value stringlengths 25 18k ⌀ | subtecnique int64 0 1 | answer stringclasses 2
values | id stringlengths 5 9 | name stringlengths 3 102 |
|---|---|---|---|---|
APT3 has been known to pack their tools. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
APT38 has used several code packing methods such as Themida Enigma VMProtect and Obsidium to pack their implants. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
APT39 has packed tools with UPX and has repacked a modified version of Mimikatz to thwart anti-virus detection. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
Astaroth uses a software packer called Pe123\RPolyCryptor. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
Bazar has a variant with a packed payload. | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
BLINDINGCAN has been packed with the UPX packer. ;; China Chopper's client component is packed with UPX. ;; CSPY Downloader has been packed with UPX. ;; Dark Caracal has used UPX to pack Bandook. ;; DarkComet has the option to compress its payload using UPX or MPRESS. ;; A version of Daserf uses the MPRESS packer. ;; ... | 1 | accept | T1027.002 | Obfuscated Files or Information: Software Packing |
The hostwriter campaign utilised malware that edited plist files so that data could be exfiltrated on startup. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
APT29 CozyBear modify startup files so that upon booting a machine, malicious activity is executed. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
Ryuk ransomeware has the ability to launch it's encryption program upon booting up the infected machine. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
REvil ransomware performs a variety of malicious activity after startup, having modified the infected machine to do so. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
The threat actor FIN13 often modifies plist files with the aim to run malicious code upon startup. | 1 | accept | T1547.007 | Boot or Logon Autostart Execution: Re |
REvil can escalate it's privileges by loading a dll file before startup, allowing it to run with SYSTEM level privileges. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
Ransomeware can achieve persistence by abusing port monitors for code execution upon startup. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
QakBot malware can send a .dll file to be executed during system boot. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
Malware such as Emotet can achieve persistence through executing code during startup, often via dll injection via port monitors during startup. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
Russian threat actors deploy a variety of techniques to achieve persistence, sometimes involving the abuse of port monitors to execute arbitrary code during the boot process. | 1 | accept | T1547.010 | Boot or Logon Autostart Execution: Port Monitors |
Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
Cring Ransomware can escalate privileges via changes to the default handlers. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
Through manipulation of the registry, FIN13 can achieve persistence by changing the file association to allow for malicious code execution. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
CobaltStrike contains modules that can modify default file associations. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
Neurevt trojan persists itself via executing arbitrary code, often achieved by modifying default file associations. | 1 | accept | T1546.001 | Event Triggered Execution: Change Default File Association |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.