Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
RainyDay can use the Windows Command Shell for execution.[1] |
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service | |
Enterprise | T1555 | .003 | Credentials from Password Stores: Credentials from Web Browsers |
RainyDay can use tools to collect credentials from web browsers.[1] |
.004 | Credentials from Password Stores: Windows Credential Manager |
RainyDay can use the QuarksPwDump tool to obtain local passwords and domain cached credentials.[1] |
||
Enterprise | T1005 | Data from Local System |
RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.[1] |
|
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
RainyDay can use a file exfiltration tool to copy files to |
Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography | |
Enterprise | T1567 | .002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
RainyDay can use a file exfiltration tool to upload specific files to Dropbox.[1] |
Enterprise | T1008 | Fallback Channels |
RainyDay has the ability to switch between TCP and HTTP for C2 if one method is not working.[1] |
|
Enterprise | T1083 | File and Directory Discovery |
RainyDay can use a file exfiltration tool to collect recently changed files with specific extensions.[1] |
|
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
RainyDay can use side-loading to run malicious executables.[1] |
Enterprise | T1070 | .004 | Indicator Removal on Host: File Deletion |
RainyDay has the ability to uninstall itself by deleting its service and files.[1] |
Enterprise | T1105 | Ingress Tool Transfer | ||
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
RainyDay has named services and scheduled tasks to appear benign including "ChromeCheck" and "googleupdate."[1] |
.005 | Masquerading: Match Legitimate Name or Location |
RainyDay has used names to mimic legitimate software including "vmtoolsd.exe" to spoof Vmtools.[1] |
||
Enterprise | T1106 | Native API |
The file collection tool used by RainyDay can utilize native API including |
|
Enterprise | T1095 | Non-Application Layer Protocol | ||
Enterprise | T1027 | Obfuscated Files or Information | ||
Enterprise | T1057 | Process Discovery | ||
Enterprise | T1090 | Proxy |
RainyDay can use proxy tools including boost_proxy_client for reverse proxy functionality.[1] |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task | |
Enterprise | T1113 | Screen Capture | ||
Enterprise | T1007 | System Service Discovery |
RainyDay can create and register a service for execution.[1] |
ID | Name | References |
---|---|---|
G0019 | Naikon |