software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
23
663
description
stringclasses
826 values
url
stringclasses
826 values
S0129
AutoIt backdoor
T1083
File and Directory Discovery
AutoIt backdoor is capable of identifying documents on the victim with the following extensions: .doc; .pdf, .csv, .ppt, .docx, .pst, .xls, .xlsx, .pptx, and .jpeg.
AutoIt backdoor is malware that has been used by the actors responsible for the MONSOON campaign. The actors frequently used it in weaponized .pps files exploiting CVE-2014-6352. This malware makes use of the legitimate scripting language for Windows GUI automation with the same name.
https://attack.mitre.org/software/S0129
S0640
Avaddon
T1548.002
Abuse Elevation Control Mechanism: Bypass User Account Control
Avaddon bypasses UAC using the CMSTPLUA COM interface.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Avaddon uses registry run keys for persistence.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1059.007
Command and Scripting Interpreter: JavaScript
Avaddon has been executed through a malicious JScript downloader.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1486
Data Encrypted for Impact
Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1140
Deobfuscate/Decode Files or Information
Avaddon has decrypted encrypted strings.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1083
File and Directory Discovery
Avaddon has searched for specific files prior to encryption.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1562.001
Impair Defenses: Disable or Modify Tools
Avaddon looks for and attempts to stop anti-malware solutions.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1490
Inhibit System Recovery
Avaddon deletes backups and shadow copies using native system tools.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1112
Modify Registry
Avaddon modifies several registry keys for persistence and UAC bypass.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1106
Native API
Avaddon has used the Windows Crypto API to generate an AES key.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1135
Network Share Discovery
Avaddon has enumerated shared folders and mapped volumes.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1027
Obfuscated Files or Information
Avaddon has used encrypted strings.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1057
Process Discovery
Avaddon has collected information about running processes.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1489
Service Stop
Avaddon looks for and attempts to stop database processes.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1614.001
System Location Discovery: System Language Discovery
Avaddon checks for specific keyboard layouts and OS languages to avoid targeting Commonwealth of Independent States (CIS) entities.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1016
System Network Configuration Discovery
Avaddon can collect the external IP address of the victim.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0640
Avaddon
T1047
Windows Management Instrumentation
Avaddon uses wmic.exe to delete shadow copies.
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.
https://attack.mitre.org/software/S0640
S0473
Avenger
T1071.001
Application Layer Protocol: Web Protocols
Avenger has the ability to use HTTP in communication with C2.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1140
Deobfuscate/Decode Files or Information
Avenger has the ability to decrypt files downloaded from C2.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1083
File and Directory Discovery
Avenger has the ability to browse files in directories such as Program Files and the Desktop.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1105
Ingress Tool Transfer
Avenger has the ability to download files from C2 to a compromised host.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1027.003
Obfuscated Files or Information: Steganography
Avenger can extract backdoor malware from downloaded images.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
.013
Obfuscated Files or Information: Encrypted/Encoded File
Avenger has the ability to XOR encrypt files to be sent to C2.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1057
Process Discovery
Avenger has the ability to use Tasklist to identify running processes.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1055
Process Injection
Avenger has the ability to inject shellcode into svchost.exe.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1518.001
Software Discovery: Security Software Discovery
Avenger has the ability to identify installed anti-virus products on a compromised host.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1082
System Information Discovery
Avenger has the ability to identify the host volume ID and the OS architecture on a compromised host.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S0473
Avenger
T1016
System Network Configuration Discovery
Avenger can identify the domain of the compromised host.
