| enterprise | T1071 | Application Layer Protocol | - | 
| enterprise | T1071.001 | Web Protocols | Zeus Panda uses HTTP for C2 communications. | 
| enterprise | T1547 | Boot or Logon Autostart Execution | - | 
| enterprise | T1547.001 | Registry Run Keys / Startup Folder | Zeus Panda adds persistence by creating Registry Run keys. | 
| enterprise | T1115 | Clipboard Data | Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect. | 
| enterprise | T1059 | Command and Scripting Interpreter | Zeus Panda can launch remote scripts on the victim’s machine. | 
| enterprise | T1059.001 | PowerShell | Zeus Panda uses PowerShell to download and execute the payload. | 
| enterprise | T1059.003 | Windows Command Shell | Zeus Panda can launch an interface where it can execute several commands on the victim’s PC. | 
| enterprise | T1140 | Deobfuscate/Decode Files or Information | Zeus Panda decrypts strings in the code during the execution process. | 
| enterprise | T1083 | File and Directory Discovery | Zeus Panda searches for specific directories on the victim’s machine. | 
| enterprise | T1070 | Indicator Removal | - | 
| enterprise | T1070.004 | File Deletion | Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track. | 
| enterprise | T1105 | Ingress Tool Transfer | Zeus Panda can download additional malware plug-in modules and execute them on the victim’s machine. | 
| enterprise | T1056 | Input Capture | - | 
| enterprise | T1056.001 | Keylogging | Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN. | 
| enterprise | T1056.004 | Credential API Hooking | Zeus Panda hooks processes by leveraging its own IAT hooked functions. | 
| enterprise | T1112 | Modify Registry | Zeus Panda modifies several Registry keys under HKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\to disable phishing filters. | 
| enterprise | T1027 | Obfuscated Files or Information | Zeus Panda encrypts strings with XOR. Zeus Panda also encrypts all configuration and settings in AES and RC4. | 
| enterprise | T1027.010 | Command Obfuscation | Zeus Panda obfuscates the macro commands in its initial payload. | 
| enterprise | T1057 | Process Discovery | Zeus Panda checks for running processes on the victim’s machine. | 
| enterprise | T1055 | Process Injection | - | 
| enterprise | T1055.002 | Portable Executable Injection | Zeus Panda checks processes on the system and if they meet the necessary requirements, it injects into that process. | 
| enterprise | T1012 | Query Registry | Zeus Panda checks for the existence of a Registry key and if it contains certain values. | 
| enterprise | T1113 | Screen Capture | Zeus Panda can take screenshots of the victim’s machine. | 
| enterprise | T1518 | Software Discovery | - | 
| enterprise | T1518.001 | Security Software Discovery | Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment. | 
| enterprise | T1082 | System Information Discovery | Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system. | 
| enterprise | T1614 | System Location Discovery | - | 
| enterprise | T1614.001 | System Language Discovery | Zeus Panda queries the system’s keyboard mapping to determine the language used on the system. It will terminate execution if it detects LANG_RUSSIAN, LANG_BELARUSIAN, LANG_KAZAK, or LANG_UKRAINIAN. | 
| enterprise | T1124 | System Time Discovery | Zeus Panda collects the current system time (UTC) and sends it back to the C2 server. |