| enterprise |
T1059 |
Command and Scripting Interpreter |
- |
| enterprise |
T1059.003 |
Windows Command Shell |
TA577 has used BAT files in malware execution chains. |
| enterprise |
T1059.007 |
JavaScript |
TA577 has used JavaScript to execute additional malicious payloads. |
| enterprise |
T1586 |
Compromise Accounts |
- |
| enterprise |
T1586.002 |
Email Accounts |
TA577 has sent thread hijacked messages from compromised emails. |
| enterprise |
T1027 |
Obfuscated Files or Information |
- |
| enterprise |
T1027.009 |
Embedded Payloads |
TA577 has used LNK files to execute embedded DLLs. |
| enterprise |
T1566 |
Phishing |
- |
| enterprise |
T1566.002 |
Spearphishing Link |
TA577 has sent emails containing links to malicious JavaScript files. |
| enterprise |
T1204 |
User Execution |
- |
| enterprise |
T1204.001 |
Malicious Link |
TA577 has lured users into executing malicious JavaScript files by sending malicious links via email. |