software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
23
663
description
stringclasses
826 values
url
stringclasses
826 values
S0612
WastedLocker
T1486
Data Encrypted for Impact
WastedLocker can encrypt data and leave a ransom note.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1140
Deobfuscate/Decode Files or Information
WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1083
File and Directory Discovery
WastedLocker can enumerate files and directories just prior to encryption.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1222.001
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
WastedLocker has a command to take ownership of a file and reset the ACL permissions using the takeown.exe /F filepath command.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1564.001
Hide Artifacts: Hidden Files and Directories
WastedLocker has copied a random file from the Windows System32 folder to the %APPDATA% location under a different hidden filename.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
.004
Hide Artifacts: NTFS File Attributes
WastedLocker has the ability to save and execute files as an alternate data stream (ADS).
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1574.001
Hijack Execution Flow: DLL Search Order Hijacking
WastedLocker has performed DLL hijacking before execution.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1490
Inhibit System Recovery
WastedLocker can delete shadow volumes.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1112
Modify Registry
WastedLocker can modify registry values within the Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry key.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1106
Native API
WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc() API function to help execute the payload.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1135
Network Share Discovery
WastedLocker can identify network adjacent and accessible drives.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1027.001
Obfuscated Files or Information: Binary Padding
WastedLocker contains junk code to increase its entropy and hide the actual code.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
.013
Obfuscated Files or Information: Encrypted/Encoded File
The WastedLocker payload includes encrypted strings stored within the .bss section of the binary file.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1120
Peripheral Device Discovery
WastedLocker can enumerate removable drives prior to the encryption process.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1012
Query Registry
WastedLocker checks for specific registry keys related to the UCOMIEnumConnections and IActiveScriptParseProcedure32 interfaces.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1569.002
System Services: Service Execution
WastedLocker can execute itself as a service.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0612
WastedLocker
T1497.001
Virtualization/Sandbox Evasion: System Checks
WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique.
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.
https://attack.mitre.org/software/S0612
S0579
Waterbear
T1140
Deobfuscate/Decode Files or Information
Waterbear has the ability to decrypt its RC4 encrypted payload for execution.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1574.002
Hijack Execution Flow: DLL Side-Loading
Waterbear has used DLL side loading to import and load a malicious DLL loader.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1562.006
Impair Defenses: Indicator Blocking
Waterbear can hook the ZwOpenProcess and GetExtendedTcpTable APIs called by the process of a security product to hide PIDs and TCP records from detection.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1105
Ingress Tool Transfer
Waterbear can receive and load executables from remote C2 servers.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1112
Modify Registry
Waterbear has deleted certain values from the Registry to load a malicious DLL.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1106
Native API
Waterbear can leverage API functions for execution.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1027.005
Obfuscated Files or Information: Indicator Removal from Tools
Waterbear can scramble functions not to be executed again with random values.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
.013
Obfuscated Files or Information: Encrypted/Encoded File
Waterbear has used RC4 encrypted shellcode and encrypted functions.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1057
Process Discovery
Waterbear can identify the process for a specific security product.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1055
Process Injection
Waterbear can inject decrypted shellcode into the LanmanServer service.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
.003
Thread Execution Hijacking
Waterbear can use thread injection to inject shellcode into the process of security software.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1012
Query Registry
Waterbear can query the Registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\MTxOCI" to see if the value OracleOcilib exists.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1518.001
Software Discovery: Security Software Discovery
Waterbear can find the presence of a specific security software.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0579
Waterbear
T1049
System Network Connections Discovery
Waterbear can use API hooks on GetExtendedTcpTable to retrieve a table containing a list of TCP endpoints available to the application.
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.
https://attack.mitre.org/software/S0579
S0109
WEBC2
T1059.003
Command and Scripting Interpreter: Windows Command Shell
WEBC2 can open an interactive command shell.
WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server.
https://attack.mitre.org/software/S0109
S0109
WEBC2
T1574.001
Hijack Execution Flow: DLL Search Order Hijacking
Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll).
WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server.
https://attack.mitre.org/software/S0109
S0109
WEBC2
T1105
Ingress Tool Transfer
WEBC2 can download and execute a file.
WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server.
https://attack.mitre.org/software/S0109
S0515
WellMail
T1560
Archive Collected Data
WellMail can archive files on the compromised host.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0515
WellMail
T1005
Data from Local System
WellMail can exfiltrate files from the victim machine.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0515
WellMail
T1140
Deobfuscate/Decode Files or Information
WellMail can decompress scripts received from C2.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0515
WellMail
T1573.002
Encrypted Channel: Asymmetric Cryptography
WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0515
WellMail
T1105
Ingress Tool Transfer
WellMail can receive data and executable scripts from C2.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0515
WellMail
T1095
Non-Application Layer Protocol
WellMail can use TCP for C2 communications.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0515
WellMail
T1571
Non-Standard Port
WellMail has been observed using TCP port 25, without using SMTP, to leverage an open port for secure command and control communications.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0515
WellMail
T1016
System Network Configuration Discovery
WellMail can identify the IP address of the victim system.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0515
WellMail
T1033
System Owner/User Discovery
WellMail can identify the current username on the victim system.
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
https://attack.mitre.org/software/S0515
S0514
WellMess
T1071.001
Application Layer Protocol: Web Protocols
WellMess can use HTTP and HTTPS in C2 communications.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
.004
Application Layer Protocol: DNS
WellMess has the ability to use DNS tunneling for C2 communications.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1059.001
Command and Scripting Interpreter: PowerShell
WellMess can execute PowerShell scripts received from C2.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
.003
Command and Scripting Interpreter: Windows Command Shell
WellMess can execute command line scripts received from C2.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1132.001
Data Encoding: Standard Encoding
WellMess has used Base64 encoding to uniquely identify communication to and from the C2.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1005
Data from Local System
WellMess can send files from the victim machine to C2.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1001.001
Data Obfuscation: Junk Data
WellMess can use junk data in the Base64 string for additional obfuscation.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1140
Deobfuscate/Decode Files or Information
WellMess can decode and decrypt data received from C2.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1573.001
Encrypted Channel: Symmetric Cryptography
WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
.002
Encrypted Channel: Asymmetric Cryptography
WellMess can communicate to C2 with mutual TLS where client and server mutually check certificates.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1105
Ingress Tool Transfer
WellMess can write files to a compromised host.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1069.002
Permission Groups Discovery: Domain Groups
WellMess can identify domain group membership for the current user.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1082
System Information Discovery
WellMess can identify the computer name of a compromised host.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1016
System Network Configuration Discovery
WellMess can identify the IP address and user domain on the target machine.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0514
WellMess
T1033
System Owner/User Discovery
WellMess can collect the username on the victim machine to send to C2.
WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29.
https://attack.mitre.org/software/S0514
S0645
Wevtutil
T1005
Data from Local System
Wevtutil can be used to export events from a specific log.
Wevtutil is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers.
https://attack.mitre.org/software/S0645
S0645
Wevtutil
T1562.002
Impair Defenses: Disable Windows Event Logging
Wevtutil can be used to disable specific event logs on the system.
Wevtutil is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers.
https://attack.mitre.org/software/S0645
S0645
Wevtutil
T1070.001
Indicator Removal: Clear Windows Event Logs
Wevtutil can be used to clear system and security event logs from the system.
Wevtutil is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers.
https://attack.mitre.org/software/S0645
S0689
WhisperGate
T1134.002
Access Token Manipulation: Create Process with Token
The WhisperGate third stage can use the AdvancedRun.exe tool to execute commands in the context of the Windows TrustedInstaller group via %TEMP%\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1071.001
Application Layer Protocol: Web Protocols
WhisperGate can make an HTTPS connection to download additional files.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1059.001
Command and Scripting Interpreter: PowerShell
WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
.003
Command and Scripting Interpreter: Windows Command Shell
WhisperGate can use cmd.exe to execute commands.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
.005
Command and Scripting Interpreter: Visual Basic
WhisperGate can use a Visual Basic script to exclude the C:\ drive from Windows Defender.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1485
Data Destruction
WhisperGate can corrupt files by overwriting the first 1 MB with 0xcc and appending random extensions.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1140
Deobfuscate/Decode Files or Information
WhisperGate can deobfuscate downloaded files stored in reverse byte order and decrypt embedded resources using multiple XOR operations.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1561.001
Disk Wipe: Disk Content Wipe
WhisperGate can overwrite sectors of a victim host's hard drive at periodic offsets.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
