Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1020 | Automated Exfiltration |
Doki has used a script that gathers information from a hardcoded list of IP addresses and uploads to an Ngrok URL.[1] |
|
Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell | |
Enterprise | T1610 | Deploy Container | ||
Enterprise | T1568 | .002 | Dynamic Resolution: Domain Generation Algorithms |
Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains.[1] |
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography |
Doki has used the embedTLS library for network communications.[1] |
Enterprise | T1611 | Escape to Host |
Doki’s container was configured to bind the host root directory.[1] |
|
Enterprise | T1041 | Exfiltration Over C2 Channel | ||
Enterprise | T1133 | External Remote Services |
Doki was executed through an open Docker daemon API port.[1] |
|
Enterprise | T1083 | File and Directory Discovery |
Doki has resolved the path of a process PID to use as a script argument.[1] |
|
Enterprise | T1105 | Ingress Tool Transfer | ||
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location | |
Enterprise | T1057 | Process Discovery | ||
Enterprise | T1102 | Web Service |
Doki has used the dogechain.info API to generate a C2 address.[1] |