..
Click anywhere to stop
Click anywhere to stop
Class | Trojan-Spy |
Platform | Win32 |
Family | Delf |
Full name | Trojan-Spy.Win32.Delf.ps |
Examples |
FD7C644917966C365E264F378748928B 652A5C3DB11B483D6807BD44CD5E06D5 3932E490D0692B4BDC1598B39C9AA819 EC0BEC3B22E280DC253458D1EFB5857E 20D152FD08F44CA79E16652E5FF31FBC |
Updated at | 2023-12-12 17:25:59 |
Tactics & techniques MITRE* |
TA0005 Defense EvasionThe adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses. T1564.001 Hide Artifacts: Hidden Files and DirectoriesAdversaries may set files and directories to be hidden to evade detection mechanisms. To prevent normal users from accidentally changing special files on a system, most operating systems have the concept of a ‘hidden’ file. These files don’t show up when a user browses the file system with a GUI or when using normal commands on the command line. Users must explicitly ask to show the hidden files either via a series of Graphical User Interface (GUI) prompts or with command line switches (
* © 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
dir /a for Windows and ls –a for Linux and macOS).On Linux and Mac, users can mark specific files as hidden simply by putting a “.” as the first character in the file or folder name (Citation: Sofacy Komplex Trojan) (Citation: Antiquated Mac Malware). Files and folders that start with a period, ‘.’, are by default hidden from being viewed in the Finder application and standard command-line utilities like “ls”. Users must specifically change settings to have these files viewable. Files on macOS can also be marked with the UF_HIDDEN flag which prevents them from being seen in Finder.app, but still allows them to be seen in Terminal.app (Citation: WireLurker). On Windows, users can mark specific files as hidden by using the attrib.exe binary. Many applications create these hidden files and folders to store information so that it doesn’t clutter up the user’s workspace. For example, SSH utilities create a .ssh folder that’s hidden and contains the user’s known hosts and keys. Adversaries can use this to their advantage to hide files and folders anywhere on the system and evading a typical user or system analysis that does not incorporate investigation of hidden files. |
Find out the statistics of the threats spreading in your region |