value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
Comnie establishes persistence via a .lnk file in the victim’s startup path.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. ;; Dragonfly 2.0 manipulated .lnk files to gather user credentials in conjunction with Forced Authentication. ;; Empire can persist by modifying a .LNK file to include a backdoor. ;; FELIXROOT creates a .LNK file for persistence. ;; Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe. ;; Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence. ;; Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions. ;; Helminth establishes persistence by creating a shortcut. ;; InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence. ;; Kazuar adds a .lnk file to the Windows startup folder. ;; A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence. ;; A Lazarus Group malware sample adds persistence on the system by creating a shortcut in the user’s Startup folder. ;; Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor. ;; Micropsia creates a shortcut to maintain persistence. ;; Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder. ;; Reaver creates a shortcut file and saves it in a Startup folder to establish persistence. ;; RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. ;; RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in. ;; S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk which points to the malicious msdtc.exe file already created in the %CommonFiles% directory. ;; SeaDuke is capable of persisting via a .lnk file stored in the Startup directory. ;; SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder. ;; SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder. ;; To establish persistence SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start ” “Yahoo Talk ” “MSN Gaming Z0ne ” or “MSN Talk” shortcut. ;; TinyZBot can create a shortcut in the Windows startup folder for persistence.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
Agent Tesla has the ability to extract credentials from configuration or support files.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Azorult can steal credentials in files belonging to common software such as Skype Telegram and Steam.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs including The Bat! email client Outlook and Windows Credential Store.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Empire can use various modules to search for files containing passwords.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Fox Kitten has accessed files to gain valid credentials. ;; Hildegard has searched for SSH keys Docker credentials and Kubernetes service tokens. ;; jRAT can capture passwords from common chat applications such as MSN Messenger AOL Instant Messenger and and Google Talk. ;; LaZagne can obtain credentials from chats databases mail and WiFi. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; MuddyWater has run a tool that steals passwords saved in victim email. ;; OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. ;; If an initial connectivity check fails pngdowner attempts to extract proxy details and credentials from Windows Protected Storage and from the IE Credentials Store. This allows the adversary to use the proxy credentials for subsequent requests if they enable outbound HTTP access. ;; PoshC2 contains modules for searching for passwords in local and remote files. ;; Pupy can use Lazagne for harvesting credentials. ;; Pysa has extracted credentials from the password database before encrypting the files. ;; QuasarRAT can obtain passwords from FTP clients. ;; Smoke Loader searches for files named logins.json to parse for credentials. ;; Stolen Pencil has used tools that are capable of obtaining credentials from saved mail. ;; TA505 has used malware to gather credentials from FTP clients and Outlook. ;; TrickBot can obtain passwords stored in files from several applications such as Outlook Filezilla OpenSSH OpenVPN and WinSCP. Additionally it searches for the .vnc.lnk" affix to steal VNC credentials. ;; XTunnel is capable of accessing locally stored passwords on victims."
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Limit communications with the container service to local Unix sockets or remote access via SSH.
1
accept
T1552.007
Unsecured Credentials: Container Api
Require secure port access to communicate with the APIs over TLS by disabling unauthenticated access to the Docker API and Kubernetes API Server.
1
accept
T1552.007
Unsecured Credentials: Container Api
Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls.
1
accept
T1552.007
Unsecured Credentials: Container Api
Use the principle of least privilege for privileged accounts such as the service account in Kubernetes.
1
accept
T1552.007
Unsecured Credentials: Container Api
An adversary may access the Docker API to collect logs that contain credentials to cloud, container, and various other resources in the environment.
1
accept
T1552.007
Unsecured Credentials: Container Api
Ensure containers are not running as root by default.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
Limit privileges of user accounts and remediate privilege escalation vectors so only authorized administrators can create container orchestration jobs.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
Threat actors can create clusters of containers to maintain persistence.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
Ransomware such as DarkMatter can utilize containers to schedule the execution of the encryption payload.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
APT23 abuses container creation programs such as Kubernetes to repeatedly execute malicious code.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
TeamTNT relies on users to download and execute malicious Docker images.
1
accept
T1204.003
User Execution: Malicious Image
TigerDownloader can be modified to be executed once a user is tricked into downloading a malicious AWS image.
1
accept
T1204.003
User Execution: Malicious Image
DarkSide ransomware can be executed once a user downloads a malicious GCP image.
1
accept
T1204.003
User Execution: Malicious Image
Persistence can be maintained via backdoor installations through the medium of malicious docker images.
