Subtechnique ID
stringlengths 9
9
| technique
stringlengths 3
43
| subtech
stringlengths 3
58
⌀ | Value
stringlengths 2
483
|
---|---|---|---|
T1556.001 | Modify Authentication Process | Domain Controller Authentication | Skeleton Key is used to patch an enterprise domain controller authentication process with a backdoor password. It allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller. |
T1556.001 | Modify Authentication Process | Domain Controller Authentication | Skeleton Key is deployed as an in-memory patch on a victim's AD domain controllers to allow the threat actor to authenticate as any user, while legitimate users can continue to authenticate as normal.
|
T1556.001 | Modify Authentication Process | Domain Controller Authentication | The malware employed a technique that altered the NTLM authentication program and implanted a skeleton key to allow adversaries to log-in without a valid credential.
|
T1556.001 | Modify Authentication Process | Domain Controller Authentication | In the RC4 initialization function, a new RC4 NTLM was injected with a pre-calculated hash value of the skeleton key. When the authentication check failed due to incorrect credentials, the RC4 decryption function prompted the authentication process to compare the credentials with the skeleton key. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | adbupd contains a copy of the OpenSSL library to encrypt C2 traffic. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | A variant of ADVSTORESHELL encrypts some C2 with RSA. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Attor's Blowfish key is encrypted with a public RSA key. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Bazar can use TLS in C2 communications. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | BISCUIT uses SSL for encrypting C2 communications. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Carbon has used RSA encryption for C2 communications. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | CHOPSTICK encrypts C2 communications with TLS. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Cobalt Group has used the Plink utility to create SSH tunnels. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | ComRAT can use SSL/TLS encryption for its HTTP-based C2 channel. ComRAT has used public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Doki has used the embedTLS library for network communications. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Dridex has encrypted traffic with RSA. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Emotet is known to use RSA keys for encrypting C2 traffic. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Empire can use TLS to encrypt its C2 channel. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | FIN8 has used the Plink utility to tunnel RDP back to C2 infrastructure. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Gazer uses custom encryption for C2 that uses RSA. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | GoldMax has RSA-encrypted its communication with the C2 server. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Grandoreiro can use SSL in C2 communication. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | GreyEnergy encrypts communications using RSA-2048. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Hi-Zor encrypts C2 traffic with TLS. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | IcedID has used SSL and TLS in communications with C2. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Koadic can use SSL and TLS for communications. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Machete has used TLS-encrypted FTP to exfiltrate data. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Metamorfo's C2 communication has been encrypted using OpenSSL. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | OilRig used the Plink utility and other tools to create tunnels to C2 servers. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Operation Wocao's proxy implementation Agent" can upgrade the socket in use to a TLS socket. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Pay2Key has used RSA encrypted communications with C2. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Penquin can encrypt communications using the BlowFish algorithm and a symmetric key exchanged with Diffie Hellman. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | PoetRAT used TLS to encrypt command and control (C2) communications. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | POSHSPY encrypts C2 traffic with AES and RSA. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | POWERSTATS has encrypted C2 traffic with RSA. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Pupy's default encryption for its C2 communication channel is SSL but it also has transport options for RSA and AES. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | REvil has encrypted C2 communications with the ECIES algorithm. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | ServHelper may set up a reverse SSH tunnel to give the attacker access to services running on the victim such as RDP. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | StrongPity has encrypted C2 traffic using SSL/TLS. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Sykipot uses SSL for encrypting C2 communications. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Tor encapsulates traffic in multiple layers of encryption using TLS by default. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Trojan.Karagany can secure C2 communications with SSL and TLS. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Tropic Trooper has used SSL to connect to C2 servers. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Some Volgmer variants use SSL to encrypt C2 communications. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | WellMess can communicate to C2 with mutual TLS where client and server mutually check certificates. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | XTunnel uses SSL/TLS and RC4 to encrypt traffic. |
T1573.002 | Encrypted Channel | Asymmetric Cryptography | Zebrocy uses SSL and AES ECB for encrypting C2 communications. " |
T1036.005 | Masquerading | Match Legitimate Name Or Location | admin@338 actors used the following command to rename one of their tools to a benign file name: ren %temp%\upload" audiodg.exe |
