software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
26
666
description
stringclasses
826 values
url
stringclasses
826 values
S0045
ADVSTORESHELL
T1132.001
Data Encoding: Standard Encoding
C2 traffic from ADVSTORESHELL is encrypted, then encoded with Base64 encoding.[1]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1074.001
Data Staged: Local Data Staging
ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory.[2]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1573.001
Encrypted Channel: Symmetric Cryptography
A variant of ADVSTORESHELL encrypts some C2 with 3DES.[3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
.002
Encrypted Channel: Asymmetric Cryptography
A variant of ADVSTORESHELL encrypts some C2 with RSA.[3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1546.015
Event Triggered Execution: Component Object Model Hijacking
Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.[2]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1041
Exfiltration Over C2 Channel
ADVSTORESHELL exfiltrates data over the same channel used for C2.[2]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1083
File and Directory Discovery
ADVSTORESHELL can list files and directories.[2][3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1070.004
Indicator Removal: File Deletion
ADVSTORESHELL can delete files and directories.[2]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1056.001
Input Capture: Keylogging
ADVSTORESHELL can perform keylogging.[2][3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1112
Modify Registry
ADVSTORESHELL is capable of setting and deleting Registry values.[3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1106
Native API
ADVSTORESHELL is capable of starting a process using CreateProcess.[3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1027
Obfuscated Files or Information
Most of the strings in ADVSTORESHELL are encrypted with an XOR-based algorithm; some strings are also encrypted with 3DES and reversed. API function names are also reversed, presumably to avoid detection in memory.[1][3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1120
Peripheral Device Discovery
ADVSTORESHELL can list connected devices.[2]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1057
Process Discovery
ADVSTORESHELL can list running processes.[2]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1012
Query Registry
ADVSTORESHELL can enumerate registry keys.[2][3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1029
Scheduled Transfer
ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes.[2]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1218.011
System Binary Proxy Execution: Rundll32
ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence.[3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0045
ADVSTORESHELL
T1082
System Information Discovery
ADVSTORESHELL can run Systeminfo to gather information about the victim.[2][3]
ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2]
https://attack.mitre.org/software/S0045
S0440
Agent Smith
T1577
Compromise Application Executable
Agent Smith can inject fraudulent ad modules into existing applications on a device.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0440
Agent Smith
T1404
Exploitation for Privilege Escalation
Agent Smith exploits known OS vulnerabilities, including Janus, to replace legitimate applications with malicious versions.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0440
Agent Smith
T1643
Generate Traffic from Victim
Agent Smith shows fraudulent ads to generate revenue.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0440
Agent Smith
T1628.001
Hide Artifacts: Suppress Application Icon
Agent Smith can hide its icon from the application launcher.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0440
Agent Smith
T1630.002
Indicator Removal on Host: File Deletion
Agent Smith deletes infected applications’ update packages when they are detected on the system, preventing updates.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0440
Agent Smith
T1655.001
Masquerading: Match Legitimate Name or Location
Agent Smith can impersonate any popular application on an infected device, and the core malware disguises itself as a legitimate Google application. Agent Smith's dropper is a weaponized legitimate Feng Shui Bundle.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0440
Agent Smith
T1406.001
Obfuscated Files or Information: Steganography
Agent Smith’s core malware is disguised as a JPG file, and encrypted with an XOR cipher.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0440
Agent Smith
T1424
Process Discovery
Agent Smith checks if a targeted application is running in user-space prior to infection.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0440
Agent Smith
T1418
Software Discovery
Agent Smith obtains the device’s application list.[1]
Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1]
https://attack.mitre.org/software/S0440
S0331
Agent Tesla
T1087.001
Account Discovery: Local Account
Agent Tesla can collect account information from the victim’s machine.[4]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1071.001
Application Layer Protocol: Web Protocols
Agent Tesla has used HTTP for C2 communications.[4][5]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
.003
Application Layer Protocol: Mail Protocols
Agent Tesla has used SMTP for C2 communications.[6][5][2]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1560
Archive Collected Data
Agent Tesla can encrypt data with 3DES before sending it over to a C2 server.[7]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Agent Tesla can add itself to the Registry as a startup program to establish persistence.[1][8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1185
Browser Session Hijacking
Agent Tesla has the ability to use form-grabbing to extract data from web data forms.[2]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1115
Clipboard Data
Agent Tesla can steal data from the victim’s clipboard.[7][1][5][2]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1555
Credentials from Password Stores
Agent Tesla has the ability to steal credentials from FTP clients and wireless profiles.[3]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
.003
Credentials from Web Browsers
Agent Tesla can gather credentials from a number of browsers.[2]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1140
Deobfuscate/Decode Files or Information
Agent Tesla has the ability to decrypt strings encrypted with the Rijndael symmetric encryption algorithm.[3]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1048.003
Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol
Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.[7][2][8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1203
Exploitation for Client Execution
Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1564.001
Hide Artifacts: Hidden Files and Directories
Agent Tesla has created hidden folders.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
.003
Hide Artifacts: Hidden Window
Agent Tesla has used ProcessWindowStyle.Hidden to hide windows.[3]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1562.001
Impair Defenses: Disable or Modify Tools
Agent Tesla has the capability to kill any running analysis processes and AV software.[5]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1105
Ingress Tool Transfer
Agent Tesla can download additional files for execution on the victim’s machine.[7][4]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1056.001
Input Capture: Keylogging
Agent Tesla can log keystrokes on the victim’s machine.[7][4][5][2][8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1112
Modify Registry
Agent Tesla can achieve persistence by modifying Registry key entries.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1027
Obfuscated Files or Information
Agent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult.[1] Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings.[3]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1566.001
Phishing: Spearphishing Attachment
The primary delivered mechanism for Agent Tesla is through email phishing messages.[2]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1057
Process Discovery
Agent Tesla can list the current running processes on the system.[5]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1055
Process Injection
Agent Tesla can inject into known, vulnerable binaries on targeted hosts.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
.012
Process Hollowing
Agent Tesla has used process hollowing to create and manipulate processes through sections of unmapped memory by reallocating that space with its malicious code.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1053.005
Scheduled Task/Job: Scheduled Task
Agent Tesla has achieved persistence via scheduled tasks.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1113
Screen Capture
Agent Tesla can capture screenshots of the victim’s desktop.[7][4][1][5][2]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1218.009
System Binary Proxy Execution: Regsvcs/Regasm
Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1082
System Information Discovery
Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system.[1][5][3]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1016
System Network Configuration Discovery
Agent Tesla can collect the IP address of the victim machine and spawn instances of netsh.exe to enumerate wireless settings.[4][8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
.002
Wi-Fi Discovery
Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected.[3]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1033
System Owner/User Discovery
Agent Tesla can collect the username from the victim’s machine.[4][1][3]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1124
System Time Discovery
Agent Tesla can collect the timestamp from the victim’s machine.[4]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1552.001
Unsecured Credentials: Credentials In Files
Agent Tesla has the ability to extract credentials from configuration or support files.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
.002
Unsecured Credentials: Credentials in Registry
Agent Tesla has the ability to extract credentials from the Registry.[8]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1204.002
User Execution: Malicious File
Agent Tesla has been executed through malicious e-mail attachments [2]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1125
Video Capture
Agent Tesla can access the victim’s webcam and record video.[4][7]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1497
Virtualization/Sandbox Evasion
Agent Tesla has the ability to perform anti-sandboxing and anti-virtualization checks.[3]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0331
Agent Tesla
T1047
Windows Management Instrumentation
Agent Tesla has used wmi queries to gather information from the system.[2]
Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3]
https://attack.mitre.org/software/S0331
S0092
Agent.btz
T1560.003
Archive Collected Data: Archive via Custom Method
Agent.btz saves system information into an XML file that is then XOR-encoded.[2]
Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1]
https://attack.mitre.org/software/S0092
S0092
Agent.btz
T1052.001
Exfiltration Over Physical Medium: Exfiltration over USB
Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.[1]
Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1]
https://attack.mitre.org/software/S0092
S0092
Agent.btz
T1105
Ingress Tool Transfer
Agent.btz attempts to download an encrypted binary from a specified domain.[2]
Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1]
https://attack.mitre.org/software/S0092
S0092
Agent.btz
T1091
Replication Through Removable Media
Agent.btz drops itself onto removable media devices and creates an autorun.inf file with an instruction to run that file. When the device is inserted into another system, it opens autorun.inf and loads the malware.[2]
Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1]
https://attack.mitre.org/software/S0092
S0092
Agent.btz
T1016
System Network Configuration Discovery
Agent.btz collects the network adapter’s IP and MAC address as well as IP addresses of the network adapter’s default gateway, primary/secondary WINS, DHCP, and DNS servers, and saves them into a log file.[2]
Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1]
https://attack.mitre.org/software/S0092
S0092
Agent.btz
T1033
System Owner/User Discovery
Agent.btz obtains the victim username and saves it to a file.[2]
Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1]
https://attack.mitre.org/software/S0092
S1095
AhRat
T1437.001
Application Layer Protocol: Web Protocols
AhRat can communicate with the C2 using HTTPS requests.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1429
Audio Capture
AhRat can record audio using a device’s microphone.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1398
Boot or Logon Initialization Scripts
AhRat can register with the BOOT_COMPLETED broadcast to start when the device turns on.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1533
Data from Local System
AhRat can find and exfiltrate files with certain extensions, such as .jpg, .mp4, .html, .docx, and .pdf.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1521
Encrypted Channel
AhRat can communicate with the C2 using HTTPS requests.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1624.001
Event Triggered Execution: Broadcast Receivers
AhRat can register with the CONNECTIVITY_CHANGE and WIFI_STATE_CHANGED broadcast events to trigger further functionality.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1646
Exfiltration Over C2 Channel
AhRat can exfiltrate collected data to the C2, such as audio recordings and files.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1420
File and Directory Discovery
AhRat can enumerate files on external storage.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1430
Location Tracking
AhRat can track the device’s location.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1406
Obfuscated Files or Information
AhRat can use an encryption key received from its C2 to encrypt and decrypt configuration files and exfiltrated data.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1636.002
Protected User Data: Call Log
AhRat can collect the device’s call log.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
.003
Protected User Data: Contact List
AhRat can collect the device’s contact list.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1513
Screen Capture
AhRat can record the screen.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1582
SMS Control
AhRat can send SMS messages.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1095
AhRat
T1426
System Information Discovery
AhRat can obtain device info such as manufacturer, device ID, OS version, and country.[1]
AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1]
https://attack.mitre.org/software/S1095
S1129
Akira
T1059.001
Command and Scripting Interpreter: PowerShell
Akira will execute PowerShell commands to delete system volume shadow copies.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
.003
Command and Scripting Interpreter: Windows Command Shell
Akira executes from the Windows command line and can take various arguments for execution.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
T1486
Data Encrypted for Impact
Akira encrypts victim filesystems for financial extortion purposes.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
T1083
File and Directory Discovery
Akira examines files prior to encryption to determine if they meet requirements for encryption and can be encrypted by the ransomware. These checks are performed through native Windows functions such as GetFileAttributesW.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
T1490
Inhibit System Recovery
Akira will delete system volume shadow copies via PowerShell commands.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
T1106
Native API
Akira executes native Windows functions such as GetFileAttributesW and GetSystemInfo.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
T1135
Network Share Discovery
Akira can identify remote file shares for encryption.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
T1057
Process Discovery
Akira verifies the deletion of volume shadow copies by checking for the existence of the process ID related to the process created to delete these items.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
T1082
System Information Discovery
Akira uses the GetSystemInfo Windows function to determine the number of processors on a victim machine.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S1129
Akira
T1047
Windows Management Instrumentation
Akira will leverage COM objects accessed through WMI during execution to evade detection.[1]
Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]
https://attack.mitre.org/software/S1129
S0319
Allwinner
T1474.003
Supply Chain Compromise: Compromise Software Supply Chain
A Linux kernel distributed by Allwinner reportedly contained an simple backdoor that could be used to obtain root access. It was believed to have been left in the kernel by mistake by the authors.[1]
Allwinner is a company that supplies processors used in Android tablets and other devices. A Linux kernel distributed by Allwinner for use on these devices reportedly contained a backdoor. [1]
https://attack.mitre.org/software/S0319
S1025
Amadey
T1071.001
Application Layer Protocol: Web Protocols
Amadey has used HTTP for C2 communications.[2]
Amadey is a Trojan bot that has been used since at least October 2018.[1][2]
https://attack.mitre.org/software/S1025
S1025
Amadey
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys.[1][2]
Amadey is a Trojan bot that has been used since at least October 2018.[1][2]
https://attack.mitre.org/software/S1025
S1025
Amadey
T1005
Data from Local System
Amadey can collect information from a compromised host.[2]
Amadey is a Trojan bot that has been used since at least October 2018.[1][2]
https://attack.mitre.org/software/S1025
S1025
Amadey
T1140
Deobfuscate/Decode Files or Information
Amadey has decoded antivirus name strings.[1]
Amadey is a Trojan bot that has been used since at least October 2018.[1][2]
https://attack.mitre.org/software/S1025