混淆文件或信息是攻击者为规避检测对恶意内容进行加密、编码或结构伪装的技术,涉及从初始访问到持久化攻击的全生命周期。传统防御主要依赖特征检测、熵值分析和沙箱动态行为监控,通过识别非常规文件结构(如异常节区数量)、高频API调用模式等特征实施拦截。典型缓解措施包括深度文件格式解析、进程行为基线建模和内存完整性检查。
为突破静态检测与动态分析的双重防御,攻击者持续演进混淆技术,发展出环境感知、动态变异、分片重组等新型匿迹手法。这些技术通过深度融入目标系统生态,构建出"表面合规、内藏恶意"的混淆体系,使传统依赖固定规则的检测机制面临严峻挑战。
当前混淆匿迹技术的核心演进方向集中在三个维度:第一,时空维度解耦,将恶意载荷的存储形态、传输形态与执行形态分离,利用分片存储、延迟触发等机制规避即时检测;第二,环境深度适配,通过指纹识别、行为学习等技术实现混淆策略的动态优化,确保恶意代码仅在特定条件下显性化;第三,合法生态寄生,深度利用商业软件功能(如文档模板、云同步服务)构建隐蔽通道,使攻击行为与正常业务操作形成强关联。典型技术如分片式载荷重组将攻击链拆解为多个低特征阶段,合法格式嵌套则通过滥用标准协议实现"检测逃逸"。这些技术的共性在于突破传统单点对抗模式,构建多维立体的混淆矩阵。
混淆匿迹技术的升级迫使防御体系向智能化、持续化方向转型。需构建跨生命周期的动态威胁评估模型,结合文件结构分析、内存行为监控与上下文关联检测,实现混淆层穿透。同时应强化格式规范安全审计,推动实施文档格式严格校验标准,压缩攻击者的隐匿空间。
| 效应类型 | 是否存在 |
|---|---|
| 特征伪装 | ✅ |
| 行为透明 | ✅ |
| 数据遮蔽 | ✅ |
| 时空释痕 | ✅ |
通过模拟合法文件格式特征(如文档结构、熵值分布)实现载荷隐匿。合法格式嵌套技术将恶意代码嵌入标准文档的深层结构,使文件在静态检测时呈现为正常业务文档。多态代码混淆动态调整指令序列,使同类攻击样本具有差异化语法特征,规避基于固定规则的检测。
环境感知动态解密技术仅在特定条件下激活恶意行为,在沙箱分析或非目标环境中保持静默。攻击者通过硬件指纹验证、进程白名单检测等机制,使恶意代码在防御方观测窗口期内不展现攻击特征,形成"观测逃逸"效应。
采用多层加密(如AES+RSA混合加密)和自定义编码方案(如Base85+Hex转换)保护核心数据。加密容器隐藏技术通过密码学强度确保静态存储时数据不可读,分片式载荷重组利用隐写术分散关键信息,双重遮蔽机制有效对抗内容分析。
分片存储与延迟触发机制将攻击链扩展至长周期。攻击者通过云存储版本控制分批次投递载荷分片,在目标环境内逐步完成重组,使得单一时空点的特征浓度低于检测阈值。合法格式嵌套结合文档协作功能,利用正常业务文件流转实现攻击持久化。
| ID | Name | Description |
|---|---|---|
| C0025 | 2016 Ukraine Electric Power Attack |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used heavily obfuscated code with Industroyer in its Windows Notepad backdoor.[1] |
| S1028 | Action RAT |
Action RAT's commands, strings, and domains can be Base64 encoded within the payload.[2] |
| S0045 | ADVSTORESHELL |
Most of the strings in ADVSTORESHELL are encrypted with an XOR-based algorithm; some strings are also encrypted with 3DES and reversed. API function names are also reversed, presumably to avoid detection in memory.[3][4] |
| S0331 | Agent Tesla |
Agent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult.[5] Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings.[6] |
| S1025 | Amadey |
Amadey has obfuscated strings such as antivirus vendor names, domains, files, and others.[7] |
| S0504 | Anchor |
Anchor has obfuscated code with stack strings and string encryption.[8] |
| S0584 | AppleJeus |
AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components.[9] |
| S0622 | AppleSeed |
AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls.[10] |
| G0099 | APT-C-36 |
APT-C-36 has used ConfuserEx to obfuscate its variant of Imminent Monitor, compressed payload and RAT packages, and password protected encrypted email attachments to avoid detection.[11] |
| G0022 | APT3 |
APT3 obfuscates files or information to help evade defensive measures.[12] |
| G0067 | APT37 | |
| G0096 | APT41 | |
| S0640 | Avaddon | |
| S1053 | AvosLocker |
AvosLocker has used XOR-encoded strings.[18] |
| G0135 | BackdoorDiplomacy |
BackdoorDiplomacy has obfuscated tools and malware it uses with VMProtect.[19] |
| G0063 | BlackOasis |
BlackOasis's first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools.[20] |
| S0635 | BoomBox |
BoomBox can encrypt data using AES prior to exfiltration.[21] |
| S0651 | BoxCaon |
BoxCaon used the "StackStrings" obfuscation technique to hide malicious functionalities.[22] |
| S1161 | BPFDoor |
BPFDoor can require a password to activate the backdoor and uses RC4 encryption or static library encryption |
| S1063 | Brute Ratel C4 |
Brute Ratel C4 has used encrypted payload files and maintains an encrypted configuration structure in memory.[24][25] |
| S1039 | Bumblebee |
Bumblebee has been delivered as password-protected zipped ISO files and used control-flow-flattening to obfuscate the flow of functions.[26][27][28] |
| S0482 | Bundlore |
Bundlore has obfuscated data with base64, AES, RC4, and bz2.[29] |
| S1118 | BUSHWALK |
BUSHWALK can encrypt the resulting data generated from C2 commands with RC4.[30] |
| C0015 | C0015 |
During C0015, the threat actors used Base64-encoded strings.[31] |
| C0017 | C0017 |
During C0017, APT41 broke malicious binaries, including DEADEYE and KEYPLUG, into multiple sections on disk to evade detection.[32] |
| S0030 | Carbanak |
Carbanak encrypts strings to make analysis more difficult.[33] |
| S0335 | Carbon |
Carbon encrypts configuration files and tasks for the malware to complete using CAST-128 algorithm.[34][35] |
| S0465 | CARROTBALL |
CARROTBALL has used a custom base64 alphabet to decode files.[36] |
| S1149 | CHIMNEYSWEEP |
CHIMNEYSWEEP can use a custom Base64 alphabet to encode an API decryption key.[37] |
| S0660 | Clambling |
The Clambling executable has been obfuscated when dropped on a compromised host.[38] |
| S1105 | COATHANGER |
COATHANGER can store obfuscated configuration information in the last 56 bytes of the file |
| S0154 | Cobalt Strike |
Cobalt Strike can hash functions to obfuscate calls to the Windows API and use a public/private key pair to encrypt Beacon session metadata.[40][41] |
| S0369 | CoinTicker |
CoinTicker initially downloads a hidden encoded file.[42] |
| S0244 | Comnie | |
| S0126 | ComRAT |
ComRAT has encrypted its virtual file system using AES-256 in XTS mode.[44][45] |
| S0608 | Conficker |
Conficker has obfuscated its code to prevent its removal from host machines.[46] |
| S0575 | Conti |
Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls.[47][48][49] |
| S0137 | CORESHELL |
CORESHELL obfuscates strings using a custom stream cipher.[50] |
| S0625 | Cuba |
Cuba has used multiple layers of obfuscation to avoid analysis, including its Base64 encoded payload.[51] |
| S1111 | DarkGate |
DarkGate uses a hard-coded string as a seed, along with the victim machine hardware identifier and input text, to generate a unique string used as an internal mutex value to evade static detection based on mutexes.[52] |
| S1066 | DarkTortilla |
DarkTortilla has been obfuscated with the DeepSea .NET and ConfuserEx code obfuscators.[53] |
| S0187 | Daserf |
Daserf uses encrypted Windows APIs and also encrypts data using the alternative base64+RC4 or the Caesar cipher.[54] |
| S0354 | Denis | |
| S0659 | Diavol |
Diavol has Base64 encoded the RSA public key used for encrypting files.[56] |
| S0695 | Donut |
Donut can generate encrypted, compressed/encoded, or otherwise obfuscated code modules.[57] |
| S0694 | DRATzarus | |
| S0384 | Dridex | |
| S0502 | Drovorub |
Drovorub has used XOR encrypted payloads in WebSocket client to server messages.[60] |
| S0062 | DustySky |
The DustySky dropper uses a function to obfuscate the name of functions and other parts of the malware.[61] |
| G1006 | Earth Lusca |
Earth Lusca used Base64 to encode strings.[62] |
| S0377 | Ebury |
Ebury has obfuscated its strings with a simple XOR encryption with a static key.[63] |
| S0593 | ECCENTRICBANDWAGON |
ECCENTRICBANDWAGON has encrypted strings with RC4.[64] |
| S0624 | Ecipekac |
Ecipekac can use XOR, AES, and DES to encrypt loader shellcode.[65] |
| S0605 | EKANS | |
| S0091 | Epic |
Epic heavily obfuscates its code to make analysis more difficult.[67] |
| S0512 | FatDuke |
FatDuke can use base64 encoding, string stacking, and opaque predicates for obfuscation.[68] |
| S0355 | Final1stspy |
Final1stspy obfuscates strings with base64 encoding.[69] |
| S0182 | FinFisher |
FinFisher is heavily obfuscated in many ways, including through the use of spaghetti code in its functions in an effort to confuse disassembly programs. It also uses a custom XOR algorithm to obfuscate code.[70][71] |
| S0696 | Flagpro |
Flagpro has been delivered within ZIP or RAR password-protected archived files.[72] |
