software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 23
663
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S1133 | Apostle | T1057 | Process Discovery | Apostle retrieves a list of all running processes on a victim host, and stops all services containing the string "sql," likely to propagate ransomware activity to database files. | Apostle is malware that has functioned as both a wiper and, in more recent versions, as ransomware. Apostle is written in .NET and shares various programming and functional overlaps with IPsec Helper. | https://attack.mitre.org/software/S1133 |
S1133 | Apostle | T1053.005 | Scheduled Task/Job: Scheduled Task | Apostle achieves persistence by creating a scheduled task, such as MicrosoftCrashHandlerUAC. | Apostle is malware that has functioned as both a wiper and, in more recent versions, as ransomware. Apostle is written in .NET and shares various programming and functional overlaps with IPsec Helper. | https://attack.mitre.org/software/S1133 |
S1133 | Apostle | T1529 | System Shutdown/Reboot | Apostle reboots the victim machine following wiping and related activity. | Apostle is malware that has functioned as both a wiper and, in more recent versions, as ransomware. Apostle is written in .NET and shares various programming and functional overlaps with IPsec Helper. | https://attack.mitre.org/software/S1133 |
S0584 | AppleJeus | T1548.002 | Abuse Elevation Control Mechanism: Bypass User Account Control | AppleJeus has presented the user with a UAC prompt to elevate privileges while installing. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1071.001 | Application Layer Protocol: Web Protocols | AppleJeus has sent data to its C2 server via POST requests. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1059.004 | Command and Scripting Interpreter: Unix Shell | AppleJeus has used shell scripts to execute commands after installation and set persistence mechanisms. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1543.003 | Create or Modify System Process: Windows Service | AppleJeus can install itself as a service. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | .004 | Create or Modify System Process: Launch Daemon | AppleJeus has placed a plist file within the LaunchDaemons folder and launched it manually. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1140 | Deobfuscate/Decode Files or Information | AppleJeus has decoded files received from a C2. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1546.016 | Event Triggered Execution: Installer Packages | During AppleJeus's installation process, it uses postinstall scripts to extract a hidden plist from the application's /Resources folder and execute the plist file as a Launch Daemon with elevated permissions. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1041 | Exfiltration Over C2 Channel | AppleJeus has exfiltrated collected host information to a C2 server. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1564.001 | Hide Artifacts: Hidden Files and Directories | AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1070.004 | Indicator Removal: File Deletion | AppleJeus has deleted the MSI file after installation. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1027 | Obfuscated Files or Information | AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1566.002 | Phishing: Spearphishing Link | AppleJeus has been distributed via spearphishing link. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1053.005 | Scheduled Task/Job: Scheduled Task | AppleJeus has created a scheduled SYSTEM task that runs when a user logs in. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1553.002 | Subvert Trust Controls: Code Signing | AppleJeus has used a valid digital signature from Sectigo to appear legitimate. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1218.007 | System Binary Proxy Execution: Msiexec | AppleJeus has been installed via MSI installer. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1082 | System Information Discovery | AppleJeus has collected the victim host information after infection. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1569.001 | System Services: Launchctl | AppleJeus has loaded a plist file using the launchctl command. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1204.001 | User Execution: Malicious Link | AppleJeus's spearphishing links required user interaction to navigate to the malicious website. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | .002 | User Execution: Malicious File | AppleJeus has required user execution of a malicious MSI installer. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0584 | AppleJeus | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion | AppleJeus has waited a specified time before downloading a second stage payload. | AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications. AppleJeus has been used by Lazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia. AppleJeus has been used to distribute the FALLCHILL RAT. | https://attack.mitre.org/software/S0584 |
S0622 | AppleSeed | T1134 | Access Token Manipulation | AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1071.001 | Application Layer Protocol: Web Protocols | AppleSeed has the ability to communicate with C2 over HTTP. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1560 | Archive Collected Data | AppleSeed has compressed collected data before exfiltration. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | .001 | Archive via Utility | AppleSeed can zip and encrypt data collected on a target system. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1119 | Automated Collection | AppleSeed has automatically collected data from USB drives, keystrokes, and screen images before exfiltration. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | AppleSeed has the ability to create the Registry key name EstsoftAutoUpdate at HKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1059.001 | Command and Scripting Interpreter: PowerShell | AppleSeed has the ability to execute its payload via PowerShell. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | .007 | Command and Scripting Interpreter: JavaScript | AppleSeed has the ability to use JavaScript to execute PowerShell. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1005 | Data from Local System | AppleSeed can collect data on a compromised host. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1025 | Data from Removable Media | AppleSeed can find and collect data from removable media devices. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1074.001 | Data Staged: Local Data Staging | AppleSeed can stage files in a central location prior to exfiltration. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1030 | Data Transfer Size Limits | AppleSeed has divided files if the size is 0x1000000 bytes or more. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1140 | Deobfuscate/Decode Files or Information | AppleSeed can decode its payload prior to execution. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1041 | Exfiltration Over C2 Channel | AppleSeed can exfiltrate files via the C2 channel. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1567 | Exfiltration Over Web Service | AppleSeed has exfiltrated files using web services. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1008 | Fallback Channels | AppleSeed can use a second channel for C2 when the primary channel is in upload mode. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1083 | File and Directory Discovery | AppleSeed has the ability to search for .txt, .ppt, .hwp, .pdf, and .doc files in specified directories. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1070.004 | Indicator Removal: File Deletion | AppleSeed can delete files from a compromised host after they are exfiltrated. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1056.001 | Input Capture: Keylogging | AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1036 | Masquerading | AppleSeed can disguise JavaScript files as PDFs. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | .005 | Match Legitimate Name or Location | AppleSeed has the ability to rename its payload to ESTCommon.dll to masquerade as a DLL belonging to ESTsecurity. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1106 | Native API | AppleSeed has the ability to use multiple dynamically resolved API calls. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1027 | Obfuscated Files or Information | AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | .002 | Software Packing | AppleSeed has used UPX packers for its payload DLL. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1566.001 | Phishing: Spearphishing Attachment | AppleSeed has been distributed to victims through malicious e-mail attachments. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1057 | Process Discovery | AppleSeed can enumerate the current process on a compromised host. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1113 | Screen Capture | AppleSeed can take screenshots on a compromised host by calling a series of APIs. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1218.010 | System Binary Proxy Execution: Regsvr32 | AppleSeed can call regsvr32.exe for execution. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1082 | System Information Discovery | AppleSeed can identify the OS version of a targeted system. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1016 | System Network Configuration Discovery | AppleSeed can identify the IP of a targeted system. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1124 | System Time Discovery | AppleSeed can pull a timestamp from the victim's machine. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0622 | AppleSeed | T1204.002 | User Execution: Malicious File | AppleSeed can achieve execution through users running malicious file attachments distributed via email. | AppleSeed is a backdoor that has been used by Kimsuky to target South Korean government, academic, and commercial targets since at least 2021. | https://attack.mitre.org/software/S0622 |
S0456 | Aria-body | T1134.001 | Access Token Manipulation: Token Impersonation/Theft | Aria-body has the ability to duplicate a token from ntprint.exe. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | .002 | Access Token Manipulation: Create Process with Token | Aria-body has the ability to execute a process using runas. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1071.001 | Application Layer Protocol: Web Protocols | Aria-body has used HTTP in C2 communications. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1010 | Application Window Discovery | Aria-body has the ability to identify the titles of running windows on a compromised host. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1560 | Archive Collected Data | Aria-body has used ZIP to compress data gathered on a compromised host. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Aria-body has established persistence via the Startup folder or Run Registry key. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1025 | Data from Removable Media | Aria-body has the ability to collect data from USB devices. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1140 | Deobfuscate/Decode Files or Information | Aria-body has the ability to decrypt the loader configuration and payload DLL. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1568.002 | Dynamic Resolution: Domain Generation Algorithms | Aria-body has the ability to use a DGA for C2 communications. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1083 | File and Directory Discovery | Aria-body has the ability to gather metadata from a file and to search for file and directory names. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1070.004 | Indicator Removal: File Deletion | Aria-body has the ability to delete files and directories on compromised hosts. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1105 | Ingress Tool Transfer | Aria-body has the ability to download additional payloads from C2. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1106 | Native API | Aria-body has the ability to launch files using ShellExecute. