Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1547 | .008 | Boot or Logon Autostart Execution: LSASS Driver |
Pasam establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk.[2] |
Enterprise | T1005 | Data from Local System |
Pasam creates a backdoor through which remote attackers can retrieve files.[2] |
|
Enterprise | T1083 | File and Directory Discovery |
Pasam creates a backdoor through which remote attackers can retrieve lists of files.[2] |
|
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Pasam creates a backdoor through which remote attackers can delete files.[2] |
Enterprise | T1105 | Ingress Tool Transfer |
Pasam creates a backdoor through which remote attackers can upload files.[2] |
|
Enterprise | T1057 | Process Discovery |
Pasam creates a backdoor through which remote attackers can retrieve lists of running processes.[2] |
|
Enterprise | T1082 | System Information Discovery |
Pasam creates a backdoor through which remote attackers can retrieve information such as hostname and free disk space.[2] |