クラス: Trojan-Dropper
Trojan-Dropperプログラムは、コードに組み込まれた悪質なプログラムを犠牲PCに秘密裏にインストールするように設計されています。この種の悪意のあるプログラムは通常、被害者のドライブ(通常はWindowsディレクトリ、Windowsシステムディレクトリ、一時ディレクトリなど)に一定の範囲のファイルを保存し、通知なしで起動します(またはアーカイブエラーの偽の通知、古いオペレーティングシステムのバージョンなど)。このようなプログラムは、以下の目的でハッカーによって使用されています。トロイの木馬プログラムおよび/またはウイルスを秘密裏にインストールして、既知の悪意のあるプログラムがウイルス対策ソリューションによって検出されないようにします。すべてのウイルス対策プログラムがこのタイプのトロイの木馬の中のすべてのコンポーネントをスキャンできるわけではありません。プラットフォーム: Win32
Win32は、32ビットアプリケーションの実行をサポートするWindows NTベースのオペレーティングシステム(Windows XP、Windows 7など)上のAPIです。世界で最も広く普及しているプログラミングプラットフォームの1つです。ファミリー: Trojan-Dropper.Win32.Sysn
No family descriptionExamples
05872831D21DEC5B9E09DD9CB9CB17574286D0746741D9C49B30BD762E877BCD
4702BC08390D5FB28E57E2B896BDB8A4
D9226DC2B79F393BE1E6B1F4E8853167
CD36EA8184166E1F32322DD2D0A7B8E0
Tactics and Techniques: Mitre*
TA0011
Command and Control
The adversary is trying to communicate with compromised systems to control them.
Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses.
Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses.
T1095
Non-Application Layer Protocol
Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected hosts within a network. The list of possible protocols is extensive.(Citation: Wikipedia OSI) Specific examples include use of network layer protocols, such as the Internet Control Message Protocol (ICMP), transport layer protocols, such as the User Datagram Protocol (UDP), session layer protocols, such as Socket Secure (SOCKS), as well as redirected/tunneled protocols, such as Serial over LAN (SOL).
ICMP communication between hosts is one example.(Citation: Cisco Synful Knock Evolution) Because ICMP is part of the Internet Protocol Suite, it is required to be implemented by all IP-compatible hosts.(Citation: Microsoft ICMP) However, it is not as commonly monitored as other Internet Protocols such as TCP or UDP and may be used by adversaries to hide communications.
ICMP communication between hosts is one example.(Citation: Cisco Synful Knock Evolution) Because ICMP is part of the Internet Protocol Suite, it is required to be implemented by all IP-compatible hosts.(Citation: Microsoft ICMP) However, it is not as commonly monitored as other Internet Protocols such as TCP or UDP and may be used by adversaries to hide communications.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.