id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1573.002
encrypted channel
asymmetricTechniquecryptography
emotet is known to use rsa keys for encrypting c2 traffic.
t1573.002
encrypted channel
asymmetricTechniquecryptography
empire can use tls to encrypt its c2 channel.
t1573.002
encrypted channel
asymmetricTechniquecryptography
fin6 used the plink command-line utility to create ssh tunnels to c2 servers.
t1573.002
encrypted channel
asymmetricTechniquecryptography
fin8 has used the plink utility to tunnel rdp back to c2 infrastructure.
t1573.002
encrypted channel
asymmetricTechniquecryptography
gazer uses custom encryption for c2 that uses rsa.
t1573.002
encrypted channel
asymmetricTechniquecryptography
goldmax has rsa-encrypted its communication with the c2 server.
t1573.002
encrypted channel
asymmetricTechniquecryptography
grandoreiro can use ssl in c2 communication.
t1573.002
encrypted channel
asymmetricTechniquecryptography
greyenergy encrypts communications using rsa-2048.
t1573.002
encrypted channel
asymmetricTechniquecryptography
hi-zor encrypts c2 traffic with tls.
t1573.002
encrypted channel
asymmetricTechniquecryptography
icedid has used ssl and tls in communications with c2.
t1573.002
encrypted channel
asymmetricTechniquecryptography
koadic can use ssl and tls for communications.
t1573.002
encrypted channel
asymmetricTechniquecryptography
machete has used tls-encrypted ftp to exfiltrate data.
t1573.002
encrypted channel
asymmetricTechniquecryptography
metamorfo's c2 communication has been encrypted using openssl.
t1573.002
encrypted channel
asymmetricTechniquecryptography
oilrig used the plink utility and other tools to create tunnels to c2 servers.
t1573.002
encrypted channel
asymmetricTechniquecryptography
operation wocao's proxy implementation agent can upgrade the socket in use to a tls socket.
t1573.002
encrypted channel
asymmetricTechniquecryptography
pay2key has used rsa encrypted communications with c2.
t1573.002
encrypted channel
asymmetricTechniquecryptography
penquin can encrypt communications using the blowfish algorithm and a symmetric key exchanged with diffie hellman.
t1573.002
encrypted channel
asymmetricTechniquecryptography
poetrat used tls to encrypt command and control c2 communications.
t1573.002
encrypted channel
asymmetricTechniquecryptography
poshspy encrypts c2 traffic with aes and rsa.
t1573.002
encrypted channel
asymmetricTechniquecryptography
powerstats has encrypted c2 traffic with rsa.
t1573.002
encrypted channel
asymmetricTechniquecryptography
puppy's default encryption for its c2 communication channel is ssl but it also has transport options for rsa and aes.
t1573.002
encrypted channel
asymmetricTechniquecryptography
revil has encrypted c2 communications with the ecies algorithm.
t1573.002
encrypted channel
asymmetricTechniquecryptography
servhelper may set up a reverse ssh tunnel to give the attacker access to services running on the victim such as rdp.
t1573.002
encrypted channel
asymmetricTechniquecryptography
strongpity has encrypted c2 traffic using ssltls.
t1573.002
encrypted channel
asymmetricTechniquecryptography
sykipot uses ssl for encrypting c2 communications.
t1573.002
encrypted channel
asymmetricTechniquecryptography
tor encapsulates traffic in multiple layers of encryption using tls by default.
t1573.002
encrypted channel
asymmetricTechniquecryptography
trojan.karagany can secure c2 communications with ssl and tls.
t1573.002
encrypted channel
asymmetricTechniquecryptography
tropic trooper has used ssl to connect to c2 servers.
t1573.002
encrypted channel
asymmetricTechniquecryptography
some volgmer variants use ssl to encrypt c2 communications.
t1573.002
encrypted channel
asymmetricTechniquecryptography
wannacry uses tor for command and control traffic and routes a custom cryptographic protocol over the tor circuit.
