Kategorie: Trojan-Downloader
Als Trojan-Downloader klassifizierte Programme laden neue Versionen von Schadprogrammen, einschließlich Trojanern und AdWare, auf die Opfercomputer herunter und installieren sie. Nach dem Herunterladen aus dem Internet werden die Programme gestartet oder in eine Liste von Programmen aufgenommen, die beim Hochfahren des Betriebssystems automatisch ausgeführt werden.Informationen über die Namen und Standorte der heruntergeladenen Programme befinden sich im Trojaner-Code oder werden vom Trojaner aus einer Internet-Ressource (normalerweise einer Webseite) heruntergeladen.
Diese Art von bösartigem Programm wird häufig bei der Erstinfektion von Besuchern von Websites verwendet, die Exploits enthalten.
Mehr Informationen
Plattform: VBS
Visual Basic Scripting Edition (VBScript) ist eine Skriptsprache, die von Windows Script Host interpretiert wird. VBScript wird häufig zum Erstellen von Skripten unter Microsoft Windows-Betriebssystemen verwendet.Familie: Trojan-Downloader.VBS.Agent
No family descriptionExamples
8CA82FA7378DCE17DD05A07CD651A31790351F90041A6313E24730B40B85A648
095408D55DC3B7BE34D710C6D397C9CA
CB97F4CD5B210CBF0A4902134F50C793
CA74E8DC672A26D21B58E4ABE2190DE6
Tactics and Techniques: Mitre*
TA0002
Execution
The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.
T1059.005
Visual Basic
Adversaries may abuse Visual Basic (VB) for execution. VB is a programming language created by Microsoft with interoperability with many Windows technologies such as Component Object Model and the Native API through the Windows API. Although tagged as legacy with no planned future evolutions, VB is integrated and supported in the .NET Framework and cross-platform .NET Core.
TA0011
Command and Control
The adversary is trying to communicate with compromised systems to control them. Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim's network structure and defenses.
T1071
Application Layer Protocol
Adversaries may communicate using OSI application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.