| Name | Description |
|---|---|
| Pyark |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1025 | 从可移动介质获取数据 |
Machete can find, encrypt, and upload files from fixed and removable drives.[4][1] |
|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
Machete collects stored credentials from several web browsers.[1] |
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
Machete renamed task names to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python tasks.[1] |
| .005 | 伪装: Match Legitimate Name or Location |
Machete renamed payloads to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python executables.[1][2] |
||
| Enterprise | T1115 | 剪贴板数据 |
Machete hijacks the clipboard data by creating an overlapped window that listens to keyboard events.[1][2] |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| .002 | 加密通道: Asymmetric Cryptography | |||
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder | |
| Enterprise | T1059 | .006 | 命令与脚本解释器: Python |
Machete is written in Python and is used in conjunction with additional Python scripts.[1][2][3] |
| Enterprise | T1008 | 回退信道 |
Machete has sent data over HTTP if FTP failed, and has also used a fallback server.[1] |
|
| Enterprise | T1120 | 外围设备发现 |
Machete detects the insertion of new devices by listening for the WM_DEVICECHANGE window message.[1] |
|
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .002 | 应用层协议: File Transfer Protocols | |||
| Enterprise | T1010 | 应用窗口发现 | ||
| Enterprise | T1560 | 归档收集数据 |
Machete stores zipped files with profile data from installed web browsers.[1] |
|
| .003 | Archive via Custom Method |
Machete's collected data is encrypted with AES before exfiltration.[1] |
||
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Machete stores files and logs in a folder on the local drive.[1][4] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1083 | 文件和目录发现 |
Machete produces file listings in order to search for files to be exfiltrated.[1][4][3] |
|
| Enterprise | T1552 | .004 | 未加密凭证: Private Keys |
Machete has scanned and looked for cryptographic keys and certificate file extensions.[1] |
| Enterprise | T1217 | 浏览器信息发现 |
Machete retrieves the user profile data (e.g., browsers) from Chrome and Firefox browsers.[1] |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| .010 | 混淆文件或信息: Command Obfuscation |
Machete has used pyobfuscate, zlib compression, and base64 encoding for obfuscation. Machete has also used some visual obfuscation techniques by naming variables as combinations of letters to hinder analysis.[4][1] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Once a file is uploaded, Machete will delete it from the machine.[1] |
| Enterprise | T1082 | 系统信息发现 | ||
| Enterprise | T1049 | 系统网络连接发现 |
Machete uses the |
|
| Enterprise | T1016 | 系统网络配置发现 |
Machete collects the MAC address of the target computer and other network configuration information.[1][3] |
|
| Enterprise | T1020 | 自动化渗出 |
Machete’s collected files are exfiltrated automatically to remote servers.[1] |
|
| Enterprise | T1125 | 视频捕获 |
Machete takes photos from the computer’s web camera.[2][4][3] |
|
| Enterprise | T1105 | 输入工具传输 |
Machete can download additional files for execution on the victim’s machine.[1] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
Machete logs keystrokes from the victim’s machine.[1][2][4][3] |
| Enterprise | T1057 | 进程发现 |
Machete has a component to check for running processes to look for web browsers.[1] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Machete's collected data is exfiltrated over the same channel used for C2.[1] |
|
| Enterprise | T1052 | .001 | 通过物理介质渗出: Exfiltration over USB |
Machete has a feature to copy files from every drive onto a removable drive in a hidden folder.[1][2] |
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories |
Machete has the capability to exfiltrate stolen data to a hidden folder on a removable drive.[1] |
| Enterprise | T1123 | 音频捕获 |
Machete captures audio from the computer’s microphone.[2][4][3] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
The different components of Machete are executed by Windows Task Scheduler.[1][2] |
| Enterprise | T1029 | 预定传输 |
Machete sends stolen data to the C2 server every 10 minutes.[1] |
|