Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Invoke-ShareFinder
|
|
|
|
|
|
CMSTPLUA
dllhost.exe
Regsvr32.exe
|
7-Zip
WinRAR
|
No vulnerabilities exploited available.
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Impact |
|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Command and Scripting Interpreter | Valid Accounts | Valid Accounts | Disable or Modify Tools | OS Credential Dumping | Domain Trust Discovery | Remote Services | Archive Collected Data | Exfiltration Over Web Service | Data Encrypted for Impact |
| Windows Management Instrumentation | Inhibit System Recovery |
No negotiation chats available.
No YARA rules available.
No IoCs available for this group.