Sınıf: Hoax
Bir aldatmaca, bir virüs veya başka bir zararlı kod parçası hakkında sahte bir uyarıdır. Tipik olarak bir aldatmaca, tehlikeli yeni bir virüsün okuyucusunu uyaran ve okuyucunun mesajı ilettiğini ileri süren bir e-posta mesajı biçiminde olur. Aldatmacalar kendilerine zarar vermez, fakat iyi niyetli kullanıcılar tarafından dağıtımı genellikle korku ve belirsizliğe neden olur. Çoğu virüsten koruma yazılımı satıcıları web sitelerinde aldatmaca bilgileri içerir ve uyarı mesajlarını iletmeden önce her zaman kontrol edilmesi önerilir.Platform: MSIL
Ortak Ara Dil (eski adı Microsoft Orta Düzey Dili veya MSIL), Microsoft'un .NET Framework için geliştirdiği bir ara dildir. CIL kodu, Microsoft Visual Studio'da (Visual Basic .NET, Visual C ++, Visual C # ve diğerleri) tüm Microsoft .NET derleyicileri tarafından oluşturulur.Aile: Hoax.MSIL.ArchSMS
No family descriptionExamples
978E2E40D8964CF3E40B15B81DF9E3DEB39880B4FD35EEACA44314B4B1A3CBF8
A9BE1C25402C32411F9525A419AB6B51
24A256F883AA155326E242FA86CEC2DF
92659F42A828F426C5A5E1BDA6E80756
Tactics and Techniques: Mitre*
TA0007
Discovery
The adversary is trying to figure out your environment.
Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network. These techniques help adversaries observe the environment and orient themselves before deciding how to act. They also allow adversaries to explore what they can control and what’s around their entry point in order to discover how it could benefit their current objective. Native operating system tools are often used toward this post-compromise information-gathering objective.
Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network. These techniques help adversaries observe the environment and orient themselves before deciding how to act. They also allow adversaries to explore what they can control and what’s around their entry point in order to discover how it could benefit their current objective. Native operating system tools are often used toward this post-compromise information-gathering objective.
T1518.001
Software Discovery: Security Software Discovery
Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as firewall rules and anti-virus. Adversaries may use the information from Security Software Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Example commands that can be used to obtain security software information are netsh,
Adversaries may also utilize cloud APIs to discover the configurations of firewall rules within an environment.(Citation: Expel IO Evil in AWS) For example, the permitted IP ranges, ports or user accounts for the inbound/outbound rules of security groups, virtual firewalls established within AWS for EC2 and/or VPC instances, can be revealed by the
Example commands that can be used to obtain security software information are netsh,
reg query with Reg, dir with cmd, and Tasklist, but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for. It is becoming more common to see macOS malware perform checks for LittleSnitch and KnockKnock software.Adversaries may also utilize cloud APIs to discover the configurations of firewall rules within an environment.(Citation: Expel IO Evil in AWS) For example, the permitted IP ranges, ports or user accounts for the inbound/outbound rules of security groups, virtual firewalls established within AWS for EC2 and/or VPC instances, can be revealed by the
DescribeSecurityGroups action with various request parameters. (Citation: DescribeSecurityGroups - Amazon Elastic Compute Cloud) * © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.