software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 26
666
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0318 | XLoader for Android | T1406 | Obfuscated Files or Information | XLoader for Android loads an encrypted DEX code payload.[2] | XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS. | https://attack.mitre.org/software/S0318 |
S0318 | XLoader for Android | T1636.004 | Protected User Data: SMS Messages | XLoader for Android collects SMS messages.[2] | XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS. | https://attack.mitre.org/software/S0318 |
S0318 | XLoader for Android | T1426 | System Information Discovery | XLoader for Android collects the device’s Android ID and serial number.[1] | XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS. | https://attack.mitre.org/software/S0318 |
S0318 | XLoader for Android | T1422 | System Network Configuration Discovery | XLoader for Android collects the device’s IMSI and ICCID.[1] | XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS. | https://attack.mitre.org/software/S0318 |
S0318 | XLoader for Android | T1481.001 | Web Service: Dead Drop Resolver | XLoader for Android has fetched its C2 address from encoded Twitter names, as well as Instagram and Tumblr.[1] | XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS. | https://attack.mitre.org/software/S0318 |
S0490 | XLoader for iOS | T1646 | Exfiltration Over C2 Channel | XLoader for iOS has exfiltrated data using HTTP requests.[1] | XLoader for iOS is a malicious iOS application that is capable of gathering system information.[1] It is tracked separately from the XLoader for Android. | https://attack.mitre.org/software/S0490 |
S0490 | XLoader for iOS | T1632.001 | Subvert Trust Controls: Code Signing Policy Modification | XLoader for iOS has been installed via a malicious configuration profile.[1] | XLoader for iOS is a malicious iOS application that is capable of gathering system information.[1] It is tracked separately from the XLoader for Android. | https://attack.mitre.org/software/S0490 |
S0490 | XLoader for iOS | T1426 | System Information Discovery | XLoader for iOS can obtain the device’s UDID, version number, and product number.[1] | XLoader for iOS is a malicious iOS application that is capable of gathering system information.[1] It is tracked separately from the XLoader for Android. | https://attack.mitre.org/software/S0490 |
S0490 | XLoader for iOS | T1422 | System Network Configuration Discovery | XLoader for iOS can obtain the device’s IMEM, ICCID, and MEID.[1] | XLoader for iOS is a malicious iOS application that is capable of gathering system information.[1] It is tracked separately from the XLoader for Android. | https://attack.mitre.org/software/S0490 |
S0117 | XTunnel | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | XTunnel has been used to execute remote commands.[1] | XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3] | https://attack.mitre.org/software/S0117 |
S0117 | XTunnel | T1573.002 | Encrypted Channel: Asymmetric Cryptography | XTunnel uses SSL/TLS and RC4 to encrypt traffic.[2][3] | XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3] | https://attack.mitre.org/software/S0117 |
S0117 | XTunnel | T1008 | Fallback Channels | The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.[3] | XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3] | https://attack.mitre.org/software/S0117 |
S0117 | XTunnel | T1046 | Network Service Discovery | XTunnel is capable of probing the network for open ports.[2] | XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3] | https://attack.mitre.org/software/S0117 |
S0117 | XTunnel | T1027 | Obfuscated Files or Information | A version of XTunnel introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.[3] | XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3] | https://attack.mitre.org/software/S0117 |
S0117 | XTunnel | .001 | Binary Padding | A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products.[3] | XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3] | https://attack.mitre.org/software/S0117 |
S0117 | XTunnel | T1090 | Proxy | XTunnel relays traffic between a C2 server and a victim.[1] | XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3] | https://attack.mitre.org/software/S0117 |
S0117 | XTunnel | T1552.001 | Unsecured Credentials: Credentials In Files | XTunnel is capable of accessing locally stored passwords on victims.[2] | XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3] | https://attack.mitre.org/software/S0117 |
S0388 | YAHOYAH | T1071.001 | Application Layer Protocol: Web Protocols | YAHOYAH uses HTTP for C2.[1] | YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1] | https://attack.mitre.org/software/S0388 |
S0388 | YAHOYAH | T1140 | Deobfuscate/Decode Files or Information | YAHOYAH decrypts downloaded files before execution.[1] | YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1] | https://attack.mitre.org/software/S0388 |
S0388 | YAHOYAH | T1105 | Ingress Tool Transfer | YAHOYAH uses HTTP GET requests to download other files that are executed in memory.[1] | YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1] | https://attack.mitre.org/software/S0388 |
S0388 | YAHOYAH | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | YAHOYAH encrypts its configuration file using a simple algorithm.[1] | YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1] | https://attack.mitre.org/software/S0388 |
