software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
23
663
description
stringclasses
826 values
url
stringclasses
826 values
S1133
Apostle
T1057
Process Discovery
Apostle retrieves a list of all running processes on a victim host, and stops all services containing the string "sql," likely to propagate ransomware activity to database files.
Apostle is malware that has functioned as both a wiper and, in more recent versions, as ransomware. Apostle is written in .NET and shares various programming and functional overlaps with IPsec Helper.
https://attack.mitre.org/software/S1133
S1133
Apostle
T1053.005
Scheduled Task/Job: Scheduled Task
Apostle achieves persistence by creating a scheduled task, such as MicrosoftCrashHandlerUAC.
Apostle is malware that has functioned as both a wiper and, in more recent versions, as ransomware. Apostle is written in .NET and shares various programming and functional overlaps with IPsec Helper.
https://attack.mitre.org/software/S1133
S1133
Apostle
T1529
System Shutdown/Reboot
Apostle reboots the victim machine following wiping and related activity.
Apostle is malware that has functioned as both a wiper and, in more recent versions, as ransomware. Apostle is written in .NET and shares various programming and functional overlaps with IPsec Helper.
https://attack.mitre.org/software/S1133
S0584
AppleJeus
T1548.002
Abuse Elevation Control Mechanism: Bypass User Account Control
AppleJeus has presented the user with a UAC prompt to elevate privileges while installing.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1071.001
Application Layer Protocol: Web Protocols
AppleJeus has sent data to its C2 server via POST requests.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1059.004
Command and Scripting Interpreter: Unix Shell
AppleJeus has used shell scripts to execute commands after installation and set persistence mechanisms.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1543.003
Create or Modify System Process: Windows Service
AppleJeus can install itself as a service.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
.004
Create or Modify System Process: Launch Daemon
AppleJeus has placed a plist file within the LaunchDaemons folder and launched it manually.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1140
Deobfuscate/Decode Files or Information
AppleJeus has decoded files received from a C2.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1546.016
Event Triggered Execution: Installer Packages
During AppleJeus's installation process, it uses postinstall scripts to extract a hidden plist from the application's /Resources folder and execute the plist file as a Launch Daemon with elevated permissions.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1041
Exfiltration Over C2 Channel
AppleJeus has exfiltrated collected host information to a C2 server.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1564.001
Hide Artifacts: Hidden Files and Directories
AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1070.004
Indicator Removal: File Deletion
AppleJeus has deleted the MSI file after installation.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1027
Obfuscated Files or Information
AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1566.002
Phishing: Spearphishing Link
AppleJeus has been distributed via spearphishing link.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1053.005
Scheduled Task/Job: Scheduled Task
AppleJeus has created a scheduled SYSTEM task that runs when a user logs in.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1553.002
Subvert Trust Controls: Code Signing
AppleJeus has used a valid digital signature from Sectigo to appear legitimate.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1218.007
System Binary Proxy Execution: Msiexec
AppleJeus has been installed via MSI installer.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1082
System Information Discovery
AppleJeus has collected the victim host information after infection.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1569.001
System Services: Launchctl
AppleJeus has loaded a plist file using the launchctl command.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1204.001
User Execution: Malicious Link
AppleJeus's spearphishing links required user interaction to navigate to the malicious website.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
.002
User Execution: Malicious File
AppleJeus has required user execution of a malicious MSI installer.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0584
AppleJeus
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
AppleJeus has waited a specified time before downloading a second stage payload.
AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT.
