Home
Attack
Dataset
Contact Us
Attack
2024 01
T1-24–01–S–N–CL
T2-24–01–S–N–CL
T3-24–01–S–N–CL
T4-24–01–S–E–M
T5-24–01–S–E–LM
T6-24–01–S–E–FH
T7-24–01–M–NE–CLM
T8-24–01–M–NE–CFHL
T9-24–01–M–NE–CLM
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Dataset
Contact Us
T5-24-02-S-E-DL
Backdoor (with ARCANUS Tool)
Backdoor malware is malicious software designed to provide unauthorized access to a system. Attackers can use it to remotely control the system or steal data without the user’s knowledge. It is typically installed by exploiting software vulnerabilities or through infected files. Backdoors are difficult to detect and can be mitigated through regular security updates and proper firewall configurations. They pose a significant threat to system integrity, leading to severe data breaches and security compromises.
ARCANUS has the following two characteristics:
1. It is open-source and available on GitHub.
2. It is written in the Go programming language.
OS
IP
Software
Log collection
time
Program
runtime
Attacker
-
-
-
35 sec
50 sec
Victim
Ubuntu 22.04
192.168.56.119
-
Installing
python3 -m pip install -r requirements.txt
Using
python3 run.py
MITRE ATT&CK Framework
Attack Tactic
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Logs
./log/2024_02_T5_{time}.xml # YYmmdd_HHMMSS
References
[1]
Naver BLOG [칼리 리눅스 아르카누스로 악성코드 만들기]
[2]
Boannews [해커가 사랑하는 마법의 문 ‘백도어’]
[3]
Github - EgeBalci [ARCANUS]
※ Click on the attack name to see a description and scenario for the attack
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.