| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
CARROTBAT has the ability to execute command line arguments on a compromised host.[2] |
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
CARROTBAT has the ability to execute obfuscated commands on the infected host.[1] |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
CARROTBAT has the ability to download a base64 encoded payload.[1] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
CARROTBAT has the ability to delete downloaded files from a compromised host.[1] |
| Enterprise | T1082 | 系统信息发现 |
CARROTBAT has the ability to determine the operating system of the compromised host and whether Windows is being run with x86 or x64 architecture.[1][2] |
|
| Enterprise | T1105 | 输入工具传输 |
CARROTBAT has the ability to download and execute a remote file via certutil.[1] |
|