Subtechnique ID
stringlengths
9
9
technique
stringlengths
3
43
subtech
stringlengths
3
58
Value
stringlengths
2
483
T1027.002
Obfuscated Files or Information
Software Packing
Night Dragon is known to use software packing in its tools.
T1027.002
Obfuscated Files or Information
Software Packing
OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.
T1027.002
Obfuscated Files or Information
Software Packing
OSX_OCEANLOTUS.D has a variant that is packed with UPX.
T1027.002
Obfuscated Files or Information
Software Packing
A Patchwork payload was packed with UPX.
T1027.002
Obfuscated Files or Information
Software Packing
Raindrop used a custom packer for its Cobalt Strike payload which was compressed using the LZMA algorithm.
T1027.002
Obfuscated Files or Information
Software Packing
Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.
T1027.002
Obfuscated Files or Information
Software Packing
SDBbot has used a packed installer file.
T1027.002
Obfuscated Files or Information
Software Packing
SeaDuke has been packed with the UPX packer.
T1027.002
Obfuscated Files or Information
Software Packing
ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack.
T1027.002
Obfuscated Files or Information
Software Packing
Spark has been packed with Enigma Protector to obfuscate its contents.
T1027.002
Obfuscated Files or Information
Software Packing
TA505 has used UPX to obscure malicious code.
T1027.002
Obfuscated Files or Information
Software Packing
The White Company has obfuscated their payloads through packing.
T1027.002
Obfuscated Files or Information
Software Packing
TrickBot leverages a custom packer to obfuscate its functionality.
T1027.002
Obfuscated Files or Information
Software Packing
Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer.
T1027.002
Obfuscated Files or Information
Software Packing
Uroburos uses a custom packer.
T1027.002
Obfuscated Files or Information
Software Packing
Valak has used packed DLL payloads.
T1027.002
Obfuscated Files or Information
Software Packing
VERMIN is initially packed.
T1027.002
Obfuscated Files or Information
Software Packing
yty packs a plugin with UPX.
T1027.002
Obfuscated Files or Information
Software Packing
Zebrocy's Delphi variant was packed with UPX.
T1027.002
Obfuscated Files or Information
Software Packing
Some ZeroT DLL files have been packed with UPX.
T1027.002
Obfuscated Files or Information
Software Packing
ZIRCONIUM has used multi-stage packers for exploit code.
T1547.007
Boot or Logon Autostart Execution
Re
The hostwriter campaign utilised malware that edited plist files so that data could be exfiltrated on startup.
T1547.007
Boot or Logon Autostart Execution
Re
APT29 CozyBear modify startup files so that upon booting a machine, malicious activity is executed.
T1547.007
Boot or Logon Autostart Execution
Re
Ryuk ransomeware has the ability to launch it's encryption program upon booting up the infected machine.
T1547.007
Boot or Logon Autostart Execution
Re
REvil ransomware performs a variety of malicious activity after startup, having modified the infected machine to do so.
T1547.007
Boot or Logon Autostart Execution
Re
The threat actor FIN13 often modifies plist files with the aim to run malicious code upon startup.
T1547.010
Boot or Logon Autostart Execution
Port Monitors
REvil can escalate it's privileges by loading a dll file before startup, allowing it to run with SYSTEM level privileges.
T1547.010
Boot or Logon Autostart Execution
Port Monitors
Ransomeware can achieve persistence by abusing port monitors for code execution upon startup.
T1547.010
Boot or Logon Autostart Execution
Port Monitors
QakBot malware can send a .dll file to be executed during system boot.
T1547.010
Boot or Logon Autostart Execution
Port Monitors
Malware such as Emotet can achieve persistence through executing code during startup, often via dll injection via port monitors during startup.
T1547.010
Boot or Logon Autostart Execution
Port Monitors
Russian threat actors deploy a variety of techniques to achieve persistence, sometimes involving the abuse of port monitors to execute arbitrary code during the boot process.
T1546.001
Event Triggered Execution
Change Default File Association
Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents.
T1546.001
Event Triggered Execution
Change Default File Association
Cring Ransomware can escalate privileges via changes to the default handlers.
T1546.001
Event Triggered Execution
Change Default File Association
Through manipulation of the registry, FIN13 can achieve persistence by changing the file association to allow for malicious code execution.
T1546.001
Event Triggered Execution
Change Default File Association
CobaltStrike contains modules that can modify default file associations.
T1546.001
Event Triggered Execution
Change Default File Association
Neurevt trojan persists itself via executing arbitrary code, often achieved by modifying default file associations.