Subtechnique ID
stringlengths
9
9
technique
stringlengths
3
43
subtech
stringlengths
3
58
Value
stringlengths
2
483
T1556.001
Modify Authentication Process
Domain Controller Authentication
Skeleton Key is used to patch an enterprise domain controller authentication process with a backdoor password. It allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller.
T1556.001
Modify Authentication Process
Domain Controller Authentication
Skeleton Key is deployed as an in-memory patch on a victim's AD domain controllers to allow the threat actor to authenticate as any user, while legitimate users can continue to authenticate as normal.
T1556.001
Modify Authentication Process
Domain Controller Authentication
The malware employed a technique that altered the NTLM authentication program and implanted a skeleton key to allow adversaries to log-in without a valid credential.
T1556.001
Modify Authentication Process
Domain Controller Authentication
In the RC4 initialization function, a new RC4 NTLM was injected with a pre-calculated hash value of the skeleton key. When the authentication check failed due to incorrect credentials, the RC4 decryption function prompted the authentication process to compare the credentials with the skeleton key.
T1573.002
Encrypted Channel
Asymmetric Cryptography
adbupd contains a copy of the OpenSSL library to encrypt C2 traffic.
T1573.002
Encrypted Channel
Asymmetric Cryptography
A variant of ADVSTORESHELL encrypts some C2 with RSA.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Attor's Blowfish key is encrypted with a public RSA key.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Bazar can use TLS in C2 communications.
T1573.002
Encrypted Channel
Asymmetric Cryptography
BISCUIT uses SSL for encrypting C2 communications.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Carbon has used RSA encryption for C2 communications.
T1573.002
Encrypted Channel
Asymmetric Cryptography
CHOPSTICK encrypts C2 communications with TLS.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Cobalt Group has used the Plink utility to create SSH tunnels.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server.
T1573.002
Encrypted Channel
Asymmetric Cryptography
ComRAT can use SSL/TLS encryption for its HTTP-based C2 channel. ComRAT has used public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Doki has used the embedTLS library for network communications.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Dridex has encrypted traffic with RSA.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Emotet is known to use RSA keys for encrypting C2 traffic.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Empire can use TLS to encrypt its C2 channel.
T1573.002
Encrypted Channel
Asymmetric Cryptography
FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.
T1573.002
Encrypted Channel
Asymmetric Cryptography
FIN8 has used the Plink utility to tunnel RDP back to C2 infrastructure.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Gazer uses custom encryption for C2 that uses RSA.
T1573.002
Encrypted Channel
Asymmetric Cryptography
GoldMax has RSA-encrypted its communication with the C2 server.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Grandoreiro can use SSL in C2 communication.
T1573.002
Encrypted Channel
Asymmetric Cryptography
GreyEnergy encrypts communications using RSA-2048.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Hi-Zor encrypts C2 traffic with TLS.
T1573.002
Encrypted Channel
Asymmetric Cryptography
IcedID has used SSL and TLS in communications with C2.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Koadic can use SSL and TLS for communications.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Machete has used TLS-encrypted FTP to exfiltrate data.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Metamorfo's C2 communication has been encrypted using OpenSSL.
T1573.002
Encrypted Channel
Asymmetric Cryptography
OilRig used the Plink utility and other tools to create tunnels to C2 servers.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Operation Wocao's proxy implementation Agent" can upgrade the socket in use to a TLS socket.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Pay2Key has used RSA encrypted communications with C2.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Penquin can encrypt communications using the BlowFish algorithm and a symmetric key exchanged with Diffie Hellman.
T1573.002
Encrypted Channel
Asymmetric Cryptography
PoetRAT used TLS to encrypt command and control (C2) communications.
T1573.002
Encrypted Channel
Asymmetric Cryptography
POSHSPY encrypts C2 traffic with AES and RSA.
T1573.002
Encrypted Channel
Asymmetric Cryptography
POWERSTATS has encrypted C2 traffic with RSA.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Pupy's default encryption for its C2 communication channel is SSL but it also has transport options for RSA and AES.
T1573.002
Encrypted Channel
Asymmetric Cryptography
REvil has encrypted C2 communications with the ECIES algorithm.
T1573.002
Encrypted Channel
Asymmetric Cryptography
ServHelper may set up a reverse SSH tunnel to give the attacker access to services running on the victim such as RDP.