https://attack.mitre.org/software/S0584
S0622
AppleSeed
T1134
Access Token Manipulation
AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1071.001
Application Layer Protocol: Web Protocols
AppleSeed has the ability to communicate with C2 over HTTP.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1560
Archive Collected Data
AppleSeed has compressed collected data before exfiltration.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
.001
Archive via Utility
AppleSeed can zip and encrypt data collected on a target system.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1119
Automated Collection
AppleSeed has automatically collected data from USB drives, keystrokes, and screen images before exfiltration.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
AppleSeed has the ability to create the Registry key name EstsoftAutoUpdate at HKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1059.001
Command and Scripting Interpreter: PowerShell
AppleSeed has the ability to execute its payload via PowerShell.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
.007
Command and Scripting Interpreter: JavaScript
AppleSeed has the ability to use JavaScript to execute PowerShell.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1005
Data from Local System
AppleSeed can collect data on a compromised host.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1025
Data from Removable Media
AppleSeed can find and collect data from removable media devices.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1074.001
Data Staged: Local Data Staging
AppleSeed can stage files in a central location prior to exfiltration.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1030
Data Transfer Size Limits
AppleSeed has divided files if the size is 0x1000000 bytes or more.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1140
Deobfuscate/Decode Files or Information
AppleSeed can decode its payload prior to execution.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1041
Exfiltration Over C2 Channel
AppleSeed can exfiltrate files via the C2 channel.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1567
Exfiltration Over Web Service
AppleSeed has exfiltrated files using web services.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1008
Fallback Channels
AppleSeed can use a second channel for C2 when the primary channel is in upload mode.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1083
File and Directory Discovery
AppleSeed has the ability to search for .txt, .ppt, .hwp, .pdf, and .doc files in specified directories.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1070.004
Indicator Removal: File Deletion
AppleSeed can delete files from a compromised host after they are exfiltrated.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1056.001
Input Capture: Keylogging
AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1036
Masquerading
AppleSeed can disguise JavaScript files as PDFs.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
.005
Match Legitimate Name or Location
AppleSeed has the ability to rename its payload to ESTCommon.dll to masquerade as a DLL belonging to ESTsecurity.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1106
Native API
AppleSeed has the ability to use multiple dynamically resolved API calls.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1027
Obfuscated Files or Information
AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
.002
Software Packing
AppleSeed has used UPX packers for its payload DLL.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1566.001
Phishing: Spearphishing Attachment
AppleSeed has been distributed to victims through malicious e-mail attachments.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1057
Process Discovery
AppleSeed can enumerate the current process on a compromised host.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1113
Screen Capture
AppleSeed can take screenshots on a compromised host by calling a series of APIs.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1218.010
System Binary Proxy Execution: Regsvr32
AppleSeed can call regsvr32.exe for execution.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1082
System Information Discovery
AppleSeed can identify the OS version of a targeted system.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1016
System Network Configuration Discovery
AppleSeed can identify the IP of a targeted system.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1124
System Time Discovery
AppleSeed can pull a timestamp from the victim's machine.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0622
AppleSeed
T1204.002
User Execution: Malicious File
AppleSeed can achieve execution through users running malicious file attachments distributed via email.
AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021.
https://attack.mitre.org/software/S0622
S0456
Aria-body
T1134.001
Access Token Manipulation: Token Impersonation/Theft
Aria-body has the ability to duplicate a token from ntprint.exe.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
.002
Access Token Manipulation: Create Process with Token
Aria-body has the ability to execute a process using runas.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1071.001
Application Layer Protocol: Web Protocols
Aria-body has used HTTP in C2 communications.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1010
Application Window Discovery
Aria-body has the ability to identify the titles of running windows on a compromised host.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1560
Archive Collected Data
Aria-body has used ZIP to compress data gathered on a compromised host.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Aria-body has established persistence via the Startup folder or Run Registry key.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1025
Data from Removable Media
Aria-body has the ability to collect data from USB devices.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1140
Deobfuscate/Decode Files or Information
Aria-body has the ability to decrypt the loader configuration and payload DLL.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1568.002
Dynamic Resolution: Domain Generation Algorithms
Aria-body has the ability to use a DGA for C2 communications.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1083
File and Directory Discovery
Aria-body has the ability to gather metadata from a file and to search for file and directory names.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1070.004
Indicator Removal: File Deletion
Aria-body has the ability to delete files and directories on compromised hosts.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1105
Ingress Tool Transfer
Aria-body has the ability to download additional payloads from C2.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1106
Native API
Aria-body has the ability to launch files using ShellExecute.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1095
Non-Application Layer Protocol
Aria-body has used TCP in C2 communications.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1027.013
Obfuscated Files or Information: Encrypted/Encoded File
Aria-body has used an encrypted configuration file for its loader.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1057
Process Discovery
Aria-body has the ability to enumerate loaded modules for a process..
