| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
Dtrack can collect a variety of information from victim machines.[4] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
One of Dtrack can hide in replicas of legitimate programs like OllyDbg, 7-Zip, and FileZilla.[4] |
| Enterprise | T1129 | 共享模块 |
Dtrack contains a function that calls |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Dtrack can add a service called WBService to establish persistence.[4] |
| Enterprise | T1574 | 劫持执行流 |
One of Dtrack can replace the normal flow of a program execution with malicious code.[4] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Dtrack has used a decryption routine that is part of an executable physical patch.[2] |
|
| Enterprise | T1547 | 启动或登录自动启动执行 |
Dtrack’s RAT makes a persistent target file with auto execution on the host start.[2] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| Enterprise | T1560 | 归档收集数据 |
Dtrack packs collected data into a password protected archive.[2] |
|
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Dtrack can save collected data to disk, different file formats, and network shares.[2][4] |
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1078 | 有效账户 |
Dtrack used hard-coded credentials to gain access to a network share.[4] |
|
| Enterprise | T1012 | 查询注册表 |
Dtrack can collect the RegisteredOwner, RegisteredOrganization, and InstallDate registry values.[4] |
|
| Enterprise | T1217 | 浏览器信息发现 | ||
| Enterprise | T1027 | .009 | 混淆文件或信息: Embedded Payloads |
Dtrack has used a dropper that embeds an encrypted payload as extra data.[2] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| Enterprise | T1082 | 系统信息发现 |
Dtrack can collect the victim's computer name, hostname and adapter information to create a unique identifier.[2][4] |
|
| Enterprise | T1049 | 系统网络连接发现 |
Dtrack can collect network and active connection information.[2] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Dtrack can collect the host's IP addresses using the |
|
| Enterprise | T1105 | 输入工具传输 |
Dtrack’s can download and upload a file to the victim’s computer.[2][4] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1055 | .012 | 进程注入: Process Hollowing |
Dtrack has used process hollowing shellcode to target a predefined list of processes from |
| ID | Name | References |
|---|---|---|
| G0032 | Lazarus Group |