Lua (T1059.011)

View on ATT&CK

In Playbook

Associated Tactics

  • Execution

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
Global Research and Analysis Team. (2016, August 9). The ProjectSauron APT. Retrieved August 5, 2024. Kaspersky Lua
Lua. (2024, June 25). Getting started. Retrieved August 5, 2024. Lua main page
Lua. (n.d.). lua_State. Retrieved August 5, 2024. Lua state
Marschalek, Marion. (2014, December 16). EvilBunny: Malware Instrumented By Lua. Retrieved August 5, 2024. Cyphort EvilBunny
Mercer, Warren. (2020, October 6). PoetRAT: Malware targeting public and private sector in Azerbaijan evolves. Retrieved August 5, 2024. PoetRat Lua
Raggi, Michael. Cass, Zydeca. The Proofpoint Threat Research Team.. (2022, March 1). Asylum Ambuscade: State Actor Uses Lua-based Sunseed Malware to Target European Governments and Refugee Movement. Retrieved August 5, 2024. Lua Proofpoint Sunseed