| G0093 | GALLIUM |
GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.[73] |
| G0084 | Gallmaker | |
| G0047 | Gamaredon Group |
Gamaredon Group has delivered self-extracting 7z archive files within malicious document attachments.[75] |
| S0477 | Goopy |
Goopy's decrypter have been inflated with junk code in between legitimate API functions, and also included infinite loops to avoid analysis.[55] |
| S1138 | Gootloader |
The Gootloader first stage script is obfuscated using random alpha numeric strings.[76][77] |
| S0690 | Green Lambert |
Green Lambert has encrypted strings.[78][79] |
| S0632 | GrimAgent |
GrimAgent has used Rotate on Right (RoR) and Rotate on Left (RoL) functionality to encrypt strings.[80] |
| S0132 | H1N1 |
H1N1 uses multiple techniques to obfuscate strings, including XOR.[81] |
| S0499 | Hancitor |
Hancitor has used Base64 to encode malicious links. Hancitor has also delivered compressed payloads in ZIP files to victims.[82][83] |
| S0070 | HTTPBrowser |
HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming.[84] |
| S0203 | Hydraq |
Hydraq uses basic obfuscation in the form of spaghetti code.[85][86] |
| S0434 | Imminent Monitor |
Imminent Monitor has encrypted the spearphish attachments to avoid detection from email gateways; the debugger also encrypts information before sending to the C2.[11] |
| S0604 | Industroyer |
Industroyer uses heavily obfuscated code in its Windows Notepad backdoor.[1] |
| S0259 | InnaputRAT |
InnaputRAT uses an 8-byte XOR key to obfuscate API names and other strings contained in the payload.[87] |
| S0260 | InvisiMole |
InvisiMole avoids analysis by encrypting all strings, internal files, configuration data and by using a custom executable format.[88][89] |
| S0189 | ISMInjector |
ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.[90] |
| S0201 | JPIN |
A JPIN uses a encrypted and compressed payload that is disguised as a bitmap within the resource section of the installer.[91] |
| S0283 | jRAT |
jRAT’s Java payload is encrypted with AES.[92] Additionally, backdoor files are encrypted using DES as a stream cipher. Later variants of jRAT also incorporated AV evasion methods such as Java bytecode obfuscation via the commercial Allatori obfuscation tool.[93] |
| S0265 | Kazuar |
Kazuar is obfuscated using the open source ConfuserEx protector. Kazuar also obfuscates the name of created files/folders/mutexes and encrypts debug messages written to log files using the Rijndael cipher.[94] |
| G0004 | Ke3chang | |
| S0585 | Kerrdown |
Kerrdown can encrypt, encode, and compress multiple layers of shellcode.[96] |
| S0607 | KillDisk |
KillDisk uses VMProtect to make reverse engineering the malware more difficult.[97] |
| G0094 | Kimsuky |
Kimsuky has obfuscated binary strings including the use of XOR encryption and Base64 encoding.[98][99] Kimsuky has also modified the first byte of DLL implants targeting victims to prevent recognition of the executable file format.[100] |
| S0641 | Kobalos |
Kobalos encrypts all strings using RC4 and bundles all functionality into a single function call.[101] |
| S0447 | Lokibot | |
| S0167 | Matryoshka |
Matryoshka obfuscates API function names using a substitute cipher combined with Base64 encoding.[103] |
| S0449 | Maze |
Maze has decrypted strings and other important information during the encryption process. Maze also calls certain functions dynamically to hinder analysis.[104] |
| S0500 | MCMD |
MCMD can Base64 encode output strings prior to sending to C2.[105] |
| S0051 | MiniDuke |
MiniDuke can use control flow flattening to obscure code.[68] |
| G1036 | Moonstone Sleet |
Moonstone Sleet delivers encrypted payloads in pieces that are then combined together to form a new portable executable (PE) file during installation.[106] |
