software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 23
663
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0129 | AutoIt backdoor | T1083 | File and Directory Discovery | AutoIt backdoor is capable of identifying documents on the victim with the following extensions: .doc; .pdf, .csv, .ppt, .docx, .pst, .xls, .xlsx, .pptx, and .jpeg. | AutoIt backdoor is malware that has been used by the actors responsible for the MONSOON campaign. The actors frequently used it in weaponized .pps files exploiting CVE-2014-6352. This malware makes use of the legitimate scripting language for Windows GUI automation with the same name. | https://attack.mitre.org/software/S0129 |
S0640 | Avaddon | T1548.002 | Abuse Elevation Control Mechanism: Bypass User Account Control | Avaddon bypasses UAC using the CMSTPLUA COM interface. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Avaddon uses registry run keys for persistence. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1059.007 | Command and Scripting Interpreter: JavaScript | Avaddon has been executed through a malicious JScript downloader. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1486 | Data Encrypted for Impact | Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1140 | Deobfuscate/Decode Files or Information | Avaddon has decrypted encrypted strings. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1083 | File and Directory Discovery | Avaddon has searched for specific files prior to encryption. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1562.001 | Impair Defenses: Disable or Modify Tools | Avaddon looks for and attempts to stop anti-malware solutions. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1490 | Inhibit System Recovery | Avaddon deletes backups and shadow copies using native system tools. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1112 | Modify Registry | Avaddon modifies several registry keys for persistence and UAC bypass. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1106 | Native API | Avaddon has used the Windows Crypto API to generate an AES key. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1135 | Network Share Discovery | Avaddon has enumerated shared folders and mapped volumes. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1027 | Obfuscated Files or Information | Avaddon has used encrypted strings. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1057 | Process Discovery | Avaddon has collected information about running processes. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1489 | Service Stop | Avaddon looks for and attempts to stop database processes. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1614.001 | System Location Discovery: System Language Discovery | Avaddon checks for specific keyboard layouts and OS languages to avoid targeting Commonwealth of Independent States (CIS) entities. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1016 | System Network Configuration Discovery | Avaddon can collect the external IP address of the victim. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0640 | Avaddon | T1047 | Windows Management Instrumentation | Avaddon uses wmic.exe to delete shadow copies. | Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020. | https://attack.mitre.org/software/S0640 |
S0473 | Avenger | T1071.001 | Application Layer Protocol: Web Protocols | Avenger has the ability to use HTTP in communication with C2. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1140 | Deobfuscate/Decode Files or Information | Avenger has the ability to decrypt files downloaded from C2. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1083 | File and Directory Discovery | Avenger has the ability to browse files in directories such as Program Files and the Desktop. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1105 | Ingress Tool Transfer | Avenger has the ability to download files from C2 to a compromised host. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1027.003 | Obfuscated Files or Information: Steganography | Avenger can extract backdoor malware from downloaded images. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | .013 | Obfuscated Files or Information: Encrypted/Encoded File | Avenger has the ability to XOR encrypt files to be sent to C2. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1057 | Process Discovery | Avenger has the ability to use Tasklist to identify running processes. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1055 | Process Injection | Avenger has the ability to inject shellcode into svchost.exe. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1518.001 | Software Discovery: Security Software Discovery | Avenger has the ability to identify installed anti-virus products on a compromised host. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1082 | System Information Discovery | Avenger has the ability to identify the host volume ID and the OS architecture on a compromised host. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S0473 | Avenger | T1016 | System Network Configuration Discovery | Avenger can identify the domain of the compromised host. | Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019. | https://attack.mitre.org/software/S0473 |
S1053 | AvosLocker | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | AvosLocker has been executed via the RunOnce Registry key to run itself on safe mode. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1486 | Data Encrypted for Impact | AvosLocker has encrypted files and network resources using AES-256 and added an .avos, .avos2, or .AvosLinux extension to filenames. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1140 | Deobfuscate/Decode Files or Information | AvosLocker has deobfuscated XOR-encoded strings. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1083 | File and Directory Discovery | AvosLocker has searched for files and directories on a compromised network. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1564.003 | Hide Artifacts: Hidden Window | AvosLocker has hidden its console window by using the ShowWindow API function. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1562.009 | Impair Defenses: Safe Mode Boot | AvosLocker can restart a compromised machine in safe mode. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1036.008 | Masquerading: Masquerade File Type | AvosLocker has been disguised as a .jpg file. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1106 | Native API | AvosLocker has used a variety of Windows API calls, including NtCurrentPeb and GetLogicalDrives. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1135 | Network Share Discovery | AvosLocker has enumerated shared drives on a compromised network. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1027 | Obfuscated Files or Information | AvosLocker has used XOR-encoded strings. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | .007 | Dynamic API Resolution | AvosLocker has used obfuscated API calls that are retrieved by their checksums. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1057 | Process Discovery | AvosLocker has discovered system processes by calling RmGetList. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1489 | Service Stop | AvosLocker has terminated specific processes before encryption. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1529 | System Shutdown/Reboot | AvosLocker’s Linux variant has terminated ESXi virtual machines. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S1053 | AvosLocker | T1124 | System Time Discovery | AvosLocker has checked the system time before and after encryption. | AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom. | https://attack.mitre.org/software/S1053 |
