software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
23
663
description
stringclasses
826 values
url
stringclasses
826 values
S0466
WindTail
T1560.001
Archive Collected Data: Archive via Utility
WindTail has the ability to use the macOS built-in zip utility to archive files.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1119
Automated Collection
WindTail can identify and add files that possess specific file extensions to an array for archiving.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1059.004
Command and Scripting Interpreter: Unix Shell
WindTail can use the open command to execute an application.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1140
Deobfuscate/Decode Files or Information
WindTail has the ability to decrypt strings using hard-coded AES keys.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1048.003
Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol
WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1083
File and Directory Discovery
WindTail has the ability to enumerate the users home directory and the path to its own application bundle.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1564.003
Hide Artifacts: Hidden Window
WindTail can instruct the OS to execute an application without a dock icon or menu.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1070.004
Indicator Removal: File Deletion
WindTail has the ability to receive and execute a self-delete command.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1036
Masquerading
WindTail has used icons mimicking MS Office files to mask payloads.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
.001
Invalid Code Signature
WindTail has been incompletely signed with revoked certificates.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1106
Native API
WindTail can invoke Apple APIs contentsOfDirectoryAtPath, pathExtension, and (string) compare.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1027.013
Obfuscated Files or Information: Encrypted/Encoded File
WindTail can be delivered as a compressed, encrypted, and encoded payload.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0466
WindTail
T1124
System Time Discovery
WindTail has the ability to generate the current date and time.
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.
https://attack.mitre.org/software/S0466
S0219
WINERACK
T1010
Application Window Discovery
WINERACK can enumerate active windows.
WINERACK is a backdoor used by APT37.
https://attack.mitre.org/software/S0219
S0219
WINERACK
T1059
Command and Scripting Interpreter
WINERACK can create a reverse shell that utilizes statically-linked Wine cmd.exe code to emulate Windows command prompt commands.
WINERACK is a backdoor used by APT37.
https://attack.mitre.org/software/S0219
S0219
WINERACK
T1083
File and Directory Discovery
WINERACK can enumerate files and directories.
WINERACK is a backdoor used by APT37.
https://attack.mitre.org/software/S0219
S0219
WINERACK
T1057
Process Discovery
WINERACK can enumerate processes.
WINERACK is a backdoor used by APT37.
https://attack.mitre.org/software/S0219
S0219
WINERACK
T1082
System Information Discovery
WINERACK can gather information about the host.
WINERACK is a backdoor used by APT37.
https://attack.mitre.org/software/S0219
S0219
WINERACK
T1033
System Owner/User Discovery
WINERACK can gather information on the victim username.
WINERACK is a backdoor used by APT37.
https://attack.mitre.org/software/S0219
S0219
WINERACK
T1007
System Service Discovery
WINERACK can enumerate services.
WINERACK is a backdoor used by APT37.
https://attack.mitre.org/software/S0219
S0191
Winexe
T1569.002
System Services: Service Execution
Winexe installs a service on the remote system, executes the command, then uninstalls the service.
Winexe is a lightweight, open source tool similar to PsExec designed to allow system administrators to execute commands on remote servers. Winexe is unique in that it is a GNU/Linux based client.
https://attack.mitre.org/software/S0191
S0176
Wingbird
T1547.008
Boot or Logon Autostart Execution: LSASS Driver
Wingbird drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0176
Wingbird
T1543.003
Create or Modify System Process: Windows Service
Wingbird uses services.exe to register a new autostart service named "Audit Service" using a copy of the local lsass.exe file.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0176
Wingbird
T1068
Exploitation for Privilege Escalation
Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0176
Wingbird
T1574.002
Hijack Execution Flow: DLL Side-Loading
Wingbird side loads a malicious file, sspisrv.dll, in part of a spoofed lssas.exe service.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0176
Wingbird
T1070.004
Indicator Removal: File Deletion
Wingbird deletes its payload along with the payload's parent process after it finishes copying files.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0176
Wingbird
T1055
Process Injection
Wingbird performs multiple process injections to hijack system processes and execute malicious code.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0176
Wingbird
T1518.001
Software Discovery: Security Software Discovery
Wingbird checks for the presence of Bitdefender security software.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0176
Wingbird
T1082
System Information Discovery
Wingbird checks the victim OS version after executing to determine where to drop files based on whether the victim is 32-bit or 64-bit.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0176
Wingbird
T1569.002
System Services: Service Execution
Wingbird uses services.exe to register a new autostart service named "Audit Service" using a copy of the local lsass.exe file.
Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
https://attack.mitre.org/software/S0176
S0059
WinMM
T1071.001
Application Layer Protocol: Web Protocols
WinMM uses HTTP for C2.
WinMM is a full-featured, simple backdoor used by Naikon.
https://attack.mitre.org/software/S0059
S0059
WinMM
T1008
Fallback Channels
WinMM is usually configured with primary and backup domains for C2 communications.
WinMM is a full-featured, simple backdoor used by Naikon.
https://attack.mitre.org/software/S0059
S0059
WinMM
T1083
File and Directory Discovery
WinMM sets a WH_CBT Windows hook to search for and capture files on the victim.
WinMM is a full-featured, simple backdoor used by Naikon.
https://attack.mitre.org/software/S0059
S0059
WinMM
T1057
Process Discovery
WinMM sets a WH_CBT Windows hook to collect information on process creation.
WinMM is a full-featured, simple backdoor used by Naikon.
https://attack.mitre.org/software/S0059
S0059
WinMM
T1082
System Information Discovery
WinMM collects the system name, OS version including service pack, and system install date and sends the information to the C2 server.
WinMM is a full-featured, simple backdoor used by Naikon.
https://attack.mitre.org/software/S0059
S0059
WinMM
T1033
System Owner/User Discovery
WinMM uses NetUser-GetInfo to identify that it is running under an "Admin" account on the local system.
WinMM is a full-featured, simple backdoor used by Naikon.
https://attack.mitre.org/software/S0059
S0430
Winnti for Linux
T1071.001
Application Layer Protocol: Web Protocols
Winnti for Linux has used HTTP in outbound communications.
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.
https://attack.mitre.org/software/S0430
S0430
Winnti for Linux
T1140
Deobfuscate/Decode Files or Information
Winnti for Linux has decoded XOR encoded strings holding its configuration upon execution.
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.
https://attack.mitre.org/software/S0430
S0430
Winnti for Linux
T1573.001
Encrypted Channel: Symmetric Cryptography
Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control (C2).
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.
https://attack.mitre.org/software/S0430
S0430
Winnti for Linux
T1105
Ingress Tool Transfer
Winnti for Linux has the ability to deploy modules directly from command and control (C2) servers, possibly for remote command execution, file exfiltration, and socks5 proxying on the infected host.
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.
https://attack.mitre.org/software/S0430
S0430
Winnti for Linux
T1095
Non-Application Layer Protocol
Winnti for Linux has used ICMP, custom TCP, and UDP in outbound communications.
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.
https://attack.mitre.org/software/S0430
S0430
Winnti for Linux
T1027.013
Obfuscated Files or Information: Encrypted/Encoded File
Winnti for Linux can encode its configuration file with single-byte XOR encoding.
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.
https://attack.mitre.org/software/S0430
S0430
Winnti for Linux
T1014
Rootkit
Winnti for Linux has used a modified copy of the open-source userland rootkit Azazel, named libxselinux.so, to hide the malware's operations and network activity.
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.
https://attack.mitre.org/software/S0430
S0430
Winnti for Linux
T1205
Traffic Signaling
Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control (C2) mechanism.
