..
Click anywhere to stop
Click anywhere to stop
Class | Exploit |
Platform | Java |
Family | Agent |
Full name | Exploit.Java.Agent.ir |
Examples |
4096657C616B803076354C04FDFC8422 6859D3372362E96667DF7F8AD07249FA BD03E386C334D49030BD6268B85DA4E5 FDB0E2A02C148D060707C0FB232853CA 8C4470EB4DF5BFC42D057DB975630CCD |
Updated at | 2023-12-13 13:28:20 |
Tactics & techniques MITRE* |
TA0011 Command and ControlThe adversary is trying to communicate with compromised systems to control them. Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses. T1568 Dynamic ResolutionAdversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control.
* © 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
Adversaries may use dynamic resolution for the purpose of Fallback Channels. When contact is lost with the primary command and control server malware may employ dynamic resolution as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity) |
Find out the statistics of the threats spreading in your region |