t1573.002
encrypted channel
asymmetricTechniquecryptography
wellmail can use hard coded client and certificate authority certificates to communicate with c2 over mutual tls.
t1573.002
encrypted channel
asymmetricTechniquecryptography
wellmess can communicate to c2 with mutual tls where client and server mutually check certificates.
t1573.002
encrypted channel
asymmetricTechniquecryptography
xtunnel uses ssltls and rc4 to encrypt traffic.
t1573.002
encrypted channel
asymmetricTechniquecryptography
zebrocy uses ssl and aes ecb for encrypting c2 communications.
t1574
hijack execution flow
null
a process that does not use the network begins to do so abnormal process call trees
t1574
hijack execution flow
null
are suspicious
t1574
hijack execution flow
null
adversaries may execute their own malicious payloads by hijacking the way operating systems run programs
t1574
hijack execution flow
null
changes in the set of dlls that are loaded by a process compared with past behavior that do not correlate with known software patches etc
t1574
hijack execution flow
null
citation autoruns for windows suspicious program execution through services may show up as outlier processes that have not been seen before when compared against historical data
t1574
hijack execution flow
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as network connections made for command and control learning details about the environment through discovery and lateral movement
t1574
hijack execution flow
null
hashing of binaries and service executables could be used to detect replacement against historical data
t1574
hijack execution flow
null
hijacking execution flow can be for the purposes of persistence since this hijacked execution may recur over time
t1574
hijack execution flow
null
if a service binary path or failure parameters are changed to values that are not typical for that service and does not correlate with software updates then it may be due to malicious activity
t1574
hijack execution flow
null
if an executable is written renamed andor moved to match an existing service executable it could be detected and correlated with other suspicious behavior
t1574
hijack execution flow
null
local redirection files that do not correlate with software updates are suspicious
t1574
hijack execution flow
null
look for changes to binaries and service executables that may normally occur during software updates
t1574
hijack execution flow
null
manifest and
t1574
hijack execution flow
null
modification to existing services should not occur frequently
t1574
hijack execution flow
null
modifications to or creation of
t1574
hijack execution flow
null
monitor dlls loaded into a process and detect dlls that have the same file name but abnormal paths
t1574
hijack execution flow
null
monitor file systems for moving renaming replacing or modifying dlls
t1574
hijack execution flow
null
monitor for changes to environment variables as well as the commands to implement these changes
t1574
hijack execution flow
null
monitor processes for unusual activity e
t1574
hijack execution flow
null
service changes are reflected in the registry
t1574
hijack execution flow
null
tools such as sysinternals autoruns may also be used to detect system changes that could be attempts at persistence including listing current service information
t1574
hijack execution flow
null
track library metadata such as a hash and compare libraries that are loaded at process execution time against previous executions to detect differences that do not correlate with patching or updates
t1574
hijack execution flow
null
windows registry windows registry key modification process process creation module module load command command execution service service metadata file file creation file file modification
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
apt41 has used search order hijacking to execute malicious payloads such as winnti rat.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
astaroth can launch itself via dll search order hijacking.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
boostwrite has exploited the loading of the legitimate dwrite.dll file by actually loading the gdi library which then loads the gdiplus library and ultimately loads the local dwrite dll.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
crutch can persist via dll search order hijacking on google chrome mozilla firefox or microsoft onedrive.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
downdelph uses search order hijacking of the windows executable sysprep.exe to escalate privileges.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
empire contains modules that can discover and exploit various dll hijacking opportunities.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
evil nun has used the malware variant terra tv to load a malicious dll placed in the teamviewer directory instead of the original windows dll located in a system folder.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
a finfisher variant uses dll search order hijacking.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
hikit has used dll search order hijacking to load oci.dll as a persistence mechanism.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
httpbrowser abuses the windows dll load order by using a legitimate symantec antivirus binary vpdn_lu.exe to load a malicious dll that mimics a legitimate symantec dll navlu.dll.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
invisimole can be launched by using dll search order hijacking in which the wrapper dll is placed in the same folder as explorer.exe and loaded during startup into the windows explorer process instead of the legitimate library.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
melcoz can use dll hijacking to bypass security controls.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
menupass has used dll search order hijacking.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
miragefox is likely loaded via dll hijacking into a legitimate mcafee binary.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
powersploit contains a collection of privesc-powerup modules that can discover and exploit dll hijacking opportunities in services and processes.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
prikormka uses dll search order hijacking for persistence by saving itself as ntshrui.dll to the windows directory so it will load before the legitimate ntshrui.dll saved in the system32 subdirectory.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
ramsay can hijack outdated windows application dependencies with malicious versions of its own dll payload.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
redleaves is launched through use of dll search order hijacking to load a malicious dll.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
rtm has used search order hijacking to force teamviewer to load a malicious dll.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
threat group-3390 has performed dll search order hijacking to execute their payload.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
variants of webc2 achieve persistence by using dll search order hijacking usually by copying the dll file to systemroot c:windows ntshrui.dll.
