Kategorie: Rootkit
Diese Art von bösartigem Programm wurde entwickelt, um bestimmte Objekte oder Aktivitäten im System zu verbergen. Registrierungsschlüssel (z. B. zum automatischen Starten bösartiger Objekte), Dateien, Ordner und Prozesse im Speicher eines infizierten Computers sowie bösartige Netzwerkaktivitäten können ausgeblendet werden.Rootkits selbst verfügen über schädliche Nutzlast. In den meisten Fällen wird diese Art von Programm jedoch verwendet, um zu verhindern, dass bösartige Programme erkannt werden, und um die Dauer der Ausführung auf einem infizierten Computer zu verlängern.
Mehr Informationen
Plattform: Win64
Win64 ist eine Plattform auf Windows-basierten Betriebssystemen für die Ausführung von 32- / 64-Bit-Anwendungen. Win64-Programme können nicht auf 32-Bit-Versionen von Windows gestartet werden.Familie: Rootkit.Win64.Agent
No family descriptionExamples
22F11F843A38131FC76FBA5A1AECA66ATactics and Techniques: Mitre*
TA0003
Persistence
The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.
T1543.003
Windows Service
Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions. Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry.
TA0004
Privilege Escalation
The adversary is trying to gain higher-level permissions. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include: SYSTEM/root level, local administrator, user account with admin-like access, user accounts with access to specific system or perform specific function. These techniques often overlap with Persistence techniques, as OS features that let an adversary persist can execute in an elevated context.
T1543.003
Windows Service
Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions. Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.