id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1573.002 | encrypted channel | asymmetricTechniquecryptography | emotet is known to use rsa keys for encrypting c2 traffic. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | empire can use tls to encrypt its c2 channel. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | fin6 used the plink command-line utility to create ssh tunnels to c2 servers. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | fin8 has used the plink utility to tunnel rdp back to c2 infrastructure. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | gazer uses custom encryption for c2 that uses rsa. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | goldmax has rsa-encrypted its communication with the c2 server. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | grandoreiro can use ssl in c2 communication. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | greyenergy encrypts communications using rsa-2048. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | hi-zor encrypts c2 traffic with tls. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | icedid has used ssl and tls in communications with c2. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | koadic can use ssl and tls for communications. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | machete has used tls-encrypted ftp to exfiltrate data. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | metamorfo's c2 communication has been encrypted using openssl. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | oilrig used the plink utility and other tools to create tunnels to c2 servers. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | operation wocao's proxy implementation agent can upgrade the socket in use to a tls socket. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | pay2key has used rsa encrypted communications with c2. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | penquin can encrypt communications using the blowfish algorithm and a symmetric key exchanged with diffie hellman. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | poetrat used tls to encrypt command and control c2 communications. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | poshspy encrypts c2 traffic with aes and rsa. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | powerstats has encrypted c2 traffic with rsa. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | puppy's default encryption for its c2 communication channel is ssl but it also has transport options for rsa and aes. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | revil has encrypted c2 communications with the ecies algorithm. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | servhelper may set up a reverse ssh tunnel to give the attacker access to services running on the victim such as rdp. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | strongpity has encrypted c2 traffic using ssltls. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | sykipot uses ssl for encrypting c2 communications. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | tor encapsulates traffic in multiple layers of encryption using tls by default. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | trojan.karagany can secure c2 communications with ssl and tls. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | tropic trooper has used ssl to connect to c2 servers. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | some volgmer variants use ssl to encrypt c2 communications. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | wannacry uses tor for command and control traffic and routes a custom cryptographic protocol over the tor circuit. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | wellmail can use hard coded client and certificate authority certificates to communicate with c2 over mutual tls. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | wellmess can communicate to c2 with mutual tls where client and server mutually check certificates. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | xtunnel uses ssltls and rc4 to encrypt traffic. |
t1573.002 | encrypted channel | asymmetricTechniquecryptography | zebrocy uses ssl and aes ecb for encrypting c2 communications. |
t1574 | hijack execution flow | null | a process that does not use the network begins to do so abnormal process call trees |
t1574 | hijack execution flow | null | are suspicious |
t1574 | hijack execution flow | null | adversaries may execute their own malicious payloads by hijacking the way operating systems run programs |
t1574 | hijack execution flow | null | changes in the set of dlls that are loaded by a process compared with past behavior that do not correlate with known software patches etc |
t1574 | hijack execution flow | null | citation autoruns for windows suspicious program execution through services may show up as outlier processes that have not been seen before when compared against historical data |
t1574 | hijack execution flow | null | data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as network connections made for command and control learning details about the environment through discovery and lateral movement |
t1574 | hijack execution flow | null | hashing of binaries and service executables could be used to detect replacement against historical data |
t1574 | hijack execution flow | null | hijacking execution flow can be for the purposes of persistence since this hijacked execution may recur over time |
t1574 | hijack execution flow | null | if a service binary path or failure parameters are changed to values that are not typical for that service and does not correlate with software updates then it may be due to malicious activity |
t1574 | hijack execution flow | null | if an executable is written renamed andor moved to match an existing service executable it could be detected and correlated with other suspicious behavior |
t1574 | hijack execution flow | null | local redirection files that do not correlate with software updates are suspicious |
t1574 | hijack execution flow | null | look for changes to binaries and service executables that may normally occur during software updates |
t1574 | hijack execution flow | null | manifest and |
t1574 | hijack execution flow | null | modification to existing services should not occur frequently |
t1574 | hijack execution flow | null | modifications to or creation of |
t1574 | hijack execution flow | null | monitor dlls loaded into a process and detect dlls that have the same file name but abnormal paths |
t1574 | hijack execution flow | null | monitor file systems for moving renaming replacing or modifying dlls |
t1574 | hijack execution flow | null | monitor for changes to environment variables as well as the commands to implement these changes |
t1574 | hijack execution flow | null | monitor processes for unusual activity e |
t1574 | hijack execution flow | null | service changes are reflected in the registry |
t1574 | hijack execution flow | null | tools such as sysinternals autoruns may also be used to detect system changes that could be attempts at persistence including listing current service information |
