| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
ToddyCat has used WMI to execute scripts for post exploit document collection.[2] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
ToddyCat has run scripts to collect documents from targeted hosts.[2] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
ToddyCat has used the name |
| Enterprise | T1190 | 利用公开应用程序漏洞 |
ToddyCat has exploited the ProxyLogon vulnerability (CVE-2021-26855) to compromise Exchange Servers at multiple organizations.[1] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
ToddyCat has used Powershell scripts to perform post exploit collection.[2] |
| .003 | 命令与脚本解释器: Windows Command Shell |
ToddyCat has used .bat scripts and |
||
| Enterprise | T1562 | .004 | 妨碍防御: Disable or Modify System Firewall |
Prior to executing a backdoor ToddyCat has run |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
ToddyCat has leveraged xcopy, 7zip, and RAR to stage and compress collected documents prior to exfiltration.[2] |
| Enterprise | T1074 | .002 | 数据分段: Remote Data Staging |
ToddyCat manually transferred collected files to an exfiltration host using xcopy.[2] |
| Enterprise | T1083 | 文件和目录发现 |
ToddyCat has run scripts to enumerate recently modified documents having either a .pdf, .doc, .docx, .xls or .xlsx extension.[2] |
|
| Enterprise | T1078 | .002 | 有效账户: Domain Accounts |
ToddyCat has used compromised domain admin credentials to mount local network shares.[2] |
| Enterprise | T1106 | 本机API |
ToddyCat has used |
|
| Enterprise | T1069 | .002 | 权限组发现: Domain Groups |
ToddyCat has executed |
| Enterprise | T1082 | 系统信息发现 |
ToddyCat has collected information on bootable drives including model, vendor, and serial numbers.[2] |
|
| Enterprise | T1049 | 系统网络连接发现 |
ToddyCat has used |
|
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
ToddyCat has run |
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
ToddyCat can determine is Kaspersky software is running on an endpoint by running |
| Enterprise | T1057 | 进程发现 |
ToddyCat has run |
|
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
ToddyCat has used locally mounted network shares for lateral movement through targated environments.[2] |
| Enterprise | T1018 | 远程系统发现 |
ToddyCat has used |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
ToddyCat has used a DropBox uploader to exfiltrate stolen files.[2] |
| Enterprise | T1566 | .003 | 钓鱼: Spearphishing via Service |
ToddyCat has sent loaders configured to run Ninja as zip archives via Telegram.[1] |
| Enterprise | T1564 | .003 | 隐藏伪装: Hidden Window |
ToddyCat has hidden malicious scripts using |
| Enterprise | T1095 | 非应用层协议 |
ToddyCat has used a passive backdoor that receives commands with UDP packets.[2] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
ToddyCat has used scheduled tasks to execute discovery commands and scripts for collection.[2] |