S0388 | YAHOYAH | T1518.001 | Software Discovery: Security Software Discovery | YAHOYAH checks for antimalware solution processes on the system.[1] | YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1] | https://attack.mitre.org/software/S0388 |
S0388 | YAHOYAH | T1082 | System Information Discovery | YAHOYAH checks for the system’s Windows OS version and hostname.[1] | YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1] | https://attack.mitre.org/software/S0388 |
S0311 | YiSpecter | T1437.001 | Application Layer Protocol: Web Protocols | YiSpecter has connected to the C2 server via HTTP.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1577 | Compromise Application Executable | YiSpecter has replaced device apps with ones it has downloaded.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1407 | Download New Code at Runtime | YiSpecter has used private APIs to download and install other pieces of itself, as well as other malicious apps. [1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1456 | Drive-By Compromise | YiSpecter is believed to have initially infected devices using internet traffic hijacking to generate abnormal popups.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1628.001 | Hide Artifacts: Suppress Application Icon | YiSpecter has hidden the app icon from iOS springboard.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1625 | Hijack Execution Flow | YiSpecter has hijacked normal application’s launch routines to display ads.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1424 | Process Discovery | YiSpecter has collected information about running processes.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1418 | Software Discovery | YiSpecter has collected information about installed applications.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1409 | Stored Application Data | YiSpecter has modified Safari’s default search engine, bookmarked websites, opened pages, and accessed contacts and authorization tokens of the IM program "QQ" on infected devices.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1632.001 | Subvert Trust Controls: Code Signing Policy Modification | YiSpecter has used fake Verisign and Symantec certificates to bypass malware detection systems. YiSpecter has also signed malicious apps with iOS enterprise certificates to work on non-jailbroken iOS devices.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1426 | System Information Discovery | YiSpecter has collected the device UUID.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0311 | YiSpecter | T1422 | System Network Configuration Discovery | YiSpecter has collected compromised device MAC addresses.[1] | YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1] | https://attack.mitre.org/software/S0311 |
S0248 | yty | T1005 | Data from Local System | yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1083 | File and Directory Discovery | yty gathers information on victim’s drives and has a plugin for document listing.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1056.001 | Input Capture: Keylogging | yty uses a keylogger plugin to gather keystrokes.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1027.001 | Obfuscated Files or Information: Binary Padding | yty contains junk code in its binary, likely to confuse malware analysts.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | .002 | Obfuscated Files or Information: Software Packing | yty packs a plugin with UPX.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1057 | Process Discovery | yty gets an output of running processes using the tasklist command.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1018 | Remote System Discovery | yty uses the net view command for discovery.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1053.005 | Scheduled Task/Job: Scheduled Task | yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR " + path_file + "/ST 09:30".[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1113 | Screen Capture | yty collects screenshots of the victim machine.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1082 | System Information Discovery | yty gathers the computer name, the serial number of the main disk volume, CPU information, Microsoft Windows version, and runs the command systeminfo.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1016 | System Network Configuration Discovery | yty runs ipconfig /all and collects the domain name.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1033 | System Owner/User Discovery | yty collects the victim’s username.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1497.001 | Virtualization/Sandbox Evasion: System Checks | yty has some basic anti-sandbox detection that tries to detect Virtual PC, Sandboxie, and VMware. [1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0248 | yty | T1102.002 | Web Service: Bidirectional Communication | yty communicates to the C2 server by retrieving a Google Doc.[1] | yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1] | https://attack.mitre.org/software/S0248 |