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.
https://attack.mitre.org/software/S0430
S0141
Winnti for Windows
T1548.002
Abuse Elevation Control Mechanism: Bypass User Account Control
Winnti for Windows can use a variant of the sysprep UAC bypass.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1071.001
Application Layer Protocol: Web Protocols
Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Winnti for Windows can add a service named wind0ws to the Registry to achieve persistence after reboot.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1543.003
Create or Modify System Process: Windows Service
Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1140
Deobfuscate/Decode Files or Information
The Winnti for Windows dropper can decrypt and decompresses a data blob.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1573.001
Encrypted Channel: Symmetric Cryptography
Winnti for Windows can XOR encrypt C2 traffic.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1480.001
Execution Guardrails: Environmental Keying
The Winnti for Windows dropper component can verify the existence of a single command line parameter and either terminate if it is not found or later use it as a decryption key.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1083
File and Directory Discovery
Winnti for Windows can check for the presence of specific files prior to moving to the next phase of execution.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1070.004
Indicator Removal: File Deletion
Winnti for Windows can delete the DLLs for its various components from a compromised host.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
.006
Indicator Removal: Timestomp
Winnti for Windows can set the timestamps for its worker and service components to match that of cmd.exe.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1105
Ingress Tool Transfer
The Winnti for Windows dropper can place malicious payloads on targeted systems.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1036.005
Masquerading: Match Legitimate Name or Location
A Winnti for Windows implant file was named ASPNET_FILTER.DLL, mimicking the legitimate ASP.NET ISAPI filter DLL with the same name.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1106
Native API
Winnti for Windows can use Native API to create a new process and to start services.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1095
Non-Application Layer Protocol
Winnti for Windows can communicate using custom TCP.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1027.013
Obfuscated Files or Information: Encrypted/Encoded File
Winnti for Windows has the ability to encrypt and compress its payload.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1057
Process Discovery
Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1090.001
Proxy: Internal Proxy
The Winnti for Windows HTTP/S C2 mode can make use of a local proxy.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
.002
Proxy: External Proxy
The Winnti for Windows HTTP/S C2 mode can make use of an external proxy.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1218.011
System Binary Proxy Execution: Rundll32
The Winnti for Windows installer loads a DLL using rundll32.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1082
System Information Discovery
Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0141
Winnti for Windows
T1569.002
System Services: Service Execution
Winnti for Windows can run as a service using svchost.exe.
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux.
https://attack.mitre.org/software/S0141
S0041
Wiper
T1072
Software Deployment Tools
It is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the Wiper malware.
Wiper is a family of destructive malware used in March 2013 during breaches of South Korean banks and media companies.
https://attack.mitre.org/software/S0041
S1115
WIREFIRE
T1071.001
Application Layer Protocol: Web Protocols
WIREFIRE can respond to specific HTTP POST requests to /api/v1/cav/client/visits.
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
https://attack.mitre.org/software/S1115
S1115
WIREFIRE
T1554
Compromise Host Software Binary
WIREFIRE can modify the visits.py component of Ivanti Connect Secure VPNs for file download and arbitrary command execution.
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
https://attack.mitre.org/software/S1115
S1115
WIREFIRE
T1132.001
Data Encoding: Standard Encoding
WIREFIRE can Base64 encode process output sent to C2.
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
https://attack.mitre.org/software/S1115
S1115
WIREFIRE
T1140
Deobfuscate/Decode Files or Information
WIREFIRE can decode, decrypt, and decompress data received in C2 HTTP POST requests.
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
https://attack.mitre.org/software/S1115
S1115
WIREFIRE
T1573.001
Encrypted Channel: Symmetric Cryptography
WIREFIRE can AES encrypt process output sent from compromised devices to C2.
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
https://attack.mitre.org/software/S1115
S1115
WIREFIRE
T1105
Ingress Tool Transfer
WIREFIRE has the ability to download files to compromised devices.
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
https://attack.mitre.org/software/S1115
S1115
WIREFIRE
T1505.003
Server Software Component: Web Shell
WIREFIRE is a web shell that can download files to and execute arbitrary commands from compromised Ivanti Connect Secure VPNs.
