software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 23
663
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0418 | ViceLeaker | T1630.002 | Indicator Removal on Host: File Deletion | ViceLeaker can delete arbitrary files from the device. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0418 | ViceLeaker | T1544 | Ingress Tool Transfer | ViceLeaker can download attacker-specified files. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0418 | ViceLeaker | T1430 | Location Tracking | ViceLeaker can collect location information, including GPS coordinates. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0418 | ViceLeaker | T1655.001 | Masquerading: Match Legitimate Name or Location | ViceLeaker was embedded into legitimate applications using Smali injection. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0418 | ViceLeaker | T1636.002 | Protected User Data: Call Log | ViceLeaker can collect the device’s call log. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0418 | ViceLeaker | .004 | Protected User Data: SMS Messages | ViceLeaker can collect SMS messages. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0418 | ViceLeaker | T1418 | Software Discovery | ViceLeaker can obtain a list of installed applications. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0418 | ViceLeaker | T1426 | System Information Discovery | ViceLeaker collects device information, including the device model and OS version. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0418 | ViceLeaker | T1512 | Video Capture | ViceLeaker can take photos from both the front and back cameras. | ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens. | https://attack.mitre.org/software/S0418 |
S0506 | ViperRAT | T1429 | Audio Capture | ViperRAT can collect and record audio content. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1533 | Data from Local System | ViperRAT can collect device photos, PDF documents, Office documents, browser history, and browser bookmarks. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1407 | Download New Code at Runtime | ViperRAT has been installed in two stages and can secretly install new applications. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1430 | Location Tracking | ViperRAT can track the device’s location. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1655.001 | Masquerading: Match Legitimate Name or Location | ViperRAT’s second stage has masqueraded as "System Updates", "Viber Update", and "WhatsApp Update". | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1636.002 | Protected User Data: Call Log | ViperRAT can collect the device’s call log. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | .003 | Protected User Data: Contact List | ViperRAT can collect the device’s contact list. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | .004 | Protected User Data: SMS Messages | ViperRAT can collect SMS messages. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1426 | System Information Discovery | ViperRAT can collect system information, including brand, manufacturer, and serial number. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1422 | System Network Configuration Discovery | ViperRAT can collect network configuration data from the device, including phone number, SIM operator, and network operator. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | .001 | Internet Connection Discovery | ViperRAT can collect network configuration data from the device, including phone number, SIM operator, and network operator. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1421 | System Network Connections Discovery | ViperRAT can collect the device’s cell tower information. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0506 | ViperRAT | T1512 | Video Capture | ViperRAT can take photos with the device camera. | ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force. | https://attack.mitre.org/software/S0506 |
S0180 | Volgmer | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | Volgmer can execute commands on the victim's machine. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1543.003 | Create or Modify System Process: Windows Service | Volgmer installs a copy of itself in a randomly selected service, then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1140 | Deobfuscate/Decode Files or Information | Volgmer deobfuscates its strings and APIs once its executed. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1573.001 | Encrypted Channel: Symmetric Cryptography | Volgmer uses a simple XOR cipher to encrypt traffic and files. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | .002 | Encrypted Channel: Asymmetric Cryptography | Some Volgmer variants use SSL to encrypt C2 communications. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1083 | File and Directory Discovery | Volgmer can list directories on a victim. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1070.004 | Indicator Removal: File Deletion | Volgmer can delete files and itself after infection to avoid analysis. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1105 | Ingress Tool Transfer | Volgmer can download remote files and additional payloads to the victim's machine. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1036.004 | Masquerading: Masquerade Task or Service | Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1112 | Modify Registry | Volgmer modifies the Registry to store an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1106 | Native API | Volgmer executes payloads using the Windows API call CreateProcessW(). | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1027.011 | Obfuscated Files or Information: Fileless Storage | Volgmer stores an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | .013 | Obfuscated Files or Information: Encrypted/Encoded File | A Volgmer variant is encoded using a simple XOR cipher. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1057 | Process Discovery | Volgmer can gather a list of processes. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1012 | Query Registry | Volgmer checks the system for certain Registry keys. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1082 | System Information Discovery | Volgmer can gather system information, the computer name, OS version, drive and serial information from the victim's machine. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1016 | System Network Configuration Discovery | Volgmer can gather the IP address from the victim's machine. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1049 | System Network Connections Discovery | Volgmer can gather information about TCP connection state. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S0180 | Volgmer | T1007 | System Service Discovery | Volgmer queries the system to identify existing services. | Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. | https://attack.mitre.org/software/S0180 |
