value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
APT3 has been known to pack their tools.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
APT38 has used several code packing methods such as Themida Enigma VMProtect and Obsidium to pack their implants.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
APT39 has packed tools with UPX and has repacked a modified version of Mimikatz to thwart anti-virus detection.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
Astaroth uses a software packer called Pe123\RPolyCryptor.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
Bazar has a variant with a packed payload.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
BLINDINGCAN has been packed with the UPX packer. ;; China Chopper's client component is packed with UPX. ;; CSPY Downloader has been packed with UPX. ;; Dark Caracal has used UPX to pack Bandook. ;; DarkComet has the option to compress its payload using UPX or MPRESS. ;; A version of Daserf uses the MPRESS packer. ;; ...
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
The hostwriter campaign utilised malware that edited plist files so that data could be exfiltrated on startup.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
APT29 CozyBear modify startup files so that upon booting a machine, malicious activity is executed.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
Ryuk ransomeware has the ability to launch it's encryption program upon booting up the infected machine.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
REvil ransomware performs a variety of malicious activity after startup, having modified the infected machine to do so.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
The threat actor FIN13 often modifies plist files with the aim to run malicious code upon startup.
1
accept
T1547.007
Boot or Logon Autostart Execution: Re
REvil can escalate it's privileges by loading a dll file before startup, allowing it to run with SYSTEM level privileges.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
Ransomeware can achieve persistence by abusing port monitors for code execution upon startup.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
QakBot malware can send a .dll file to be executed during system boot.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
Malware such as Emotet can achieve persistence through executing code during startup, often via dll injection via port monitors during startup.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
Russian threat actors deploy a variety of techniques to achieve persistence, sometimes involving the abuse of port monitors to execute arbitrary code during the boot process.
1
accept
T1547.010
Boot or Logon Autostart Execution: Port Monitors
Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association
Cring Ransomware can escalate privileges via changes to the default handlers.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association
Through manipulation of the registry, FIN13 can achieve persistence by changing the file association to allow for malicious code execution.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association
CobaltStrike contains modules that can modify default file associations.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association
Neurevt trojan persists itself via executing arbitrary code, often achieved by modifying default file associations.
1
accept
T1546.001
Event Triggered Execution: Change Default File Association