-
Notifications
You must be signed in to change notification settings - Fork 16
Malware Capabilities
Ivan Kirillov edited this page Feb 19, 2014
·
12 revisions
-
Command and Control [C]
- Degrade Security Programs [SO]
-
Send Data to C2 Server [SO]
- Send System Information [TO]
- Send Heartbeat Data [TO]
- Check for Payload [TO]
- Determine C2 Server [SO]
- Remote Machine Manipulation [C]
-
Privilege Escalation [C]
-
Escalate User Privilege [SO]
- Elevate CPU Mode [TO]
- Access Remote Machine [SO]
-
Escalate User Privilege [SO]
-
Data Theft [C]
-
Steal Stored Information [SO]
- Steal Serial Numbers [TO]
- Steal Documents [TO]
- Steal Database Content [TO]
- Steal Cryptocurrency Data [TO]
- Steal Images [TO]
-
Steal Authentication Credentials [SO]
- Steal Web/Network Credential [TO]
- Steal Password Hash [TO]
- Steal PKI Key [TO]
- Steal Cookie [TO]
- Steal PKI Software Certificate [TO]
-
Steal User Data [SO]
- Steal Dialed Phone Numbers [TO]
- Steal Email Data [TO]
- Steal SMS Database [TO]
- Steal Browser Cache [TO]
- Steal Browser History [TO]
- Steal Referrer URLs [TO]
- Steal Contact List Data [TO]
- Log Activity [SO]
-
Steal Stored Information [SO]
-
Spying [C]
-
Capture System Input Peripheral Data [SO]
- Capture Camera Input [TO]
- Capture Keyboard Input [TO]
- Capture Mouse Input [TO]
- Capture Microphone Input [TO]
- Capture Touchscreen Input [TO]
- Capture System Output Peripheral Data [SO]
-
Steal System Information [SO]
- Steal Make/Model [TO]
- Steal Network Address [TO]
- Steal Open Port [TO]
- Capture System Interface Data [SO]
-
Capture System Input Peripheral Data [SO]
-
Secondary Operation [C]
- Patch Operating System File(s) [SO]
-
Remove Traces of Infection [SO]
- Remove System Artifacts [TO]
- Remove Self [TO]
- Lay Dormant [SO]
- Install Other Components [SO]
- Suicide Exit [SO]
- Perform Data Exfiltration [SO]
-
Anti-Detection [C]
- Security Software Evasion [SO]
-
Hide Executing Code [SO]
- Execute Before/External to Kernel/Hypervisor [TO]
- Hide Processes [TO]
- Execute Stealthy Code [TO]
- Hide Userspace Libraries [TO]
- Execute Non-Main CPU Code [TO]
- Hide Kernel Modules [TO]
- Hide Services [TO]
- Hide Threads [TO]
- Anti-Memory Forensics [SO]
-
Self-Modification [SO]
- Change/Add Content [TO]
- Encrypt Self [TO]
-
Prevent Malware Artifact Access [SO]
- Prevent Registry Access [TO]
- Prevent File Access [TO]
- Prevent Memory Access [TO]
- Hide Malware Artifacts [SO]
-
Anti-Code Analysis [C]
-
Anti-Debugging [SO]
- Detect Debugging [TO]
- Prevent Debugging [TO]
- Anti-Disassembly [SO]
- Anti-Sandbox [SO]
-
Anti-Debugging [SO]
- Infection/Propagation [C]
-
Anti-Behavioral Analysis [C]
-
Anti-VM [SO]
- Detect VM Environment [TO]
- Prevent Execution in VM [TO]
-
Infect File [SO]
- Write Code Into File [TO]
- Identify File [TO]
- Modify File [TO]
-
Anti-VM [SO]
- Integrity Violation [C]
-
Data Exfiltration [C]
-
Stage Data for Exfiltration [SO]
- Package Data [TO]
- Move Data to Staging Server [TO]
-
Obfuscate Data for Exfiltration [SO]
- Hide Data [TO]
- Encrypt Data [TO]
- Impersonate User [SO]
-
Stage Data for Exfiltration [SO]
-
Probing [C]
- Click Fraud [SO]
-
Probe Host Configuration [SO]
- Check Language [TO]
- Identify OS [TO]
- Identify Host IP Address [TO]
- Inventory System Applications [TO]
-
Probe Network Environment [SO]
- Map Local Network [TO]
- Check for Firewall [TO]
- Check for Network Drives [TO]
- Check for Proxy [TO]
- Check for Internet Connectivity [TO]
-
Anti-Removal [C]
-
Prevent Malware Artifact Deletion [SO]
- Prevent Registry Deletion [TO]
- Prevent File Deletion [TO]
- Prevent API Unhooking [TO]
-
Code Obfuscation [SO]
- Transform Control Flow [TO]
- Obfuscate Instructions [TO]
- Obfuscate Runtime Code [TO]
-
Prevent Malware Artifact Deletion [SO]
- Security Degradation [C]
-
Availability Violation [C]
-
Consume System Resources [SO]
- Crack Passwords [TO]
- Mine for CryptoCurrency [TO]
-
Annoy User [SO]
- Annoy Remote User [TO]
- Annoy Local System User [TO]
- Compromise System Availability [SO]
-
Consume System Resources [SO]
-
Destruction [C]
-
Destroy Physical Entity [SO]
- Destroy Firmware [TO]
- Destroy Hardware [TO]
-
Capture System State Data [SO]
- Capture File System [TO]
- Capture System Memory [TO]
-
Destroy Physical Entity [SO]
- Fraud [C]
- Persistence [C]
-
Machine Access/Control [C]
-
Receive Data from C2 Server [SO]
- Validate Data [TO]
- Control Malware via Remote Command [TO]
- Update Configuration [TO]
- Install Backdoor [SO]
-
Receive Data from C2 Server [SO]