software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 23
663
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0466 | WindTail | T1560.001 | Archive Collected Data: Archive via Utility | WindTail has the ability to use the macOS built-in zip utility to archive files. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1119 | Automated Collection | WindTail can identify and add files that possess specific file extensions to an array for archiving. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1059.004 | Command and Scripting Interpreter: Unix Shell | WindTail can use the open command to execute an application. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1140 | Deobfuscate/Decode Files or Information | WindTail has the ability to decrypt strings using hard-coded AES keys. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1048.003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol | WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1083 | File and Directory Discovery | WindTail has the ability to enumerate the users home directory and the path to its own application bundle. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1564.003 | Hide Artifacts: Hidden Window | WindTail can instruct the OS to execute an application without a dock icon or menu. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1070.004 | Indicator Removal: File Deletion | WindTail has the ability to receive and execute a self-delete command. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1036 | Masquerading | WindTail has used icons mimicking MS Office files to mask payloads. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | .001 | Invalid Code Signature | WindTail has been incompletely signed with revoked certificates. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1106 | Native API | WindTail can invoke Apple APIs contentsOfDirectoryAtPath, pathExtension, and (string) compare. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | WindTail can be delivered as a compressed, encrypted, and encoded payload. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0466 | WindTail | T1124 | System Time Discovery | WindTail has the ability to generate the current date and time. | WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX. | https://attack.mitre.org/software/S0466 |
S0219 | WINERACK | T1010 | Application Window Discovery | WINERACK can enumerate active windows. | WINERACK is a backdoor used by APT37. | https://attack.mitre.org/software/S0219 |
S0219 | WINERACK | T1059 | Command and Scripting Interpreter | WINERACK can create a reverse shell that utilizes statically-linked Wine cmd.exe code to emulate Windows command prompt commands. | WINERACK is a backdoor used by APT37. | https://attack.mitre.org/software/S0219 |
S0219 | WINERACK | T1083 | File and Directory Discovery | WINERACK can enumerate files and directories. | WINERACK is a backdoor used by APT37. | https://attack.mitre.org/software/S0219 |
S0219 | WINERACK | T1057 | Process Discovery | WINERACK can enumerate processes. | WINERACK is a backdoor used by APT37. | https://attack.mitre.org/software/S0219 |
S0219 | WINERACK | T1082 | System Information Discovery | WINERACK can gather information about the host. | WINERACK is a backdoor used by APT37. | https://attack.mitre.org/software/S0219 |
S0219 | WINERACK | T1033 | System Owner/User Discovery | WINERACK can gather information on the victim username. | WINERACK is a backdoor used by APT37. | https://attack.mitre.org/software/S0219 |
S0219 | WINERACK | T1007 | System Service Discovery | WINERACK can enumerate services. | WINERACK is a backdoor used by APT37. | https://attack.mitre.org/software/S0219 |
S0191 | Winexe | T1569.002 | System Services: Service Execution | Winexe installs a service on the remote system, executes the command, then uninstalls the service. | Winexe is a lightweight, open source tool similar to PsExec designed to allow system administrators to execute commands on remote servers. Winexe is unique in that it is a GNU/Linux based client. | https://attack.mitre.org/software/S0191 |
S0176 | Wingbird | T1547.008 | Boot or Logon Autostart Execution: LSASS Driver | Wingbird drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0176 | Wingbird | T1543.003 | Create or Modify System Process: Windows Service | Wingbird uses services.exe to register a new autostart service named "Audit Service" using a copy of the local lsass.exe file. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0176 | Wingbird | T1068 | Exploitation for Privilege Escalation | Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0176 | Wingbird | T1574.002 | Hijack Execution Flow: DLL Side-Loading | Wingbird side loads a malicious file, sspisrv.dll, in part of a spoofed lssas.exe service. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0176 | Wingbird | T1070.004 | Indicator Removal: File Deletion | Wingbird deletes its payload along with the payload's parent process after it finishes copying files. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0176 | Wingbird | T1055 | Process Injection | Wingbird performs multiple process injections to hijack system processes and execute malicious code. