| Technique | Use |
|---|
System Network Configuration Discovery [ T1016] |
KONNI can collect the Internet Protocol address from the victim’s machine.
|
System Owner/User Discovery [ T1033] |
KONNI can collect the username from the victim’s machine.
|
Masquerading: Match Legitimate Name or Location [ T1036.005] |
KONNI creates a shortcut called Anti virus service.lnk in an apparent attempt to masquerade as a legitimate file.
|
Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol [ T1048.003] |
KONNI has used File Transfer Protocol to exfiltrate reconnaissance data out.
|
|
KONNI has the capability to perform keylogging.
|
Process Discovery [ T1057] |
KONNI has used tasklist.exe to get a snapshot of the current processes’ state of the target machine.
|
Command and Scripting Interpreter: PowerShell [ T1059.001] |
KONNI used PowerShell to download and execute a specific 64-bit version of the malware.
|
Command and Scripting Interpreter: Windows Command Shell [ T1059.003] |
KONNI has used cmd.exe to execute arbitrary commands on the infected host across different stages of the infection change.
|
Indicator Removal on Host: File Deletion [ T1070.004] |
KONNI can delete files.
|
Application Layer Protocol: Web Protocols [ T1071.001] |
KONNI has used Hypertext Transfer Protocol for command and control.
|
System Information Discovery [ T1082] |
KONNI can gather the operating system version, architecture information, connected drives, hostname, and computer name from the victim’s machine and has used systeminfo.exe to get a snapshot of the current system state of the target machine.
|
File and Directory Discovery [ T1083] |
A version of KONNI searches for filenames created with a previous version of the malware, suggesting different versions targeted the same victims and the versions may work together.
|
Ingress Tool Transfer [ T1105] |
KONNI can download files and execute them on the victim’s machine.
|
|
KONNI has modified registry keys of ComSysApp service and Svchost on the machine to gain persistence.
|
|
KONNI can take screenshots of the victim’s machine.
|
|
KONNI had a feature to steal data from the clipboard.
|
Data Encoding: Standard Encoding [ T1132.001] |
KONNI has used a custom base64 key to encode stolen data before exfiltration.
|
Access Token Manipulation: Create Process with Token [ T1134.002] |
KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user.
|
Deobfuscate/Decode Files or Information [ T1140] |
KONNI has used CertUtil to download and decode base64 encoded strings.
|
Signed Binary Proxy Execution: Rundll32 [ T1218.011] |
KONNI has used Rundll32 to execute its loader for privilege escalation purposes.
|
Event Triggered Execution: Component Object Model Hijacking [ T1546.015] |
KONNI has modified ComSysApp service to load the malicious DLL payload.
|
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder [ T1547.001] |
A version of KONNI drops a Windows shortcut into the Startup folder to establish persistence.
|
Boot or Logon Autostart Execution: Shortcut Modification [ T1547.009] |
A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence.
|
Abuse Elevation Control Mechanism: Bypass User Access Control [ T1548.002] |
KONNI bypassed User Account Control with the "AlwaysNotify" settings.
|
Credentials from Password Stores: Credentials from Web Browsers [ T1555.003] |
KONNI can steal profiles (containing credential information) from Firefox, Chrome, and Opera.
|