Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | Command and Scripting Interpreter |
Windigo has used a Perl script for information gathering.[3] |
|
Enterprise | T1005 | Data from Local System |
Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.[3] |
|
Enterprise | T1189 | Drive-by Compromise |
Windigo has distributed Windows malware via drive-by downloads.[1] |
|
Enterprise | T1083 | File and Directory Discovery |
Windigo has used a script to check for the presence of files created by OpenSSH backdoors.[3] |
|
Enterprise | T1090 | Proxy |
Windigo has delivered a generic Windows proxy Win32/Glubteta.M. Windigo has also used multiple reverse proxy chains as part of their C2 infrastructure.[1] |
|
Enterprise | T1518 | Software Discovery |
Windigo has used a script to detect installed software on targeted systems.[3] |
|
Enterprise | T1082 | System Information Discovery |
Windigo has used a script to detect which Linux distribution and version is currently installed on the system.[3] |