Classe: Worm
Les vers se propagent sur les réseaux informatiques via des ressources réseau. Contrairement à Net-Worms, un utilisateur doit lancer un ver afin qu'il soit activé. Ce type de ver recherche les réseaux informatiques distants et se copie dans les répertoires accessibles en lecture / écriture (s'il en trouve). En outre, ces vers utilisent les fonctions intégrées du système d'exploitation pour rechercher des répertoires réseau accessibles et / ou ils recherchent au hasard des ordinateurs sur Internet, s'y connectent et tentent d'accéder pleinement aux disques de ces ordinateurs. Cette catégorie couvre également les vers qui, pour une raison ou une autre, ne rentrent dans aucune des autres catégories définies ci-dessus (par exemple les vers pour les appareils mobiles).Plus d'informations
Plateforme: Win32
Win32 est une API sur les systèmes d'exploitation Windows NT (Windows XP, Windows 7, etc.) qui prend en charge l'exécution des applications 32 bits. L'une des plateformes de programmation les plus répandues au monde.Famille: Worm.Win32.Vobfus
No family descriptionExamples
EB2666175508D612826EBDF5576083374DBB2AFA8DABAE7AD3A074B609A64A69
846AFDDF11B88E074DA51DE006122AAD
F801F5050C31C3B32E0846E42D00B34E
F24B9CE723716DBE0BACDF1861D8F901
Tactics and Techniques: Mitre*
TA0005
Defense Evasion
The adversary is trying to avoid being detected.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
T1036
Masquerading
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.
Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site) Masquerading may also include the use of Proxy or VPNs to disguise IP addresses, which can allow adversaries to blend in with normal network traffic and bypass conditional access policies or anti-abuse protections.
Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site) Masquerading may also include the use of Proxy or VPNs to disguise IP addresses, which can allow adversaries to blend in with normal network traffic and bypass conditional access policies or anti-abuse protections.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.