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0176 | Wingbird | T1518.001 | Software Discovery: Security Software Discovery | Wingbird checks for the presence of Bitdefender security software. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0176 | Wingbird | T1082 | System Information Discovery | Wingbird checks the victim OS version after executing to determine where to drop files based on whether the victim is 32-bit or 64-bit. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0176 | Wingbird | T1569.002 | System Services: Service Execution | Wingbird uses services.exe to register a new autostart service named "Audit Service" using a copy of the local lsass.exe file. | Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign. | https://attack.mitre.org/software/S0176 |
S0059 | WinMM | T1071.001 | Application Layer Protocol: Web Protocols | WinMM uses HTTP for C2. | WinMM is a full-featured, simple backdoor used by Naikon. | https://attack.mitre.org/software/S0059 |
S0059 | WinMM | T1008 | Fallback Channels | WinMM is usually configured with primary and backup domains for C2 communications. | WinMM is a full-featured, simple backdoor used by Naikon. | https://attack.mitre.org/software/S0059 |
S0059 | WinMM | T1083 | File and Directory Discovery | WinMM sets a WH_CBT Windows hook to search for and capture files on the victim. | WinMM is a full-featured, simple backdoor used by Naikon. | https://attack.mitre.org/software/S0059 |
S0059 | WinMM | T1057 | Process Discovery | WinMM sets a WH_CBT Windows hook to collect information on process creation. | WinMM is a full-featured, simple backdoor used by Naikon. | https://attack.mitre.org/software/S0059 |
S0059 | WinMM | T1082 | System Information Discovery | WinMM collects the system name, OS version including service pack, and system install date and sends the information to the C2 server. | WinMM is a full-featured, simple backdoor used by Naikon. | https://attack.mitre.org/software/S0059 |
S0059 | WinMM | T1033 | System Owner/User Discovery | WinMM uses NetUser-GetInfo to identify that it is running under an "Admin" account on the local system. | WinMM is a full-featured, simple backdoor used by Naikon. | https://attack.mitre.org/software/S0059 |
S0430 | Winnti for Linux | T1071.001 | Application Layer Protocol: Web Protocols | Winnti for Linux has used HTTP in outbound communications. | Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows. | https://attack.mitre.org/software/S0430 |
S0430 | Winnti for Linux | T1140 | Deobfuscate/Decode Files or Information | Winnti for Linux has decoded XOR encoded strings holding its configuration upon execution. | Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows. | https://attack.mitre.org/software/S0430 |
S0430 | Winnti for Linux | T1573.001 | Encrypted Channel: Symmetric Cryptography | Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control (C2). | Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows. | https://attack.mitre.org/software/S0430 |
S0430 | Winnti for Linux | T1105 | Ingress Tool Transfer | Winnti for Linux has the ability to deploy modules directly from command and control (C2) servers, possibly for remote command execution, file exfiltration, and socks5 proxying on the infected host. | Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows. | https://attack.mitre.org/software/S0430 |
S0430 | Winnti for Linux | T1095 | Non-Application Layer Protocol | Winnti for Linux has used ICMP, custom TCP, and UDP in outbound communications. | Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows. | https://attack.mitre.org/software/S0430 |
S0430 | Winnti for Linux | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | Winnti for Linux can encode its configuration file with single-byte XOR encoding. | Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows. | https://attack.mitre.org/software/S0430 |
S0430 | Winnti for Linux | T1014 | Rootkit | Winnti for Linux has used a modified copy of the open-source userland rootkit Azazel, named libxselinux.so, to hide the malware's operations and network activity. | Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows. | https://attack.mitre.org/software/S0430 |
S0430 | Winnti for Linux | T1205 | Traffic Signaling | Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control (C2) mechanism. | Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows. | https://attack.mitre.org/software/S0430 |
