software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 23
663
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0230 | ZeroT | T1543.003 | Create or Modify System Process: Windows Service | ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1001.002 | Data Obfuscation: Steganography | ZeroT has retrieved stage 2 payloads as Bitmap images that use Least Significant Bit (LSB) steganography. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1140 | Deobfuscate/Decode Files or Information | ZeroT shellcode decrypts and decompresses its RC4-encrypted payload. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1573.001 | Encrypted Channel: Symmetric Cryptography | ZeroT has used RC4 to encrypt C2 traffic. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1574.002 | Hijack Execution Flow: DLL Side-Loading | ZeroT has used DLL side-loading to load malicious payloads. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1105 | Ingress Tool Transfer | ZeroT can download additional payloads onto the victim. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1027.001 | Obfuscated Files or Information: Binary Padding | ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | .002 | Obfuscated Files or Information: Software Packing | Some ZeroT DLL files have been packed with UPX. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | .013 | Obfuscated Files or Information: Encrypted/Encoded File | ZeroT has encrypted its payload with RC4. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1082 | System Information Discovery | ZeroT gathers the victim's computer name, Windows version, and system language, and then sends it to its C2 server. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0230 | ZeroT | T1016 | System Network Configuration Discovery | ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server. | ZeroT is a Trojan used by TA459, often in conjunction with PlugX. | https://attack.mitre.org/software/S0230 |
S0330 | Zeus Panda | T1071.001 | Application Layer Protocol: Web Protocols | Zeus Panda uses HTTP for C2 communications. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Zeus Panda adds persistence by creating Registry Run keys. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1115 | Clipboard Data | Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1059 | Command and Scripting Interpreter | Zeus Panda can launch remote scripts on the victim’s machine. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | .001 | PowerShell | Zeus Panda uses PowerShell to download and execute the payload. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | .003 | Windows Command Shell | Zeus Panda can launch an interface where it can execute several commands on the victim’s PC. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1140 | Deobfuscate/Decode Files or Information | Zeus Panda decrypts strings in the code during the execution process. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1083 | File and Directory Discovery | Zeus Panda searches for specific directories on the victim’s machine. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1070.004 | Indicator Removal: File Deletion | Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1105 | Ingress Tool Transfer | Zeus Panda can download additional malware plug-in modules and execute them on the victim’s machine. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1056.001 | Input Capture: Keylogging | Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | .004 | Input Capture: Credential API Hooking | Zeus Panda hooks processes by leveraging its own IAT hooked functions. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1112 | Modify Registry | Zeus Panda modifies several Registry keys under HKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\ to disable phishing filters. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1027.010 | Obfuscated Files or Information: Command Obfuscation | Zeus Panda obfuscates the macro commands in its initial payload. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | .013 | Obfuscated Files or Information: Encrypted/Encoded File | Zeus Panda encrypts strings with XOR. Zeus Panda also encrypts all configuration and settings in AES and RC4. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1057 | Process Discovery | Zeus Panda checks for running processes on the victim’s machine. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1055.002 | Process Injection: Portable Executable Injection | Zeus Panda checks processes on the system and if they meet the necessary requirements, it injects into that process. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1012 | Query Registry | Zeus Panda checks for the existence of a Registry key and if it contains certain values. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1113 | Screen Capture | Zeus Panda can take screenshots of the victim’s machine. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1518.001 | Software Discovery: Security Software Discovery | Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1082 | System Information Discovery | Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1614.001 | System Location Discovery: System Language Discovery | Zeus Panda queries the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects LANG_RUSSIAN, LANG_BELARUSIAN, LANG_KAZAK, or LANG_UKRAINIAN. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S0330 | Zeus Panda | T1124 | System Time Discovery | Zeus Panda collects the current system time (UTC) and sends it back to the C2 server. | Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10. | https://attack.mitre.org/software/S0330 |
S1114 | ZIPLINE | T1059.004 | Command and Scripting Interpreter: Unix Shell | ZIPLINE can use /bin/sh to create a reverse shell and execute commands. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S1114 | ZIPLINE | T1573.001 | Encrypted Channel: Symmetric Cryptography | ZIPLINE can use AES-128-CBC to encrypt data for both upload and download. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S1114 | ZIPLINE | T1083 | File and Directory Discovery | ZIPLINE can find and append specific files on Ivanti Connect Secure VPNs based upon received commands. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S1114 | ZIPLINE | T1562.001 | Impair Defenses: Disable or Modify Tools | ZIPLINE can add itself to the exclusion list for the Ivanti Connect Secure Integrity Checker Tool if the --exclude parameter is passed by the tar process. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S1114 | ZIPLINE | T1105 | Ingress Tool Transfer | ZIPLINE can download files to be saved on the compromised system. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S1114 | ZIPLINE | T1095 | Non-Application Layer Protocol | ZIPLINE can communicate with C2 using a custom binary protocol. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S1114 | ZIPLINE | T1057 | Process Discovery | ZIPLINE can identify running processes and their names. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S1114 | ZIPLINE | T1090 | Proxy | ZIPLINE can create a proxy server on compromised hosts. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S1114 | ZIPLINE | T1205 | Traffic Signaling | ZIPLINE can identify a specific string in intercepted network traffic, SSH-2.0-OpenSSH_0.3xx., to trigger its command functionality. | ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality. | https://attack.mitre.org/software/S1114 |
