Mis-Type is a backdoor hybrid that was used in Operation Dust Storm by 2012.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .001 | Account Discovery: Local Account |
Mis-Type may create a file containing the results of the command |
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1547 | Boot or Logon Autostart Execution |
Mis-Type has created registry keys for persistence, including |
|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Mis-Type has used |
Enterprise | T1136 | .001 | Create Account: Local Account |
Mis-Type may create a temporary user on the system named |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
Enterprise | T1005 | Data from Local System |
Mis-Type has collected files and data from a compromised host.[1] |
|
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
Mis-Type has temporarily stored collected information to the files |
Enterprise | T1041 | Exfiltration Over C2 Channel |
Mis-Type has transmitted collected files and data to its C2 server.[1] |
|
Enterprise | T1008 | Fallback Channels |
Mis-Type first attempts to use a Base64-encoded network protocol over a raw TCP socket for C2, and if that method fails, falls back to a secondary HTTP-based protocol to communicate to an alternate C2 server.[1] |
|
Enterprise | T1105 | Ingress Tool Transfer |
Mis-Type has downloaded additional malware and files onto a compromised host.[1] |
|
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Mis-Type saves itself as a file named |
Enterprise | T1106 | Native API |
Mis-Type has used Windows API calls, including |
|
Enterprise | T1095 | Non-Application Layer Protocol |
Mis-Type network traffic can communicate over a raw socket.[1] |
|
Enterprise | T1055 | Process Injection |
Mis-Type has been injected directly into a running process, including |
|
Enterprise | T1082 | System Information Discovery |
The initial beacon packet for Mis-Type contains the operating system version and file system of the victim.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery |
Mis-Type may create a file containing the results of the command |
|
Enterprise | T1033 | System Owner/User Discovery |
Mis-Type runs tests to determine the privilege level of the compromised user.[1] |
ID | Name | Description |
---|---|---|
C0016 | Operation Dust Storm |