software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 26
666
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S0412 | ZxShell | .005 | Remote Services: VNC | ZxShell supports functionality for VNC sessions.[2] | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2] | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1113 | Screen Capture | ZxShell can capture screenshots.[1] | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2] | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1218.011 | System Binary Proxy Execution: Rundll32 | ZxShell has used rundll32.exe to execute other DLLs and named pipes.[2] | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2] | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1082 | System Information Discovery | ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory.[2] | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2] | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1033 | System Owner/User Discovery | ZxShell can collect the owner and organization information from the target workstation.[2] | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2] | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1007 | System Service Discovery | ZxShell can check the services on the system.[2] | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2] | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1569.002 | System Services: Service Execution | ZxShell can create a new service for execution.[2] | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2] | https://attack.mitre.org/software/S0412 |
S0412 | ZxShell | T1125 | Video Capture | ZxShell has a command to perform video device spying.[2] | ZxShell is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.[1][2] | https://attack.mitre.org/software/S0412 |
S1013 | ZxxZ | T1005 | Data from Local System | ZxxZ can collect data from a compromised host.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1140 | Deobfuscate/Decode Files or Information | ZxxZ has used a XOR key to decrypt strings.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1105 | Ingress Tool Transfer | ZxxZ can download and execute additional files.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1036.004 | Masquerading: Masquerade Task or Service | ZxxZ has been disguised as a Windows security update service.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1106 | Native API | ZxxZ has used API functions such as Process32First, Process32Next, and ShellExecuteA.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | ZxxZ has been encoded to avoid detection from static analysis tools.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1566.001 | Phishing: Spearphishing Attachment | ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1057 | Process Discovery | ZxxZ has created a snapshot of running processes using CreateToolhelp32Snapshot.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1012 | Query Registry | ZxxZ can search the registry of a compromised host.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1053.005 | Scheduled Task/Job: Scheduled Task | ZxxZ has used scheduled tasks for persistence and execution.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1518.001 | Software Discovery: Security Software Discovery | ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1082 | System Information Discovery | ZxxZ has collected the host name and operating system product name from a compromised machine.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1033 | System Owner/User Discovery | ZxxZ can collect the username from a compromised host.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |
S1013 | ZxxZ | T1204.002 | User Execution: Malicious File | ZxxZ has relied on victims to open a malicious attachment delivered via email.[1] | ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] | https://attack.mitre.org/software/S1013 |