Sınıf: Trojan-Ransom
Bu tür bir Trojan, kurbanın bilgisayarındaki verileri değiştirir, böylece kurban artık verileri kullanamaz veya bilgisayarın düzgün çalışmasını engeller. Veriler “rehin alındığında” (bloke veya şifreli) olduğunda, kullanıcı fidye talebinde bulunacaktır. Fidye talebi, kurbanın kötü niyetli kullanıcı parasını göndermesini söyler; Bunu aldıktan sonra, siber suçlu, verileri geri yüklemek veya bilgisayarın performansını geri yüklemek için kurbanı bir program gönderecektir.Platform: Win32
Win32, 32-bit uygulamaların yürütülmesini destekleyen Windows NT tabanlı işletim sistemlerinde (Windows XP, Windows 7, vb.) Bir API'dir. Dünyanın en yaygın programlama platformlarından biri.Aile: Trojan-Ransom.Win32.PornoAsset
No family descriptionExamples
53CAB278DB49D256B76E431862E4A659Tactics and Techniques: Mitre*
TA0003
Persistence
The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.
T1547.014
Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine. Active Setup is a Windows mechanism that is used to execute programs when a user logs in. The value stored in the Registry key will be executed after a user logs into the computer. These programs will be executed under the context of the user and will have the account's associated permissions level.
TA0004
Privilege Escalation
The adversary is trying to gain higher-level permissions. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include: SYSTEM/root level, local administrator, user account with admin-like access, user accounts with access to specific system or perform specific function. These techniques often overlap with Persistence techniques, as OS features that let an adversary persist can execute in an elevated context.
T1547.014
Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine. Active Setup is a Windows mechanism that is used to execute programs when a user logs in. The value stored in the Registry key will be executed after a user logs into the computer. These programs will be executed under the context of the user and will have the account's associated permissions level.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.