Name | Description |
---|---|
SNAKEHOSE |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1486 | Data Encrypted for Impact |
EKANS uses standard encryption library functions to encrypt files.[1][2] |
|
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
EKANS stops processes related to security and management software.[1][3] |
Enterprise | T1490 | Inhibit System Recovery |
EKANS removes backups of Volume Shadow Copies to disable any restoration capabilities.[1][2] |
|
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
EKANS has been disguised as |
Enterprise | T1027 | Obfuscated Files or Information | ||
Enterprise | T1057 | Process Discovery | ||
Enterprise | T1489 | Service Stop |
EKANS stops database, data backup solution, antivirus, and ICS-related processes.[1][3][2] |
|
Enterprise | T1016 | System Network Configuration Discovery | ||
Enterprise | T1047 | Windows Management Instrumentation |
EKANS can use Windows Mangement Instrumentation (WMI) calls to execute operations.[1] |