software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 23
663
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0612 | WastedLocker | T1486 | Data Encrypted for Impact | WastedLocker can encrypt data and leave a ransom note. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1140 | Deobfuscate/Decode Files or Information | WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1083 | File and Directory Discovery | WastedLocker can enumerate files and directories just prior to encryption. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1222.001 | File and Directory Permissions Modification: Windows File and Directory Permissions Modification | WastedLocker has a command to take ownership of a file and reset the ACL permissions using the takeown.exe /F filepath command. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1564.001 | Hide Artifacts: Hidden Files and Directories | WastedLocker has copied a random file from the Windows System32 folder to the %APPDATA% location under a different hidden filename. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | .004 | Hide Artifacts: NTFS File Attributes | WastedLocker has the ability to save and execute files as an alternate data stream (ADS). | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1574.001 | Hijack Execution Flow: DLL Search Order Hijacking | WastedLocker has performed DLL hijacking before execution. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1490 | Inhibit System Recovery | WastedLocker can delete shadow volumes. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1112 | Modify Registry | WastedLocker can modify registry values within the Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry key. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1106 | Native API | WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc() API function to help execute the payload. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1135 | Network Share Discovery | WastedLocker can identify network adjacent and accessible drives. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1027.001 | Obfuscated Files or Information: Binary Padding | WastedLocker contains junk code to increase its entropy and hide the actual code. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | .013 | Obfuscated Files or Information: Encrypted/Encoded File | The WastedLocker payload includes encrypted strings stored within the .bss section of the binary file. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1120 | Peripheral Device Discovery | WastedLocker can enumerate removable drives prior to the encryption process. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1012 | Query Registry | WastedLocker checks for specific registry keys related to the UCOMIEnumConnections and IActiveScriptParseProcedure32 interfaces. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1569.002 | System Services: Service Execution | WastedLocker can execute itself as a service. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0612 | WastedLocker | T1497.001 | Virtualization/Sandbox Evasion: System Checks | WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique. | WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media. | https://attack.mitre.org/software/S0612 |
S0579 | Waterbear | T1140 | Deobfuscate/Decode Files or Information | Waterbear has the ability to decrypt its RC4 encrypted payload for execution. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1574.002 | Hijack Execution Flow: DLL Side-Loading | Waterbear has used DLL side loading to import and load a malicious DLL loader. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1562.006 | Impair Defenses: Indicator Blocking | Waterbear can hook the ZwOpenProcess and GetExtendedTcpTable APIs called by the process of a security product to hide PIDs and TCP records from detection. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1105 | Ingress Tool Transfer | Waterbear can receive and load executables from remote C2 servers. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1112 | Modify Registry | Waterbear has deleted certain values from the Registry to load a malicious DLL. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1106 | Native API | Waterbear can leverage API functions for execution. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1027.005 | Obfuscated Files or Information: Indicator Removal from Tools | Waterbear can scramble functions not to be executed again with random values. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | .013 | Obfuscated Files or Information: Encrypted/Encoded File | Waterbear has used RC4 encrypted shellcode and encrypted functions. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1057 | Process Discovery | Waterbear can identify the process for a specific security product. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1055 | Process Injection | Waterbear can inject decrypted shellcode into the LanmanServer service. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | .003 | Thread Execution Hijacking | Waterbear can use thread injection to inject shellcode into the process of security software. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1012 | Query Registry | Waterbear can query the Registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\MTxOCI" to see if the value OracleOcilib exists. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1518.001 | Software Discovery: Security Software Discovery | Waterbear can find the presence of a specific security software. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0579 | Waterbear | T1049 | System Network Connections Discovery | Waterbear can use API hooks on GetExtendedTcpTable to retrieve a table containing a list of TCP endpoints available to the application. | Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors. | https://attack.mitre.org/software/S0579 |
S0109 | WEBC2 | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | WEBC2 can open an interactive command shell. | WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server. | https://attack.mitre.org/software/S0109 |
S0109 | WEBC2 | T1574.001 | Hijack Execution Flow: DLL Search Order Hijacking | Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll). | WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server. | https://attack.mitre.org/software/S0109 |
S0109 | WEBC2 | T1105 | Ingress Tool Transfer | WEBC2 can download and execute a file. | WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server. | https://attack.mitre.org/software/S0109 |