1
accept
T1204.003
User Execution: Malicious Image
REvil ransomware can install itself once a user downloads an image that has been modified to contain malicious functionality.
1
accept
T1204.003
User Execution: Malicious Image
APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks.
1
accept
T1110.003
Brute Force: Password Spraying
APT33 has used password spraying to gain access to target systems.
1
accept
T1110.003
Brute Force: Password Spraying
Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts.
1
accept
T1110.003
Brute Force: Password Spraying
CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password.
1
accept
T1110.003
Brute Force: Password Spraying
Lazarus Group malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames which center around permutations of the username Administrator and weak passwords.
1
accept
T1110.003
Brute Force: Password Spraying
Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.
1
accept
T1110.003
Brute Force: Password Spraying
Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server.
1
accept
T1110.003
Brute Force: Password Spraying
MailSniper can be used for password spraying against Exchange and Office 365. ;; Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets.
1
accept
T1110.003
Brute Force: Password Spraying
Chimera has used credential stuffing against victim's remote services to obtain valid accounts.
1
accept
T1110.004
Brute Force: Credential Stuffing
TrickBot uses brute-force attack against RDP with rdpscanDll module.
1
accept
T1110.004
Brute Force: Credential Stuffing
APT22 uses credential stuffing to enumerate the number of compromised accounts they can access.
1
accept
T1110.004
Brute Force: Credential Stuffing
Skimmers, such as those utilised by Magecart, will often use credential stuffing to access multiple user accounts across multiple ecommerce websites.
1
accept
T1110.004
Brute Force: Credential Stuffing
Credential stuffing is a technique often used by threat actors to gain access to new accounts which they can then abuse the trust of to assist in social engineering attacks.
1
accept
T1110.004
Brute Force: Credential Stuffing
Ransomware such as REvil can credential stuff to gain access to more valid accounts before moving laterally and vertically within the network.
1
accept
T1110.004
Brute Force: Credential Stuffing
Threat actors can credential stuff to gain access to users accounts if they reuse passwords.
1
accept
T1110.004
Brute Force: Credential Stuffing
HyperStack can use default credentials to connect to IPC$ shares on remote machines.
1
accept
T1078.001
Valid Accounts: Default Accounts
Stuxnet infected WinCC machines via a hardcoded database server password.
1
accept
T1078.001
Valid Accounts: Default Accounts
Threat actors targeting government sectors will abuse default guest and administrator accounts on older windows OS to gain initial access.
1
accept
T1078.001
Valid Accounts: Default Accounts
APT40 abuses default administrator accounts for initial access.
1
accept
T1078.001
Valid Accounts: Default Accounts
Certain CobaltStrike beacons can maintain persistence via access to default administrator accounts.
1
accept
T1078.001
Valid Accounts: Default Accounts
APT32 has used legitimate local admin account credentials.
1
accept
T1078.003
Valid Accounts: Local Accounts
Cobalt Strike can use known credentials to run commands and spawn processes as a local user account.
1
accept
T1078.003
Valid Accounts: Local Accounts
Emotet can brute force a local admin password then use it to facilitate lateral movement.
1
accept
T1078.003
Valid Accounts: Local Accounts
FIN10 has moved laterally using the Local Administrator account.
1
accept
T1078.003
Valid Accounts: Local Accounts
HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers.
1
accept
T1078.003
Valid Accounts: Local Accounts
NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems.
1
accept
T1078.003
Valid Accounts: Local Accounts
Operation Wocao has used local account credentials found during the intrusion for lateral movement and privilege escalation.
1
accept
T1078.003
Valid Accounts: Local Accounts
PROMETHIUM has created admin accounts on a compromised host. ;; Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP. ;; Tropic Trooper has used known administrator account credentials to execute the backdoor directly. ;; Turla has abused local accounts that have the same password across the victim’s network. ;; Umbreon creates valid local users to provide access to the system.
1
accept
T1078.003
Valid Accounts: Local Accounts
admin@338 has sent emails with malicious Microsoft Office documents attached.
1
accept
T1566.001
Phishing: Spearphishing Attachment
The primary delivered mechaism for Agent Tesla is through email phishing messages.
