| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| Enterprise | T1482 | 域信任发现 |
DUSTTRAP can identify Active Directory information and related items.[1] |
|
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1010 | 应用窗口发现 | ||
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1654 | 日志枚举 | ||
| Enterprise | T1012 | 查询注册表 | ||
| Enterprise | T1027 | .009 | 混淆文件或信息: Embedded Payloads |
DUSTTRAP contains additional embedded DLLs and configuration files that are loaded into memory during execution.[1] |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
DUSTTRAP begins with an initial launcher that decrypts an AES-128-CFB encrypted file on disk and executes it in memory.[1] |
||
| Enterprise | T1070 | 移除指标 |
DUSTTRAP restores the |
|
| .001 | Clear Windows Event Logs | |||
| .005 | Network Share Connection Removal |
DUSTTRAP can remove network shares from infected systems.[1] |
||
| Enterprise | T1082 | 系统信息发现 |
DUSTTRAP reads the value of the infected system's |
|
| Enterprise | T1124 | 系统时间发现 |
DUSTTRAP reads the infected system's current time and writes it to a log file during execution.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
DUSTTRAP can enumerate infected system network information.[1] |
|
| Enterprise | T1615 | 组策略发现 |
DUSTTRAP can identify victim environment Group Policy information.[1] |
|
| Enterprise | T1135 | 网络共享发现 |
DUSTTRAP can identify and enumerate victim system network shares.[1] |
|
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
DUSTTRAP decryption relies on the infected machine's |
| Enterprise | T1087 | .001 | 账号发现: Local Account | |
| .002 | 账号发现: Domain Account | |||
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery | |
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1055 | 进程注入 |
DUSTTRAP compromises the |
|
| Enterprise | T1018 | 远程系统发现 |
DUSTTRAP can use |
|
| Enterprise | T1041 | 通过C2信道渗出 | ||
| ID | Name | Description |
|---|---|---|
| C0040 | APT41 DUST |
DUSTTRAP was used during APT41 DUST.[1] |