software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
23
663
description
stringclasses
826 values
url
stringclasses
826 values
S0418
ViceLeaker
T1630.002
Indicator Removal on Host: File Deletion
ViceLeaker can delete arbitrary files from the device.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0418
ViceLeaker
T1544
Ingress Tool Transfer
ViceLeaker can download attacker-specified files.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0418
ViceLeaker
T1430
Location Tracking
ViceLeaker can collect location information, including GPS coordinates.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0418
ViceLeaker
T1655.001
Masquerading: Match Legitimate Name or Location
ViceLeaker was embedded into legitimate applications using Smali injection.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0418
ViceLeaker
T1636.002
Protected User Data: Call Log
ViceLeaker can collect the device’s call log.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0418
ViceLeaker
.004
Protected User Data: SMS Messages
ViceLeaker can collect SMS messages.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0418
ViceLeaker
T1418
Software Discovery
ViceLeaker can obtain a list of installed applications.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0418
ViceLeaker
T1426
System Information Discovery
ViceLeaker collects device information, including the device model and OS version.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0418
ViceLeaker
T1512
Video Capture
ViceLeaker can take photos from both the front and back cameras.
ViceLeaker is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.
https://attack.mitre.org/software/S0418
S0506
ViperRAT
T1429
Audio Capture
ViperRAT can collect and record audio content.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1533
Data from Local System
ViperRAT can collect device photos, PDF documents, Office documents, browser history, and browser bookmarks.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1407
Download New Code at Runtime
ViperRAT has been installed in two stages and can secretly install new applications.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1430
Location Tracking
ViperRAT can track the device’s location.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1655.001
Masquerading: Match Legitimate Name or Location
ViperRAT’s second stage has masqueraded as "System Updates", "Viber Update", and "WhatsApp Update".
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1636.002
Protected User Data: Call Log
ViperRAT can collect the device’s call log.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
.003
Protected User Data: Contact List
ViperRAT can collect the device’s contact list.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
.004
Protected User Data: SMS Messages
ViperRAT can collect SMS messages.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1426
System Information Discovery
ViperRAT can collect system information, including brand, manufacturer, and serial number.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1422
System Network Configuration Discovery
ViperRAT can collect network configuration data from the device, including phone number, SIM operator, and network operator.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
.001
Internet Connection Discovery
ViperRAT can collect network configuration data from the device, including phone number, SIM operator, and network operator.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1421
System Network Connections Discovery
ViperRAT can collect the device’s cell tower information.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0506
ViperRAT
T1512
Video Capture
ViperRAT can take photos with the device camera.
ViperRAT is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.
https://attack.mitre.org/software/S0506
S0180
Volgmer
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Volgmer can execute commands on the victim's machine.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1543.003
Create or Modify System Process: Windows Service
Volgmer installs a copy of itself in a randomly selected service, then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1140
Deobfuscate/Decode Files or Information
Volgmer deobfuscates its strings and APIs once its executed.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1573.001
Encrypted Channel: Symmetric Cryptography
Volgmer uses a simple XOR cipher to encrypt traffic and files.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
.002
Encrypted Channel: Asymmetric Cryptography
Some Volgmer variants use SSL to encrypt C2 communications.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1083
File and Directory Discovery
Volgmer can list directories on a victim.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1070.004
Indicator Removal: File Deletion
Volgmer can delete files and itself after infection to avoid analysis.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1105
Ingress Tool Transfer
Volgmer can download remote files and additional payloads to the victim's machine.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1036.004
Masquerading: Masquerade Task or Service
Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1112
Modify Registry
Volgmer modifies the Registry to store an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1106
Native API
Volgmer executes payloads using the Windows API call CreateProcessW().
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1027.011
Obfuscated Files or Information: Fileless Storage
Volgmer stores an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
.013
Obfuscated Files or Information: Encrypted/Encoded File
A Volgmer variant is encoded using a simple XOR cipher.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1057
Process Discovery
Volgmer can gather a list of processes.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1012
Query Registry
Volgmer checks the system for certain Registry keys.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1082
System Information Discovery
Volgmer can gather system information, the computer name, OS version, drive and serial information from the victim's machine.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1016
System Network Configuration Discovery
Volgmer can gather the IP address from the victim's machine.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1049
System Network Connections Discovery
Volgmer can gather information about TCP connection state.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S0180
Volgmer
T1007
System Service Discovery
Volgmer queries the system to identify existing services.
