Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1560 | Archive Collected Data | ||
Enterprise | T1123 | Audio Capture | ||
Enterprise | T1119 | Automated Collection |
VERMIN saves each collected file with the automatically generated format {0:dd-MM-yyyy}.txt .[1] |
|
Enterprise | T1115 | Clipboard Data | ||
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
VERMIN decrypts code, strings, and commands to use once it's on the victim's machine.[1] |
|
Enterprise | T1070 | .004 | Indicator Removal: File Deletion | |
Enterprise | T1105 | Ingress Tool Transfer |
VERMIN can download and upload files to the victim's machine.[1] |
|
Enterprise | T1056 | .001 | Input Capture: Keylogging | |
Enterprise | T1027 | .002 | Obfuscated Files or Information: Software Packing | |
.013 | Obfuscated Files or Information: Encrypted/Encoded File |
VERMIN is obfuscated using the obfuscation tool called ConfuserEx.[1] |
||
Enterprise | T1057 | Process Discovery |
VERMIN can get a list of the processes and running tasks on the system.[1] |
|
Enterprise | T1113 | Screen Capture |
VERMIN can perform screen captures of the victim’s machine.[1] |
|
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
VERMIN uses WMI to check for anti-virus software installed on the system.[1] |
Enterprise | T1082 | System Information Discovery |
VERMIN collects the OS name, machine name, and architecture information.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery | ||
Enterprise | T1033 | System Owner/User Discovery |