Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
No victim
No victim
No tools used available.
No vulnerabilities exploited available.
| Persistence | Privilege Escalation | Defense Evasion | Discovery | Collection | Impact |
|---|---|---|---|---|---|
| Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Create or Modify System Process | Deobfuscate/Decode Files or Information | Query Registry | Data Staged | Inhibit System Recovery |
| Abuse Elevation Control Mechanism: Bypass User Account Control | Indicator Removal: Timestomp | Process Discovery | Input Capture | Service Stop | |
| Impair Defenses: Disable or Modify Tools | Account Discovery | ||||
| Virtualization/Sandbox Evasion | |||||
| File and Directory Discovery |
No negotiation chats available.