Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
PLEAD has used HTTP for communications with command and control (C2) servers.[2] |
Enterprise | T1010 | Application Window Discovery |
PLEAD has the ability to list open windows on the compromised host.[1] |
|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
PLEAD has the ability to execute shell commands on the compromised host.[2] |
Enterprise | T1555 | Credentials from Password Stores |
PLEAD has the ability to steal saved passwords from Microsoft Outlook.[4] |
|
.003 | Credentials from Web Browsers |
PLEAD has the ability to steal saved credentials from web browsers.[1][4] |
||
Enterprise | T1001 | .001 | Data Obfuscation: Junk Data |
PLEAD samples were found to be highly obfuscated with junk code.[4] |
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography | |
Enterprise | T1083 | File and Directory Discovery |
PLEAD has the ability to list drives and files on the compromised host.[1][2] |
|
Enterprise | T1070 | .004 | Indicator Removal on Host: File Deletion |
PLEAD has the ability to delete files on the compromised host.[1] |
Enterprise | T1105 | Ingress Tool Transfer |
PLEAD has the ability to upload and download files to and from an infected host.[2] |
|
Enterprise | T1057 | Process Discovery |
PLEAD has the ability to list processes on the compromised host.[1] |
|
Enterprise | T1090 | Proxy | ||
Enterprise | T1204 | .001 | User Execution: Malicious Link | |
.002 | User Execution: Malicious File |
PLEAD has been executed via malicious e-mail attachments.[1] |
ID | Name | References |
---|---|---|
G0098 | BlackTech |