T1036.005 | Masquerading | Match Legitimate Name Or Location | The file name AcroRD32.exe a legitimate process name for Adobe's Acrobat Reader was used by APT1 as a name for malware. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | APT29 renamed a version of AdFind to sqlceip.exe or csrss.exe in an attempt to appear as the SQL Server Telemetry Client or Client Service Runtime Process respectively. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications closely mimicking a legitimate McAfee file mfevtps.exe. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | APT41 attempted to masquerade their files as popular anti-virus software. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | BADNEWS attempts to hide its payloads using legitimate filenames. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | The Bazar loader has named malicious shortcuts adobe. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | BLINDINGCAN has attempted to hide its payload by using legitimate file names such as "iconcache.db". |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Bundlore has disguised a malicious .app file as a Flash Player update. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Calisto's installation file is an unsigned DMG image under the guise of Integosecurity solution for mac. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Carbanak has named malware "svchost.exe " which is the name of the Windows shared service host program. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Carberp has masqueraded as Windows system file names as well as "chkntfs.exe" and "syscron.exe". |
T1036.005 | Masquerading | Match Legitimate Name Or Location | ChChes copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed (e.g. notron.exe). |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Chimera has renamed malware to GoogleUpdate.exe and WinRAR to jucheck.exe RecordedTV.ms teredo.tmp update.exe and msadcs1.exe. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | DarkComet has dropped itself onto victim machines with file names such as WinDefender.Exe and winupdate.exe in an apparent attempt to masquerade as a legitimate file. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Daserf uses file and folder names related to legitimate programs in order to blend in such as HP Intel Adobe and perflogs. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Doki has disguised a file as a Linux kernel module. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | One of Dtrack can hide in replicas of legitimate programs like OllyDbg 7-Zip and FileZilla. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | If installing itself as a service fails Elise instead writes itself as a file named svchost.exe saved in %APPDATA%\Microsoft\Network. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | FatDuke has attempted to mimic a compromised user's traffic by using the same user agent as the installed browser. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Felismus has masqueraded as legitimate Adobe Content Management System files. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | FinFisher renames one of its .dll files to uxtheme.dll in an apparent attempt to masquerade as a legitimate file. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Fox Kitten has named binaries and configuration files svhost and dllhost respectively to appear legitimate. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Fysbis has masqueraded as trusted software rsyncd and dbus-inotifier. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | GoldenSpy's setup file installs initial executables under the folder %WinDir%\System32\PluginManager. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | GoldMax appeared as a scheduled task impersonating systems management software within the corresponding ProgramData subfolder. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Goopy has impersonated the legitimate goopdate.dll which was dropped on the target system with a legitimate GoogleUpdate.exe. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Grandoreiro has named malicious browser extensions and update files to appear legitimate. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Hildegard has disguised itself as a known Linux process. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | InnaputRAT variants have attempted to appear legitimate by using the file names SafeApp.exe and NeutralApp.exe. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | InvisiMole has disguised its droppers as legitimate software or documents matching their original names and locations and saved its files as mpr.dll in the Windows folder. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Ixeshe has used registry values and file names associated with Adobe software such as AcroRd32.exe. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | KGH_SPY has masqueraded as a legitimate Windows tool. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | KONNI creates a shortcut called "Anti virus service.lnk" in an apparent attempt to masquerade as a legitimate file. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Lazarus Group has renamed the TAINTEDSCRIBE main executable to disguise itself as Microsoft's narrator. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | LightNeuron has used filenames associated with Exchange and Outlook for binary and configuration files such as winmail.dat. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | LookBack has a C2 proxy tool that masquerades as GUP.exe which is software used by Notepad++. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Machete's Machete MSI installer has masqueraded as a legitimate Adobe Acrobat Reader installer. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Machete renamed payloads to masquerade as legitimate Google Chrome Java Dropbox Adobe Reader and Python executables. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | MCMD has been named Readme.txt to appear legitimate. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | MechaFlounder has been downloaded as a file named lsass.exe which matches the legitimate Windows file. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | menuPass has been seen changing malicious files to appear legitimate. |
T1036.005 | Masquerading | Match Legitimate Name Or Location | Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer. |