| Name | Description |
|---|---|
| Samas |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
SamSam uses custom batch scripts to execute some of its components.[3] |
| Enterprise | T1486 | 数据加密以实现影响 |
SamSam encrypts victim files using RSA-2048 encryption and demands a ransom be paid in Bitcoin to decrypt those files.[3] |
|
| Enterprise | T1027 | .001 | 混淆文件或信息: Binary Padding |
SamSam has used garbage code to pad some of its malware components.[3] |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
SamSam has been seen using AES or DES to encrypt payloads and payload components.[3][2] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
SamSam has been seen deleting its own files and payloads to make analysis of the attack more difficult.[3] |