1
accept
T1566.001
Phishing: Spearphishing Attachment
Ajax Security Team has used personalized spearphishing attachments.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT1 has sent spearphishing emails containing malicious attachments.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT12 has sent emails with malicious Microsoft Office documents and PDFs attached.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments. ;; APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims. ;; APT30 has used spearphishing emails with malicious DOC attachments. ;; APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet. ;; APT33 has sent spearphishing e-mails with archive attachments. ;; APT37 delivers malware using spearphishing emails with malicious HWP attachments. ;; APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims. ;; APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims. ;; BlackTech has used spearphishing e-mails with malicious documents to deliver malware. ;; BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents. ;; BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims. ;; Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf .doc .xls archives containing LNK files and password protected archives containing .exe and .scr executables. ;; Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments. ;; DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the “attachedTemplate” technique to load a template from a remote server. ;; Dragonfly 2.0 used spearphishing with Microsoft Office attachments to target victims. ;; Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments. ;; Emotet has been delivered by phishing emails containing attachments. ;; FIN4 has used spearphishing emails containing attachments (which are often stolen legitimate documents sent from compromised accounts) with embedded malicious macros. ;; FIN6 has targeted victims with e-mails containing malicious attachments. ;; FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached. ;; FIN8 has distributed targeted emails containing Word documents with embedded malicious macros. ;; Frankenstein has used spearphishing emails to send trojanized Microsoft Word documents. ;; Gallmaker sent emails with malicious Microsoft Office documents attached. ;; Gamaredon Group has delivered spearphishing emails with malicious attachments to targets. ;; Gorgon Group sent emails to victims with malicious Microsoft Office documents attached. ;; Hancitor has been delivered via phishing emails with malicious attachments. ;; Higaisa has sent spearphishing emails containing malicious attachments. ;; IcedID has been delivered via phishing e-mails with malicious attachments. ;; Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise. ;; Javali has been delivered as malicious e-mail attachments. ;; Kerrdown has been distributed through malicious e-mail attachments. ;; Kimsuky has used emails containing Word Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns. ;; Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents. ;; Leviathan has sent spearphishing emails with malicious attachments including .rtf .doc and .xls files. ;; Machete has delivered spearphishing emails that contain a zipped file with malicious contents. ;; menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents. ;; Metamorfo has been delivered to victims via emails containing malicious HTML attachments. ;; Mofang delivered spearphishing emails with malicious documents PDFs or Excel files attached. ;; Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments. ;; MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients. ;; Mustang Panda has used spearphishing attachments to deliver initial access payloads. ;; Naikon has used malicious e-mail attachments to deliver malware. ;; NETWIRE has been spread via e-mail campaigns utilizing malicious attachments. ;; OceanSalt has been delivered via spearphishing emails with Microsoft Office attachments. ;; OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts. ;; Patchwork has used spearphishing with an attachment to deliver files with exploits to initial victims. ;; PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector. ;; PoetRAT was distributed via malicious Word documents. ;; Pony has been delivered via spearphishing attachments. ;; Ramsay has been distributed through spearphishing emails with malicious attachments. ;; Rancor has attached a malicious document to an email to gain initial access. ;; REvil has been distributed via malicious e-mail attachments including MS Word Documents. ;; Rifdoor has been distributed in e-mails with malicious Excel or Word documents. ;; RTM has been delivered via spearphishing attachments disguised as PDF documents. ;; RTM has used spearphishing attachments to distribute its malware. ;; Sandworm Team has delivered malicious Microsoft Office attachments via spearphishing emails. ;; Sharpshooter has sent malicious attachments via emails to targets. ;; Sidewinder has sent e-mails with malicious attachments often crafted for specific targets. ;; Silence has sent emails with malicious DOCX CHM LNK and ZIP attachments. ;; TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments. ;; TA505 has used spearphishing emails with malicious attachments to initially compromise victims. ;; TA551 has sent spearphishing attachments with password protected ZIP files. ;; The White Company has sent phishing emails with malicious Microsoft Word attachments to victims. ;; TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware ;; Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments. ;; Valak has been delivered via spearphishing e-mails with password protected ZIP files. ;; Windshift has sent spearphishing emails with attachment to harvest credentials and deliver malware. ;; Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet Bokbot TrickBot or Bazar.
