Mivast is a backdoor that has been used by Deep Panda. It was reportedly used in the Anthem breach. [1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Mivast creates the following Registry entry: |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Mivast has the capability to open a remote shell and run basic commands.[2] |
| Enterprise | T1003 | .002 | 操作系统凭证转储: Security Account Manager |
Mivast has the capability to gather NTLM password information.[2] |
| Enterprise | T1105 | 输入工具传输 |
Mivast has the capability to download and execute .exe files.[2] |
|
| ID | Name | References |
|---|---|---|
| G0009 | Deep Panda |