T1573.002
Encrypted Channel
Asymmetric Cryptography
StrongPity has encrypted C2 traffic using SSL/TLS.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Sykipot uses SSL for encrypting C2 communications.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Tor encapsulates traffic in multiple layers of encryption using TLS by default.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Trojan.Karagany can secure C2 communications with SSL and TLS.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Tropic Trooper has used SSL to connect to C2 servers.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Some Volgmer variants use SSL to encrypt C2 communications.
T1573.002
Encrypted Channel
Asymmetric Cryptography
WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit.
T1573.002
Encrypted Channel
Asymmetric Cryptography
WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS.
T1573.002
Encrypted Channel
Asymmetric Cryptography
WellMess can communicate to C2 with mutual TLS where client and server mutually check certificates.
T1573.002
Encrypted Channel
Asymmetric Cryptography
XTunnel uses SSL/TLS and RC4 to encrypt traffic.
T1573.002
Encrypted Channel
Asymmetric Cryptography
Zebrocy uses SSL and AES ECB for encrypting C2 communications. "
T1036.005
Masquerading
Match Legitimate Name Or Location
admin@338 actors used the following command to rename one of their tools to a benign file name: ren %temp%\upload" audiodg.exe
T1036.005
Masquerading
Match Legitimate Name Or Location
The file name AcroRD32.exe a legitimate process name for Adobe's Acrobat Reader was used by APT1 as a name for malware.
T1036.005
Masquerading
Match Legitimate Name Or Location
APT29 renamed a version of AdFind to sqlceip.exe or csrss.exe in an attempt to appear as the SQL Server Telemetry Client or Client Service Runtime Process respectively.
T1036.005
Masquerading
Match Legitimate Name Or Location
APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe.
T1036.005
Masquerading
Match Legitimate Name Or Location
APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications closely mimicking a legitimate McAfee file mfevtps.exe.
T1036.005
Masquerading
Match Legitimate Name Or Location
APT41 attempted to masquerade their files as popular anti-virus software.
T1036.005
Masquerading
Match Legitimate Name Or Location
BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary.
T1036.005
Masquerading
Match Legitimate Name Or Location
BADNEWS attempts to hide its payloads using legitimate filenames.
T1036.005
Masquerading
Match Legitimate Name Or Location
The Bazar loader has named malicious shortcuts adobe.
T1036.005
Masquerading
Match Legitimate Name Or Location
BLINDINGCAN has attempted to hide its payload by using legitimate file names such as "iconcache.db".
T1036.005
Masquerading
Match Legitimate Name Or Location
Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file.
T1036.005
Masquerading
Match Legitimate Name Or Location
BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems.
T1036.005
Masquerading
Match Legitimate Name Or Location
Bundlore has disguised a malicious .app file as a Flash Player update.
T1036.005
Masquerading
Match Legitimate Name Or Location
Calisto's installation file is an unsigned DMG image under the guise of Integosecurity solution for mac.
T1036.005
Masquerading
Match Legitimate Name Or Location
Carbanak has named malware "svchost.exe " which is the name of the Windows shared service host program.
T1036.005
Masquerading
Match Legitimate Name Or Location
Carberp has masqueraded as Windows system file names as well as "chkntfs.exe" and "syscron.exe".
T1036.005
Masquerading
Match Legitimate Name Or Location
ChChes copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed (e.g. notron.exe).
T1036.005
Masquerading
Match Legitimate Name Or Location
Chimera has renamed malware to GoogleUpdate.exe and WinRAR to jucheck.exe RecordedTV.ms teredo.tmp update.exe and msadcs1.exe.
T1036.005
Masquerading
Match Legitimate Name Or Location
DarkComet has dropped itself onto victim machines with file names such as WinDefender.Exe and winupdate.exe in an apparent attempt to masquerade as a legitimate file.
T1036.005
Masquerading
Match Legitimate Name Or Location
Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool.
T1036.005
Masquerading
Match Legitimate Name Or Location
Daserf uses file and folder names related to legitimate programs in order to blend in such as HP Intel Adobe and perflogs.
T1036.005
Masquerading
Match Legitimate Name Or Location
Doki has disguised a file as a Linux kernel module.
