software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
23
663
description
stringclasses
826 values
url
stringclasses
826 values
S0230
ZeroT
T1543.003
Create or Modify System Process: Windows Service
ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1001.002
Data Obfuscation: Steganography
ZeroT has retrieved stage 2 payloads as Bitmap images that use Least Significant Bit (LSB) steganography.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1140
Deobfuscate/Decode Files or Information
ZeroT shellcode decrypts and decompresses its RC4-encrypted payload.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1573.001
Encrypted Channel: Symmetric Cryptography
ZeroT has used RC4 to encrypt C2 traffic.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1574.002
Hijack Execution Flow: DLL Side-Loading
ZeroT has used DLL side-loading to load malicious payloads.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1105
Ingress Tool Transfer
ZeroT can download additional payloads onto the victim.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1027.001
Obfuscated Files or Information: Binary Padding
ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
.002
Obfuscated Files or Information: Software Packing
Some ZeroT DLL files have been packed with UPX.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
.013
Obfuscated Files or Information: Encrypted/Encoded File
ZeroT has encrypted its payload with RC4.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1082
System Information Discovery
ZeroT gathers the victim's computer name, Windows version, and system language, and then sends it to its C2 server.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0230
ZeroT
T1016
System Network Configuration Discovery
ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server.
ZeroT is a Trojan used by TA459, often in conjunction with PlugX.
https://attack.mitre.org/software/S0230
S0330
Zeus Panda
T1071.001
Application Layer Protocol: Web Protocols
Zeus Panda uses HTTP for C2 communications.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Zeus Panda adds persistence by creating Registry Run keys.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1115
Clipboard Data
Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1059
Command and Scripting Interpreter
Zeus Panda can launch remote scripts on the victim’s machine.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
.001
PowerShell
Zeus Panda uses PowerShell to download and execute the payload.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
.003
Windows Command Shell
Zeus Panda can launch an interface where it can execute several commands on the victim’s PC.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1140
Deobfuscate/Decode Files or Information
Zeus Panda decrypts strings in the code during the execution process.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1083
File and Directory Discovery
Zeus Panda searches for specific directories on the victim’s machine.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1070.004
Indicator Removal: File Deletion
Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1105
Ingress Tool Transfer
Zeus Panda can download additional malware plug-in modules and execute them on the victim’s machine.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1056.001
Input Capture: Keylogging
Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
.004
Input Capture: Credential API Hooking
Zeus Panda hooks processes by leveraging its own IAT hooked functions.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1112
Modify Registry
Zeus Panda modifies several Registry keys under HKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\ to disable phishing filters.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1027.010
Obfuscated Files or Information: Command Obfuscation
Zeus Panda obfuscates the macro commands in its initial payload.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
.013
Obfuscated Files or Information: Encrypted/Encoded File
Zeus Panda encrypts strings with XOR. Zeus Panda also encrypts all configuration and settings in AES and RC4.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1057
Process Discovery
Zeus Panda checks for running processes on the victim’s machine.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1055.002
Process Injection: Portable Executable Injection
Zeus Panda checks processes on the system and if they meet the necessary requirements, it injects into that process.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1012
Query Registry
Zeus Panda checks for the existence of a Registry key and if it contains certain values.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1113
Screen Capture
Zeus Panda can take screenshots of the victim’s machine.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1518.001
Software Discovery: Security Software Discovery
Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1082
System Information Discovery
Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1614.001
System Location Discovery: System Language Discovery
Zeus Panda queries the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects LANG_RUSSIAN, LANG_BELARUSIAN, LANG_KAZAK, or LANG_UKRAINIAN.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S0330
Zeus Panda
T1124
System Time Discovery
Zeus Panda collects the current system time (UTC) and sends it back to the C2 server.
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.
https://attack.mitre.org/software/S0330
S1114
ZIPLINE
T1059.004
Command and Scripting Interpreter: Unix Shell
ZIPLINE can use /bin/sh to create a reverse shell and execute commands.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S1114
ZIPLINE
T1573.001
Encrypted Channel: Symmetric Cryptography
ZIPLINE can use AES-128-CBC to encrypt data for both upload and download.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S1114
ZIPLINE
T1083
File and Directory Discovery
ZIPLINE can find and append specific files on Ivanti Connect Secure VPNs based upon received commands.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S1114
ZIPLINE
T1562.001
Impair Defenses: Disable or Modify Tools
ZIPLINE can add itself to the exclusion list for the Ivanti Connect Secure Integrity Checker Tool if the --exclude parameter is passed by the tar process.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S1114
ZIPLINE
T1105
Ingress Tool Transfer
ZIPLINE can download files to be saved on the compromised system.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S1114
ZIPLINE
T1095
Non-Application Layer Protocol
ZIPLINE can communicate with C2 using a custom binary protocol.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S1114
ZIPLINE
T1057
Process Discovery
ZIPLINE can identify running processes and their names.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S1114
ZIPLINE
T1090
Proxy
ZIPLINE can create a proxy server on compromised hosts.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S1114
ZIPLINE
T1205
Traffic Signaling
ZIPLINE can identify a specific string in intercepted network traffic, SSH-2.0-OpenSSH_0.3xx., to trigger its command functionality.
