| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
Kevin can compile randomly-generated MOF files into the WMI repository to persistently run malware.[1] |
| Enterprise | T1005 | 从本地系统获取数据 |
Kevin can upload logs and other data from a compromised host.[1] |
|
| Enterprise | T1036 | .003 | 伪装: Rename System Utilities |
Kevin has renamed an image of |
| Enterprise | T1572 | 协议隧道 |
Kevin can use a custom protocol tunneled through DNS or HTTP.[1] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| Enterprise | T1008 | 回退信道 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .004 | 应用层协议: DNS |
Variants of Kevin can communicate over DNS through queries to the server for constructed domain names with embedded information.[1] |
||
| Enterprise | T1030 | 数据传输大小限制 |
Kevin can exfiltrate data to the C2 server in 27-character chunks.[1] |
|
| Enterprise | T1074 | 数据分段 |
Kevin can create directories to store logs and other collected data.[1] |
|
| Enterprise | T1001 | .001 | 数据混淆: Junk Data |
Kevin can generate a sequence of dummy HTTP C2 requests to obscure traffic.[1] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Kevin can Base32 encode chunks of output files during exfiltration.[1] |
| Enterprise | T1106 | 本机API | ||
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File | |
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| Enterprise | T1082 | 系统信息发现 |
Kevin can enumerate the OS version and hostname of a targeted machine.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Kevin can collect the MAC address and other information from a victim machine using |
|
| Enterprise | T1497 | 虚拟化/沙盒规避 |
Kevin can sleep for a time interval between C2 communication attempts.[1] |
|
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1041 | 通过C2信道渗出 |
Kevin can send data from the victim host through a DNS C2 channel.[1] |
|
| Enterprise | T1564 | .003 | 隐藏伪装: Hidden Window |
Kevin can hide the current window from the targeted user via the |