.002
Disk Wipe: Disk Structure Wipe
WhisperGate can overwrite the Master Book Record (MBR) on victim systems with a malicious 16-bit bootloader.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1083
File and Directory Discovery
WhisperGate can locate files based on hardcoded file extensions.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1562.001
Impair Defenses: Disable or Modify Tools
WhisperGate can download and execute AdvancedRun.exe to disable the Windows Defender Theat Protection service and set an exclusion path for the C:\ drive.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1070.004
Indicator Removal: File Deletion
WhisperGate can delete tools from a compromised host after execution.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1105
Ingress Tool Transfer
WhisperGate can download additional stages of malware from a Discord CDN channel.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1036
Masquerading
WhisperGate has been disguised as a JPG extension to avoid detection as a malicious PE file.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1106
Native API
WhisperGate has used the ExitWindowsEx to flush file buffers to disk and stop running processes and other API calls.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1135
Network Share Discovery
WhisperGate can enumerate connected remote logical drives.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1027.013
Obfuscated Files or Information: Encrypted/Encoded File
WhisperGate can Base64 encode strings, store downloaded files in reverse byte order, and use the Eazfuscator tool to obfuscate its third stage.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1542.003
Pre-OS Boot: Bootkit
WhisperGate overwrites the MBR with a bootloader component that performs destructive wiping operations on hard drives and displays a fake ransom note when the host boots.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1055.012
Process Injection: Process Hollowing
WhisperGate has the ability to inject its fourth stage into a suspended process created by the legitimate Windows utility InstallUtil.exe.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1620
Reflective Code Loading
WhisperGate's downloader can reverse its third stage file bytes and reflectively load the file as a .NET assembly.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1518.001
Software Discovery: Security Software Discovery
WhisperGate can recognize the presence of monitoring tools on a target system.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1218.004
System Binary Proxy Execution: InstallUtil
WhisperGate has used InstallUtil.exe as part of its process to disable Windows Defender.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1082
System Information Discovery
WhisperGate has the ability to enumerate fixed logical drives on a targeted system.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1569.002
System Services: Service Execution
WhisperGate can download and execute AdvancedRun.exe via sc.exe.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1529
System Shutdown/Reboot
WhisperGate can shutdown a compromised host through execution of ExitWindowsEx with the EXW_SHUTDOWN flag.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1497.001
Virtualization/Sandbox Evasion: System Checks
WhisperGate can stop its execution when it recognizes the presence of certain monitoring tools.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
.003
Virtualization/Sandbox Evasion: Time Based Evasion
WhisperGate can pause for 20 seconds to bypass antivirus solutions.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0689
WhisperGate
T1102
Web Service
WhisperGate can download additional payloads hosted on a Discord channel.
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.
https://attack.mitre.org/software/S0689
S0206
Wiarp
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Wiarp creates a backdoor through which remote attackers can open a command line interface.
Wiarp is a trojan used by Elderwood to open a backdoor on compromised hosts.
https://attack.mitre.org/software/S0206
S0206
Wiarp
T1543.003
Create or Modify System Process: Windows Service
Wiarp creates a backdoor through which remote attackers can create a service.
Wiarp is a trojan used by Elderwood to open a backdoor on compromised hosts.
https://attack.mitre.org/software/S0206
S0206
Wiarp
T1105
Ingress Tool Transfer
Wiarp creates a backdoor through which remote attackers can download files.
Wiarp is a trojan used by Elderwood to open a backdoor on compromised hosts.
https://attack.mitre.org/software/S0206
S0206
Wiarp
T1055
Process Injection
Wiarp creates a backdoor through which remote attackers can inject files into running processes.
Wiarp is a trojan used by Elderwood to open a backdoor on compromised hosts.
https://attack.mitre.org/software/S0206
S0005
Windows Credential Editor
T1003.001
OS Credential Dumping: LSASS Memory
Windows Credential Editor can dump credentials.
Windows Credential Editor is a password dumping tool.
https://attack.mitre.org/software/S0005
S0155
WINDSHIELD
T1070.004
Indicator Removal: File Deletion
WINDSHIELD is capable of file deletion along with other file system interaction.
WINDSHIELD is a signature backdoor used by APT32.
https://attack.mitre.org/software/S0155
S0155
WINDSHIELD
T1095
Non-Application Layer Protocol
WINDSHIELD C2 traffic can communicate via TCP raw sockets.
WINDSHIELD is a signature backdoor used by APT32.
https://attack.mitre.org/software/S0155
S0155
WINDSHIELD
T1012
Query Registry
WINDSHIELD can gather Registry values.
WINDSHIELD is a signature backdoor used by APT32.
https://attack.mitre.org/software/S0155
S0155
WINDSHIELD
T1082
System Information Discovery
WINDSHIELD can gather the victim computer name.
WINDSHIELD is a signature backdoor used by APT32.
https://attack.mitre.org/software/S0155
S0155
WINDSHIELD
T1033
System Owner/User Discovery
WINDSHIELD can gather the victim user name.
WINDSHIELD is a signature backdoor used by APT32.
https://attack.mitre.org/software/S0155
S0466
WindTail
T1071.001
Application Layer Protocol: Web Protocols
WindTail has the ability to use HTTP for C2 communications.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466