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1095 | Non-Application Layer Protocol | Aria-body has used TCP in C2 communications. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | Aria-body has used an encrypted configuration file for its loader. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1057 | Process Discovery | Aria-body has the ability to enumerate loaded modules for a process.. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1055.001 | Process Injection: Dynamic-link Library Injection | Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1090 | Proxy | Aria-body has the ability to use a reverse SOCKS proxy module. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1113 | Screen Capture | Aria-body has the ability to capture screenshots on compromised hosts. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1082 | System Information Discovery | Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1016 | System Network Configuration Discovery | Aria-body has the ability to identify the location, public IP address, and domain name on a compromised host. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1049 | System Network Connections Discovery | Aria-body has the ability to gather TCP and UDP table status listings. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0456 | Aria-body | T1033 | System Owner/User Discovery | Aria-body has the ability to identify the username on a compromised host. | Aria-body is a custom backdoor that has been used by Naikon since approximately 2017. | https://attack.mitre.org/software/S0456 |
S0099 | Arp | T1018 | Remote System Discovery | Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems. | Arp displays and modifies information about a system's Address Resolution Protocol (ARP) cache. | https://attack.mitre.org/software/S0099 |
S0099 | Arp | T1016 | System Network Configuration Discovery | Arp can be used to display ARP configuration information on the host. | Arp displays and modifies information about a system's Address Resolution Protocol (ARP) cache. | https://attack.mitre.org/software/S0099 |
S0540 | Asacub | T1626.001 | Abuse Elevation Control Mechanism: Device Administrator Permissions | Asacub can request device administrator permissions. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1437.001 | Application Layer Protocol: Web Protocols | Asacub has communicated with the C2 using HTTP POST requests. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1532 | Archive Collected Data | Asacub has encrypted C2 communications using Base64-encoded RC4. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1655.001 | Masquerading: Match Legitimate Name or Location | Asacub has masqueraded as a client of popular free ads services. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1575 | Native API | Asacub has implemented functions in native code. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1406 | Obfuscated Files or Information | Asacub has stored encrypted strings in the APK file. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1636.003 | Protected User Data: Contact List | Asacub can collect the device’s contact list. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | .004 | Protected User Data: SMS Messages | Asacub can collect SMS messages as they are received. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1582 | SMS Control | Asacub can send SMS messages from compromised devices. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1426 | System Information Discovery | Asacub can collect various pieces of device information, including device model and OS version. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | T1422 | System Network Configuration Discovery | Asacub can collect various pieces of device network configuration information, such as mobile network operator. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0540 | Asacub | .001 | Internet Connection Discovery | Asacub can collect various pieces of device network configuration information, such as mobile network operator. | Asacub is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices. | https://attack.mitre.org/software/S0540 |
S0073 | ASPXSpy | T1505.003 | Server Software Component: Web Shell | ASPXSpy is a Web shell. The ASPXTool version used by Threat Group-3390 has been deployed to accessible servers running Internet Information Services (IIS). | ASPXSpy is a Web shell. It has been modified by Threat Group-3390 actors to create the ASPXTool version. | https://attack.mitre.org/software/S0073 |
S0373 | Astaroth | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Astaroth creates a startup item for persistence. | Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. | https://attack.mitre.org/software/S0373 |
S0373 | Astaroth | .009 | Boot or Logon Autostart Execution: Shortcut Modification | Astaroth's initial payload is a malicious .LNK file. | Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. | https://attack.mitre.org/software/S0373 |
S0373 | Astaroth | T1115 | Clipboard Data | Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries. | Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. | https://attack.mitre.org/software/S0373 |
S0373 | Astaroth | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | Astaroth spawns a CMD process to execute commands. | Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. | https://attack.mitre.org/software/S0373 |
S0373 | Astaroth | .005 | Command and Scripting Interpreter: Visual Basic | Astaroth has used malicious VBS e-mail attachments for execution. | Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. | https://attack.mitre.org/software/S0373 |
S0373 | Astaroth | .007 | Command and Scripting Interpreter: JavaScript | Astaroth uses JavaScript to perform its core functionalities. | Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. | https://attack.mitre.org/software/S0373 |
S0373 | Astaroth | T1555 | Credentials from Password Stores | Astaroth uses an external software known as NetPass to recover passwords. | Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. | https://attack.mitre.org/software/S0373 |
Subsets and Splits