enterprise |
T1548 |
Abuse Elevation Control Mechanism |
- |
enterprise |
T1548.002 |
Bypass User Account Control |
Evilnum has used PowerShell to bypass UAC. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.007 |
JavaScript |
Evilnum has used malicious JavaScript files on the victim’s machine. |
enterprise |
T1555 |
Credentials from Password Stores |
Evilnum can collect email credentials from victims. |
enterprise |
T1574 |
Hijack Execution Flow |
- |
enterprise |
T1574.001 |
DLL Search Order Hijacking |
Evilnum has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder. |
enterprise |
T1070 |
Indicator Removal |
- |
enterprise |
T1070.004 |
File Deletion |
Evilnum has deleted files used during infection. |
enterprise |
T1105 |
Ingress Tool Transfer |
Evilnum can deploy additional components or tools as needed. |
enterprise |
T1566 |
Phishing |
- |
enterprise |
T1566.002 |
Spearphishing Link |
Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive. |
enterprise |
T1219 |
Remote Access Software |
EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromrised machines. |
enterprise |
T1539 |
Steal Web Session Cookie |
Evilnum can steal cookies and session information from browsers. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.001 |
Malicious Link |
Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file. |
enterprise |
T1497 |
Virtualization/Sandbox Evasion |
- |
enterprise |
T1497.001 |
System Checks |
Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments. |