t1574.001
hijack execution flow
dllTechniquesearchTechniqueorderTechniquehijacking
whitefly has used search order hijacking to run the loader acrobat.
t1574.002
hijack execution flow
dllTechniqueside
apt19 launched an http malware variant and a port 22 malware variant using a legitimate executable that loaded the malicious dll.
t1574.002
hijack execution flow
dllTechniqueside
apt3 has been known to side load dlls with a valid version of chrome with one of their tools.
t1574.002
hijack execution flow
dllTechniqueside
apt32 ran legitimately-signed executables from symantec and mcafee which load a malicious dll. the group also side-loads its backdoor by dropping a library and a legitimate signed executable acro transcoder.
t1574.002
hijack execution flow
dllTechniqueside
apt41 used legitimate executables to perform dll side-loading of their malware.
t1574.002
hijack execution flow
dllTechniqueside
badnews typically loads its dll file into a legitimate signed java or vmware executable.
t1574.002
hijack execution flow
dllTechniqueside
dll side-loading has been used to execute bbsrat through a legitimate citrix executable ssonsvr.exe. the citrix executable was dropped along with bbsrat by the dropper.
t1574.002
hijack execution flow
dllTechniqueside
blacktech has used dll side loading by giving dlls hardcoded names and placing them in searched directories.
t1574.002
hijack execution flow
dllTechniqueside
bronze butler has used legitimate applications to side-load malicious dlls.
t1574.002
hijack execution flow
dllTechniqueside
chimera has used side loading to place malicious dlls in memory.
t1574.002
hijack execution flow
dllTechniqueside
denis exploits a security vulnerability to load a fake dll and execute its code.
t1574.002
hijack execution flow
dllTechniqueside
egregor has used dll side-loading to execute its payload.
t1574.002
hijack execution flow
dllTechniqueside
finfisher uses dll side-loading to load malicious programs.
t1574.002
hijack execution flow
dllTechniqueside
gallium used dll side-loading to covertly load poison ivy into memory on the victim machine.
t1574.002
hijack execution flow
dllTechniqueside
a gh0st rat variant has used dll side-loading.
t1574.002
hijack execution flow
dllTechniqueside
goopy has the ability to side-load malicious dlls with legitimate applications from kaspersky microsoft and google.
t1574.002
hijack execution flow
dllTechniqueside
higaisas javascript file used a legitimate microsoft office 2007 package to side-load the oinfo12.ocx dynamic link library.
t1574.002
hijack execution flow
dllTechniqueside
httpbrowser has used dll side-loading.
t1574.002
hijack execution flow
dllTechniqueside
hyperbro has used a legitimate application to sideload a dll to decrypt decompress and run a payload.
t1574.002
hijack execution flow
dllTechniqueside
javali can use dll side-loading to load malicious dlls into legitimate executables.
t1574.002
hijack execution flow
dllTechniqueside
lookback side loads its communications module as a dll into the libcurl.dll loader.
t1574.002
hijack execution flow
dllTechniqueside
menupass has used dll side-loading to launch versions of mimikatz and pwdump6 as well as uppercut.