| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
TA505 has used malware to gather credentials from Internet Explorer.[1] |
| Enterprise | T1112 | 修改注册表 |
TA505 has used malware to disable Windows Defender through modification of the Registry.[5] |
|
| Enterprise | T1568 | .001 | 动态解析: Fast Flux DNS |
TA505 has used fast flux to mask botnets by distributing payloads across multiple IPs.[8] |
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
TA505 has used PowerShell to download and execute malware and reconnaissance scripts.[1][9][10][11] |
| .003 | 命令与脚本解释器: Windows Command Shell | |||
| .005 | 命令与脚本解释器: Visual Basic | |||
| .007 | 命令与脚本解释器: JavaScript | |||
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools | |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1486 | 数据加密以实现影响 |
TA505 has used a wide variety of ransomware, such as Clop, Locky, Jaff, Bart, Philadelphia, and GlobeImposter, to encrypt victim files and demand a ransom payment.[1] |
|
| Enterprise | T1608 | .001 | 暂存能力: Upload Malware | |
| Enterprise | T1078 | .002 | 有效账户: Domain Accounts |
TA505 has used stolen domain admin accounts to compromise additional hosts.[6] |
| Enterprise | T1552 | .001 | 未加密凭证: Credentials In Files |
TA505 has used malware to gather credentials from FTP clients and Outlook.[1] |
| Enterprise | T1106 | 本机API |
TA505 has deployed payloads that use Windows API calls on a compromised host.[5] |
|
| Enterprise | T1069 | 权限组发现 |
TA505 has used TinyMet to enumerate members of privileged groups.[6] TA505 has also run |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| .010 | 混淆文件或信息: Command Obfuscation | |||
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
TA505 has used lures to get users to click links in emails and attachments. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files. [1][2][3][10][9][12][8][13] |
| .002 | 用户执行: Malicious File |
TA505 has used lures to get users to enable content in malicious attachments and execute malicious files contained in archives. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files. [1][2][3][10][9][12][8][13][6] |
||
| Enterprise | T1218 | .007 | 系统二进制代理执行: Msiexec |
TA505 has used |
| .011 | 系统二进制代理执行: Rundll32 |
TA505 has leveraged |
||
| Enterprise | T1583 | .001 | 获取基础设施: Domains |
TA505 has registered domains to impersonate services such as Dropbox to distribute malware.[5] |
| Enterprise | T1588 | .001 | 获取能力: Malware |
TA505 has used malware such as Azorult and Cobalt Strike in their operations.[4] |
| .002 | 获取能力: Tool |
TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.[4] |
||
| Enterprise | T1087 | .003 | 账号发现: Email Account |
TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server.[8] |
| Enterprise | T1105 | 输入工具传输 |
TA505 has downloaded additional malware to execute on victim systems.[10][11][9] |
|
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection | |
| Enterprise | T1559 | .002 | 进程间通信: Dynamic Data Exchange |
TA505 has leveraged malicious Word documents that abused DDE.[2] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
TA505 has used spearphishing emails with malicious attachments to initially compromise victims.[1][2][3][10][9][12][8][13][6] |
| .002 | 钓鱼: Spearphishing Link |
TA505 has sent spearphishing emails containing malicious links.[1][3][8][13] |
||
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
TA505 has signed payloads with code signing certificates from Thawte and Sectigo.[10][11][8] |
| .005 | 颠覆信任控制: Mark-of-the-Web Bypass |
TA505 has used .iso files to deploy malicious .lnk files.[14] |
||