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing.
https://attack.mitre.org/software/S0180
S1010
VPNFilter
T1561.001
Disk Wipe: Disk Content Wipe
VPNFilter has the capability to wipe a portion of an infected device's firmware.
VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019.
https://attack.mitre.org/software/S1010
S1010
VPNFilter
T0830
Adversary-in-the-Middle
The VPNFilter's ssler module configures the device's iptables to redirect all traffic destined for port 80 to its local service listening on port 8888. Any outgoing web requests on port 80 are now intercepted by ssler and can be inspected by the ps module and manipulated before being sent to the legitimate HTTP service.
VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019.
https://attack.mitre.org/software/S1010
S1010
VPNFilter
T0842
Network Sniffing
The VPNFilter packet sniffer looks for basic authentication as well as monitors ICS traffic, and is specific to the TP-LINK R600-VPN. The malware uses a raw socket to look for connections to a pre-specified IP address, only looking at TCP packets that are 150 bytes or larger. Packets that are not on port 502, are scanned for BasicAuth, and that information is logged. This may have allowed credential harvesting from communications between devices accessing a modbus-enabled HMI.
VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019.
https://attack.mitre.org/software/S1010
S0366
WannaCry
T1543.003
Create or Modify System Process: Windows Service
WannaCry creates the service "mssecsvc2.0" with the display name "Microsoft Security Center (2.0) Service."
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1486
Data Encrypted for Impact
WannaCry encrypts user files and demands that a ransom be paid in Bitcoin to decrypt those files.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1573.002
Encrypted Channel: Asymmetric Cryptography
WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1210
Exploitation of Remote Services
WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1083
File and Directory Discovery
WannaCry searches for variety of user files by file extension before encrypting them using RSA and AES, including Office, PDF, image, audio, video, source code, archive/compression format, and key and certificate files.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1222.001
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
WannaCry uses attrib +h and icacls . /grant Everyone:F /T /C /Q to make some of its files hidden and grant all users full access controls.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1564.001
Hide Artifacts: Hidden Files and Directories
WannaCry uses attrib +h to make some of its files hidden.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1490
Inhibit System Recovery
WannaCry uses vssadmin, wbadmin, bcdedit, and wmic to delete and disable operating system recovery features.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1570
Lateral Tool Transfer
WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1120
Peripheral Device Discovery
WannaCry contains a thread that will attempt to scan for new attached drives every few seconds. If one is identified, it will encrypt the files on the attached device.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1090.003
Proxy: Multi-hop Proxy
WannaCry uses Tor for command and control traffic.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1563.002
Remote Service Session Hijacking: RDP Hijacking
WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1018
Remote System Discovery
WannaCry scans its local network segment for remote systems to try to exploit and copy itself to.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1489
Service Stop
WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1016
System Network Configuration Discovery
WannaCry will attempt to determine the local network segment it is a part of.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T1047
Windows Management Instrumentation
WannaCry utilizes wmic to delete shadow copies.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T0866
Exploitation of Remote Services
WannaCry initially infected IT networks, but by means of an exploit (particularly the SMBv1-targeting MS17-010 vulnerability) spread to industrial networks.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S0366
WannaCry
T0867
Lateral Tool Transfer
WannaCry can move laterally through industrial networks by means of the SMB service.
WannaCry is ransomware that was first seen in a global attack during May 2017, which affected more than 150 countries. It contains worm-like features to spread itself across a computer network using the SMBv1 exploit EternalBlue.
https://attack.mitre.org/software/S0366
S1116
WARPWIRE
T1059.007
Command and Scripting Interpreter: JavaScript
WARPWIRE is a credential harvester written in JavaScript.
WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs.
https://attack.mitre.org/software/S1116
S1116
WARPWIRE
T1554
Compromise Host Software Binary
WARPWIRE can embed itself into a legitimate file on compromised Ivanti Connect Secure VPNs.
WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs.
https://attack.mitre.org/software/S1116
S1116
WARPWIRE
T1132.001
Data Encoding: Standard Encoding
WARPWIRE can Base64 encode captured credentials with btoa() prior to sending to C2.
WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs.
https://attack.mitre.org/software/S1116
S1116
WARPWIRE
T1048.003
Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol
WARPWIRE can send captured credentials to C2 via HTTP GET or POST requests.
WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs.
https://attack.mitre.org/software/S1116
S1116
WARPWIRE
T1056.003
Input Capture: Web Portal Capture
WARPWIRE can capture credentials submitted during the web logon process in order to access layer seven applications such as RDP.
WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs.
https://attack.mitre.org/software/S1116
S0670
WarzoneRAT
T1548.002
Abuse Elevation Control Mechanism: Bypass User Account Control
WarzoneRAT can use sdclt.exe to bypass UAC in Windows 10 to escalate privileges; for older Windows versions WarzoneRAT can use the IFileOperation exploit to bypass the UAC module.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
WarzoneRAT can add itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run and HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UIF2IS20VK Registry keys.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1059.001
Command and Scripting Interpreter: PowerShell
WarzoneRAT can use PowerShell to download files and execute commands.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
.003
Command and Scripting Interpreter: Windows Command Shell
WarzoneRAT can use cmd.exe to execute malicious code.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1555.003
Credentials from Password Stores: Credentials from Web Browsers
WarzoneRAT has the capability to grab passwords from numerous web browsers as well as from Outlook and Thunderbird email clients.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1005
Data from Local System
WarzoneRAT can collect data from a compromised host.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1140
Deobfuscate/Decode Files or Information
WarzoneRAT can use XOR 0x45 to decrypt obfuscated code.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1573.001
Encrypted Channel: Symmetric Cryptography
WarzoneRAT can encrypt its C2 with RC4 with the password warzone160\x00.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1546.015
Event Triggered Execution: Component Object Model Hijacking
WarzoneRAT can perform COM hijacking by setting the path to itself to the HKCU\Software\Classes\Folder\shell\open\command key with a DelegateExecute parameter.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1041
Exfiltration Over C2 Channel
WarzoneRAT can send collected victim data to its C2 server.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1083
File and Directory Discovery
WarzoneRAT can enumerate directories on a compromise host.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1564
Hide Artifacts
WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide its attempts to elevate privileges through IFileOperation.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
.003
Hidden Window
WarzoneRAT has the ability of performing remote desktop access via a hVNC window for decreased visibility.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1562.001
Impair Defenses: Disable or Modify Tools
WarzoneRAT can disarm Windows Defender during the UAC process to evade detection.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1105
Ingress Tool Transfer
WarzoneRAT can download and execute additional files.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1056.001
Input Capture: Keylogging
WarzoneRAT has the capability to install a live and offline keylogger, including through the use of the GetAsyncKeyState Windows API.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1112
Modify Registry
WarzoneRAT can create HKCU\Software\Classes\Folder\shell\open\command as a new registry key during privilege escalation.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1106
Native API
WarzoneRAT can use a variety of API calls on a compromised host.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1095
Non-Application Layer Protocol
WarzoneRAT can communicate with its C2 server via TCP over port 5200.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1566.001
Phishing: Spearphishing Attachment
WarzoneRAT has been distributed as a malicious attachment within an email.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1057
Process Discovery
WarzoneRAT can obtain a list of processes on a compromised host.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1055
Process Injection
WarzoneRAT has the ability to inject malicious DLLs into a specific process for privilege escalation.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1090
Proxy
WarzoneRAT has the capability to act as a reverse proxy.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1021.001
Remote Services: Remote Desktop Protocol
WarzoneRAT has the ability to control an infected PC using RDP.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
.005
Remote Services: VNC
WarzoneRAT has the ability of performing remote desktop access via a VNC console.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1014
Rootkit
WarzoneRAT can include a rootkit to hide processes, files, and startup.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1082
System Information Discovery
WarzoneRAT can collect compromised host information, including OS version, PC name, RAM size, and CPU details.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1221
Template Injection
WarzoneRAT has been install via template injection through a malicious DLL embedded within a template RTF in a Word document.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1204.002
User Execution: Malicious File
WarzoneRAT has relied on a victim to open a malicious attachment within an email for execution.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0670
WarzoneRAT
T1125
Video Capture
WarzoneRAT can access the webcam on a victim's machine.
WarzoneRAT is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.
https://attack.mitre.org/software/S0670
S0612
WastedLocker
T1548.002
Abuse Elevation Control Mechanism: Bypass User Account Control
WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1059.003
Command and Scripting Interpreter: Windows Command Shell
WastedLocker has used cmd to execute commands on the system.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1543.003
Create or Modify System Process: Windows Service
WastedLocker created and established a service that runs until the encryption process is complete.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612