| G0129 | Mustang Panda |
Mustang Panda has delivered initial payloads hidden using archives and encoding measures.[107][108][109][110][111][112] |
| S0336 | NanoCore |
NanoCore’s plugins were obfuscated with Eazfuscater.NET 3.3.[113] |
| S0198 | NETWIRE |
NETWIRE has used a custom obfuscation algorithm to hide strings including Registry keys, APIs, and DLL names.[114] |
| S1090 | NightClub |
NightClub can obfuscate strings using the congruential generator |
| S0353 | NOKKI | |
| S0138 | OLDBAIT |
OLDBAIT obfuscates internal strings and unpacks them at startup.[50] |
| S0264 | OopsIE |
OopsIE uses the Confuser protector to obfuscate an embedded .Net Framework assembly used for C2. OopsIE also encodes collected data in hexadecimal format before writing to files on disk and obfuscates strings.[117][118] |
| S0229 | Orz |
Some Orz strings are base64 encoded, such as the embedded DLL known as MockDll.[119] |
| S0594 | Out1 | |
| S0598 | P.A.S. Webshell |
P.A.S. Webshell can use encryption and base64 encoding to hide strings and to enforce access control once deployed.[121] |
| S0664 | Pandora |
Pandora has the ability to compress stings with QuickLZ.[122] |
| S0517 | Pillowmint |
Pillowmint has been compressed and stored within a registry key. Pillowmint has also obfuscated the AES key used for encryption.[123] |
| S0124 | Pisloader |
Pisloader obfuscates files by splitting strings into smaller sub-strings and including "garbage" strings that are never used. The malware also uses return-oriented programming (ROP) technique and single-byte XOR to obfuscate data.[124] |
| S0013 | PlugX |
PlugX can use API hashing and modify the names of strings to evade detection.[38][112] |
| S0428 | PoetRAT |
PoetRAT has used a custom encryption scheme for communication between scripts.[125] |
| S0012 | PoisonIvy |
PoisonIvy hides any strings related to its own indicators of compromise.[126] |
| S0518 | PolyglotDuke |
PolyglotDuke can custom encrypt strings.[68] |
| S0453 | Pony |
Pony attachments have been delivered via compressed archive files. Pony also obfuscates the memory flow by adding junk instructions when executing to make analysis more difficult.[127] |
| S0150 | POSHSPY |
POSHSPY appends a file signature header (randomly selected from six file types) to encrypted data prior to upload or download.[128] |
| S0393 | PowerStallion |
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.[129] |
| S0196 | PUNCHBUGGY |
PUNCHBUGGY has hashed most its code's functions and encrypted payloads with base64 and XOR.[130] |
| S0197 | PUNCHTRACK |
PUNCHTRACK is loaded and executed by a highly obfuscated launcher.[131] |
| S0650 | QakBot |
QakBot has hidden code within Excel spreadsheets by turning the font color to white and splitting it across multiple cells.[132] |
| S0458 | Ramsay |
Ramsay has base64-encoded its portable executable and hidden itself under a JPG header. Ramsay can also embed information within document footers.[133] |
| S1130 | Raspberry Robin |
Raspberry Robin uses mixed-case letters for filenames and commands to evade detection.[134] |
| G1039 | RedCurl |
RedCurl has used malware with string encryption.[135] RedCurl has also encrypted data and has encoded PowerShell commands using Base64.[136][137] RedCurl has used |
| S0511 | RegDuke |
RegDuke can use control-flow flattening or the commercially available .NET Reactor for obfuscation.[68] |
| S0332 | Remcos |
Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths.[139] |
| G0106 | Rocke |
Rocke has modified UPX headers after packing files to break unpackers.[140] |
| S0240 | ROKRAT |
ROKRAT can encrypt data prior to exfiltration by using an RSA public key.[15][141] |
| S0148 | RTM |