S0251 | Zebrocy | T1071.001 | Application Layer Protocol: Web Protocols | Zebrocy uses HTTP for C2.[1][2][7][3][8][6] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | .003 | Application Layer Protocol: Mail Protocols | Zebrocy uses SMTP and POP3 for C2.[1][2][7][3][8] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1560 | Archive Collected Data | Zebrocy has used a method similar to RC4 as well as AES for encryption and hexadecimal for encoding data before exfiltration. [9][7][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1119 | Automated Collection | Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.[7][8] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Zebrocy creates an entry in a Registry Run key for the malware to execute on startup.[7][8][6] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1037.001 | Boot or Logon Initialization Scripts: Logon Script (Windows) | Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.[7] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | Zebrocy uses cmd.exe to execute commands on the system.[8][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1555.003 | Credentials from Password Stores: Credentials from Web Browsers | Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files.[8] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1132.001 | Data Encoding: Standard Encoding | Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.[6] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1074.001 | Data Staged: Local Data Staging | Zebrocy stores all collected information in a single file before exfiltration.[7] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1140 | Deobfuscate/Decode Files or Information | Zebrocy decodes its secondary payload and writes it to the victim’s machine. Zebrocy also uses AES and XOR to decrypt strings and payloads.[2][7] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1573.002 | Encrypted Channel: Asymmetric Cryptography | Zebrocy uses SSL and AES ECB for encrypting C2 communications.[7][8][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1041 | Exfiltration Over C2 Channel | Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.[6][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1083 | File and Directory Discovery | Zebrocy searches for files that are 60mb and less and contain the following extensions: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .exe, .zip, and .rar. Zebrocy also runs the echo %APPDATA% command to list the contents of the directory.[9][7][8] Zebrocy can obtain the current execution path as well as perform drive enumeration.[6][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1070.004 | Indicator Removal: File Deletion | Zebrocy has a command to delete files and directories.[7][8][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1105 | Ingress Tool Transfer | Zebrocy obtains additional code to execute on the victim's machine, including the downloading of a secondary payload.[1][2][8][6] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1056.004 | Input Capture: Credential API Hooking | Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method.[9] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1135 | Network Share Discovery | Zebrocy identifies network drives when they are added to victim systems.[9] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1027.002 | Obfuscated Files or Information: Software Packing | Zebrocy's Delphi variant was packed with UPX.[3][6] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1120 | Peripheral Device Discovery | Zebrocy enumerates information about connected storage devices.[2] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1057 | Process Discovery | Zebrocy uses the tasklist and wmic process get Capture, ExecutablePath commands to gather the processes running on the system.[2][7][3][8][6] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1012 | Query Registry | Zebrocy executes the reg query command to obtain information in the Registry.[8] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1053.005 | Scheduled Task/Job: Scheduled Task | Zebrocy has a command to create a scheduled task for persistence.[4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1113 | Screen Capture | A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format.[2][7][3][8][6][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1082 | System Information Discovery | Zebrocy collects the OS version, computer name and serial number for the storage volume C:. Zebrocy also runs the systeminfo command to gather system information. [1][2][7][3][8][6][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1016 | System Network Configuration Discovery | Zebrocy runs the ipconfig /all command.[8] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1049 | System Network Connections Discovery | Zebrocy uses netstat -aon to gather network connection information.[8] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1033 | System Owner/User Discovery | Zebrocy gets the username from the system.[7][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1124 | System Time Discovery | Zebrocy gathers the current time zone and date information from the system.[7][4] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0251 | Zebrocy | T1047 | Windows Management Instrumentation | One variant of Zebrocy uses WMI queries to gather information.[3] | Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4] | https://attack.mitre.org/software/S0251 |
S0494 | Zen | T1407 | Download New Code at Runtime | Zen can dynamically load executable code from remote sources.[1] | Zen is Android malware that was first seen in 2013.[1] | https://attack.mitre.org/software/S0494 |
