Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1560 | Archive Collected Data | ||
Enterprise | T1005 | Data from Local System | ||
Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography |
WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS.[1][2] |
Enterprise | T1105 | Ingress Tool Transfer |
WellMail can receive data and executable scripts from C2.[1] |
|
Enterprise | T1095 | Non-Application Layer Protocol | ||
Enterprise | T1571 | Non-Standard Port |
WellMail has been observed using TCP port 25, without using SMTP, to leverage an open port for secure command and control communications.[1][2] |
|
Enterprise | T1016 | System Network Configuration Discovery |
WellMail can identify the IP address of the victim system.[1] |
|
Enterprise | T1033 | System Owner/User Discovery |
WellMail can identify the current username on the victim system.[1] |
ID | Name | References |
---|---|---|
G0016 | APT29 |