-
Notifications
You must be signed in to change notification settings - Fork 16
Malware Capabilities
Ivan Kirillov edited this page Feb 19, 2014
·
12 revisions
The following hierarchy and associated pages capture the current MAEC Malware Capabilities, as of the v4.1 release. Our hope is that these pages will serve as a useful reference to our implementation and we plan on augmenting them with additional examples, references, and relationships in the near future. We also welcome any feedback on these pages and MAEC's Malware Capabilities in general.
[C] : Capability
[SO] : Strategic Objective
[TO] : Tactical Objective
-
Command and Control [C]
- Determine C2 Server [SO]
- Degrade Security Programs [SO]
-
Send Data to C2 Server [SO]
- Send System Information [TO]
- Send Heartbeat Data [TO]
- Check for Payload [TO]
- Remote Machine Manipulation [C]
-
Privilege Escalation [C]
- Access Remote Machine [SO]
-
Escalate User Privilege [SO]
- Elevate CPU Mode [TO]
-
Data Theft [C]
-
Steal Stored Information [SO]
- Steal Serial Numbers [TO]
- Steal Documents [TO]
- Steal Database Content [TO]
- Steal Cryptocurrency Data [TO]
- Steal Images [TO]
-
Steal User Data [SO]
- Steal Dialed Phone Numbers [TO]
- Steal Email Data [TO]
- Steal SMS Database [TO]
- Steal Browser Cache [TO]
- Steal Browser History [TO]
- Steal Referrer URLs [TO]
- Steal Contact List Data [TO]
- Log Activity [SO]
-
Steal Authentication Credentials [SO]
- Steal Web/Network Credential [TO]
- Steal Password Hash [TO]
- Steal PKI Key [TO]
- Steal Cookie [TO]
- Steal PKI Software Certificate [TO]
-
Steal Stored Information [SO]
-
Spying [C]
-
Capture System Input Peripheral Data [SO]
- Capture Camera Input [TO]
- Capture Keyboard Input [TO]
- Capture Mouse Input [TO]
- Capture Microphone Input [TO]
- Capture Touchscreen Input [TO]
-
Steal System Information [SO]
- Steal Make/Model [TO]
- Steal Network Address [TO]
- Steal Open Port [TO]
- Capture System Interface Data [SO]
- Capture System Output Peripheral Data [SO]
-
Capture System Input Peripheral Data [SO]
-
Secondary Operation [C]
- Patch Operating System File(s) [SO]
-
Remove Traces of Infection [SO]
- Remove System Artifacts [TO]
- Remove Self [TO]
- Lay Dormant [SO]
- Install Other Components [SO]
- Suicide Exit [SO]
- Perform Data Exfiltration [SO]
-
Anti-Detection [C]
- Security Software Evasion [SO]
-
Prevent Malware Artifact Access [SO]
- Prevent Registry Access [TO]
- Prevent File Access [TO]
- Prevent Memory Access [TO]
-
Hide Executing Code [SO]
- Execute Before/External to Kernel/Hypervisor [TO]
- Hide Processes [TO]
- Execute Stealthy Code [TO]
- Hide Userspace Libraries [TO]
- Execute Non-Main CPU Code [TO]
- Hide Kernel Modules [TO]
- Hide Services [TO]
- Hide Threads [TO]
-
Self-Modification [SO]
- Change/Add Content [TO]
- Encrypt Self [TO]
- Anti-Memory Forensics [SO]
- Hide Malware Artifacts [SO]
-
Anti-Code Analysis [C]
-
Anti-Debugging [SO]
- Detect Debugging [TO]
- Prevent Debugging [TO]
- Anti-Sandbox [SO]
- Anti-Disassembly [SO]
-
Anti-Debugging [SO]
- Infection/Propagation [C]
-
Anti-Behavioral Analysis [C]
-
Infect File [SO]
- Write Code Into File [TO]
- Identify File [TO]
- Modify File [TO]
-
Anti-VM [SO]
- Detect VM Environment [TO]
- Prevent Execution in VM [TO]
-
Infect File [SO]
- Integrity Violation [C]
-
Data Exfiltration [C]
-
Obfuscate Data for Exfiltration [SO]
- Hide Data [TO]
- Encrypt Data [TO]
- Impersonate User [SO]
-
Stage Data for Exfiltration [SO]
- Package Data [TO]
- Move Data to Staging Server [TO]
-
Obfuscate Data for Exfiltration [SO]
-
Probing [C]
-
Probe Host Configuration [SO]
- Check Language [TO]
- Identify OS [TO]
- Identify Host IP Address [TO]
- Inventory System Applications [TO]
- Click Fraud [SO]
-
Probe Network Environment [SO]
- Map Local Network [TO]
- Check for Firewall [TO]
- Check for Network Drives [TO]
- Check for Proxy [TO]
- Check for Internet Connectivity [TO]
-
Probe Host Configuration [SO]
-
Anti-Removal [C]
-
Code Obfuscation [SO]
- Transform Control Flow [TO]
- Obfuscate Instructions [TO]
- Obfuscate Runtime Code [TO]
-
Prevent Malware Artifact Deletion [SO]
- Prevent Registry Deletion [TO]
- Prevent File Deletion [TO]
- Prevent API Unhooking [TO]
-
Code Obfuscation [SO]
- Security Degradation [C]
-
Availability Violation [C]
- Compromise System Availability [SO]
-
Consume System Resources [SO]
- Crack Passwords [TO]
- Mine for CryptoCurrency [TO]
-
Annoy User [SO]
- Annoy Remote User [TO]
- Annoy Local System User [TO]
-
Destruction [C]
-
Destroy Physical Entity [SO]
- Destroy Firmware [TO]
- Destroy Hardware [TO]
-
Capture System State Data [SO]
- Capture File System [TO]
- Capture System Memory [TO]
-
Destroy Physical Entity [SO]
- Fraud [C]
- Persistence [C]
-
Machine Access/Control [C]
-
Receive Data from C2 Server [SO]
- Validate Data [TO]
- Control Malware via Remote Command [TO]
- Update Configuration [TO]
- Install Backdoor [SO]
-
Receive Data from C2 Server [SO]