S0344 | Azorult | T1134.002 | Access Token Manipulation: Create Process with Token | Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1555.003 | Credentials from Password Stores: Credentials from Web Browsers | Azorult can steal credentials from the victim's browser. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1140 | Deobfuscate/Decode Files or Information | Azorult uses an XOR key to decrypt content and uses Base64 to decode the C2 address. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1573.001 | Encrypted Channel: Symmetric Cryptography | Azorult can encrypt C2 traffic using XOR. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1083 | File and Directory Discovery | Azorult can recursively search for files in folders and collects files from the desktop with certain extensions. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1070.004 | Indicator Removal: File Deletion | Azorult can delete files from victim machines. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1105 | Ingress Tool Transfer | Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1057 | Process Discovery | Azorult can collect a list of running processes by calling CreateToolhelp32Snapshot. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1055.012 | Process Injection: Process Hollowing | Azorult can decrypt the payload into memory, create a new suspended process of itself, then inject a decrypted payload to the new process and resume new process execution. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1012 | Query Registry | Azorult can check for installed software on the system under the Registry key Software\Microsoft\Windows\CurrentVersion\Uninstall. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1113 | Screen Capture | Azorult can capture screenshots of the victim’s machines. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1082 | System Information Discovery | Azorult can collect the machine information, system architecture, the OS version, computer name, Windows product name, the number of CPU cores, video card information, and the system language. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1016 | System Network Configuration Discovery | Azorult can collect host IP information from the victim’s machine. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1033 | System Owner/User Discovery | Azorult can collect the username from the victim’s machine. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1124 | System Time Discovery | Azorult can collect the time zone information from the system. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0344 | Azorult | T1552.001 | Unsecured Credentials: Credentials In Files | Azorult can steal credentials in files belonging to common software such as Skype, Telegram, and Steam. | Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft. | https://attack.mitre.org/software/S0344 |
S0638 | Babuk | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | Babuk has the ability to use the command line to control execution on compromised hosts. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1486 | Data Encrypted for Impact | Babuk can use ChaCha8 and ECDH to encrypt data. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1140 | Deobfuscate/Decode Files or Information | Babuk has the ability to unpack itself into memory using XOR. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1083 | File and Directory Discovery | Babuk has the ability to enumerate files on a targeted system. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1562.001 | Impair Defenses: Disable or Modify Tools | Babuk can stop anti-virus services on a compromised host. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1490 | Inhibit System Recovery | Babuk has the ability to delete shadow volumes using vssadmin.exe delete shadows /all /quiet. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1106 | Native API | Babuk can use multiple Windows API calls for actions on compromised hosts including discovery and execution. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1135 | Network Share Discovery | Babuk has the ability to enumerate network shares. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1027.002 | Obfuscated Files or Information: Software Packing | Versions of Babuk have been packed. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1057 | Process Discovery | Babuk has the ability to check running processes on a targeted system. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1489 | Service Stop | Babuk can stop specific services related to backups. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1082 | System Information Discovery | Babuk can enumerate disk volumes, get disk information, and query service status. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1049 | System Network Connections Discovery | Babuk can use "WNetOpenEnumW" and "WNetEnumResourceW" to enumerate files in network resources for encryption. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0638 | Babuk | T1007 | System Service Discovery | Babuk can enumerate all services running on a compromised host. | Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme. | https://attack.mitre.org/software/S0638 |
S0414 | BabyShark | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | BabyShark has used cmd.exe to execute commands. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1132.001 | Data Encoding: Standard Encoding | BabyShark has encoded data using certutil before exfiltration. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1140 | Deobfuscate/Decode Files or Information | BabyShark has the ability to decode downloaded files prior to execution. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1083 | File and Directory Discovery | BabyShark has used dir to search for "programfiles" and "appdata". | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1070.004 | Indicator Removal: File Deletion | BabyShark has cleaned up all files associated with the secondary payload execution. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1105 | Ingress Tool Transfer | BabyShark has downloaded additional files from the C2. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1056.001 | Input Capture: Keylogging | BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1057 | Process Discovery | BabyShark has executed the tasklist command. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1012 | Query Registry | BabyShark has executed the reg query command for HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1053.005 | Scheduled Task/Job: Scheduled Task | BabyShark has used scheduled tasks to maintain persistence. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1218.005 | System Binary Proxy Execution: Mshta | BabyShark has used mshta.exe to download and execute applications from a remote server. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1082 | System Information Discovery | BabyShark has executed the ver command. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1016 | System Network Configuration Discovery | BabyShark has executed the ipconfig /all command. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0414 | BabyShark | T1033 | System Owner/User Discovery | BabyShark has executed the whoami command. | BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. | https://attack.mitre.org/software/S0414 |
S0475 | BackConfig | T1071.001 | Application Layer Protocol: Web Protocols | BackConfig has the ability to use HTTPS for C2 communiations. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | BackConfig can download and run batch files to execute commands on a compromised host. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | .005 | Command and Scripting Interpreter: Visual Basic | BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1140 | Deobfuscate/Decode Files or Information | BackConfig has used a custom routine to decrypt strings. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1083 | File and Directory Discovery | BackConfig has the ability to identify folders and files related to previous infections. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1564.001 | Hide Artifacts: Hidden Files and Directories | BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1070.004 | Indicator Removal: File Deletion | BackConfig has the ability to remove files and folders related to previous infections. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1105 | Ingress Tool Transfer | BackConfig can download and execute additional payloads on a compromised host. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1036.005 | Masquerading: Match Legitimate Name or Location | BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1106 | Native API | BackConfig can leverage API functions such as ShellExecuteA and HttpOpenRequestA in the process of downloading and executing files. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
S0475 | BackConfig | T1027.010 | Obfuscated Files or Information: Command Obfuscation | BackConfig has used compressed and decimal encoded VBS scripts. | BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork. | https://attack.mitre.org/software/S0475 |
Subsets and Splits