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1055.001
Process Injection: Dynamic-link Library Injection
Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1090
Proxy
Aria-body has the ability to use a reverse SOCKS proxy module.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1113
Screen Capture
Aria-body has the ability to capture screenshots on compromised hosts.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1082
System Information Discovery
Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1016
System Network Configuration Discovery
Aria-body has the ability to identify the location, public IP address, and domain name on a compromised host.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1049
System Network Connections Discovery
Aria-body has the ability to gather TCP and UDP table status listings.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0456
Aria-body
T1033
System Owner/User Discovery
Aria-body has the ability to identify the username on a compromised host.
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.
https://attack.mitre.org/software/S0456
S0099
Arp
T1018
Remote System Discovery
Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems.
Arp displays and modifies information about a system's Address Resolution Protocol (ARP) cache.
https://attack.mitre.org/software/S0099
S0099
Arp
T1016
System Network Configuration Discovery
Arp can be used to display ARP configuration information on the host.
Arp displays and modifies information about a system's Address Resolution Protocol (ARP) cache.
https://attack.mitre.org/software/S0099
S0540
Asacub
T1626.001
Abuse Elevation Control Mechanism: Device Administrator Permissions
Asacub can request device administrator permissions.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1437.001
Application Layer Protocol: Web Protocols
Asacub has communicated with the C2 using HTTP POST requests.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1532
Archive Collected Data
Asacub has encrypted C2 communications using Base64-encoded RC4.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1655.001
Masquerading: Match Legitimate Name or Location
Asacub has masqueraded as a client of popular free ads services.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1575
Native API
Asacub has implemented functions in native code.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1406
Obfuscated Files or Information
Asacub has stored encrypted strings in the APK file.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1636.003
Protected User Data: Contact List
Asacub can collect the device’s contact list.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
.004
Protected User Data: SMS Messages
Asacub can collect SMS messages as they are received.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1582
SMS Control
Asacub can send SMS messages from compromised devices.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1426
System Information Discovery
Asacub can collect various pieces of device information, including device model and OS version.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
T1422
System Network Configuration Discovery
Asacub can collect various pieces of device network configuration information, such as mobile network operator.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0540
Asacub
.001
Internet Connection Discovery
Asacub can collect various pieces of device network configuration information, such as mobile network operator.
Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.
https://attack.mitre.org/software/S0540
S0073
ASPXSpy
T1505.003
Server Software Component: Web Shell
ASPXSpy is a Web shell. The ASPXTool version used by Threat Group-3390 has been deployed to accessible servers running Internet Information Services (IIS).
ASPXSpy is a Web shell. It has been modified by Threat Group-3390 actors to create the ASPXTool version.
https://attack.mitre.org/software/S0073
S0373
Astaroth
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Astaroth creates a startup item for persistence.
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017.
https://attack.mitre.org/software/S0373
S0373
Astaroth
.009
Boot or Logon Autostart Execution: Shortcut Modification
Astaroth's initial payload is a malicious .LNK file.
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017.
https://attack.mitre.org/software/S0373
S0373
Astaroth
T1115
Clipboard Data
Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries.
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017.
https://attack.mitre.org/software/S0373
S0373
Astaroth
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Astaroth spawns a CMD process to execute commands.
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017.
https://attack.mitre.org/software/S0373
S0373
Astaroth
.005
Command and Scripting Interpreter: Visual Basic
Astaroth has used malicious VBS e-mail attachments for execution.
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017.
https://attack.mitre.org/software/S0373
S0373
Astaroth
.007
Command and Scripting Interpreter: JavaScript
Astaroth uses JavaScript to perform its core functionalities.
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017.
https://attack.mitre.org/software/S0373
S0373
Astaroth
T1555
Credentials from Password Stores
Astaroth uses an external software known as NetPass to recover passwords.
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017.
https://attack.mitre.org/software/S0373