Skip to content

Hide Navigation Hide TOC

Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64)

Caterpillar WebShell is a self-developed Web Shell tool created by the group Volatile Cedar.(Citation: ClearSky Lebanese Cedar Jan 2021)

Cluster A Galaxy A Cluster B Galaxy B Level
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware System Network Configuration Discovery - T1016 (707399d6-ab3e-4963-9315-d9d3818cd6a0) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Network Service Discovery - T1046 (e3a12395-188d-4051-9a16-ea8e14d07b88) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Rootkit - T1014 (0f20e3cb-245b-4a61-8a91-2d93f7cb0e9b) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Modify Registry - T1112 (57340c81-c025-4189-8fa0-fc7ede51bae4) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware File and Directory Discovery - T1083 (7bc57495-ea59-4380-be31-a64af124ef18) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Exfiltration Over C2 Channel - T1041 (92d7da27-2d91-488e-a00c-059dc162766d) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware System Service Discovery - T1007 (322bad5a-1c49-4d23-ab79-76d641794afa) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Brute Force - T1110 (a93494bb-4b80-4ea1-8695-3236a49916fd) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Data from Local System - T1005 (3c4a2599-71ee-4405-ba1e-0e28414b4bc5) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Process Discovery - T1057 (8f4a33ec-8b1f-4b80-a2f6-642b2e479580) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware System Owner/User Discovery - T1033 (03d7999c-1f4c-42cc-8373-e7690d318104) Attack Pattern 1
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Local Groups - T1069.001 (a01bf75f-00b2-4568-a58f-565ff9bf202b) Attack Pattern 1
Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) Attack Pattern Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern 2
Local Groups - T1069.001 (a01bf75f-00b2-4568-a58f-565ff9bf202b) Attack Pattern Permission Groups Discovery - T1069 (15dbf668-795c-41e6-8219-f0447c0e64ce) Attack Pattern 2