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.
https://attack.mitre.org/software/S1114
S0086
ZLib
T1071.001
Application Layer Protocol: Web Protocols
ZLib communicates over HTTP for C2.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1560.002
Archive Collected Data: Archive via Library
The ZLib backdoor compresses communications using the standard Zlib compression library.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1059.003
Command and Scripting Interpreter: Windows Command Shell
ZLib has the ability to execute shell commands.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1543.003
Create or Modify System Process: Windows Service
ZLib creates Registry keys to allow itself to run as various services.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1041
Exfiltration Over C2 Channel
ZLib has sent data and files from a compromised host to its C2 servers.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1083
File and Directory Discovery
ZLib has the ability to enumerate files and drives.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1105
Ingress Tool Transfer
ZLib has the ability to download files.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1036.005
Masquerading: Match Legitimate Name or Location
ZLib mimics the resource version information of legitimate Realtek Semiconductor, Nvidia, or Synaptics modules.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1113
Screen Capture
ZLib has the ability to obtain screenshots of the compromised system.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1082
System Information Discovery
ZLib has the ability to enumerate system information.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0086
ZLib
T1007
System Service Discovery
ZLib has the ability to discover and manipulate Windows services.
ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.
https://attack.mitre.org/software/S0086
S0672
Zox
T1005
Data from Local System
Zox has the ability to upload files from a targeted system.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0672
Zox
T1001.002
Data Obfuscation: Steganography
Zox has used the .PNG file format for C2 communications.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0672
Zox
T1068
Exploitation for Privilege Escalation
Zox has the ability to leverage local and remote exploits to escalate privileges.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0672
Zox
T1083
File and Directory Discovery
Zox can enumerate files on a compromised host.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0672
Zox
T1105
Ingress Tool Transfer
Zox can download files to a compromised machine.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0672
Zox
T1027.013
Obfuscated Files or Information: Encrypted/Encoded File
Zox has been encoded with Base64.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0672
Zox
T1057
Process Discovery
Zox has the ability to list processes.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0672
Zox
T1021.002
Remote Services: SMB/Windows Admin Shares
Zox has the ability to use SMB for communication.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0672
Zox
T1082
System Information Discovery
Zox can enumerate attached drives.
Zox is a remote access tool that has been used by Axiom since at least 2008.
https://attack.mitre.org/software/S0672
S0350
zwShell
T1059.003
Command and Scripting Interpreter: Windows Command Shell
zwShell can launch command-line shells.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1543.003
Create or Modify System Process: Windows Service
zwShell has established persistence by adding itself as a new service.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1083
File and Directory Discovery
zwShell can browse the file system.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1070.004
Indicator Removal: File Deletion
zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1112
Modify Registry
zwShell can modify the Registry.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1021.001
Remote Services: Remote Desktop Protocol
zwShell has used RDP for lateral movement.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
.002
Remote Services: SMB/Windows Admin Shares
zwShell has been copied over network shares to move laterally.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1053.005
Scheduled Task/Job: Scheduled Task
zwShell has used SchTasks for execution.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1082
System Information Discovery
zwShell can obtain the victim PC name and OS version.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1016
System Network Configuration Discovery
zwShell can obtain the victim IP address.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0350
zwShell
T1033
System Owner/User Discovery
zwShell can obtain the name of the logged-in user on the victim.
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.
https://attack.mitre.org/software/S0350
S0412
ZxShell
T1134.002
Access Token Manipulation: Create Process with Token
ZxShell has a command called RunAs, which creates a new process as another user or process context.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1071.001
Application Layer Protocol: Web Protocols
ZxShell has used HTTP for C2 connections.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
.002
Application Layer Protocol: File Transfer Protocols
ZxShell has used FTP for C2 connections.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1059.003
Command and Scripting Interpreter: Windows Command Shell
ZxShell can launch a reverse command shell.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1136.001
Create Account: Local Account
ZxShell has a feature to create local user accounts.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1543.003
Create or Modify System Process: Windows Service
ZxShell can create a new service using the service parser function ProcessScCommand.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1005
Data from Local System
ZxShell can transfer files from a compromised host.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1499
Endpoint Denial of Service
ZxShell has a feature to perform SYN flood attack on a host.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1190
Exploit Public-Facing Application
ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1083
File and Directory Discovery
ZxShell has a command to open a file manager and explorer on the system.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1562.001
Impair Defenses: Disable or Modify Tools
ZxShell can kill AV products' processes.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
.004
Impair Defenses: Disable or Modify System Firewall
ZxShell can disable the firewall by modifying the registry key HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1070.001
Indicator Removal: Clear Windows Event Logs
ZxShell has a command to clear system event logs.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
.004
Indicator Removal: File Deletion
ZxShell can delete files from the system.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1105
Ingress Tool Transfer
ZxShell has a command to transfer files from a remote host.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1056.001
Input Capture: Keylogging
ZxShell has a feature to capture a remote computer's keystrokes using a keylogger.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
.004
Input Capture: Credential API Hooking
ZxShell hooks several API functions to spawn system threads.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1112
Modify Registry
ZxShell can create Registry entries to enable services to run.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1106
Native API
ZxShell can leverage native API including RegisterServiceCtrlHandler to register a service.RegisterServiceCtrlHandler
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1046
Network Service Discovery
ZxShell can launch port scans.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1571
Non-Standard Port
ZxShell can use ports 1985 and 1986 in HTTP/S communication.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1057
Process Discovery
ZxShell has a command, ps, to obtain a listing of processes on the system.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1055.001
Process Injection: Dynamic-link Library Injection
ZxShell is injected into a shared SVCHOST process.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1090
Proxy
ZxShell can set up an HTTP or SOCKS proxy.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1012
Query Registry
ZxShell can query the netsvc group value data located in the svchost group Registry key.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1021.001
Remote Services: Remote Desktop Protocol
ZxShell has remote desktop functionality.
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.
https://attack.mitre.org/software/S0412