Classe: Trojan-Downloader
Programas classificados como Trojan-Downloader baixam e instalam novas versões de programas mal-intencionados, incluindo Trojans e AdWare, em computadores vitimados. Uma vez baixados da Internet, os programas são iniciados ou incluídos em uma lista de programas que serão executados automaticamente quando o sistema operacional for inicializado. As informações sobre os nomes e locais dos programas baixados estão no código do Trojan ou são baixadas pelo cavalo de Tróia a partir de um recurso da Internet (geralmente uma página da Web). Esse tipo de programa malicioso é freqüentemente usado na infecção inicial de visitantes de sites que contêm exploits.Plataforma: VBS
O Visual Basic Scripting Edition (VBScript) é uma linguagem de script interpretada pelo Windows Script Host. O VBScript é amplamente usado para criar scripts em sistemas operacionais Microsoft Windows.Família: Trojan-Downloader.VBS.Agent
No family descriptionExamples
4F2561E3B460D8134F30A78BB0CFA034Tactics and Techniques: Mitre*
TA0001
Initial Access
The adversary is trying to get into your network. Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted spearphishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited-use due to changing passwords.
T1566.001
Spearphishing Attachment
Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution. Spearphishing may also involve social engineering techniques, such as posing as a trusted source.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.