t1574 | hijack execution flow | null | track library metadata such as a hash and compare libraries that are loaded at process execution time against previous executions to detect differences that do not correlate with patching or updates |
t1574 | hijack execution flow | null | windows registry windows registry key modification process process creation module module load command command execution service service metadata file file creation file file modification |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | apt41 has used search order hijacking to execute malicious payloads such as winnti rat. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | astaroth can launch itself via dll search order hijacking. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | boostwrite has exploited the loading of the legitimate dwrite.dll file by actually loading the gdi library which then loads the gdiplus library and ultimately loads the local dwrite dll. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | crutch can persist via dll search order hijacking on google chrome mozilla firefox or microsoft onedrive. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | downdelph uses search order hijacking of the windows executable sysprep.exe to escalate privileges. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | empire contains modules that can discover and exploit various dll hijacking opportunities. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | evil nun has used the malware variant terra tv to load a malicious dll placed in the teamviewer directory instead of the original windows dll located in a system folder. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | a finfisher variant uses dll search order hijacking. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | hikit has used dll search order hijacking to load oci.dll as a persistence mechanism. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | httpbrowser abuses the windows dll load order by using a legitimate symantec antivirus binary vpdn_lu.exe to load a malicious dll that mimics a legitimate symantec dll navlu.dll. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | invisimole can be launched by using dll search order hijacking in which the wrapper dll is placed in the same folder as explorer.exe and loaded during startup into the windows explorer process instead of the legitimate library. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | melcoz can use dll hijacking to bypass security controls. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | menupass has used dll search order hijacking. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | miragefox is likely loaded via dll hijacking into a legitimate mcafee binary. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | powersploit contains a collection of privesc-powerup modules that can discover and exploit dll hijacking opportunities in services and processes. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | prikormka uses dll search order hijacking for persistence by saving itself as ntshrui.dll to the windows directory so it will load before the legitimate ntshrui.dll saved in the system32 subdirectory. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | ramsay can hijack outdated windows application dependencies with malicious versions of its own dll payload. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | redleaves is launched through use of dll search order hijacking to load a malicious dll. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | rtm has used search order hijacking to force teamviewer to load a malicious dll. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | threat group-3390 has performed dll search order hijacking to execute their payload. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | variants of webc2 achieve persistence by using dll search order hijacking usually by copying the dll file to systemroot c:windows ntshrui.dll. |
t1574.001 | hijack execution flow | dllTechniquesearchTechniqueorderTechniquehijacking | whitefly has used search order hijacking to run the loader acrobat. |
t1574.002 | hijack execution flow | dllTechniqueside | apt19 launched an http malware variant and a port 22 malware variant using a legitimate executable that loaded the malicious dll. |
t1574.002 | hijack execution flow | dllTechniqueside | apt3 has been known to side load dlls with a valid version of chrome with one of their tools. |
t1574.002 | hijack execution flow | dllTechniqueside | apt32 ran legitimately-signed executables from symantec and mcafee which load a malicious dll. the group also side-loads its backdoor by dropping a library and a legitimate signed executable acro transcoder. |
t1574.002 | hijack execution flow | dllTechniqueside | apt41 used legitimate executables to perform dll side-loading of their malware. |
t1574.002 | hijack execution flow | dllTechniqueside | badnews typically loads its dll file into a legitimate signed java or vmware executable. |
t1574.002 | hijack execution flow | dllTechniqueside | dll side-loading has been used to execute bbsrat through a legitimate citrix executable ssonsvr.exe. the citrix executable was dropped along with bbsrat by the dropper. |
t1574.002 | hijack execution flow | dllTechniqueside | blacktech has used dll side loading by giving dlls hardcoded names and placing them in searched directories. |
t1574.002 | hijack execution flow | dllTechniqueside | bronze butler has used legitimate applications to side-load malicious dlls. |
t1574.002 | hijack execution flow | dllTechniqueside | chimera has used side loading to place malicious dlls in memory. |
t1574.002 | hijack execution flow | dllTechniqueside | denis exploits a security vulnerability to load a fake dll and execute its code. |
t1574.002 | hijack execution flow | dllTechniqueside | egregor has used dll side-loading to execute its payload. |
t1574.002 | hijack execution flow | dllTechniqueside | finfisher uses dll side-loading to load malicious programs. |
t1574.002 | hijack execution flow | dllTechniqueside | gallium used dll side-loading to covertly load poison ivy into memory on the victim machine. |
t1574.002 | hijack execution flow | dllTechniqueside | a gh0st rat variant has used dll side-loading. |
t1574.002 | hijack execution flow | dllTechniqueside | goopy has the ability to side-load malicious dlls with legitimate applications from kaspersky microsoft and google. |
t1574.002 | hijack execution flow | dllTechniqueside | higaisas javascript file used a legitimate microsoft office 2007 package to side-load the oinfo12.ocx dynamic link library. |
t1574.002 | hijack execution flow | dllTechniqueside | httpbrowser has used dll side-loading. |
t1574.002 | hijack execution flow | dllTechniqueside | hyperbro has used a legitimate application to sideload a dll to decrypt decompress and run a payload. |
t1574.002 | hijack execution flow | dllTechniqueside | javali can use dll side-loading to load malicious dlls into legitimate executables. |
t1574.002 | hijack execution flow | dllTechniqueside | lookback side loads its communications module as a dll into the libcurl.dll loader. |
t1574.002 | hijack execution flow | dllTechniqueside | menupass has used dll side-loading to launch versions of mimikatz and pwdump6 as well as uppercut. |