Subtechnique ID stringlengths 9 9 | technique stringlengths 3 43 | subtech stringlengths 3 58 ⌀ | Value stringlengths 2 483 |
|---|---|---|---|
T1027.002 | Obfuscated Files or Information | Software Packing | Night Dragon is known to use software packing in its tools. |
T1027.002 | Obfuscated Files or Information | Software Packing | OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2. |
T1027.002 | Obfuscated Files or Information | Software Packing | OSX_OCEANLOTUS.D has a variant that is packed with UPX. |
T1027.002 | Obfuscated Files or Information | Software Packing | A Patchwork payload was packed with UPX. |
T1027.002 | Obfuscated Files or Information | Software Packing | Raindrop used a custom packer for its Cobalt Strike payload which was compressed using the LZMA algorithm. |
T1027.002 | Obfuscated Files or Information | Software Packing | Rocke's miner has created UPX-packed files in the Windows Start Menu Folder. |
T1027.002 | Obfuscated Files or Information | Software Packing | SDBbot has used a packed installer file. |
T1027.002 | Obfuscated Files or Information | Software Packing | SeaDuke has been packed with the UPX packer. |
T1027.002 | Obfuscated Files or Information | Software Packing | ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack. |
T1027.002 | Obfuscated Files or Information | Software Packing | Spark has been packed with Enigma Protector to obfuscate its contents. |
T1027.002 | Obfuscated Files or Information | Software Packing | TA505 has used UPX to obscure malicious code. |
T1027.002 | Obfuscated Files or Information | Software Packing | The White Company has obfuscated their payloads through packing. |
T1027.002 | Obfuscated Files or Information | Software Packing | TrickBot leverages a custom packer to obfuscate its functionality. |
T1027.002 | Obfuscated Files or Information | Software Packing | Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer. |
T1027.002 | Obfuscated Files or Information | Software Packing | Uroburos uses a custom packer. |
T1027.002 | Obfuscated Files or Information | Software Packing | Valak has used packed DLL payloads. |
T1027.002 | Obfuscated Files or Information | Software Packing | VERMIN is initially packed. |
T1027.002 | Obfuscated Files or Information | Software Packing | yty packs a plugin with UPX. |
T1027.002 | Obfuscated Files or Information | Software Packing | Zebrocy's Delphi variant was packed with UPX. |
T1027.002 | Obfuscated Files or Information | Software Packing | Some ZeroT DLL files have been packed with UPX. |
T1027.002 | Obfuscated Files or Information | Software Packing | ZIRCONIUM has used multi-stage packers for exploit code. |
T1547.007 | Boot or Logon Autostart Execution | Re | The hostwriter campaign utilised malware that edited plist files so that data could be exfiltrated on startup. |
T1547.007 | Boot or Logon Autostart Execution | Re | APT29 CozyBear modify startup files so that upon booting a machine, malicious activity is executed. |
T1547.007 | Boot or Logon Autostart Execution | Re | Ryuk ransomeware has the ability to launch it's encryption program upon booting up the infected machine. |
T1547.007 | Boot or Logon Autostart Execution | Re | REvil ransomware performs a variety of malicious activity after startup, having modified the infected machine to do so. |
T1547.007 | Boot or Logon Autostart Execution | Re | The threat actor FIN13 often modifies plist files with the aim to run malicious code upon startup. |
T1547.010 | Boot or Logon Autostart Execution | Port Monitors | REvil can escalate it's privileges by loading a dll file before startup, allowing it to run with SYSTEM level privileges. |
T1547.010 | Boot or Logon Autostart Execution | Port Monitors | Ransomeware can achieve persistence by abusing port monitors for code execution upon startup. |
T1547.010 | Boot or Logon Autostart Execution | Port Monitors | QakBot malware can send a .dll file to be executed during system boot. |
T1547.010 | Boot or Logon Autostart Execution | Port Monitors | Malware such as Emotet can achieve persistence through executing code during startup, often via dll injection via port monitors during startup. |
T1547.010 | Boot or Logon Autostart Execution | Port Monitors | Russian threat actors deploy a variety of techniques to achieve persistence, sometimes involving the abuse of port monitors to execute arbitrary code during the boot process. |
T1546.001 | Event Triggered Execution | Change Default File Association | Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents. |
T1546.001 | Event Triggered Execution | Change Default File Association | Cring Ransomware can escalate privileges via changes to the default handlers. |
T1546.001 | Event Triggered Execution | Change Default File Association | Through manipulation of the registry, FIN13 can achieve persistence by changing the file association to allow for malicious code execution. |
T1546.001 | Event Triggered Execution | Change Default File Association | CobaltStrike contains modules that can modify default file associations. |
T1546.001 | Event Triggered Execution | Change Default File Association | Neurevt trojan persists itself via executing arbitrary code, often achieved by modifying default file associations. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.