| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
Molerats used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Molerats decompresses ZIP files once on the victim machine.[3] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Molerats saved malicious files within the AppData and Startup folders to maintain persistence.[3] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell | |
| .005 | 命令与脚本解释器: Visual Basic |
Molerats used various implants, including those built with VBScript, on target machines.[3][6] |
||
| .007 | 命令与脚本解释器: JavaScript |
Molerats used various implants, including those built with JS, on target machines.[3] |
||
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File |
Molerats has delivered compressed executables within ZIP files to victims.[3] |
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Molerats has sent malicious links via email trick users into opening a RAR archive and running an executable.[3][6] |
| .002 | 用户执行: Malicious File |
Molerats has sent malicious files via email that tricked users into clicking Enable Content to run an embedded macro and to download malicious archives.[3][6][4] |
||
| Enterprise | T1218 | .007 | 系统二进制代理执行: Msiexec | |
| Enterprise | T1105 | 输入工具传输 |
Molerats used executables to download malicious files from different sources.[3][6] |
|
| Enterprise | T1057 | 进程发现 |
Molerats actors obtained a list of active processes on the victim and sent them to C2 servers.[1] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments.[3][6][4] |
| .002 | 钓鱼: Spearphishing Link |
Molerats has sent phishing emails with malicious links included.[3] |
||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Molerats has created scheduled tasks to persistently run VBScripts.[6] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
Molerats has used forged Microsoft code-signing certificates on malware.[5] |