software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
26
666
description
stringclasses
826 values
url
stringclasses
826 values
S0318
XLoader for Android
T1406
Obfuscated Files or Information
XLoader for Android loads an encrypted DEX code payload.[2]
XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS.
https://attack.mitre.org/software/S0318
S0318
XLoader for Android
T1636.004
Protected User Data: SMS Messages
XLoader for Android collects SMS messages.[2]
XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS.
https://attack.mitre.org/software/S0318
S0318
XLoader for Android
T1426
System Information Discovery
XLoader for Android collects the device’s Android ID and serial number.[1]
XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS.
https://attack.mitre.org/software/S0318
S0318
XLoader for Android
T1422
System Network Configuration Discovery
XLoader for Android collects the device’s IMSI and ICCID.[1]
XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS.
https://attack.mitre.org/software/S0318
S0318
XLoader for Android
T1481.001
Web Service: Dead Drop Resolver
XLoader for Android has fetched its C2 address from encoded Twitter names, as well as Instagram and Tumblr.[1]
XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.[1][2] It is tracked separately from the XLoader for iOS.
https://attack.mitre.org/software/S0318
S0490
XLoader for iOS
T1646
Exfiltration Over C2 Channel
XLoader for iOS has exfiltrated data using HTTP requests.[1]
XLoader for iOS is a malicious iOS application that is capable of gathering system information.[1] It is tracked separately from the XLoader for Android.
https://attack.mitre.org/software/S0490
S0490
XLoader for iOS
T1632.001
Subvert Trust Controls: Code Signing Policy Modification
XLoader for iOS has been installed via a malicious configuration profile.[1]
XLoader for iOS is a malicious iOS application that is capable of gathering system information.[1] It is tracked separately from the XLoader for Android.
https://attack.mitre.org/software/S0490
S0490
XLoader for iOS
T1426
System Information Discovery
XLoader for iOS can obtain the device’s UDID, version number, and product number.[1]
XLoader for iOS is a malicious iOS application that is capable of gathering system information.[1] It is tracked separately from the XLoader for Android.
https://attack.mitre.org/software/S0490
S0490
XLoader for iOS
T1422
System Network Configuration Discovery
XLoader for iOS can obtain the device’s IMEM, ICCID, and MEID.[1]
XLoader for iOS is a malicious iOS application that is capable of gathering system information.[1] It is tracked separately from the XLoader for Android.
https://attack.mitre.org/software/S0490
S0117
XTunnel
T1059.003
Command and Scripting Interpreter: Windows Command Shell
XTunnel has been used to execute remote commands.[1]
XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3]
https://attack.mitre.org/software/S0117
S0117
XTunnel
T1573.002
Encrypted Channel: Asymmetric Cryptography
XTunnel uses SSL/TLS and RC4 to encrypt traffic.[2][3]
XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3]
https://attack.mitre.org/software/S0117
S0117
XTunnel
T1008
Fallback Channels
The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.[3]
XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3]
https://attack.mitre.org/software/S0117
S0117
XTunnel
T1046
Network Service Discovery
XTunnel is capable of probing the network for open ports.[2]
XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3]
https://attack.mitre.org/software/S0117
S0117
XTunnel
T1027
Obfuscated Files or Information
A version of XTunnel introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.[3]
XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3]
https://attack.mitre.org/software/S0117
S0117
XTunnel
.001
Binary Padding
A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products.[3]
XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3]
https://attack.mitre.org/software/S0117
S0117
XTunnel
T1090
Proxy
XTunnel relays traffic between a C2 server and a victim.[1]
XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3]
https://attack.mitre.org/software/S0117
S0117
XTunnel
T1552.001
Unsecured Credentials: Credentials In Files
XTunnel is capable of accessing locally stored passwords on victims.[2]
XTunnel a VPN-like network proxy tool that can relay traffic between a C2 server and a victim. It was first seen in May 2013 and reportedly used by APT28 during the compromise of the Democratic National Committee. [1] [2] [3]
https://attack.mitre.org/software/S0117
S0388
YAHOYAH
T1071.001
Application Layer Protocol: Web Protocols
YAHOYAH uses HTTP for C2.[1]
YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1]
https://attack.mitre.org/software/S0388
S0388
YAHOYAH
T1140
Deobfuscate/Decode Files or Information
YAHOYAH decrypts downloaded files before execution.[1]
YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1]
https://attack.mitre.org/software/S0388
S0388
YAHOYAH
T1105
Ingress Tool Transfer
YAHOYAH uses HTTP GET requests to download other files that are executed in memory.[1]
YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1]
https://attack.mitre.org/software/S0388
S0388
YAHOYAH
T1027.013
Obfuscated Files or Information: Encrypted/Encoded File
YAHOYAH encrypts its configuration file using a simple algorithm.[1]
YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1]
https://attack.mitre.org/software/S0388
S0388
YAHOYAH
T1518.001
Software Discovery: Security Software Discovery
YAHOYAH checks for antimalware solution processes on the system.[1]
YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1]
https://attack.mitre.org/software/S0388
S0388
YAHOYAH
T1082
System Information Discovery
YAHOYAH checks for the system’s Windows OS version and hostname.[1]
YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1]
https://attack.mitre.org/software/S0388
S0311
YiSpecter
T1437.001
Application Layer Protocol: Web Protocols
YiSpecter has connected to the C2 server via HTTP.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1577
Compromise Application Executable
YiSpecter has replaced device apps with ones it has downloaded.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1407
Download New Code at Runtime
YiSpecter has used private APIs to download and install other pieces of itself, as well as other malicious apps. [1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1456
Drive-By Compromise
YiSpecter is believed to have initially infected devices using internet traffic hijacking to generate abnormal popups.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1628.001
Hide Artifacts: Suppress Application Icon
YiSpecter has hidden the app icon from iOS springboard.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1625
Hijack Execution Flow
YiSpecter has hijacked normal application’s launch routines to display ads.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1424
Process Discovery
YiSpecter has collected information about running processes.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1418
Software Discovery
YiSpecter has collected information about installed applications.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1409
Stored Application Data
YiSpecter has modified Safari’s default search engine, bookmarked websites, opened pages, and accessed contacts and authorization tokens of the IM program "QQ" on infected devices.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1632.001
Subvert Trust Controls: Code Signing Policy Modification
YiSpecter has used fake Verisign and Symantec certificates to bypass malware detection systems. YiSpecter has also signed malicious apps with iOS enterprise certificates to work on non-jailbroken iOS devices.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1426
System Information Discovery
YiSpecter has collected the device UUID.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0311
YiSpecter
T1422
System Network Configuration Discovery
YiSpecter has collected compromised device MAC addresses.[1]
YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.[1]
https://attack.mitre.org/software/S0311
S0248
yty
T1005
Data from Local System
yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1083
File and Directory Discovery
yty gathers information on victim’s drives and has a plugin for document listing.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1056.001
Input Capture: Keylogging
yty uses a keylogger plugin to gather keystrokes.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1027.001
Obfuscated Files or Information: Binary Padding
yty contains junk code in its binary, likely to confuse malware analysts.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
.002
Obfuscated Files or Information: Software Packing
yty packs a plugin with UPX.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1057
Process Discovery
yty gets an output of running processes using the tasklist command.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1018
Remote System Discovery
yty uses the net view command for discovery.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1053.005
Scheduled Task/Job: Scheduled Task
yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR " + path_file + "/ST 09:30".[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1113
Screen Capture
yty collects screenshots of the victim machine.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1082
System Information Discovery
yty gathers the computer name, the serial number of the main disk volume, CPU information, Microsoft Windows version, and runs the command systeminfo.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1016
System Network Configuration Discovery
yty runs ipconfig /all and collects the domain name.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1033
System Owner/User Discovery
yty collects the victim’s username.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1497.001
Virtualization/Sandbox Evasion: System Checks
yty has some basic anti-sandbox detection that tries to detect Virtual PC, Sandboxie, and VMware. [1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0248
yty
T1102.002
Web Service: Bidirectional Communication
yty communicates to the C2 server by retrieving a Google Doc.[1]
yty is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [1]
https://attack.mitre.org/software/S0248
S0251
Zebrocy
T1071.001
Application Layer Protocol: Web Protocols
Zebrocy uses HTTP for C2.[1][2][7][3][8][6]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
.003
Application Layer Protocol: Mail Protocols
Zebrocy uses SMTP and POP3 for C2.[1][2][7][3][8]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1560
Archive Collected Data
Zebrocy has used a method similar to RC4 as well as AES for encryption and hexadecimal for encoding data before exfiltration. [9][7][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1119
Automated Collection
Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.[7][8]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Zebrocy creates an entry in a Registry Run key for the malware to execute on startup.[7][8][6]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1037.001
Boot or Logon Initialization Scripts: Logon Script (Windows)
Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.[7]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Zebrocy uses cmd.exe to execute commands on the system.[8][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1555.003
Credentials from Password Stores: Credentials from Web Browsers
Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files.[8]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1132.001
Data Encoding: Standard Encoding
Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.[6]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1074.001
Data Staged: Local Data Staging
Zebrocy stores all collected information in a single file before exfiltration.[7]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1140
Deobfuscate/Decode Files or Information
Zebrocy decodes its secondary payload and writes it to the victim’s machine. Zebrocy also uses AES and XOR to decrypt strings and payloads.[2][7]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1573.002
Encrypted Channel: Asymmetric Cryptography
Zebrocy uses SSL and AES ECB for encrypting C2 communications.[7][8][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1041
Exfiltration Over C2 Channel
Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.[6][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1083
File and Directory Discovery
Zebrocy searches for files that are 60mb and less and contain the following extensions: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .exe, .zip, and .rar. Zebrocy also runs the echo %APPDATA% command to list the contents of the directory.[9][7][8] Zebrocy can obtain the current execution path as well as perform drive enumeration.[6][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1070.004
Indicator Removal: File Deletion
Zebrocy has a command to delete files and directories.[7][8][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1105
Ingress Tool Transfer
Zebrocy obtains additional code to execute on the victim's machine, including the downloading of a secondary payload.[1][2][8][6]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1056.004
Input Capture: Credential API Hooking
Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method.[9]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1135
Network Share Discovery
Zebrocy identifies network drives when they are added to victim systems.[9]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1027.002
Obfuscated Files or Information: Software Packing
Zebrocy's Delphi variant was packed with UPX.[3][6]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1120
Peripheral Device Discovery
Zebrocy enumerates information about connected storage devices.[2]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1057
Process Discovery
Zebrocy uses the tasklist and wmic process get Capture, ExecutablePath commands to gather the processes running on the system.[2][7][3][8][6]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1012
Query Registry
Zebrocy executes the reg query command to obtain information in the Registry.[8]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1053.005
Scheduled Task/Job: Scheduled Task
Zebrocy has a command to create a scheduled task for persistence.[4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1113
Screen Capture
A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format.[2][7][3][8][6][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1082
System Information Discovery
Zebrocy collects the OS version, computer name and serial number for the storage volume C:. Zebrocy also runs the systeminfo command to gather system information. [1][2][7][3][8][6][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1016
System Network Configuration Discovery
Zebrocy runs the ipconfig /all command.[8]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1049
System Network Connections Discovery
Zebrocy uses netstat -aon to gather network connection information.[8]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1033
System Owner/User Discovery
Zebrocy gets the username from the system.[7][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1124
System Time Discovery
Zebrocy gathers the current time zone and date information from the system.[7][4]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0251
Zebrocy
T1047
Windows Management Instrumentation
One variant of Zebrocy uses WMI queries to gather information.[3]
Zebrocy is a Trojan that has been used by APT28 since at least November 2015. The malware comes in several programming language variants, including C++, Delphi, AutoIt, C#, VB.NET, and Golang. [1][2][3][4]
https://attack.mitre.org/software/S0251
S0494
Zen
T1407
Download New Code at Runtime
Zen can dynamically load executable code from remote sources.[1]
