| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | 从密码存储中获取凭证 | ||
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
Evilnum has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder.[1] |
| Enterprise | T1059 | .007 | 命令与脚本解释器: JavaScript |
Evilnum has used malicious JavaScript files on the victim's machine.[1] |
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control | |
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file.[1] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| Enterprise | T1539 | 窃取Web会话Cookie |
Evilnum can steal cookies and session information from browsers.[1] |
|
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments. [1] |
| Enterprise | T1105 | 输入工具传输 |
Evilnum can deploy additional components or tools as needed.[1] |
|
| Enterprise | T1219 | 远程访问软件 |
EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromrised machines.[1] |
|
| Enterprise | T1566 | .002 | 钓鱼: Spearphishing Link |
Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive.[1] |