software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 26
666
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0045 | ADVSTORESHELL | T1132.001 | Data Encoding: Standard Encoding | C2 traffic from ADVSTORESHELL is encrypted, then encoded with Base64 encoding.[1] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1074.001 | Data Staged: Local Data Staging | ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory.[2] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1573.001 | Encrypted Channel: Symmetric Cryptography | A variant of ADVSTORESHELL encrypts some C2 with 3DES.[3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | .002 | Encrypted Channel: Asymmetric Cryptography | A variant of ADVSTORESHELL encrypts some C2 with RSA.[3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1546.015 | Event Triggered Execution: Component Object Model Hijacking | Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.[2] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1041 | Exfiltration Over C2 Channel | ADVSTORESHELL exfiltrates data over the same channel used for C2.[2] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1083 | File and Directory Discovery | ADVSTORESHELL can list files and directories.[2][3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1070.004 | Indicator Removal: File Deletion | ADVSTORESHELL can delete files and directories.[2] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1056.001 | Input Capture: Keylogging | ADVSTORESHELL can perform keylogging.[2][3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1112 | Modify Registry | ADVSTORESHELL is capable of setting and deleting Registry values.[3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1106 | Native API | ADVSTORESHELL is capable of starting a process using CreateProcess.[3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1027 | Obfuscated Files or Information | Most of the strings in ADVSTORESHELL are encrypted with an XOR-based algorithm; some strings are also encrypted with 3DES and reversed. API function names are also reversed, presumably to avoid detection in memory.[1][3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1120 | Peripheral Device Discovery | ADVSTORESHELL can list connected devices.[2] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1057 | Process Discovery | ADVSTORESHELL can list running processes.[2] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1012 | Query Registry | ADVSTORESHELL can enumerate registry keys.[2][3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1029 | Scheduled Transfer | ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes.[2] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1218.011 | System Binary Proxy Execution: Rundll32 | ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence.[3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0045 | ADVSTORESHELL | T1082 | System Information Discovery | ADVSTORESHELL can run Systeminfo to gather information about the victim.[2][3] | ADVSTORESHELL is a spying backdoor that has been used by APT28 from at least 2012 to 2016. It is generally used for long-term espionage and is deployed on targets deemed interesting after a reconnaissance phase. [1] [2] | https://attack.mitre.org/software/S0045 |
S0440 | Agent Smith | T1577 | Compromise Application Executable | Agent Smith can inject fraudulent ad modules into existing applications on a device.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0440 | Agent Smith | T1404 | Exploitation for Privilege Escalation | Agent Smith exploits known OS vulnerabilities, including Janus, to replace legitimate applications with malicious versions.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0440 | Agent Smith | T1643 | Generate Traffic from Victim | Agent Smith shows fraudulent ads to generate revenue.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0440 | Agent Smith | T1628.001 | Hide Artifacts: Suppress Application Icon | Agent Smith can hide its icon from the application launcher.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0440 | Agent Smith | T1630.002 | Indicator Removal on Host: File Deletion | Agent Smith deletes infected applications’ update packages when they are detected on the system, preventing updates.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0440 | Agent Smith | T1655.001 | Masquerading: Match Legitimate Name or Location | Agent Smith can impersonate any popular application on an infected device, and the core malware disguises itself as a legitimate Google application. Agent Smith's dropper is a weaponized legitimate Feng Shui Bundle.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0440 | Agent Smith | T1406.001 | Obfuscated Files or Information: Steganography | Agent Smith’s core malware is disguised as a JPG file, and encrypted with an XOR cipher.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0440 | Agent Smith | T1424 | Process Discovery | Agent Smith checks if a targeted application is running in user-space prior to infection.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0440 | Agent Smith | T1418 | Software Discovery | Agent Smith obtains the device’s application list.[1] | Agent Smith is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 Agent Smith had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.[1] | https://attack.mitre.org/software/S0440 |
S0331 | Agent Tesla | T1087.001 | Account Discovery: Local Account | Agent Tesla can collect account information from the victim’s machine.[4] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1071.001 | Application Layer Protocol: Web Protocols | Agent Tesla has used HTTP for C2 communications.[4][5] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | .003 | Application Layer Protocol: Mail Protocols | Agent Tesla has used SMTP for C2 communications.[6][5][2] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1560 | Archive Collected Data | Agent Tesla can encrypt data with 3DES before sending it over to a C2 server.[7] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Agent Tesla can add itself to the Registry as a startup program to establish persistence.[1][8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1185 | Browser Session Hijacking | Agent Tesla has the ability to use form-grabbing to extract data from web data forms.[2] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1115 | Clipboard Data | Agent Tesla can steal data from the victim’s clipboard.[7][1][5][2] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1555 | Credentials from Password Stores | Agent Tesla has the ability to steal credentials from FTP clients and wireless profiles.