S0494 | Zen | T1404 | Exploitation for Privilege Escalation | Zen can obtain root access via a rooting trojan in its infection chain.[1] | Zen is Android malware that was first seen in 2013.[1] | https://attack.mitre.org/software/S0494 |
S0494 | Zen | T1643 | Generate Traffic from Victim | Zen can simulate user clicks on ads.[1] | Zen is Android malware that was first seen in 2013.[1] | https://attack.mitre.org/software/S0494 |
S0494 | Zen | T1625.001 | Hijack Execution Flow: System Runtime API Hijacking | Zen can install itself on the system partition to achieve persistence. Zen can also replace framework.jar, which allows it to intercept and modify the behavior of the standard Android API.[1] | Zen is Android malware that was first seen in 2013.[1] | https://attack.mitre.org/software/S0494 |
S0494 | Zen | T1629.003 | Impair Defenses: Disable or Modify Tools | Zen can modify the SELinux enforcement mode.[1] | Zen is Android malware that was first seen in 2013.[1] | https://attack.mitre.org/software/S0494 |
S0494 | Zen | T1516 | Input Injection | Zen can simulate user clicks on ads and system prompts to create new Google accounts.[1] | Zen is Android malware that was first seen in 2013.[1] | https://attack.mitre.org/software/S0494 |
S0494 | Zen | T1406 | Obfuscated Files or Information | Zen base64 encodes one of the strings it searches for.[1] | Zen is Android malware that was first seen in 2013.[1] | https://attack.mitre.org/software/S0494 |
S0494 | Zen | T1631.001 | Process Injection: Ptrace System Calls | Zen can inject code into the Setup Wizard at runtime to extract CAPTCHA images. Zen can inject code into the libc of running processes to infect them with the malware.[1] | Zen is Android malware that was first seen in 2013.[1] | https://attack.mitre.org/software/S0494 |
S0287 | ZergHelper | T1407 | Download New Code at Runtime | ZergHelper attempts to extend its capabilities via dynamic updating of its code.[1] | ZergHelper is iOS riskware that was unique due to its apparent evasion of Apple's App Store review process. No malicious functionality was identified in the app, but it presents security risks. [1] | https://attack.mitre.org/software/S0287 |
S0027 | Zeroaccess | T1564.004 | Hide Artifacts: NTFS File Attributes | Some variants of the Zeroaccess Trojan have been known to store data in Extended Attributes.[2] | Zeroaccess is a kernel-mode Rootkit that attempts to add victims to the ZeroAccess botnet, often for monetary gain. [1] | https://attack.mitre.org/software/S0027 |
S0027 | Zeroaccess | T1014 | Rootkit | Zeroaccess is a kernel-mode rootkit.[1] | Zeroaccess is a kernel-mode Rootkit that attempts to add victims to the ZeroAccess botnet, often for monetary gain. [1] | https://attack.mitre.org/software/S0027 |
S1151 | ZeroCleare | T1059 | Command and Scripting Interpreter | ZeroCleare can receive command line arguments from an operator to corrupt the file system using the RawDisk driver.[3] | ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] | https://attack.mitre.org/software/S1151 |
S1151 | ZeroCleare | .001 | PowerShell | ZeroCleare can use a malicious PowerShell script to bypass Windows controls.[4] | ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] | https://attack.mitre.org/software/S1151 |
S1151 | ZeroCleare | T1561.002 | Disk Wipe: Disk Structure Wipe | ZeroCleare can corrupt the file system and wipe the system drive on targeted hosts.[3][2][4] | ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] | https://attack.mitre.org/software/S1151 |
S1151 | ZeroCleare | T1068 | Exploitation for Privilege Escalation | ZeroCleare has used a vulnerable signed VBoxDrv driver to bypass Microsoft Driver Signature Enforcement (DSE) protections and subsequently load the unsigned RawDisk driver.[4] | ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] | https://attack.mitre.org/software/S1151 |
S1151 | ZeroCleare | T1070.004 | Indicator Removal: File Deletion | ZeroCleare has the ability to uninstall the RawDisk driver and delete the rwdsk file on disk.[3][2] | ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] | https://attack.mitre.org/software/S1151 |
S1151 | ZeroCleare | T1106 | Native API | ZeroCleare can call the GetSystemDirectoryW API to locate the system directory.[3] | ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] | https://attack.mitre.org/software/S1151 |
S1151 | ZeroCleare | T1553.002 | Subvert Trust Controls: Code Signing | ZeroCleare can deploy a vulnerable, signed driver on a compromised host to bypass operating system safeguards.[4] | ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] | https://attack.mitre.org/software/S1151 |
S1151 | ZeroCleare | T1082 | System Information Discovery | ZeroCleare can use the IOCTL_DISK_GET_DRIVE_GEOMETRY_EX, IOCTL_DISK_GET_DRIVE_GEOMETRY, and IOCTL_DISK_GET_LENGTH_INFO system calls to compute disk size.[3] | ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] | https://attack.mitre.org/software/S1151 |
S0230 | ZeroT | T1548.002 | Abuse Elevation Control Mechanism: Bypass User Account Control | Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file.[2] | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. [1] [2] | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1071.001 | Application Layer Protocol: Web Protocols | ZeroT has used HTTP for C2.[1][2] | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. [1] [2] | https://attack.mitre.org/software/S0230 |