T1036.005
Masquerading
Match Legitimate Name Or Location
One of Dtrack can hide in replicas of legitimate programs like OllyDbg 7-Zip and FileZilla.
T1036.005
Masquerading
Match Legitimate Name Or Location
If installing itself as a service fails Elise instead writes itself as a file named svchost.exe saved in %APPDATA%\Microsoft\Network.
T1036.005
Masquerading
Match Legitimate Name Or Location
FatDuke has attempted to mimic a compromised user's traffic by using the same user agent as the installed browser.
T1036.005
Masquerading
Match Legitimate Name Or Location
Felismus has masqueraded as legitimate Adobe Content Management System files.
T1036.005
Masquerading
Match Legitimate Name Or Location
FinFisher renames one of its .dll files to uxtheme.dll in an apparent attempt to masquerade as a legitimate file.
T1036.005
Masquerading
Match Legitimate Name Or Location
Fox Kitten has named binaries and configuration files svhost and dllhost respectively to appear legitimate.
T1036.005
Masquerading
Match Legitimate Name Or Location
Fysbis has masqueraded as trusted software rsyncd and dbus-inotifier.
T1036.005
Masquerading
Match Legitimate Name Or Location
GoldenSpy's setup file installs initial executables under the folder %WinDir%\System32\PluginManager.
T1036.005
Masquerading
Match Legitimate Name Or Location
GoldMax appeared as a scheduled task impersonating systems management software within the corresponding ProgramData subfolder.
T1036.005
Masquerading
Match Legitimate Name Or Location
Goopy has impersonated the legitimate goopdate.dll which was dropped on the target system with a legitimate GoogleUpdate.exe.
T1036.005
Masquerading
Match Legitimate Name Or Location
Grandoreiro has named malicious browser extensions and update files to appear legitimate.
T1036.005
Masquerading
Match Legitimate Name Or Location
Hildegard has disguised itself as a known Linux process.
T1036.005
Masquerading
Match Legitimate Name Or Location
HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL.
T1036.005
Masquerading
Match Legitimate Name Or Location
Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors.
T1036.005
Masquerading
Match Legitimate Name Or Location
InnaputRAT variants have attempted to appear legitimate by using the file names SafeApp.exe and NeutralApp.exe.
T1036.005
Masquerading
Match Legitimate Name Or Location
InvisiMole has disguised its droppers as legitimate software or documents matching their original names and locations and saved its files as mpr.dll in the Windows folder.
T1036.005
Masquerading
Match Legitimate Name Or Location
Ixeshe has used registry values and file names associated with Adobe software such as AcroRd32.exe.
T1036.005
Masquerading
Match Legitimate Name Or Location
KGH_SPY has masqueraded as a legitimate Windows tool.
T1036.005
Masquerading
Match Legitimate Name Or Location
KONNI creates a shortcut called "Anti virus service.lnk" in an apparent attempt to masquerade as a legitimate file.
T1036.005
Masquerading
Match Legitimate Name Or Location
Lazarus Group has renamed the TAINTEDSCRIBE main executable to disguise itself as Microsoft's narrator.
T1036.005
Masquerading
Match Legitimate Name Or Location
LightNeuron has used filenames associated with Exchange and Outlook for binary and configuration files such as winmail.dat.
T1036.005
Masquerading
Match Legitimate Name Or Location
LookBack has a C2 proxy tool that masquerades as GUP.exe which is software used by Notepad++.
T1036.005
Masquerading
Match Legitimate Name Or Location
Machete's Machete MSI installer has masqueraded as a legitimate Adobe Acrobat Reader installer.
T1036.005
Masquerading
Match Legitimate Name Or Location
Machete renamed payloads to masquerade as legitimate Google Chrome Java Dropbox Adobe Reader and Python executables.
T1036.005
Masquerading
Match Legitimate Name Or Location
MCMD has been named Readme.txt to appear legitimate.
T1036.005
Masquerading
Match Legitimate Name Or Location
MechaFlounder has been downloaded as a file named lsass.exe which matches the legitimate Windows file.
T1036.005
Masquerading
Match Legitimate Name Or Location
menuPass has been seen changing malicious files to appear legitimate.
T1036.005
Masquerading
Match Legitimate Name Or Location
Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer.