Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .002 | Account Discovery: Domain Account |
ToddyCat has run |
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
ToddyCat has leveraged xcopy, 7zip, and RAR to stage and compress collected documents prior to exfiltration.[2] |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
ToddyCat has used Powershell scripts to perform post exploit collection.[2] |
.003 | Command and Scripting Interpreter: Windows Command Shell |
ToddyCat has used .bat scripts and |
||
Enterprise | T1005 | Data from Local System |
ToddyCat has run scripts to collect documents from targeted hosts.[2] |
|
Enterprise | T1074 | .002 | Data Staged: Remote Data Staging |
ToddyCat manually transferred collected files to an exfiltration host using xcopy.[2] |
Enterprise | T1567 | .002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
ToddyCat has used a DropBox uploader to exfiltrate stolen files.[2] |
Enterprise | T1190 | Exploit Public-Facing Application |
ToddyCat has exploited the ProxyLogon vulnerability (CVE-2021-26855) to compromise Exchange Servers at multiple organizations.[1] |
|
Enterprise | T1083 | File and Directory Discovery |
ToddyCat has run scripts to enumerate recently modified documents having either a .pdf, .doc, .docx, .xls or .xlsx extension.[2] |
|
Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
ToddyCat has hidden malicious scripts using |
Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
Prior to executing a backdoor ToddyCat has run |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
ToddyCat has used the name |
Enterprise | T1106 | Native API |
ToddyCat has used |
|
Enterprise | T1095 | Non-Application Layer Protocol |
ToddyCat has used a passive backdoor that receives commands with UDP packets.[2] |
|
Enterprise | T1069 | .002 | Permission Groups Discovery: Domain Groups |
ToddyCat has executed |
Enterprise | T1566 | .003 | Phishing: Spearphishing via Service |
ToddyCat has sent loaders configured to run Ninja as zip archives via Telegram.[1] |
Enterprise | T1057 | Process Discovery |
ToddyCat has run |
|
Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
ToddyCat has used locally mounted network shares for lateral movement through targated environments.[2] |
Enterprise | T1018 | Remote System Discovery |
ToddyCat has used |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
ToddyCat has used scheduled tasks to execute discovery commands and scripts for collection.[2] |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
ToddyCat can determine is Kaspersky software is running on an endpoint by running |
Enterprise | T1082 | System Information Discovery |
ToddyCat has collected information on bootable drives including model, vendor, and serial numbers.[2] |
|
Enterprise | T1049 | System Network Connections Discovery |
ToddyCat has used |
|
Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts |
ToddyCat has used compromised domain admin credentials to mount local network shares.[2] |
Enterprise | T1047 | Windows Management Instrumentation |
ToddyCat has used WMI to execute scripts for post exploit document collection.[2] |