Kategorie: Hoax
Eine Falschmeldung ist eine gefälschte Warnung vor einem Virus oder anderem bösartigen Code. In der Regel hat ein Hoax die Form einer E-Mail-Nachricht, die den Leser vor einem gefährlichen neuen Virus warnt und vorschlägt, dass der Leser die Nachricht weitergibt. Hoaxes verursachen an sich keinen Schaden, aber ihre Verteilung durch wohlmeinende Benutzer verursacht oft Angst und Unsicherheit.Die meisten Antivirus-Anbieter enthalten auf ihren Websites Hoax-Informationen und es ist immer ratsam, vor der Weiterleitung Warnmeldungen zu überprüfen.
Mehr Informationen
Plattform: Win32
Win32 ist eine API auf Windows NT-basierten Betriebssystemen (Windows XP, Windows 7 usw.), die die Ausführung von 32-Bit-Anwendungen unterstützt. Eine der am weitesten verbreiteten Programmierplattformen der Welt.Familie: Hoax.Win32.PCRepair
No family descriptionExamples
2071F468432A8DAFB50193678583C2F3878EC4A18B440A1AA72E1B4CA73052BE
154784F1A260C66E9CA4D47F48AE64B0
42C1E08E9C4E3558108BC581A66D68CB
2050E858CB8A3BE34A12933FA98B1A02
Tactics and Techniques: Mitre*
TA0011
Command and Control
The adversary is trying to communicate with compromised systems to control them.
Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses.
Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses.
T1071.001
Application Layer Protocol: Web Protocols
Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server.
Protocols such as HTTP/S(Citation: CrowdStrike Putter Panda) and WebSocket(Citation: Brazking-Websockets) that carry web traffic may be very common in environments. HTTP/S packets have many fields and headers in which data can be concealed. An adversary may abuse these protocols to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.
Protocols such as HTTP/S(Citation: CrowdStrike Putter Panda) and WebSocket(Citation: Brazking-Websockets) that carry web traffic may be very common in environments. HTTP/S packets have many fields and headers in which data can be concealed. An adversary may abuse these protocols to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.