Currently viewing ATT&CK v8.2 which was live between October 27, 2020 and April 28, 2021. Learn more about the versioning system or see the live site.

Seasalt

Seasalt is malware that has been linked to APT1's 2010 operations. It shares some code similarities with OceanSalt.[1][2]

ID: S0345
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 30 January 2019
Last Modified: 19 March 2020

Techniques Used

Domain ID Name Use
Enterprise T1071 .001 Application Layer Protocol: Web Protocols

Seasalt uses HTTP for C2 communications.[1]

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Seasalt creates a Registry entry to ensure infection after reboot under HKLM\Software\Microsoft\Windows\currentVersion\Run.[2]

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

Seasalt uses cmd.exe to create a reverse shell on the infected endpoint.[1]

Enterprise T1543 .003 Create or Modify System Process: Windows Service

Seasalt is capable of installing itself as a service.[1]

Enterprise T1083 File and Directory Discovery

Seasalt has the capability to identify the drive type on a victim.[2]

Enterprise T1070 .004 Indicator Removal on Host: File Deletion

Seasalt has a command to delete a specified file.[1]

Enterprise T1105 Ingress Tool Transfer

Seasalt has a command to download additional files.[1][1]

Enterprise T1036 .004 Masquerading: Masquerade Task or Service

Seasalt has masqueraded as a service called "SaSaut" with a display name of "System Authorization Service" in an apparent attempt to masquerade as a legitimate service.[1]

Enterprise T1027 Obfuscated Files or Information

Seasalt obfuscates configuration data.[1]

Enterprise T1057 Process Discovery

Seasalt has a command to perform a process listing.[1]

Groups That Use This Software

ID Name References
G0006 APT1

[1][2]

References