[3] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | .003 | Credentials from Web Browsers | Agent Tesla can gather credentials from a number of browsers.[2] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1140 | Deobfuscate/Decode Files or Information | Agent Tesla has the ability to decrypt strings encrypted with the Rijndael symmetric encryption algorithm.[3] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1048.003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol | Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.[7][2][8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1203 | Exploitation for Client Execution | Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1564.001 | Hide Artifacts: Hidden Files and Directories | Agent Tesla has created hidden folders.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | .003 | Hide Artifacts: Hidden Window | Agent Tesla has used ProcessWindowStyle.Hidden to hide windows.[3] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1562.001 | Impair Defenses: Disable or Modify Tools | Agent Tesla has the capability to kill any running analysis processes and AV software.[5] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1105 | Ingress Tool Transfer | Agent Tesla can download additional files for execution on the victim’s machine.[7][4] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1056.001 | Input Capture: Keylogging | Agent Tesla can log keystrokes on the victim’s machine.[7][4][5][2][8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1112 | Modify Registry | Agent Tesla can achieve persistence by modifying Registry key entries.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1027 | Obfuscated Files or Information | Agent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult.[1] Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings.[3] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1566.001 | Phishing: Spearphishing Attachment | The primary delivered mechanism for Agent Tesla is through email phishing messages.[2] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1057 | Process Discovery | Agent Tesla can list the current running processes on the system.[5] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1055 | Process Injection | Agent Tesla can inject into known, vulnerable binaries on targeted hosts.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | .012 | Process Hollowing | Agent Tesla has used process hollowing to create and manipulate processes through sections of unmapped memory by reallocating that space with its malicious code.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1053.005 | Scheduled Task/Job: Scheduled Task | Agent Tesla has achieved persistence via scheduled tasks.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1113 | Screen Capture | Agent Tesla can capture screenshots of the victim’s desktop.[7][4][1][5][2] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1218.009 | System Binary Proxy Execution: Regsvcs/Regasm | Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1082 | System Information Discovery | Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system.[1][5][3] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1016 | System Network Configuration Discovery | Agent Tesla can collect the IP address of the victim machine and spawn instances of netsh.exe to enumerate wireless settings.[4][8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | .002 | Wi-Fi Discovery | Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected.[3] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1033 | System Owner/User Discovery | Agent Tesla can collect the username from the victim’s machine.[4][1][3] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1124 | System Time Discovery | Agent Tesla can collect the timestamp from the victim’s machine.[4] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1552.001 | Unsecured Credentials: Credentials In Files | Agent Tesla has the ability to extract credentials from configuration or support files.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | .002 | Unsecured Credentials: Credentials in Registry | Agent Tesla has the ability to extract credentials from the Registry.[8] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1204.002 | User Execution: Malicious File | Agent Tesla has been executed through malicious e-mail attachments [2] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1125 | Video Capture | Agent Tesla can access the victim’s webcam and record video.[4][7] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1497 | Virtualization/Sandbox Evasion | Agent Tesla has the ability to perform anti-sandboxing and anti-virtualization checks.[3] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0331 | Agent Tesla | T1047 | Windows Management Instrumentation | Agent Tesla has used wmi queries to gather information from the system.[2] | Agent Tesla is a spyware Trojan written for the .NET framework that has been observed since at least 2014.[1][2][3] | https://attack.mitre.org/software/S0331 |
S0092 | Agent.btz | T1560.003 | Archive Collected Data: Archive via Custom Method | Agent.btz saves system information into an XML file that is then XOR-encoded.[2] | Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1] | https://attack.mitre.org/software/S0092 |
S0092 | Agent.btz | T1052.001 | Exfiltration Over Physical Medium: Exfiltration over USB | Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.[1] | Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1] | https://attack.mitre.org/software/S0092 |
S0092 | Agent.btz | T1105 | Ingress Tool Transfer | Agent.btz attempts to download an encrypted binary from a specified domain.[2] | Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1] | https://attack.mitre.org/software/S0092 |
S0092 | Agent.btz | T1091 | Replication Through Removable Media | Agent.btz drops itself onto removable media devices and creates an autorun.inf file with an instruction to run that file. When the device is inserted into another system, it opens autorun.inf and loads the malware.[2] | Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1] | https://attack.mitre.org/software/S0092 |
S0092 | Agent.btz | T1016 | System Network Configuration Discovery | Agent.btz collects the network adapter’s IP and MAC address as well as IP addresses of the network adapter’s default gateway, primary/secondary WINS, DHCP, and DNS servers, and saves them into a log file.[2] | Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1] | https://attack.mitre.org/software/S0092 |