S1010 | VPNFilter | T1561.001 | Disk Wipe: Disk Content Wipe | VPNFilter has the capability to wipe a portion of an infected device's firmware. | VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019. | https://attack.mitre.org/software/S1010 |
S1010 | VPNFilter | T0830 | Adversary-in-the-Middle | The VPNFilter's ssler module configures the device's iptables to redirect all traffic destined for port 80 to its local service listening on port 8888. Any outgoing web requests on port 80 are now intercepted by ssler and can be inspected by the ps module and manipulated before being sent to the legitimate HTTP service. | VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019. | https://attack.mitre.org/software/S1010 |
S1010 | VPNFilter | T0842 | Network Sniffing | The VPNFilter packet sniffer looks for basic authentication as well as monitors ICS traffic, and is specific to the TP-LINK R600-VPN. The malware uses a raw socket to look for connections to a pre-specified IP address, only looking at TCP packets that are 150 bytes or larger. Packets that are not on port 502, are scanned for BasicAuth, and that information is logged. This may have allowed credential harvesting from communications between devices accessing a modbus-enabled HMI. | VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019. | https://attack.mitre.org/software/S1010 |
S0366 | WannaCry | T1543.003 | Create or Modify System Process: Windows Service | WannaCry creates the service "mssecsvc2.0" with the display name "Microsoft Security Center (2.0) Service." | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1486 | Data Encrypted for Impact | WannaCry encrypts user files and demands that a ransom be paid in Bitcoin to decrypt those files. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1573.002 | Encrypted Channel: Asymmetric Cryptography | WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1210 | Exploitation of Remote Services | WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1083 | File and Directory Discovery | WannaCry searches for variety of user files by file extension before encrypting them using RSA and AES, including Office, PDF, image, audio, video, source code, archive/compression format, and key and certificate files. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1222.001 | File and Directory Permissions Modification: Windows File and Directory Permissions Modification | WannaCry uses attrib +h and icacls . /grant Everyone:F /T /C /Q to make some of its files hidden and grant all users full access controls. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1564.001 | Hide Artifacts: Hidden Files and Directories | WannaCry uses attrib +h to make some of its files hidden. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1490 | Inhibit System Recovery | WannaCry uses vssadmin, wbadmin, bcdedit, and wmic to delete and disable operating system recovery features. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1570 | Lateral Tool Transfer | WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1120 | Peripheral Device Discovery | WannaCry contains a thread that will attempt to scan for new attached drives every few seconds. If one is identified, it will encrypt the files on the attached device. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1090.003 | Proxy: Multi-hop Proxy | WannaCry uses Tor for command and control traffic. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1563.002 | Remote Service Session Hijacking: RDP Hijacking | WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1018 | Remote System Discovery | WannaCry scans its local network segment for remote systems to try to exploit and copy itself to. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1489 | Service Stop | WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1016 | System Network Configuration Discovery | WannaCry will attempt to determine the local network segment it is a part of. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T1047 | Windows Management Instrumentation | WannaCry utilizes wmic to delete shadow copies. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T0866 | Exploitation of Remote Services | WannaCry initially infected IT networks, but by means of an exploit (particularly the SMBv1-targeting MS17-010 vulnerability) spread to industrial networks. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S0366 | WannaCry | T0867 | Lateral Tool Transfer | WannaCry can move laterally through industrial networks by means of the SMB service. | WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue. | https://attack.mitre.org/software/S0366 |
S1116 | WARPWIRE | T1059.007 | Command and Scripting Interpreter: JavaScript | WARPWIRE is a credential harvester written in JavaScript. | WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs. | https://attack.mitre.org/software/S1116 |
S1116 | WARPWIRE | T1554 | Compromise Host Software Binary | WARPWIRE can embed itself into a legitimate file on compromised Ivanti Connect Secure VPNs. | WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs. | https://attack.mitre.org/software/S1116 |
S1116 | WARPWIRE | T1132.001 | Data Encoding: Standard Encoding | WARPWIRE can Base64 encode captured credentials with btoa() prior to sending to C2. | WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs. | https://attack.mitre.org/software/S1116 |
S1116 | WARPWIRE | T1048.003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol | WARPWIRE can send captured credentials to C2 via HTTP GET or POST requests. | WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs. | https://attack.mitre.org/software/S1116 |
