| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1213 | 从信息存储库获取数据 |
MgBot includes a module capable of stealing content from the Tencent QQ database storing user QQ message history on infected devices.[2] |
|
| Enterprise | T1025 | 从可移动介质获取数据 |
MgBot includes modules capable of gathering information from USB thumb drives and CD-ROMs on the victim machine given a list of provided criteria.[2] |
|
| Enterprise | T1555 | 从密码存储中获取凭证 |
MgBot includes modules for stealing stored credentials from Outlook and Foxmail email client software.[2][4] |
|
| .003 | Credentials from Web Browsers |
MgBot includes modules for stealing credentials from various browsers and applications, including Chrome, Opera, Firefox, Foxmail, QQBrowser, FileZilla, and WinSCP.[2][4] |
||
| Enterprise | T1005 | 从本地系统获取数据 |
MgBot includes modules for collecting files from local systems based on a given set of properties and filenames.[2] |
|
| Enterprise | T1115 | 剪贴板数据 | ||
| Enterprise | T1482 | 域信任发现 |
MgBot includes modules for collecting information on local domain users and permissions.[4] |
|
| Enterprise | T1003 | 操作系统凭证转储 |
MgBot includes modules for dumping and capturing credentials from process memory.[4] |
|
| Enterprise | T1539 | 窃取Web会话Cookie |
MgBot includes modules that can steal cookies from Firefox, Chrome, and Edge web browsers.[2] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
MgBot includes modules for identifying local users and administrators on victim machines.[4] |
|
| Enterprise | T1046 | 网络服务发现 |
MgBot includes modules for performing HTTP and server service scans.[4] |
|
| Enterprise | T1087 | .001 | 账号发现: Local Account |
MgBot includes modules for identifying local administrator accounts on victim systems.[4] |
| .002 | 账号发现: Domain Account |
MgBot includes modules for collecting information on Active Directory domain accounts.[4] |
||
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
MgBot includes keylogger payloads focused on the QQ chat application.[2][4] |
| Enterprise | T1057 | 进程发现 |
MgBot includes a module for establishing a process watchdog for itself, identifying if the MgBot process is still running.[4] |
|
| Enterprise | T1018 | 远程系统发现 |
MgBot includes modules for performing ARP scans of local connected systems.[4] |
|
| Enterprise | T1123 | 音频捕获 |
MgBot can capture input and output audio streams from infected devices.[2][4] |
|
| ID | Name | References |
|---|---|---|
| G1034 | Daggerfly |
Daggerfly is uniquely associated with the use of MgBot since at least 2012.[2] |