value
stringlengths 25
18k
⌀ | subtecnique
int64 0
1
| answer
stringclasses 2
values | id
stringlengths 5
9
| name
stringlengths 3
102
|
---|---|---|---|---|
APT3 has been known to pack their tools. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
APT38 has used several code packing methods such as Themida Enigma VMProtect and Obsidium to pack their implants. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
APT39 has packed tools with UPX and has repacked a modified version of Mimikatz to thwart anti-virus detection. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
Astaroth uses a software packer called Pe123\RPolyCryptor. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
Bazar has a variant with a packed payload. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
BLINDINGCAN has been packed with the UPX packer. ;; China Chopper's client component is packed with UPX. ;; CSPY Downloader has been packed with UPX. ;; Dark Caracal has used UPX to pack Bandook. ;; DarkComet has the option to compress its payload using UPX or MPRESS. ;; A version of Daserf uses the MPRESS packer. ;; Dyre has been delivered with encrypted resources and must be unpacked for execution. ;; Egregor's payloads are custom-packed archived and encrypted to prevent analysis. ;; Elderwood has packed malware payloads before delivery to victims. ;; Emotet has used custom packers to protect its payloads. ;; FatDuke has been regularly repacked by its operators to create large binaries and evade detection. ;; A FinFisher variant uses a custom packer. ;; GALLIUM packed some payloads using different types of packers both known and custom. ;; GoldMax has been packed for obfuscation. ;; GreyEnergy is packed for obfuscation. ;; H1N1 uses a custom packing algorithm. ;; Hildegard has packed ELF files into other binaries. ;; HotCroissant has used the open source UPX executable packer. ;; IcedID has packed and encrypted its loader module. ;; jRAT payloads have been packed. ;; Lazarus Group has used Themida to pack at least two separate backdoor implants. ;; Lokibot has used several packing methods for obfuscation. ;; Lucifer has used UPX packed binaries. ;; Machete has been packed with NSIS. ;; Melcoz has been packed with VMProtect and Themida. ;; Metamorfo has used VMProtect to pack and protect files. ;; NETWIRE has used .NET packer tools to evade detection. ;; Night Dragon is known to use software packing in its tools. ;; OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2. ;; OSX_OCEANLOTUS.D has a variant that is packed with UPX. ;; A Patchwork payload was packed with UPX. ;; Raindrop used a custom packer for its Cobalt Strike payload which was compressed using the LZMA algorithm. ;; Rocke's miner has created UPX-packed files in the Windows Start Menu Folder. ;; SDBbot has used a packed installer file. ;; SeaDuke has been packed with the UPX packer. ;; ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack. ;; Spark has been packed with Enigma Protector to obfuscate its contents. ;; TA505 has used UPX to obscure malicious code. ;; The White Company has obfuscated their payloads through packing. ;; TrickBot leverages a custom packer to obfuscate its functionality. ;; Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer. ;; Uroburos uses a custom packer. ;; Valak has used packed DLL payloads. ;; VERMIN is initially packed. ;; yty packs a plugin with UPX. ;; Zebrocy's Delphi variant was packed with UPX. ;; Some ZeroT DLL files have been packed with UPX. ;; ZIRCONIUM has used multi-stage packers for exploit code. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
The hostwriter campaign utilised malware that edited plist files so that data could be exfiltrated on startup. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
APT29 CozyBear modify startup files so that upon booting a machine, malicious activity is executed. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
Ryuk ransomeware has the ability to launch it's encryption program upon booting up the infected machine. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
REvil ransomware performs a variety of malicious activity after startup, having modified the infected machine to do so. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
The threat actor FIN13 often modifies plist files with the aim to run malicious code upon startup. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
REvil can escalate it's privileges by loading a dll file before startup, allowing it to run with SYSTEM level privileges. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
Ransomeware can achieve persistence by abusing port monitors for code execution upon startup. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
QakBot malware can send a .dll file to be executed during system boot. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
Malware such as Emotet can achieve persistence through executing code during startup, often via dll injection via port monitors during startup. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
Russian threat actors deploy a variety of techniques to achieve persistence, sometimes involving the abuse of port monitors to execute arbitrary code during the boot process. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
Cring Ransomware can escalate privileges via changes to the default handlers. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
Through manipulation of the registry, FIN13 can achieve persistence by changing the file association to allow for malicious code execution. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
CobaltStrike contains modules that can modify default file associations. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
Neurevt trojan persists itself via executing arbitrary code, often achieved by modifying default file associations. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |