| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
SVCReady can use |
|
| Enterprise | T1546 | .015 | 事件触发执行: Component Object Model Hijacking |
SVCReady has created the |
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
SVCReady has named a task |
| Enterprise | T1059 | .005 | 命令与脚本解释器: Visual Basic | |
| Enterprise | T1120 | 外围设备发现 |
SVCReady can check for the number of devices plugged into an infected host.[1] |
|
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1106 | 本机API |
SVCReady can use Windows API calls to gather information from an infected host.[1] |
|
| Enterprise | T1012 | 查询注册表 |
SVCReady can search for the |
|
| Enterprise | T1027 | 混淆文件或信息 | ||
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
SVCReady has relied on users clicking a malicious attachment delivered through spearphishing.[1] |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 | |
| Enterprise | T1082 | 系统信息发现 |
SVCReady has the ability to collect information such as computer name, computer manufacturer, BIOS, operating system, and firmware, including through the use of |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1124 | 系统时间发现 | ||
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
SVCReady has the ability to determine if its runtime environment is virtualized.[1] |
| .003 | 虚拟化/沙盒规避: Time Based Evasion |
SVCReady can enter a sleep stage for 30 minutes to evade detection.[1] |
||
| Enterprise | T1518 | 软件发现 |
SVCReady can collect a list of installed software from an infected host.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
SVCReady has the ability to download additional tools such as the RedLine Stealer to an infected host.[1] |
|
| Enterprise | T1057 | 进程发现 |
SVCReady can collect a list of running processes from an infected host.[1] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
SVCReady can send collected data in JSON format to its C2 server.[1] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
SVCReady has been distributed via spearphishing campaigns containing malicious Mircrosoft Word documents.[1] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
SVCReady can create a scheduled task named |