enterprise |
T1134 |
Access Token Manipulation |
Mafalda can use AdjustTokenPrivileges() to elevate privileges. |
enterprise |
T1134.003 |
Make and Impersonate Token |
Mafalda can create a token for a different user. |
enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
Mafalda can use HTTP for C2. |
enterprise |
T1217 |
Browser Information Discovery |
Mafalda can collect the contents of the %USERPROFILE%\AppData\Local\Google\Chrome\User Data\LocalState file. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.001 |
PowerShell |
Mafalda can execute PowerShell commands on a compromised machine. |
enterprise |
T1059.003 |
Windows Command Shell |
Mafalda can execute shell commands using cmd.exe . |
enterprise |
T1132 |
Data Encoding |
- |
enterprise |
T1132.001 |
Standard Encoding |
Mafalda can encode data using Base64 prior to exfiltration. |
enterprise |
T1005 |
Data from Local System |
Mafalda can collect files and information from a compromised host. |
enterprise |
T1074 |
Data Staged |
- |
enterprise |
T1074.001 |
Local Data Staging |
Mafalda can place retrieved files into a destination directory. |
enterprise |
T1622 |
Debugger Evasion |
Mafalda can search for debugging tools on a compromised host. |
enterprise |
T1140 |
Deobfuscate/Decode Files or Information |
Mafalda can decrypt files and data. |
enterprise |
T1573 |
Encrypted Channel |
- |
enterprise |
T1573.001 |
Symmetric Cryptography |
Mafalda can encrypt its C2 traffic with RC4. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
Mafalda can send network system data and files to its C2 server. |
enterprise |
T1133 |
External Remote Services |
Mafalda can establish an SSH connection from a compromised host to a server. |
enterprise |
T1083 |
File and Directory Discovery |
Mafalda can search for files and directories. |
enterprise |
T1070 |
Indicator Removal |
- |
enterprise |
T1070.001 |
Clear Windows Event Logs |
Mafalda can delete Windows Event logs by invoking the OpenEventLogW and ClearEventLogW functions. |
enterprise |
T1105 |
Ingress Tool Transfer |
Mafalda can download additional files onto the compromised host. |
enterprise |
T1056 |
Input Capture |
Mafalda can conduct mouse event logging. |
enterprise |
T1112 |
Modify Registry |
Mafalda can manipulate the system registry on a compromised host. |
enterprise |
T1106 |
Native API |
Mafalda can use a variety of API calls. |
enterprise |
T1095 |
Non-Application Layer Protocol |
Mafalda can use raw TCP for C2. |
enterprise |
T1027 |
Obfuscated Files or Information |
Mafalda has been obfuscated and contains encrypted functions. |
enterprise |
T1003 |
OS Credential Dumping |
- |
enterprise |
T1003.001 |
LSASS Memory |
Mafalda can dump password hashes from LSASS.exe . |
enterprise |
T1057 |
Process Discovery |
Mafalda can enumerate running processes on a machine. |
enterprise |
T1090 |
Proxy |
- |
enterprise |
T1090.001 |
Internal Proxy |
Mafalda can create a named pipe to listen for and send data to a named pipe-based C2 server. |
enterprise |
T1012 |
Query Registry |
Mafalda can enumerate Registry keys with all subkeys and values. |
enterprise |
T1113 |
Screen Capture |
Mafalda can take a screenshot of the target machine and save it to a file. |
enterprise |
T1518 |
Software Discovery |
- |
enterprise |
T1518.001 |
Security Software Discovery |
Mafalda can search for a variety of security software programs, EDR systems, and malware analysis tools. |
enterprise |
T1082 |
System Information Discovery |
Mafalda can collect the computer name and enumerate all drives on a compromised host. |
enterprise |
T1016 |
System Network Configuration Discovery |
Mafalda can use the GetAdaptersInfo function to retrieve information about network adapters and the GetIpNetTable function to retrieve the IPv4 to physical network address mapping table. |
enterprise |
T1049 |
System Network Connections Discovery |
Mafalda can use the GetExtendedTcpTable function to retrieve information about established TCP connections. |
enterprise |
T1033 |
System Owner/User Discovery |
Mafalda can collect the username from a compromised host. |
enterprise |
T1569 |
System Services |
- |
enterprise |
T1569.002 |
Service Execution |
Mafalda can create a remote service, let it run once, and then delete it. |
enterprise |
T1205 |
Traffic Signaling |
- |
enterprise |
T1205.001 |
Port Knocking |
Mafalda can use port-knocking to authenticate itself to another implant called Cryshell to establish an indirect connection to the C2 server. |
enterprise |
T1552 |
Unsecured Credentials |
- |
enterprise |
T1552.004 |
Private Keys |
Mafalda can collect a Chrome encryption key used to protect browser cookies. |