software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 23
663
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0412 | ZxShell | .005 | Remote Services: VNC | ZxShell supports functionality for VNC sessions. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1113 | Screen Capture | ZxShell can capture screenshots. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1218.011 | System Binary Proxy Execution: Rundll32 | ZxShell has used rundll32.exe to execute other DLLs and named pipes. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1082 | System Information Discovery | ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1033 | System Owner/User Discovery | ZxShell can collect the owner and organization information from the target workstation. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1007 | System Service Discovery | ZxShell can check the services on the system. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1569.002 | System Services: Service Execution | ZxShell can create a new service for execution. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1125 | Video Capture | ZxShell has a command to perform video device spying. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S1013 | ZxxZ | T1005 | Data from Local System | ZxxZ can collect data from a compromised host. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1140 | Deobfuscate/Decode Files or Information | ZxxZ has used a XOR key to decrypt strings. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1105 | Ingress Tool Transfer | ZxxZ can download and execute additional files. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1036.004 | Masquerading: Masquerade Task or Service | ZxxZ has been disguised as a Windows security update service. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1106 | Native API | ZxxZ has used API functions such as Process32First, Process32Next, and ShellExecuteA. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | ZxxZ has been encoded to avoid detection from static analysis tools. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1566.001 | Phishing: Spearphishing Attachment | ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1057 | Process Discovery | ZxxZ has created a snapshot of running processes using CreateToolhelp32Snapshot. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1012 | Query Registry | ZxxZ can search the registry of a compromised host. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1053.005 | Scheduled Task/Job: Scheduled Task | ZxxZ has used scheduled tasks for persistence and execution. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1518.001 | Software Discovery: Security Software Discovery | ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1082 | System Information Discovery | ZxxZ has collected the host name and operating system product name from a compromised machine. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1033 | System Owner/User Discovery | ZxxZ can collect the username from a compromised host. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1204.002 | User Execution: Malicious File | ZxxZ has relied on victims to open a malicious attachment delivered via email. | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel. | https://attack.mitre.org/software/S1013 |
Subsets and Splits