| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup.[2] |
| Enterprise | T1550 | .003 | 使用备用认证材料: Pass the Ticket |
Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication.[3] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
SeaDuke C2 traffic has been encrypted with RC4 and AES.[4][5] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
SeaDuke is capable of persisting via the Registry Run key or a .lnk file stored in the Startup directory.[5] |
| .009 | 启动或登录自动启动执行: Shortcut Modification |
SeaDuke is capable of persisting via a .lnk file stored in the Startup directory.[5] |
||
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket.[3] |
| .003 | 命令与脚本解释器: Windows Command Shell | |||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1560 | .002 | 归档收集数据: Archive via Library |
SeaDuke compressed data with zlib prior to sending it over C2.[4] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1078 | 有效账户 |
Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.[3] |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| Enterprise | T1114 | .002 | 电子邮件收集: Remote Email Collection |
Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.[3] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
SeaDuke can securely delete files, including deleting itself from the victim.[3] |
| Enterprise | T1105 | 输入工具传输 | ||