| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
MirageFox has a function for decrypting data containing C2 configuration information.[1] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
MirageFox has the capability to execute commands using cmd.exe.[1] |
| Enterprise | T1082 | 系统信息发现 |
MirageFox can collect CPU and architecture information from the victim’s machine.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
MirageFox can gather the username from the victim’s machine.[1] |
|