value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
APT3 has been known to pack their tools.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
APT38 has used several code packing methods such as Themida Enigma VMProtect and Obsidium to pack their implants.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
APT39 has packed tools with UPX and has repacked a modified version of Mimikatz to thwart anti-virus detection.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
Astaroth uses a software packer called Pe123\RPolyCryptor.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
Bazar has a variant with a packed payload.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
BLINDINGCAN has been packed with the UPX packer. ;; China Chopper's client component is packed with UPX. ;; CSPY Downloader has been packed with UPX. ;; Dark Caracal has used UPX to pack Bandook. ;; DarkComet has the option to compress its payload using UPX or MPRESS. ;; A version of Daserf uses the MPRESS packer. ;; Dyre has been delivered with encrypted resources and must be unpacked for execution. ;; Egregor's payloads are custom-packed archived and encrypted to prevent analysis. ;; Elderwood has packed malware payloads before delivery to victims. ;; Emotet has used custom packers to protect its payloads. ;; FatDuke has been regularly repacked by its operators to create large binaries and evade detection. ;; A FinFisher variant uses a custom packer. ;; GALLIUM packed some payloads using different types of packers both known and custom. ;; GoldMax has been packed for obfuscation. ;; GreyEnergy is packed for obfuscation. ;; H1N1 uses a custom packing algorithm. ;; Hildegard has packed ELF files into other binaries. ;; HotCroissant has used the open source UPX executable packer. ;; IcedID has packed and encrypted its loader module. ;; jRAT payloads have been packed. ;; Lazarus Group has used Themida to pack at least two separate backdoor implants. ;; Lokibot has used several packing methods for obfuscation. ;; Lucifer has used UPX packed binaries. ;; Machete has been packed with NSIS. ;; Melcoz has been packed with VMProtect and Themida. ;; Metamorfo has used VMProtect to pack and protect files. ;; NETWIRE has used .NET packer tools to evade detection. ;; Night Dragon is known to use software packing in its tools. ;; OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2. ;; OSX_OCEANLOTUS.D has a variant that is packed with UPX. ;; A Patchwork payload was packed with UPX. ;; Raindrop used a custom packer for its Cobalt Strike payload which was compressed using the LZMA algorithm. ;; Rocke's miner has created UPX-packed files in the Windows Start Menu Folder. ;; SDBbot has used a packed installer file. ;; SeaDuke has been packed with the UPX packer. ;; ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack. ;; Spark has been packed with Enigma Protector to obfuscate its contents. ;; TA505 has used UPX to obscure malicious code. ;; The White Company has obfuscated their payloads through packing. ;; TrickBot leverages a custom packer to obfuscate its functionality. ;; Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer. ;; Uroburos uses a custom packer. ;; Valak has used packed DLL payloads. ;; VERMIN is initially packed. ;; yty packs a plugin with UPX. ;; Zebrocy's Delphi variant was packed with UPX. ;; Some ZeroT DLL files have been packed with UPX. ;; ZIRCONIUM has used multi-stage packers for exploit code.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
The hostwriter campaign utilised malware that edited plist files so that data could be exfiltrated on startup.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
APT29 CozyBear modify startup files so that upon booting a machine, malicious activity is executed.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
Ryuk ransomeware has the ability to launch it's encryption program upon booting up the infected machine.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
REvil ransomware performs a variety of malicious activity after startup, having modified the infected machine to do so.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
The threat actor FIN13 often modifies plist files with the aim to run malicious code upon startup.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
REvil can escalate it's privileges by loading a dll file before startup, allowing it to run with SYSTEM level privileges.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
Ransomeware can achieve persistence by abusing port monitors for code execution upon startup.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
QakBot malware can send a .dll file to be executed during system boot.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
Malware such as Emotet can achieve persistence through executing code during startup, often via dll injection via port monitors during startup.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
Russian threat actors deploy a variety of techniques to achieve persistence, sometimes involving the abuse of port monitors to execute arbitrary code during the boot process.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association
Cring Ransomware can escalate privileges via changes to the default handlers.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association
Through manipulation of the registry, FIN13 can achieve persistence by changing the file association to allow for malicious code execution.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association
CobaltStrike contains modules that can modify default file associations.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association
Neurevt trojan persists itself via executing arbitrary code, often achieved by modifying default file associations.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association