Třída: Hoax
Podvod je falešné varování o viru nebo jiném škodlivém kódu. Obvykle je podvod ve formě e-mailové zprávy upozorňující čtenáře na nový nebezpečný virus a naznačuje, že čtenář předá zprávu. Hoaxy samy o sobě nepoškodí, ale jejich distribuce u významných uživatelů často způsobuje strach a nejistotu.Většina dodavatelů antiviru obsahuje informace o podvodných událostech na svých webových stránkách a je vždy vhodné prověřit před odesláním varovných zpráv.
Platfoma: MSIL
Společný středně pokročilý jazyk (dříve známý jako Microsoft Intermediate Language nebo MSIL) je pokročilý jazyk vyvinutý společností Microsoft pro rozhraní .NET Framework. Kód CIL je generován všemi kompilátory Microsoft .NET v aplikaci Microsoft Visual Studio (Visual Basic .NET, Visual C ++, Visual C # a další).Family: Hoax.MSIL.ArchSMS
No family descriptionExamples
7D6880E6652C3A8EB531746419E4EAEEAB951B2BE337A69D4D5BCB801F43D9C4
B0CCAEDCB539FD9BEFEAC1A4D5FC76D4
755F69BF0B819DDA38F2CDBF909AE5F1
6DA47D36C6DD587AAB357EA42E5AAA86
Tactics and Techniques: Mitre*
TA0005
Defense Evasion
The adversary is trying to avoid being detected.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
T1036
Masquerading
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.
Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site) Masquerading may also include the use of Proxy or VPNs to disguise IP addresses, which can allow adversaries to blend in with normal network traffic and bypass conditional access policies or anti-abuse protections.
Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site) Masquerading may also include the use of Proxy or VPNs to disguise IP addresses, which can allow adversaries to blend in with normal network traffic and bypass conditional access policies or anti-abuse protections.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.