RTM strings, network data, configuration, and modules are encrypted with a modified RC4 algorithm. RTM has also been delivered to targets as various archive files including ZIP, 7-ZIP, and RAR.[142][143] |
| S0446 | Ryuk |
Ryuk can use anti-disassembly and code transformation obfuscation techniques.[49] |
| S1018 | Saint Bot | |
| S1099 | Samurai |
Samurai can encrypt the names of requested APIs and deliver its final payload as a compressed, encrypted and base64 encoded blob.[145] |
| G0034 | Sandworm Team |
Sandworm Team has used Base64 encoding within malware variants.[146] |
| S1085 | Sardonic |
Sardonic can use certain ConfuserEx features for obfuscation and can be encoded in a base64 string.[147] |
| S0461 | SDBbot |
SDBbot has the ability to XOR the strings for its installer component with a hardcoded 128 byte key.[148] |
| S0596 | ShadowPad |
ShadowPad has encrypted its payload, a virtual file system, and various files.[149][62] |
| S0140 | Shamoon | |
| S0444 | ShimRat |
ShimRat has been delivered as a package that includes compressed DLL and shellcode payloads within a .dat file.[151] |
| S0445 | ShimRatReporter |
ShimRatReporter encrypted gathered information with a combination of shifting and XOR using a static key.[151] |
| S0063 | SHOTPUT |
SHOTPUT is obscured using XOR encoding and appended to a valid GIF file.[152][153] |
| S0623 | Siloscape |
Siloscape itself is obfuscated and uses obfuscated API calls.[154] |
| S1104 | SLOWPULSE |
SLOWPULSE can hide malicious code in the padding regions between legitimate functions in the Pulse Secure |
| S1035 | Small Sieve |
Small Sieve has the ability to use a custom hex byte swapping encoding scheme combined with an obfuscated Base64 function to protect program strings and Telegram credentials.[156] |
| S1086 | Snip3 |
Snip3 has the ability to obfuscate strings using XOR encryption.[157] |
| S0627 | SodaMaster |
SodaMaster can use "stackstrings" for obfuscation.[65] |
| S0615 | SombRAT |
SombRAT can encrypt strings with XOR-based routines and use a custom AES storage format for plugins, configuration, C2 domains, and harvested data.[158][159][160] |
| S0516 | SoreFang |
SoreFang has the ability to encode and RC6 encrypt data sent to C2.[161] |
| S0142 | StreamEx |
StreamEx obfuscates some commands by using statically programmed fragments of strings when starting a DLL. It also uses a one-byte xor against 0x91 to encode configuration data.[162] |
| S0559 | SUNBURST |
SUNBURST strings were compressed and encoded in Base64.[163] SUNBURST also obfuscated collected system information using a FNV-1a + XOR algorithm.[164] |
| S0562 | SUNSPOT |
SUNSPOT encrypted log entries it collected with the stream cipher RC4 using a hard-coded key. It also uses AES128-CBC encrypted blobs for SUNBURST source code and data extracted from the SolarWinds Orion <MsBuild.exe process.[165] |
| S1064 | SVCReady | |
| S0242 | SynAck |
SynAck payloads are obfuscated prior to compilation to inhibit analysis and/or reverse engineering.[167][168] |
| S0467 | TajMahal |
TajMahal has used an encrypted Virtual File System to store plugins.[169] |
| S0560 | TEARDROP |
TEARDROP created and read from a file with a fake JPG header, and its payload was encrypted with a simple rotating XOR cipher.[164][170][171] |
| S0266 | TrickBot |
TrickBot uses non-descriptive names to hide functionality.[172] |
| S0094 | Trojan.Karagany |
Trojan.Karagany can base64 encode and AES-128-CBC encrypt data prior to transmission.[173] |
| S0647 | Turian | |
| S0476 | Valak |
Valak has the ability to base64 encode and XOR encrypt strings.[174][175][176] |
| G0112 | Windshift |
Windshift has used string encoding with floating point calculations.[177] |
| S0117 | XTunnel |
