| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
metaMain registered a WMI event subscription consumer called "hard_disk_stat" to establish persistence.[1] |
| Enterprise | T1005 | 从本地系统获取数据 |
metaMain can collect files and system information from a compromised host.[1][2] |
|
| Enterprise | T1090 | .001 | 代理: Internal Proxy |
metaMain can create a named pipe to listen for and send data to a named pipe-based C2 server.[2] |
| Enterprise | T1112 | 修改注册表 |
metaMain can write the process ID of a target process into the |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
metaMain can encrypt the data that it sends and receives from the C2 server using an RC4 encryption algorithm.[1][2] |
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading | |
| Enterprise | T1620 | 反射性代码加载 |
metaMain has reflectively loaded a DLL to read, decrypt, and load an orchestrator file.[1] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1560 | .003 | 归档收集数据: Archive via Custom Method |
metaMain has used XOR-based encryption for collected files before exfiltration.[1] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
metaMain has stored the collected system files in a working directory.[1][2] |
| Enterprise | T1083 | 文件和目录发现 |
metaMain can recursively enumerate files in an operator-provided directory.[1][2] |
|
| Enterprise | T1106 | 本机API |
metaMain can execute an operator-provided Windows command by leveraging functions such as |
|
| Enterprise | T1205 | .001 | 流量激活: Port Knocking |
metaMain has authenticated itself to a different implant, Cryshell, through a port knocking and handshake procedure.[1] |
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File | |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
metaMain has deleted collected items after uploading the content to its C2 server.[1][2] |
| .006 | 移除指标: Timestomp |
metaMain can change the |
||
| Enterprise | T1082 | 系统信息发现 |
metaMain can collect the computer name from a compromised host.[2] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
metaMain can collect the username from a compromised host.[2] |
|
| Enterprise | T1497 | .003 | 虚拟化/沙盒规避: Time Based Evasion |
metaMain has delayed execution for five to six minutes during its persistence establishment process.[2] |
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1056 | 输入捕获 | ||
| .001 | Keylogging | |||
| Enterprise | T1057 | 进程发现 |
metaMain can enumerate the processes that run on the platform.[1][2] |
|
| Enterprise | T1055 | 进程注入 |
metaMain can inject the loader file, Speech02.db, into a process.[1] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
metaMain can upload collected files and data to its C2 server.[2] |
|
| Enterprise | T1095 | 非应用层协议 |
metaMain can establish an indirect and raw TCP socket-based connection to the C2 server.[1][2] |
|