| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.[1] |
| Enterprise | T1001 | .001 | 数据混淆: Junk Data |
Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests, making it difficult to write signatures on them.[1] |
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control |
Downdelph bypasses UAC to escalate privileges by using a custom "RedirectEXE" shim database.[1] |
| Enterprise | T1105 | 输入工具传输 |
After downloading its main config file, Downdelph downloads multiple payloads from C2 servers.[1] |
|