Zen is Android malware that was first seen in 2013.[1]
https://attack.mitre.org/software/S0494
S0494
Zen
T1404
Exploitation for Privilege Escalation
Zen can obtain root access via a rooting trojan in its infection chain.[1]
Zen is Android malware that was first seen in 2013.[1]
https://attack.mitre.org/software/S0494
S0494
Zen
T1643
Generate Traffic from Victim
Zen can simulate user clicks on ads.[1]
Zen is Android malware that was first seen in 2013.[1]
https://attack.mitre.org/software/S0494
S0494
Zen
T1625.001
Hijack Execution Flow: System Runtime API Hijacking
Zen can install itself on the system partition to achieve persistence. Zen can also replace framework.jar, which allows it to intercept and modify the behavior of the standard Android API.[1]
Zen is Android malware that was first seen in 2013.[1]
https://attack.mitre.org/software/S0494
S0494
Zen
T1629.003
Impair Defenses: Disable or Modify Tools
Zen can modify the SELinux enforcement mode.[1]
Zen is Android malware that was first seen in 2013.[1]
https://attack.mitre.org/software/S0494
S0494
Zen
T1516
Input Injection
Zen can simulate user clicks on ads and system prompts to create new Google accounts.[1]
Zen is Android malware that was first seen in 2013.[1]
https://attack.mitre.org/software/S0494
S0494
Zen
T1406
Obfuscated Files or Information
Zen base64 encodes one of the strings it searches for.[1]
Zen is Android malware that was first seen in 2013.[1]
https://attack.mitre.org/software/S0494
S0494
Zen
T1631.001
Process Injection: Ptrace System Calls
Zen can inject code into the Setup Wizard at runtime to extract CAPTCHA images. Zen can inject code into the libc of running processes to infect them with the malware.[1]
Zen is Android malware that was first seen in 2013.[1]
https://attack.mitre.org/software/S0494
S0287
ZergHelper
T1407
Download New Code at Runtime
ZergHelper attempts to extend its capabilities via dynamic updating of its code.[1]
ZergHelper is iOS riskware that was unique due to its apparent evasion of Apple's App Store review process. No malicious functionality was identified in the app, but it presents security risks. [1]
https://attack.mitre.org/software/S0287
S0027
Zeroaccess
T1564.004
Hide Artifacts: NTFS File Attributes
Some variants of the Zeroaccess Trojan have been known to store data in Extended Attributes.[2]
Zeroaccess is a kernel-mode Rootkit that attempts to add victims to the ZeroAccess botnet, often for monetary gain. [1]
https://attack.mitre.org/software/S0027
S0027
Zeroaccess
T1014
Rootkit
Zeroaccess is a kernel-mode rootkit.[1]
Zeroaccess is a kernel-mode Rootkit that attempts to add victims to the ZeroAccess botnet, often for monetary gain. [1]
https://attack.mitre.org/software/S0027
S1151
ZeroCleare
T1059
Command and Scripting Interpreter
ZeroCleare can receive command line arguments from an operator to corrupt the file system using the RawDisk driver.[3]
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4]
https://attack.mitre.org/software/S1151
S1151
ZeroCleare
.001
PowerShell
ZeroCleare can use a malicious PowerShell script to bypass Windows controls.[4]
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4]
https://attack.mitre.org/software/S1151
S1151
ZeroCleare
T1561.002
Disk Wipe: Disk Structure Wipe
ZeroCleare can corrupt the file system and wipe the system drive on targeted hosts.[3][2][4]
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4]
https://attack.mitre.org/software/S1151
S1151
ZeroCleare
T1068
Exploitation for Privilege Escalation
ZeroCleare has used a vulnerable signed VBoxDrv driver to bypass Microsoft Driver Signature Enforcement (DSE) protections and subsequently load the unsigned RawDisk driver.[4]
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4]
https://attack.mitre.org/software/S1151
S1151
ZeroCleare
T1070.004
Indicator Removal: File Deletion
ZeroCleare has the ability to uninstall the RawDisk driver and delete the rwdsk file on disk.[3][2]
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4]
https://attack.mitre.org/software/S1151
S1151
ZeroCleare
T1106
Native API
ZeroCleare can call the GetSystemDirectoryW API to locate the system directory.[3]
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4]
https://attack.mitre.org/software/S1151
S1151
ZeroCleare
T1553.002
Subvert Trust Controls: Code Signing
ZeroCleare can deploy a vulnerable, signed driver on a compromised host to bypass operating system safeguards.[4]
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4]
https://attack.mitre.org/software/S1151
S1151
ZeroCleare
T1082
System Information Discovery
ZeroCleare can use the IOCTL_DISK_GET_DRIVE_GEOMETRY_EX, IOCTL_DISK_GET_DRIVE_GEOMETRY, and IOCTL_DISK_GET_LENGTH_INFO system calls to compute disk size.[3]
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4]
https://attack.mitre.org/software/S1151
S0230
ZeroT
T1548.002
Abuse Elevation Control Mechanism: Bypass User Account Control
Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file.[2]
ZeroT is a Trojan used by TA459, often in conjunction with PlugX. [1] [2]
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1071.001
Application Layer Protocol: Web Protocols
ZeroT has used HTTP for C2.[1][2]
ZeroT is a Trojan used by TA459, often in conjunction with PlugX. [1] [2]
https://attack.mitre.org/software/S0230