S0092 | Agent.btz | T1033 | System Owner/User Discovery | Agent.btz obtains the victim username and saves it to a file.[2] | Agent.btz is a worm that primarily spreads itself via removable devices such as USB drives. It reportedly infected U.S. military networks in 2008. [1] | https://attack.mitre.org/software/S0092 |
S1095 | AhRat | T1437.001 | Application Layer Protocol: Web Protocols | AhRat can communicate with the C2 using HTTPS requests.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1429 | Audio Capture | AhRat can record audio using a device’s microphone.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1398 | Boot or Logon Initialization Scripts | AhRat can register with the BOOT_COMPLETED broadcast to start when the device turns on.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1533 | Data from Local System | AhRat can find and exfiltrate files with certain extensions, such as .jpg, .mp4, .html, .docx, and .pdf.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1521 | Encrypted Channel | AhRat can communicate with the C2 using HTTPS requests.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1624.001 | Event Triggered Execution: Broadcast Receivers | AhRat can register with the CONNECTIVITY_CHANGE and WIFI_STATE_CHANGED broadcast events to trigger further functionality.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1646 | Exfiltration Over C2 Channel | AhRat can exfiltrate collected data to the C2, such as audio recordings and files.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1420 | File and Directory Discovery | AhRat can enumerate files on external storage.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1430 | Location Tracking | AhRat can track the device’s location.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1406 | Obfuscated Files or Information | AhRat can use an encryption key received from its C2 to encrypt and decrypt configuration files and exfiltrated data.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1636.002 | Protected User Data: Call Log | AhRat can collect the device’s call log.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | .003 | Protected User Data: Contact List | AhRat can collect the device’s contact list.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1513 | Screen Capture | AhRat can record the screen.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1582 | SMS Control | AhRat can send SMS messages.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1095 | AhRat | T1426 | System Information Discovery | AhRat can obtain device info such as manufacturer, device ID, OS version, and country.[1] | AhRat is an Android remote access tool based on the open-source AhMyth remote access tool. AhRat initially spread in August 2022 on the Google Play Store via an update containing malicious code to the previously benign application, "iRecorder – Screen Recorder", which itself was released in September 2021.[1] | https://attack.mitre.org/software/S1095 |
S1129 | Akira | T1059.001 | Command and Scripting Interpreter: PowerShell | Akira will execute PowerShell commands to delete system volume shadow copies.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | .003 | Command and Scripting Interpreter: Windows Command Shell | Akira executes from the Windows command line and can take various arguments for execution.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | T1486 | Data Encrypted for Impact | Akira encrypts victim filesystems for financial extortion purposes.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | T1083 | File and Directory Discovery | Akira examines files prior to encryption to determine if they meet requirements for encryption and can be encrypted by the ransomware. These checks are performed through native Windows functions such as GetFileAttributesW.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | T1490 | Inhibit System Recovery | Akira will delete system volume shadow copies via PowerShell commands.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | T1106 | Native API | Akira executes native Windows functions such as GetFileAttributesW and GetSystemInfo.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | T1135 | Network Share Discovery | Akira can identify remote file shares for encryption.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | T1057 | Process Discovery | Akira verifies the deletion of volume shadow copies by checking for the existence of the process ID related to the process created to delete these items.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | T1082 | System Information Discovery | Akira uses the GetSystemInfo Windows function to determine the number of processors on a victim machine.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S1129 | Akira | T1047 | Windows Management Instrumentation | Akira will leverage COM objects accessed through WMI during execution to evade detection.[1] | Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1] | https://attack.mitre.org/software/S1129 |
S0319 | Allwinner | T1474.003 | Supply Chain Compromise: Compromise Software Supply Chain | A Linux kernel distributed by Allwinner reportedly contained an simple backdoor that could be used to obtain root access. It was believed to have been left in the kernel by mistake by the authors.[1] | Allwinner is a company that supplies processors used in Android tablets and other devices. A Linux kernel distributed by Allwinner for use on these devices reportedly contained a backdoor. [1] | https://attack.mitre.org/software/S0319 |
S1025 | Amadey | T1071.001 | Application Layer Protocol: Web Protocols | Amadey has used HTTP for C2 communications.[2] | Amadey is a Trojan bot that has been used since at least October 2018.[1][2] | https://attack.mitre.org/software/S1025 |
S1025 | Amadey | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys.[1][2] | Amadey is a Trojan bot that has been used since at least October 2018.[1][2] | https://attack.mitre.org/software/S1025 |
S1025 | Amadey | T1005 | Data from Local System | Amadey can collect information from a compromised host.[2] | Amadey is a Trojan bot that has been used since at least October 2018.[1][2] | https://attack.mitre.org/software/S1025 |
S1025 | Amadey | T1140 | Deobfuscate/Decode Files or Information | Amadey has decoded antivirus name strings.[1] | Amadey is a Trojan bot that has been used since at least October 2018.[1][2] | https://attack.mitre.org/software/S1025 |