..
Click anywhere to stop
Click anywhere to stop
Class | Virus |
Platform | Win32 |
Family | Tenga |
Full name | Virus.Win32.Tenga.a |
Examples |
D0417C5D03E7A530FDF510C50C2A0F78 74D76342946D69CE311EBDA58204FDF4 E1ED271194EB63B279DE9139F9832D2E 48EC366ABF5426DEAB44D65EA84603F7 F624DAA53CD8A04669B60E9A03C19EB6 |
Updated at | 2024-01-08 12:12:51 |
Tactics & techniques MITRE* |
TA0005 Defense EvasionThe adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses. T1070.004 Indicator Removal: File DeletionAdversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.
* © 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
There are tools available from the host operating system to perform cleanup, but adversaries may use other tools as well.(Citation: Microsoft SDelete July 2016) Examples of built-in Command and Scripting Interpreter functions include del on Windows and rm or unlink on Linux and macOS. |
Find out the statistics of the threats spreading in your region |