| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1557 | .002 | 中间人攻击: ARP Cache Poisoning |
Cleaver has used custom tools to facilitate ARP cache poisoning.[1] |
| Enterprise | T1585 | .001 | 建立账户: Social Media Accounts |
Cleaver has created fake LinkedIn profiles that included profile photos, details, and connections.[2] |
| Enterprise | T1587 | .001 | 开发能力: Malware |
Cleaver has created customized tools and payloads for functions including ARP poisoning, encryption, credential dumping, ASP.NET shells, web backdoors, process enumeration, WMI querying, HTTP and SMB communications, network interface sniffing, and keystroke logging.[1] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor.[1] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
Cleaver has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz.[1] |