| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Mosquito's installer uses WMI to search for antivirus display names.[1] |
|
| Enterprise | T1546 | .015 | 事件触发执行: Component Object Model Hijacking | |
| Enterprise | T1112 | 修改注册表 |
Mosquito can modify Registry keys under |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm.[1] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Mosquito establishes persistence under the Registry key |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell | |
| .003 | 命令与脚本解释器: Windows Command Shell |
Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.[1] |
||
| Enterprise | T1106 | 本机API |
Mosquito leverages the CreateProcess() and LoadLibrary() calls to execute files with the .dll and .exe extensions.[1] |
|
| Enterprise | T1027 | .011 | 混淆文件或信息: Fileless Storage |
Mosquito stores configuration values under the Registry key |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
Mosquito’s installer is obfuscated with a custom crypter to obfuscate the installer.[1] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability.[1] |
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1016 | 系统网络配置发现 | ||
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system.[1] |
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1057 | 进程发现 | ||