S1116 | WARPWIRE | T1056.003 | Input Capture: Web Portal Capture | WARPWIRE can capture credentials submitted during the web logon process in order to access layer seven applications such as RDP. | WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs. | https://attack.mitre.org/software/S1116 |
S0670 | WarzoneRAT | T1548.002 | Abuse Elevation Control Mechanism: Bypass User Account Control | WarzoneRAT can use sdclt.exe to bypass UAC in Windows 10 to escalate privileges; for older Windows versions WarzoneRAT can use the IFileOperation exploit to bypass the UAC module. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | WarzoneRAT can add itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run and HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UIF2IS20VK Registry keys. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1059.001 | Command and Scripting Interpreter: PowerShell | WarzoneRAT can use PowerShell to download files and execute commands. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | .003 | Command and Scripting Interpreter: Windows Command Shell | WarzoneRAT can use cmd.exe to execute malicious code. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1555.003 | Credentials from Password Stores: Credentials from Web Browsers | WarzoneRAT has the capability to grab passwords from numerous web browsers as well as from Outlook and Thunderbird email clients. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1005 | Data from Local System | WarzoneRAT can collect data from a compromised host. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1140 | Deobfuscate/Decode Files or Information | WarzoneRAT can use XOR 0x45 to decrypt obfuscated code. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1573.001 | Encrypted Channel: Symmetric Cryptography | WarzoneRAT can encrypt its C2 with RC4 with the password warzone160\x00. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1546.015 | Event Triggered Execution: Component Object Model Hijacking | WarzoneRAT can perform COM hijacking by setting the path to itself to the HKCU\Software\Classes\Folder\shell\open\command key with a DelegateExecute parameter. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1041 | Exfiltration Over C2 Channel | WarzoneRAT can send collected victim data to its C2 server. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1083 | File and Directory Discovery | WarzoneRAT can enumerate directories on a compromise host. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1564 | Hide Artifacts | WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide its attempts to elevate privileges through IFileOperation. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | .003 | Hidden Window | WarzoneRAT has the ability of performing remote desktop access via a hVNC window for decreased visibility. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1562.001 | Impair Defenses: Disable or Modify Tools | WarzoneRAT can disarm Windows Defender during the UAC process to evade detection. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1105 | Ingress Tool Transfer | WarzoneRAT can download and execute additional files. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1056.001 | Input Capture: Keylogging | WarzoneRAT has the capability to install a live and offline keylogger, including through the use of the GetAsyncKeyState Windows API. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1112 | Modify Registry | WarzoneRAT can create HKCU\Software\Classes\Folder\shell\open\command as a new registry key during privilege escalation. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1106 | Native API | WarzoneRAT can use a variety of API calls on a compromised host. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1095 | Non-Application Layer Protocol | WarzoneRAT can communicate with its C2 server via TCP over port 5200. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1566.001 | Phishing: Spearphishing Attachment | WarzoneRAT has been distributed as a malicious attachment within an email. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1057 | Process Discovery | WarzoneRAT can obtain a list of processes on a compromised host. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1055 | Process Injection | WarzoneRAT has the ability to inject malicious DLLs into a specific process for privilege escalation. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1090 | Proxy | WarzoneRAT has the capability to act as a reverse proxy. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1021.001 | Remote Services: Remote Desktop Protocol | WarzoneRAT has the ability to control an infected PC using RDP. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | .005 | Remote Services: VNC | WarzoneRAT has the ability of performing remote desktop access via a VNC console. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1014 | Rootkit | WarzoneRAT can include a rootkit to hide processes, files, and startup. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1082 | System Information Discovery | WarzoneRAT can collect compromised host information, including OS version, PC name, RAM size, and CPU details. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1221 | Template Injection | WarzoneRAT has been install via template injection through a malicious DLL embedded within a template RTF in a Word document. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1204.002 | User Execution: Malicious File | WarzoneRAT has relied on a victim to open a malicious attachment within an email for execution. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0670 | WarzoneRAT | T1125 | Video Capture | WarzoneRAT can access the webcam on a victim's machine. | WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018. | https://attack.mitre.org/software/S0670 |
S0612 | WastedLocker | T1548.002 | Abuse Elevation Control Mechanism: Bypass User Account Control | WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | WastedLocker has used cmd to execute commands on the system. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1543.003 | Create or Modify System Process: Windows Service | WastedLocker created and established a service that runs until the encryption process is complete. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
Subsets and Splits