Common Information
Type Value
Value
Match Legitimate Name or Location - T1036.005
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by placing an executable in a commonly trusted directory (ex: under System32) or giving it the name of a legitimate, trusted program (ex: svchost.exe). In containerized environments, this may also be done by creating a resource in a namespace that matches the naming convention of a container pod or cluster. Alternatively, a file or container image name given may be a close approximation to legitimate programs/images or something innocuous. Adversaries may also use the same icon of the file they are trying to mimic.
Details Published Attributes CTI Title
Details Website 2022-06-01 50 Analyzing AsyncRAT distributed in Colombia | Welcome to Jstnk webpage
Details Website 2022-05-17 679 Space Pirates: analyzing the tools and connections of a new hacker group
Details Website 2022-04-27 202 A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity | WeLiveSecurity
Details Website 2022-04-27 57 UNC2452 Merged into APT29 | Russia-Based Espionage Group
Details Website 2022-03-25 121 Mustang Panda’s Hodur : Vieux trucs, nouvelle variante de Korplug | WeLiveSecurity
Details Website 2022-02-24 123 Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks | CISA
Details Website 2022-02-21 24 Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network
Details Website 2022-01-18 158 DoNot Go! Do not respawn! | WeLiveSecurity
Details Website 2021-12-14 56 Tropic Trooper Targets Transportation and Government Organizations
Details Website 2021-12-09 16 The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs
Details Website 2021-11-29 92 ScarCruft surveilling North Korean defectors and human rights activists
Details Website 2021-11-15 93 Exchange Exploit Leads to Domain Wide Ransomware
Details Website 2021-09-23 30 HCRootkit / Sutersu Linux Rootkit Analysis
Details Website 2021-08-01 506 Lazarus Group’s Mata Framework Leveraged To Deploy TFlower Ransomware
Details Website 2021-07-16 12 REvil Ransomware Uses DLL Sideloading | McAfee Blog
Details Website 2021-07-05 79 Kaseya, Sera. What REvil Shall Encrypt, Shall Encrypt
Details Website 2021-06-24 60 Demystifying the full attack chain of MineBridge RAT | Zscaler
Details Website 2021-06-15 126 Andariel evolves to target South Korea with ransomware
Details Website 2021-04-22 33 CISA Identifies SUPERNOVA Malware During Incident Response | CISA
Details Website 2021-04-21 36 Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
Details Website 2021-04-20 102 Authentication Bypass Techniques and Pulse Secure Zero-Day
Details Website 2021-01-21 43 Vadokrist: A wolf in sheep’s clothing | WeLiveSecurity
Details Website 2021-01-12 216 Abusing cloud services to fly under the radar
Details Website 2021-01-12 215 Abusing cloud services to fly under the radar
Details Website 2020-12-22 66 Spicy Hot Pot Rootkit: Finding, Hunting, and Eradicating It