Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1010 | Application Window Discovery |
Catchamas obtains application windows titles and then determines which windows to perform Screen Capture on.[1] |
|
Enterprise | T1115 | Clipboard Data | ||
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
Catchamas adds a new service named NetAdapter to establish persistence.[1] |
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
Catchamas stores the gathered data from the machine in .db files and .bmp files under four separate locations.[1] |
Enterprise | T1056 | .001 | Input Capture: Keylogging | |
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service.[1] |
Enterprise | T1112 | Modify Registry |
Catchamas creates three Registry keys to establish persistence by adding a Windows Service.[1] |
|
Enterprise | T1113 | Screen Capture |
Catchamas captures screenshots based on specific keywords in the window’s title.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery |
Catchamas gathers the Mac address, IP address, and the network adapter information from the victim’s machine.[1] |
ID | Name | References |
---|---|---|
G0076 | Thrip |