S0141 | Winnti for Windows | T1548.002 | Abuse Elevation Control Mechanism: Bypass User Account Control | Winnti for Windows can use a variant of the sysprep UAC bypass. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1071.001 | Application Layer Protocol: Web Protocols | Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Winnti for Windows can add a service named wind0ws to the Registry to achieve persistence after reboot. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1543.003 | Create or Modify System Process: Windows Service | Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1140 | Deobfuscate/Decode Files or Information | The Winnti for Windows dropper can decrypt and decompresses a data blob. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1573.001 | Encrypted Channel: Symmetric Cryptography | Winnti for Windows can XOR encrypt C2 traffic. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1480.001 | Execution Guardrails: Environmental Keying | The Winnti for Windows dropper component can verify the existence of a single command line parameter and either terminate if it is not found or later use it as a decryption key. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1083 | File and Directory Discovery | Winnti for Windows can check for the presence of specific files prior to moving to the next phase of execution. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1070.004 | Indicator Removal: File Deletion | Winnti for Windows can delete the DLLs for its various components from a compromised host. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | .006 | Indicator Removal: Timestomp | Winnti for Windows can set the timestamps for its worker and service components to match that of cmd.exe. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1105 | Ingress Tool Transfer | The Winnti for Windows dropper can place malicious payloads on targeted systems. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1036.005 | Masquerading: Match Legitimate Name or Location | A Winnti for Windows implant file was named ASPNET_FILTER.DLL, mimicking the legitimate ASP.NET ISAPI filter DLL with the same name. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1106 | Native API | Winnti for Windows can use Native API to create a new process and to start services. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1095 | Non-Application Layer Protocol | Winnti for Windows can communicate using custom TCP. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | Winnti for Windows has the ability to encrypt and compress its payload. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1057 | Process Discovery | Winnti for Windows can check if the explorer.exe process is responsible for calling its install function. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1090.001 | Proxy: Internal Proxy | The Winnti for Windows HTTP/S C2 mode can make use of a local proxy. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | .002 | Proxy: External Proxy | The Winnti for Windows HTTP/S C2 mode can make use of an external proxy. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1218.011 | System Binary Proxy Execution: Rundll32 | The Winnti for Windows installer loads a DLL using rundll32. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1082 | System Information Discovery | Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0141 | Winnti for Windows | T1569.002 | System Services: Service Execution | Winnti for Windows can run as a service using svchost.exe. | Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.. The Linux variant is tracked separately under Winnti for Linux. | https://attack.mitre.org/software/S0141 |
S0041 | Wiper | T1072 | Software Deployment Tools | It is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the Wiper malware. | Wiper is a family of destructive malware used in March 2013 during breaches of South Korean banks and media companies. | https://attack.mitre.org/software/S0041 |
S1115 | WIREFIRE | T1071.001 | Application Layer Protocol: Web Protocols | WIREFIRE can respond to specific HTTP POST requests to /api/v1/cav/client/visits. | WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution. | https://attack.mitre.org/software/S1115 |
S1115 | WIREFIRE | T1554 | Compromise Host Software Binary | WIREFIRE can modify the visits.py component of Ivanti Connect Secure VPNs for file download and arbitrary command execution. | WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution. | https://attack.mitre.org/software/S1115 |
S1115 | WIREFIRE | T1132.001 | Data Encoding: Standard Encoding | WIREFIRE can Base64 encode process output sent to C2. | WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution. | https://attack.mitre.org/software/S1115 |
S1115 | WIREFIRE | T1140 | Deobfuscate/Decode Files or Information | WIREFIRE can decode, decrypt, and decompress data received in C2 HTTP POST requests. | WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution. | https://attack.mitre.org/software/S1115 |
S1115 | WIREFIRE | T1573.001 | Encrypted Channel: Symmetric Cryptography | WIREFIRE can AES encrypt process output sent from compromised devices to C2. | WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution. | https://attack.mitre.org/software/S1115 |
S1115 | WIREFIRE | T1105 | Ingress Tool Transfer | WIREFIRE has the ability to download files to compromised devices. | WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution. | https://attack.mitre.org/software/S1115 |
S1115 | WIREFIRE | T1505.003 | Server Software Component: Web Shell | WIREFIRE is a web shell that can download files to and execute arbitrary commands from compromised Ivanti Connect Secure VPNs. | WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution. | https://attack.mitre.org/software/S1115 |
