Classe: Hoax
Un canular est un faux avertissement sur un virus ou un autre élément de code malveillant. Habituellement, un canular prend la forme d'un message électronique avertissant le lecteur d'un nouveau virus dangereux et suggérant que le lecteur transmette le message. Les canulars ne causent aucun dommage en eux-mêmes, mais leur distribution par des utilisateurs bien intentionnés provoque souvent de la peur et de l'incertitude. La plupart des fournisseurs d'antivirus incluent des informations de canular sur leurs sites Web et il est toujours conseillé de vérifier avant de transférer les messages d'avertissement.Plus d'informations
Plateforme: Win32
Win32 est une API sur les systèmes d'exploitation Windows NT (Windows XP, Windows 7, etc.) qui prend en charge l'exécution des applications 32 bits. L'une des plateformes de programmation les plus répandues au monde.Famille: Hoax.Win32.BadJoke
No family descriptionExamples
1945FD349232D498ECD7CE10253DAAD118E253A595664641FB06BA0A04B664D5
F12682F0BA12B3B9A018D93243D78E0F
D89E691EDABB7E97EF6B738C92F3D756
F46FC2E991EB4728282DA4B6F955DFDE
Tactics and Techniques: Mitre*
TA0005
Defense Evasion
The adversary is trying to avoid being detected.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
T1070.006
Indicator Removal: Timestomp
Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder. This is done, for example, on files that have been modified or created by the adversary so that they do not appear conspicuous to forensic investigators or file analysis tools.
Timestomping may be used along with file name Masquerading to hide malware and tools.(Citation: WindowsIR Anti-Forensic Techniques)
Timestomping may be used along with file name Masquerading to hide malware and tools.(Citation: WindowsIR Anti-Forensic Techniques)
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.