S0515 | WellMail | T1560 | Archive Collected Data | WellMail can archive files on the compromised host. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0515 | WellMail | T1005 | Data from Local System | WellMail can exfiltrate files from the victim machine. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0515 | WellMail | T1140 | Deobfuscate/Decode Files or Information | WellMail can decompress scripts received from C2. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0515 | WellMail | T1573.002 | Encrypted Channel: Asymmetric Cryptography | WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0515 | WellMail | T1105 | Ingress Tool Transfer | WellMail can receive data and executable scripts from C2. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0515 | WellMail | T1095 | Non-Application Layer Protocol | WellMail can use TCP for C2 communications. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0515 | WellMail | T1571 | Non-Standard Port | WellMail has been observed using TCP port 25, without using SMTP, to leverage an open port for secure command and control communications. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0515 | WellMail | T1016 | System Network Configuration Discovery | WellMail can identify the IP address of the victim system. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0515 | WellMail | T1033 | System Owner/User Discovery | WellMail can identify the current username on the victim system. | WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess. | https://attack.mitre.org/software/S0515 |
S0514 | WellMess | T1071.001 | Application Layer Protocol: Web Protocols | WellMess can use HTTP and HTTPS in C2 communications. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | .004 | Application Layer Protocol: DNS | WellMess has the ability to use DNS tunneling for C2 communications. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1059.001 | Command and Scripting Interpreter: PowerShell | WellMess can execute PowerShell scripts received from C2. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | .003 | Command and Scripting Interpreter: Windows Command Shell | WellMess can execute command line scripts received from C2. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1132.001 | Data Encoding: Standard Encoding | WellMess has used Base64 encoding to uniquely identify communication to and from the C2. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1005 | Data from Local System | WellMess can send files from the victim machine to C2. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1001.001 | Data Obfuscation: Junk Data | WellMess can use junk data in the Base64 string for additional obfuscation. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1140 | Deobfuscate/Decode Files or Information | WellMess can decode and decrypt data received from C2. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1573.001 | Encrypted Channel: Symmetric Cryptography | WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | .002 | Encrypted Channel: Asymmetric Cryptography | WellMess can communicate to C2 with mutual TLS where client and server mutually check certificates. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1105 | Ingress Tool Transfer | WellMess can write files to a compromised host. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1069.002 | Permission Groups Discovery: Domain Groups | WellMess can identify domain group membership for the current user. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1082 | System Information Discovery | WellMess can identify the computer name of a compromised host. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1016 | System Network Configuration Discovery | WellMess can identify the IP address and user domain on the target machine. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0514 | WellMess | T1033 | System Owner/User Discovery | WellMess can collect the username on the victim machine to send to C2. | WellMess is lightweight malware family with variants written in .NET and Golang that has been in use since at least 2018 by APT29. | https://attack.mitre.org/software/S0514 |
S0645 | Wevtutil | T1005 | Data from Local System | Wevtutil can be used to export events from a specific log. | Wevtutil is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers. | https://attack.mitre.org/software/S0645 |
S0645 | Wevtutil | T1562.002 | Impair Defenses: Disable Windows Event Logging | Wevtutil can be used to disable specific event logs on the system. | Wevtutil is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers. | https://attack.mitre.org/software/S0645 |
S0645 | Wevtutil | T1070.001 | Indicator Removal: Clear Windows Event Logs | Wevtutil can be used to clear system and security event logs from the system. | Wevtutil is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers. | https://attack.mitre.org/software/S0645 |
S0689 | WhisperGate | T1134.002 | Access Token Manipulation: Create Process with Token | The WhisperGate third stage can use the AdvancedRun.exe tool to execute commands in the context of the Windows TrustedInstaller group via %TEMP%\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1071.001 | Application Layer Protocol: Web Protocols | WhisperGate can make an HTTPS connection to download additional files. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1059.001 | Command and Scripting Interpreter: PowerShell | WhisperGate can use PowerShell to support multiple actions including execution and defense evasion. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | .003 | Command and Scripting Interpreter: Windows Command Shell | WhisperGate can use cmd.exe to execute commands. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | .005 | Command and Scripting Interpreter: Visual Basic | WhisperGate can use a Visual Basic script to exclude the C:\ drive from Windows Defender. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1485 | Data Destruction | WhisperGate can corrupt files by overwriting the first 1 MB with 0xcc and appending random extensions. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1140 | Deobfuscate/Decode Files or Information | WhisperGate can deobfuscate downloaded files stored in reverse byte order and decrypt embedded resources using multiple XOR operations. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1561.001 | Disk Wipe: Disk Content Wipe | WhisperGate can overwrite sectors of a victim host's hard drive at periodic offsets. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | .002 | Disk Wipe: Disk Structure Wipe | WhisperGate can overwrite the Master Book Record (MBR) on victim systems with a malicious 16-bit bootloader. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1083 | File and Directory Discovery | WhisperGate can locate files based on hardcoded file extensions. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1562.001 | Impair Defenses: Disable or Modify Tools | WhisperGate can download and execute AdvancedRun.exe to disable the Windows Defender Theat Protection service and set an exclusion path for the C:\ drive. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1070.004 | Indicator Removal: File Deletion | WhisperGate can delete tools from a compromised host after execution. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1105 | Ingress Tool Transfer | WhisperGate can download additional stages of malware from a Discord CDN channel. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1036 | Masquerading | WhisperGate has been disguised as a JPG extension to avoid detection as a malicious PE file. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1106 | Native API | WhisperGate has used the ExitWindowsEx to flush file buffers to disk and stop running processes and other API calls. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1135 | Network Share Discovery | WhisperGate can enumerate connected remote logical drives. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | WhisperGate can Base64 encode strings, store downloaded files in reverse byte order, and use the Eazfuscator tool to obfuscate its third stage. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1542.003 | Pre-OS Boot: Bootkit | WhisperGate overwrites the MBR with a bootloader component that performs destructive wiping operations on hard drives and displays a fake ransom note when the host boots. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1055.012 | Process Injection: Process Hollowing | WhisperGate has the ability to inject its fourth stage into a suspended process created by the legitimate Windows utility InstallUtil.exe. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1620 | Reflective Code Loading | WhisperGate's downloader can reverse its third stage file bytes and reflectively load the file as a .NET assembly. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1518.001 | Software Discovery: Security Software Discovery | WhisperGate can recognize the presence of monitoring tools on a target system. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1218.004 | System Binary Proxy Execution: InstallUtil | WhisperGate has used InstallUtil.exe as part of its process to disable Windows Defender. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1082 | System Information Discovery | WhisperGate has the ability to enumerate fixed logical drives on a targeted system. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1569.002 | System Services: Service Execution | WhisperGate can download and execute AdvancedRun.exe via sc.exe. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1529 | System Shutdown/Reboot | WhisperGate can shutdown a compromised host through execution of ExitWindowsEx with the EXW_SHUTDOWN flag. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1497.001 | Virtualization/Sandbox Evasion: System Checks | WhisperGate can stop its execution when it recognizes the presence of certain monitoring tools. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | .003 | Virtualization/Sandbox Evasion: Time Based Evasion | WhisperGate can pause for 20 seconds to bypass antivirus solutions. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0689 | WhisperGate | T1102 | Web Service | WhisperGate can download additional payloads hosted on a Discord channel. | WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022. | https://attack.mitre.org/software/S0689 |
S0206 | Wiarp | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | Wiarp creates a backdoor through which remote attackers can open a command line interface. | Wiarp is a trojan used by Elderwood to open a backdoor on compromised hosts. | https://attack.mitre.org/software/S0206 |
S0206 | Wiarp | T1543.003 | Create or Modify System Process: Windows Service | Wiarp creates a backdoor through which remote attackers can create a service. | Wiarp is a trojan used by Elderwood to open a backdoor on compromised hosts. | https://attack.mitre.org/software/S0206 |
S0206 | Wiarp | T1105 | Ingress Tool Transfer | Wiarp creates a backdoor through which remote attackers can download files. | Wiarp is a trojan used by Elderwood to open a backdoor on compromised hosts. | https://attack.mitre.org/software/S0206 |
S0206 | Wiarp | T1055 | Process Injection | Wiarp creates a backdoor through which remote attackers can inject files into running processes. | Wiarp is a trojan used by Elderwood to open a backdoor on compromised hosts. | https://attack.mitre.org/software/S0206 |
S0005 | Windows Credential Editor | T1003.001 | OS Credential Dumping: LSASS Memory | Windows Credential Editor can dump credentials. | Windows Credential Editor is a password dumping tool. | https://attack.mitre.org/software/S0005 |
S0155 | WINDSHIELD | T1070.004 | Indicator Removal: File Deletion | WINDSHIELD is capable of file deletion along with other file system interaction. | WINDSHIELD is a signature backdoor used by APT32. | https://attack.mitre.org/software/S0155 |
S0155 | WINDSHIELD | T1095 | Non-Application Layer Protocol | WINDSHIELD C2 traffic can communicate via TCP raw sockets. | WINDSHIELD is a signature backdoor used by APT32. | https://attack.mitre.org/software/S0155 |
S0155 | WINDSHIELD | T1012 | Query Registry | WINDSHIELD can gather Registry values. | WINDSHIELD is a signature backdoor used by APT32. | https://attack.mitre.org/software/S0155 |
S0155 | WINDSHIELD | T1082 | System Information Discovery | WINDSHIELD can gather the victim computer name. | WINDSHIELD is a signature backdoor used by APT32. | https://attack.mitre.org/software/S0155 |
S0155 | WINDSHIELD | T1033 | System Owner/User Discovery | WINDSHIELD can gather the victim user name. | WINDSHIELD is a signature backdoor used by APT32. | https://attack.mitre.org/software/S0155 |
S0466 | WindTail | T1071.001 | Application Layer Protocol: Web Protocols | WindTail has the ability to use HTTP for C2 communications. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
Subsets and Splits