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
https://attack.mitre.org/software/S1115
S0312
WireLurker
T1406
Obfuscated Files or Information
WireLurker obfuscates its payload through complex code structure, multiple component versions, file hiding, code obfuscation and customized encryption to thwart anti-reversing.
WireLurker is a family of macOS malware that targets iOS devices connected over USB.
https://attack.mitre.org/software/S0312
S0312
WireLurker
T1458
Replication Through Removable Media
WireLurker monitors for iOS devices connected via USB to an infected OSX computer and installs downloaded third-party applications or automatically generated malicious applications onto the device.
WireLurker is a family of macOS malware that targets iOS devices connected over USB.
https://attack.mitre.org/software/S0312
S0489
WolfRAT
T1517
Access Notifications
WolfRAT can receive system notifications.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1429
Audio Capture
WolfRAT can record call audio.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1533
Data from Local System
WolfRAT can collect user account, photos, browser history, and arbitrary files.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1407
Download New Code at Runtime
WolfRAT can update the running malware.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1630.002
Indicator Removal on Host: File Deletion
WolfRAT can delete files from the device.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1655.001
Masquerading: Match Legitimate Name or Location
WolfRAT has masqueraded as "Google service", "GooglePlay", and "Flash update".
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1406
Obfuscated Files or Information
WolfRAT’s code is obfuscated.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1424
Process Discovery
WolfRAT uses dumpsys to determine if certain applications are running.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1636.002
Protected User Data: Call Log
WolfRAT can collect the device’s call log.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
.003
Protected User Data: Contact List
WolfRAT can collect the device’s contact list.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
.004
Protected User Data: SMS Messages
WolfRAT can collect SMS messages.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1513
Screen Capture
WolfRAT can record the screen and take screenshots to capture messages from Line, Facebook Messenger, and WhatsApp.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1582
SMS Control
WolfRAT can delete and send SMS messages.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1418
Software Discovery
WolfRAT can obtain a list of installed applications.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1422
System Network Configuration Discovery
WolfRAT sends the device’s IMEI with each exfiltration request.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1512
Video Capture
WolfRAT can take photos and videos.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S0489
WolfRAT
T1633.001
Virtualization/Sandbox Evasion: System Checks
WolfRAT can perform primitive emulation checks.
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
https://attack.mitre.org/software/S0489
S1065
Woody RAT
T1087
Account Discovery
Woody RAT can identify administrator accounts on an infected machine.
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.
https://attack.mitre.org/software/S1065
S1065
Woody RAT
T1071.001
Application Layer Protocol: Web Protocols
Woody RAT can communicate with its C2 server using HTTP requests.
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.
https://attack.mitre.org/software/S1065
S1065
Woody RAT
T1059.001
Command and Scripting Interpreter: PowerShell
Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, WoodyPowerSession.
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.
https://attack.mitre.org/software/S1065
S1065
Woody RAT
.003
Command and Scripting Interpreter: Windows Command Shell
Woody RAT can execute commands using cmd.exe.
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.
https://attack.mitre.org/software/S1065
S1065
Woody RAT
T1005
Data from Local System
Woody RAT can collect information from a compromised host.
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.
https://attack.mitre.org/software/S1065
S1065
Woody RAT
T1140
Deobfuscate/Decode Files or Information
Woody RAT can deobfuscate Base64-encoded strings and scripts.
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.
https://attack.mitre.org/software/S1065
S1065
Woody RAT
T1573.001
Encrypted Channel: Symmetric Cryptography
Woody RAT can use AES-CBC to encrypt data sent to its C2 server.
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.
https://attack.mitre.org/software/S1065
S1065
Woody RAT
.002
Encrypted Channel: Asymmetric Cryptography
Woody RAT can use RSA-4096 to encrypt data sent to its C2 server.
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.
https://attack.mitre.org/software/S1065