QUIETCANARY is a backdoor tool written in .NET that has been used since at least 2022 to gather and exfiltrate data from victim networks.[1]
| Name | Description | 
|---|---|
| Tunnus | 
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | QUIETCANARY can use HTTPS for C2 communications.[1] | 
| Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | QUIETCANARY can base64 encode C2 communications.[1] | 
| Enterprise | T1074 | Data Staged | QUIETCANARY has the ability to stage data prior to exfiltration.[1] | |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | QUIETCANARY can use a custom parsing routine to decode the command codes and additional parameters from the C2 before executing them.[1] | |
| Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography | QUIETCANARY can RC4 encrypt C2 communications.[1] | 
| Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window | QUIETCANARY can execute processes in a hidden window.[1] | 
| Enterprise | T1106 | Native API | QUIETCANARY can call  | |
| Enterprise | T1012 | Query Registry | QUIETCANARY has the ability to retrieve information from the Registry.[1] | |
| Enterprise | T1016 | System Network Configuration Discovery | QUIETCANARY can identify the default proxy setting on a compromised host.[1] | |
| ID | Name | Description | 
|---|---|---|
| C0026 | C0026 | During C0026, the threat actors used QUIETCANARY to gather and exfiltrate data. [1] |