| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1140 | 反混淆/解码文件或信息 |
BADFLICK can decode shellcode using a custom rotating XOR cipher.[2] |
|
| Enterprise | T1560 | .002 | 归档收集数据: Archive via Library |
BADFLICK has compressed data using the aPLib compression library.[2] |
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
BADFLICK has relied upon users clicking on a malicious attachment delivered through spearphishing.[2] |
| Enterprise | T1082 | 系统信息发现 |
BADFLICK has captured victim computer name, memory space, and CPU details.[2] |
|
| Enterprise | T1016 | 系统网络配置发现 | ||
| Enterprise | T1497 | .003 | 虚拟化/沙盒规避: Time Based Evasion |
BADFLICK has delayed communication to the actor-controlled IP address by 5 minutes.[2] |
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
BADFLICK has been distributed via spearphishing campaigns containing malicious Microsoft Word documents.[2] |