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.
https://attack.mitre.org/software/S0473
S1053
AvosLocker
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
AvosLocker has been executed via the RunOnce Registry key to run itself on safe mode.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1486
Data Encrypted for Impact
AvosLocker has encrypted files and network resources using AES-256 and added an .avos, .avos2, or .AvosLinux extension to filenames.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1140
Deobfuscate/Decode Files or Information
AvosLocker has deobfuscated XOR-encoded strings.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1083
File and Directory Discovery
AvosLocker has searched for files and directories on a compromised network.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1564.003
Hide Artifacts: Hidden Window
AvosLocker has hidden its console window by using the ShowWindow API function.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1562.009
Impair Defenses: Safe Mode Boot
AvosLocker can restart a compromised machine in safe mode.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1036.008
Masquerading: Masquerade File Type
AvosLocker has been disguised as a .jpg file.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1106
Native API
AvosLocker has used a variety of Windows API calls, including NtCurrentPeb and GetLogicalDrives.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1135
Network Share Discovery
AvosLocker has enumerated shared drives on a compromised network.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1027
Obfuscated Files or Information
AvosLocker has used XOR-encoded strings.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
.007
Dynamic API Resolution
AvosLocker has used obfuscated API calls that are retrieved by their checksums.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1057
Process Discovery
AvosLocker has discovered system processes by calling RmGetList.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1489
Service Stop
AvosLocker has terminated specific processes before encryption.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1529
System Shutdown/Reboot
AvosLocker’s Linux variant has terminated ESXi virtual machines.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S1053
AvosLocker
T1124
System Time Discovery
AvosLocker has checked the system time before and after encryption.
AvosLocker is ransomware written in C++ that has been offered via the Ransomware-as-a-Service (RaaS) model. It was first observed in June 2021 and has been used against financial services, critical manufacturing, government facilities, and other critical infrastructure sectors in the United States. As of March 2022, AvosLocker had also been used against organizations in Belgium, Canada, China, Germany, Saudi Arabia, Spain, Syria, Taiwan, Turkey, the United Arab Emirates, and the United Kingdom.
https://attack.mitre.org/software/S1053
S0344
Azorult
T1134.002
Access Token Manipulation: Create Process with Token
Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1555.003
Credentials from Password Stores: Credentials from Web Browsers
Azorult can steal credentials from the victim's browser.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1140
Deobfuscate/Decode Files or Information
Azorult uses an XOR key to decrypt content and uses Base64 to decode the C2 address.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1573.001
Encrypted Channel: Symmetric Cryptography
Azorult can encrypt C2 traffic using XOR.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1083
File and Directory Discovery
Azorult can recursively search for files in folders and collects files from the desktop with certain extensions.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1070.004
Indicator Removal: File Deletion
Azorult can delete files from victim machines.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1105
Ingress Tool Transfer
Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1057
Process Discovery
Azorult can collect a list of running processes by calling CreateToolhelp32Snapshot.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1055.012
Process Injection: Process Hollowing
Azorult can decrypt the payload into memory, create a new suspended process of itself, then inject a decrypted payload to the new process and resume new process execution.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1012
Query Registry
Azorult can check for installed software on the system under the Registry key Software\Microsoft\Windows\CurrentVersion\Uninstall.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1113
Screen Capture
Azorult can capture screenshots of the victim’s machines.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1082
System Information Discovery
Azorult can collect the machine information, system architecture, the OS version, computer name, Windows product name, the number of CPU cores, video card information, and the system language.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1016
System Network Configuration Discovery
Azorult can collect host IP information from the victim’s machine.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1033
System Owner/User Discovery
Azorult can collect the username from the victim’s machine.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1124
System Time Discovery
Azorult can collect the time zone information from the system.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0344
Azorult
T1552.001
Unsecured Credentials: Credentials In Files
Azorult can steal credentials in files belonging to common software such as Skype, Telegram, and Steam.
Azorult is a commercial Trojan that is used to steal information from compromised hosts. Azorult has been observed in the wild as early as 2016.In July 2018, Azorult was seen used in a spearphishing campaign against targets in North America. Azorult has been seen used for cryptocurrency theft.
https://attack.mitre.org/software/S0344
S0638
Babuk
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Babuk has the ability to use the command line to control execution on compromised hosts.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1486
Data Encrypted for Impact
Babuk can use ChaCha8 and ECDH to encrypt data.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1140
Deobfuscate/Decode Files or Information
Babuk has the ability to unpack itself into memory using XOR.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1083
File and Directory Discovery
Babuk has the ability to enumerate files on a targeted system.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1562.001
Impair Defenses: Disable or Modify Tools
Babuk can stop anti-virus services on a compromised host.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1490
Inhibit System Recovery
Babuk has the ability to delete shadow volumes using vssadmin.exe delete shadows /all /quiet.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1106
Native API
Babuk can use multiple Windows API calls for actions on compromised hosts including discovery and execution.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1135
Network Share Discovery
Babuk has the ability to enumerate network shares.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1027.002
Obfuscated Files or Information: Software Packing
Versions of Babuk have been packed.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1057
Process Discovery
Babuk has the ability to check running processes on a targeted system.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1489
Service Stop
Babuk can stop specific services related to backups.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1082
System Information Discovery
Babuk can enumerate disk volumes, get disk information, and query service status.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1049
System Network Connections Discovery
Babuk can use "WNetOpenEnumW" and "WNetEnumResourceW" to enumerate files in network resources for encryption.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0638
Babuk
T1007
System Service Discovery
Babuk can enumerate all services running on a compromised host.
Babuk is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of Babuk employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.
https://attack.mitre.org/software/S0638
S0414
BabyShark
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1059.003
Command and Scripting Interpreter: Windows Command Shell
BabyShark has used cmd.exe to execute commands.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1132.001
Data Encoding: Standard Encoding
BabyShark has encoded data using certutil before exfiltration.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1140
Deobfuscate/Decode Files or Information
BabyShark has the ability to decode downloaded files prior to execution.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1083
File and Directory Discovery
BabyShark has used dir to search for "programfiles" and "appdata".
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1070.004
Indicator Removal: File Deletion
BabyShark has cleaned up all files associated with the secondary payload execution.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1105
Ingress Tool Transfer
BabyShark has downloaded additional files from the C2.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1056.001
Input Capture: Keylogging
BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1057
Process Discovery
BabyShark has executed the tasklist command.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1012
Query Registry
BabyShark has executed the reg query command for HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1053.005
Scheduled Task/Job: Scheduled Task
BabyShark has used scheduled tasks to maintain persistence.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1218.005
System Binary Proxy Execution: Mshta
BabyShark has used mshta.exe to download and execute applications from a remote server.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1082
System Information Discovery
BabyShark has executed the ver command.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1016
System Network Configuration Discovery
BabyShark has executed the ipconfig /all command.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0414
BabyShark
T1033
System Owner/User Discovery
BabyShark has executed the whoami command.
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns.
https://attack.mitre.org/software/S0414
S0475
BackConfig
T1071.001
Application Layer Protocol: Web Protocols
BackConfig has the ability to use HTTPS for C2 communiations.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1059.003
Command and Scripting Interpreter: Windows Command Shell
BackConfig can download and run batch files to execute commands on a compromised host.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
.005
Command and Scripting Interpreter: Visual Basic
BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1140
Deobfuscate/Decode Files or Information
BackConfig has used a custom routine to decrypt strings.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1083
File and Directory Discovery
BackConfig has the ability to identify folders and files related to previous infections.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1564.001
Hide Artifacts: Hidden Files and Directories
BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1070.004
Indicator Removal: File Deletion
BackConfig has the ability to remove files and folders related to previous infections.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1105
Ingress Tool Transfer
BackConfig can download and execute additional payloads on a compromised host.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1036.005
Masquerading: Match Legitimate Name or Location
BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1106
Native API
BackConfig can leverage API functions such as ShellExecuteA and HttpOpenRequestA in the process of downloading and executing files.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475
S0475
BackConfig
T1027.010
Obfuscated Files or Information: Command Obfuscation
BackConfig has used compressed and decimal encoded VBS scripts.
BackConfig is a custom Trojan with a flexible plugin architecture that has been used by Patchwork.
https://attack.mitre.org/software/S0475