Searching
..

Click anywhere to stop

Exploit.Java.Agent.ir

Class Exploit
Platform Java
Family Agent
Full name Exploit.Java.Agent.ir
Examples 4096657C616B803076354C04FDFC8422
6859D3372362E96667DF7F8AD07249FA
BD03E386C334D49030BD6268B85DA4E5
FDB0E2A02C148D060707C0FB232853CA
8C4470EB4DF5BFC42D057DB975630CCD
Updated at 2023-12-13 13:28:20
Tactics &
techniques MITRE*

TA0011 Command and Control

The adversary is trying to communicate with compromised systems to control them.


Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses.


T1568 Dynamic Resolution

Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control.

Adversaries may use dynamic resolution for the purpose of Fallback Channels. When contact is lost with the primary command and control server malware may employ dynamic resolution as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)
* © 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
Find out the statistics of the threats spreading in your region