S0312 | WireLurker | T1406 | Obfuscated Files or Information | WireLurker obfuscates its payload through complex code structure, multiple component versions, file hiding, code obfuscation and customized encryption to thwart anti-reversing. | WireLurker is a family of macOS malware that targets iOS devices connected over USB. | https://attack.mitre.org/software/S0312 |
S0312 | WireLurker | T1458 | Replication Through Removable Media | WireLurker monitors for iOS devices connected via USB to an infected OSX computer and installs downloaded third-party applications or automatically generated malicious applications onto the device. | WireLurker is a family of macOS malware that targets iOS devices connected over USB. | https://attack.mitre.org/software/S0312 |
S0489 | WolfRAT | T1517 | Access Notifications | WolfRAT can receive system notifications. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1429 | Audio Capture | WolfRAT can record call audio. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1533 | Data from Local System | WolfRAT can collect user account, photos, browser history, and arbitrary files. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1407 | Download New Code at Runtime | WolfRAT can update the running malware. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1630.002 | Indicator Removal on Host: File Deletion | WolfRAT can delete files from the device. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1655.001 | Masquerading: Match Legitimate Name or Location | WolfRAT has masqueraded as "Google service", "GooglePlay", and "Flash update". | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1406 | Obfuscated Files or Information | WolfRAT’s code is obfuscated. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1424 | Process Discovery | WolfRAT uses dumpsys to determine if certain applications are running. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1636.002 | Protected User Data: Call Log | WolfRAT can collect the device’s call log. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | .003 | Protected User Data: Contact List | WolfRAT can collect the device’s contact list. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | .004 | Protected User Data: SMS Messages | WolfRAT can collect SMS messages. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1513 | Screen Capture | WolfRAT can record the screen and take screenshots to capture messages from Line, Facebook Messenger, and WhatsApp. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1582 | SMS Control | WolfRAT can delete and send SMS messages. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1418 | Software Discovery | WolfRAT can obtain a list of installed applications. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1422 | System Network Configuration Discovery | WolfRAT sends the device’s IMEI with each exfiltration request. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1512 | Video Capture | WolfRAT can take photos and videos. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S0489 | WolfRAT | T1633.001 | Virtualization/Sandbox Evasion: System Checks | WolfRAT can perform primitive emulation checks. | WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research. | https://attack.mitre.org/software/S0489 |
S1065 | Woody RAT | T1087 | Account Discovery | Woody RAT can identify administrator accounts on an infected machine. | Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations. | https://attack.mitre.org/software/S1065 |
S1065 | Woody RAT | T1071.001 | Application Layer Protocol: Web Protocols | Woody RAT can communicate with its C2 server using HTTP requests. | Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations. | https://attack.mitre.org/software/S1065 |
S1065 | Woody RAT | T1059.001 | Command and Scripting Interpreter: PowerShell | Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, WoodyPowerSession. | Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations. | https://attack.mitre.org/software/S1065 |
S1065 | Woody RAT | .003 | Command and Scripting Interpreter: Windows Command Shell | Woody RAT can execute commands using cmd.exe. | Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations. | https://attack.mitre.org/software/S1065 |
S1065 | Woody RAT | T1005 | Data from Local System | Woody RAT can collect information from a compromised host. | Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations. | https://attack.mitre.org/software/S1065 |
S1065 | Woody RAT | T1140 | Deobfuscate/Decode Files or Information | Woody RAT can deobfuscate Base64-encoded strings and scripts. | Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations. | https://attack.mitre.org/software/S1065 |
S1065 | Woody RAT | T1573.001 | Encrypted Channel: Symmetric Cryptography | Woody RAT can use AES-CBC to encrypt data sent to its C2 server. | Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations. | https://attack.mitre.org/software/S1065 |
S1065 | Woody RAT | .002 | Encrypted Channel: Asymmetric Cryptography | Woody RAT can use RSA-4096 to encrypt data sent to its C2 server. | Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations. | https://attack.mitre.org/software/S1065 |
Subsets and Splits