A version of XTunnel introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.[178] |
| ID | Mitigation | Description |
|---|---|---|
| M1049 | Antivirus/Antimalware |
Anti-virus can be used to automatically detect and quarantine suspicious files. Consider utilizing the Antimalware Scan Interface (AMSI) on Windows 10+ to analyze commands after being processed/interpreted. [179] |
| M1047 | Audit |
Consider periodic review of common fileless storage locations (such as the Registry or WMI repository) to potentially identify abnormal and malicious data. |
| M1040 | Behavior Prevention on Endpoint |
On Windows 10+, enable Attack Surface Reduction (ASR) rules to prevent execution of potentially obfuscated payloads. [180] |
| M1017 | User Training |
Ensure that a finite amount of ingress points to a software deployment system exist with restricted access for those required to allow and enable newly deployed software. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0015 | Application Log | Application Log Content |
The first detection of a malicious tool may trigger an anti-virus or other security tool alert. Similar events may also occur at the boundary through network IDS, email scanning appliance, etc. The initial detection should be treated as an indication of a potentially more invasive intrusion. The alerting system should be thoroughly investigated beyond that initial alert for activity that was not detected. Adversaries may continue with an operation, assuming that individual events like an anti-virus detect will not be investigated or that an analyst will not be able to conclusively link that event to other activity occurring on the network. |
| DS0017 | Command | Command Execution |
Monitor executed commands and arguments for indicators of obfuscation and potentially suspicious syntax such as uninterpreted escape characters (e.g., Also monitor command-lines for syntax-specific signs of obfuscation, such as variations of arguments associated with encoding. |
| DS0022 | File | File Creation |
Detection of file obfuscation is difficult unless artifacts are left behind by the obfuscation process that are uniquely detectable with a signature. If detection of the obfuscation itself is not possible, it may be possible to detect the malicious activity that caused the obfuscated file (for example, the method that was used to write, read, or modify the file on the file system). |
| File Metadata |
Monitor for contextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/owner, permissions, etc. File-based signatures may be capable of detecting code obfuscation depending on the methods used.[181][182][183] |
||
| DS0011 | Module | Module Load |
Monitoring module loads, especially those not explicitly included in import tables, may highlight obfuscated code functionality. Dynamic malware analysis may also expose signs of code obfuscation.[182] |
| DS0009 | Process | OS API Execution |
Monitor and analyze calls to functions such as |
| Process Creation |
Monitor for newly executed processes that may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. |
||
| DS0012 | Script | Script Execution |
Monitor executed scripts for indicators of obfuscation and potentially suspicious command syntax, such as uninterpreted escape characters (e.g., Also monitor commands within scripts for syntax-specific signs of obfuscation, such as encoded or otherwise unreadable blobs of characters. |
| DS0024 | Windows Registry | Windows Registry Key Creation |
Monitor for the creation of Registry values that may highlight storage of malicious data such as commands or payloads. |
| DS0005 | WMI | WMI Creation |
Monitor for the creation of WMI Objects and values that may highlight storage of malicious data such as commands or payloads. |