| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
FIVEHANDS can use WMI to delete files on a target machine.[1][3] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
FIVEHANDS has the ability to decrypt its payload prior to execution.[1][3][2] |
|
| Enterprise | T1059 | 命令与脚本解释器 |
FIVEHANDS can receive a command line argument to limit file encryption to specified directories.[1][2] |
|
| Enterprise | T1486 | 数据加密以实现影响 |
FIVEHANDS can use an embedded NTRU public key to encrypt data for ransom.[1][3][2] |
|
| Enterprise | T1083 | 文件和目录发现 |
FIVEHANDS has the ability to enumerate files on a compromised host in order to encrypt files with specific extensions.[3][2] |
|
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File | |
| Enterprise | T1490 | 系统恢复抑制 |
FIVEHANDS has the ability to delete volume shadow copies on compromised hosts.[1][3] |
|
| Enterprise | T1135 | 网络共享发现 |
FIVEHANDS can enumerate network shares and mounted drives on a network.[2] |
|