S0086 | ZLib | T1071.001 | Application Layer Protocol: Web Protocols | ZLib communicates over HTTP for C2. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1560.002 | Archive Collected Data: Archive via Library | The ZLib backdoor compresses communications using the standard Zlib compression library. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | ZLib has the ability to execute shell commands. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1543.003 | Create or Modify System Process: Windows Service | ZLib creates Registry keys to allow itself to run as various services. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1041 | Exfiltration Over C2 Channel | ZLib has sent data and files from a compromised host to its C2 servers. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1083 | File and Directory Discovery | ZLib has the ability to enumerate files and drives. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1105 | Ingress Tool Transfer | ZLib has the ability to download files. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1036.005 | Masquerading: Match Legitimate Name or Location | ZLib mimics the resource version information of legitimate Realtek Semiconductor, Nvidia, or Synaptics modules. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1113 | Screen Capture | ZLib has the ability to obtain screenshots of the compromised system. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1082 | System Information Discovery | ZLib has the ability to enumerate system information. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0086 | ZLib | T1007 | System Service Discovery | ZLib has the ability to discover and manipulate Windows services. | ZLib is a full-featured backdoor that was used as a second-stage implant during Operation Dust Storm since at least 2014. ZLib is malware and should not be confused with the legitimate compression library from which its name is derived. | https://attack.mitre.org/software/S0086 |
S0672 | Zox | T1005 | Data from Local System | Zox has the ability to upload files from a targeted system. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0672 | Zox | T1001.002 | Data Obfuscation: Steganography | Zox has used the .PNG file format for C2 communications. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0672 | Zox | T1068 | Exploitation for Privilege Escalation | Zox has the ability to leverage local and remote exploits to escalate privileges. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0672 | Zox | T1083 | File and Directory Discovery | Zox can enumerate files on a compromised host. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0672 | Zox | T1105 | Ingress Tool Transfer | Zox can download files to a compromised machine. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0672 | Zox | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | Zox has been encoded with Base64. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0672 | Zox | T1057 | Process Discovery | Zox has the ability to list processes. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0672 | Zox | T1021.002 | Remote Services: SMB/Windows Admin Shares | Zox has the ability to use SMB for communication. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0672 | Zox | T1082 | System Information Discovery | Zox can enumerate attached drives. | Zox is a remote access tool that has been used by Axiom since at least 2008. | https://attack.mitre.org/software/S0672 |
S0350 | zwShell | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | zwShell can launch command-line shells. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1543.003 | Create or Modify System Process: Windows Service | zwShell has established persistence by adding itself as a new service. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1083 | File and Directory Discovery | zwShell can browse the file system. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1070.004 | Indicator Removal: File Deletion | zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1112 | Modify Registry | zwShell can modify the Registry. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1021.001 | Remote Services: Remote Desktop Protocol | zwShell has used RDP for lateral movement. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | .002 | Remote Services: SMB/Windows Admin Shares | zwShell has been copied over network shares to move laterally. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1053.005 | Scheduled Task/Job: Scheduled Task | zwShell has used SchTasks for execution. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1082 | System Information Discovery | zwShell can obtain the victim PC name and OS version. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1016 | System Network Configuration Discovery | zwShell can obtain the victim IP address. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0350 | zwShell | T1033 | System Owner/User Discovery | zwShell can obtain the name of the logged-in user on the victim. | zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon. | https://attack.mitre.org/software/S0350 |
S0412 | ZxShell | T1134.002 | Access Token Manipulation: Create Process with Token | ZxShell has a command called RunAs, which creates a new process as another user or process context. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1071.001 | Application Layer Protocol: Web Protocols | ZxShell has used HTTP for C2 connections. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | .002 | Application Layer Protocol: File Transfer Protocols | ZxShell has used FTP for C2 connections. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | ZxShell can launch a reverse command shell. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1136.001 | Create Account: Local Account | ZxShell has a feature to create local user accounts. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1543.003 | Create or Modify System Process: Windows Service | ZxShell can create a new service using the service parser function ProcessScCommand. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1005 | Data from Local System | ZxShell can transfer files from a compromised host. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1499 | Endpoint Denial of Service | ZxShell has a feature to perform SYN flood attack on a host. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1190 | Exploit Public-Facing Application | ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1083 | File and Directory Discovery | ZxShell has a command to open a file manager and explorer on the system. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1562.001 | Impair Defenses: Disable or Modify Tools | ZxShell can kill AV products' processes. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | .004 | Impair Defenses: Disable or Modify System Firewall | ZxShell can disable the firewall by modifying the registry key HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1070.001 | Indicator Removal: Clear Windows Event Logs | ZxShell has a command to clear system event logs. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | .004 | Indicator Removal: File Deletion | ZxShell can delete files from the system. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1105 | Ingress Tool Transfer | ZxShell has a command to transfer files from a remote host. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1056.001 | Input Capture: Keylogging | ZxShell has a feature to capture a remote computer's keystrokes using a keylogger. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | .004 | Input Capture: Credential API Hooking | ZxShell hooks several API functions to spawn system threads. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1112 | Modify Registry | ZxShell can create Registry entries to enable services to run. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1106 | Native API | ZxShell can leverage native API including RegisterServiceCtrlHandler to register a service.RegisterServiceCtrlHandler | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1046 | Network Service Discovery | ZxShell can launch port scans. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1571 | Non-Standard Port | ZxShell can use ports 1985 and 1986 in HTTP/S communication. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1057 | Process Discovery | ZxShell has a command, ps, to obtain a listing of processes on the system. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1055.001 | Process Injection: Dynamic-link Library Injection | ZxShell is injected into a shared SVCHOST process. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1090 | Proxy | ZxShell can set up an HTTP or SOCKS proxy. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1012 | Query Registry | ZxShell can query the netsvc group value data located in the svchost group Registry key. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1021.001 | Remote Services: Remote Desktop Protocol | ZxShell has remote desktop functionality. | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004. | https://attack.mitre.org/software/S0412 |