software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
26
666
description
stringclasses
826 values
url
stringclasses
826 values
S0412
ZxShell
.005
Remote Services: VNC
ZxShell supports functionality for VNC sessions.[2]
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2]
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1113
Screen Capture
ZxShell can capture screenshots.[1]
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2]
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1218.011
System Binary Proxy Execution: Rundll32
ZxShell has used rundll32.exe to execute other DLLs and named pipes.[2]
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2]
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1082
System Information Discovery
ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory.[2]
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2]
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1033
System Owner/User Discovery
ZxShell can collect the owner and organization information from the target workstation.[2]
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2]
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1007
System Service Discovery
ZxShell can check the services on the system.[2]
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2]
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1569.002
System Services: Service Execution
ZxShell can create a new service for execution.[2]
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2]
https://attack.mitre.org/software/S0412
S0412
ZxShell
T1125
Video Capture
ZxShell has a command to perform video device spying.[2]
ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2]
https://attack.mitre.org/software/S0412
S1013
ZxxZ
T1005
Data from Local System
ZxxZ can collect data from a compromised host.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1140
Deobfuscate/Decode Files or Information
ZxxZ has used a XOR key to decrypt strings.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1105
Ingress Tool Transfer
ZxxZ can download and execute additional files.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1036.004
Masquerading: Masquerade Task or Service
ZxxZ has been disguised as a Windows security update service.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1106
Native API
ZxxZ has used API functions such as Process32First, Process32Next, and ShellExecuteA.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1027.013
Obfuscated Files or Information: Encrypted/Encoded File
ZxxZ has been encoded to avoid detection from static analysis tools.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1566.001
Phishing: Spearphishing Attachment
ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1057
Process Discovery
ZxxZ has created a snapshot of running processes using CreateToolhelp32Snapshot.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1012
Query Registry
ZxxZ can search the registry of a compromised host.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1053.005
Scheduled Task/Job: Scheduled Task
ZxxZ has used scheduled tasks for persistence and execution.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1518.001
Software Discovery: Security Software Discovery
ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1082
System Information Discovery
ZxxZ has collected the host name and operating system product name from a compromised machine.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1033
System Owner/User Discovery
ZxxZ can collect the username from a compromised host.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013
S1013
ZxxZ
T1204.002
User Execution: Malicious File
ZxxZ has relied on victims to open a malicious attachment delivered via email.[1]
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]
https://attack.mitre.org/software/S1013