1
accept
T1566.001
Phishing: Spearphishing Attachment
AppleJeus has waited a specified time before downloading a second stage payload.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
Bazar can use a timer to delay execution of core functionality.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
Egregor can perform a long sleep (greater than or equal to 3 minutes) to evade detection.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
FatDuke can turn itself on or off at random intervals.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
GoldMax has set an execution trigger date and time stored as an ASCII Unix/Epoch time value. ;; Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API and checking whether the time has been accelerated. ;; Pony has delayed execution using a built-in function to avoid detection and analysis. ;; After initial installation Raindrop runs a computation to delay execution. ;; SUNBURST remained dormant after initial access for a period of up to two weeks. ;; ThiefQuest invokes time call to check the system's time executes a sleep command invokes a second time call and then compares the time difference between the two time calls and the amount of time the system slept to identify the sandbox. ;; Ursnif has used a 30 minute delay after execution to evade sandbox monitoring tools.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
Hildegard has queried the Cloud Instance Metadata API for cloud credentials.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
TeamTNT has queried the AWS instance metadata service for credentials.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
APT33 will query Cloud Instance APIs to harvest insecurely stored credentials that can then be used for user enumeration.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
In addition to credential harvesting, other valuable data can be extracted by threat actors via the AWS instance if it is not properly secured.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
APT25 can harvest credentials from Cloud Instance APIs, then use those credentials to gain access to systems.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
Backdoor.Oldrea collects address book information from Outlook.
1
accept
T1087.003
Account Discovery: Email Account
Emotet has been observed leveraging a module that can scrape email addresses from Outlook.
1
accept
T1087.003
Account Discovery: Email Account
Grandoreiro can parse Outlook .pst files to extract e-mail addresses.
1
accept
T1087.003
Account Discovery: Email Account
MailSniper can be used to obtain account names from Exchange and Office 365 using the Get-GlobalAddressList cmdlet.
1
accept
T1087.003
Account Discovery: Email Account
Ruler can be used to enumerate Exchange users and dump the GAL.
1
accept
T1087.003
Account Discovery: Email Account
Sandworm Team used malware to enumerate email settings including usernames and passwords from the M.E.Doc application.
1
accept
T1087.003
Account Discovery: Email Account
TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server.
1
accept
T1087.003
Account Discovery: Email Account
TrickBot collects email addresses from Outlook.;;Threat actors will often attempt to gather more targets by using tools that lists of users from memory, and combine this with a company’s email naming convention to create a target list of email addresses. ;; Some actors use open-source malware and tools to target and steal email account credentials from popular email clients such as, Apple Mail, Gmail, and Outlook. ;; Spearphising is used by the most advanced threat groups in the world, which shows the potential value that skilled threat actors can extract by discovering which email addresses to target. ;; Malware can used by actors to automate email account discovery. ;; Actors can exploit vulnerabilities, such as Log4Shell, to move into different directories to quickly locate email addresses.
1
accept
T1087.003
Account Discovery: Email Account
Threat actors will attempt to gather cloud accounts and their appropriate groups in attempts to find weak or default settings to exploit for malicious purposes.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
Identifying cloud groups and cloud permissions can be accomplished by various commands, such as: ‘az ad user get-member-groups’ to get groups associated to a user account in Azure.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
Some actors and malware will attempt to launch commands, via PowerShell for example (among others), to gather cloud group user settings and permissions for Google with the command: ‘GET https://cloudidentity.googleapis.com/v1/groups’.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
As more organizations utilize cloud services, more actors and malware will attempt to engage in malicious activity by locating cloud groups and their corresponding cloud user settings.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
Targeting an access control list (ACL) could grant actors the ability to discover cloud account users and settings, for Amazon Web Services (AWS) this can be done with the ‘GetBucketAcl’ command.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
Drovorub can use kernel modules to establish persistence.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Threat actors can leverage malicious loadable kernel modules (LKMs) to gain Rootkit level access on an affected machine.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Actors are always looking for ways keep control of an infected machine, one way this can be done is through malicious kernel modules to covertly escalate privileges and maintain persistence.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
LKMs used by actors and malware are often loaded into the ‘/lib/modules/’ with a .ko extension on Linux systems.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Malware trying to get kernel access may run commands before loading a malicious module, and some of these include ‘modprobe’, ‘insmod’, ‘lsmod’, ‘rmmod’, and ‘modinfo’.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Some malware will attempt to load Kexts into the kernel, which create new rows in KextPolicy tables.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Dok persists via a plist login item.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
LoudMiner used plists to execute shell scripts and maintain persistence on boot. LoudMiner also added plist files in /Library/LaunchDaemons with KeepAlive set to true which would restart the process if stopped.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
NETWIRE can persist via startup options for Login items.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
Property list (plist) files can be manipulated by malware to execute their own malicious executables.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
Some malware will create property list files (.plist) to download and execute code as part of maintaining persistence.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
macOs malware may try to use the ‘plist’ command to manipulate keys in property list (plist) files to elevate privileges or establish persistence.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification