{"description": "Enterprise techniques used by USBferry, ATT&CK software S0452 (v1.0)", "name": "USBferry (S0452)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "18", "navigator": "5.2.0"}, "techniques": [{"techniqueID": "T1087", "showSubtechniques": true}, {"techniqueID": "T1087.001", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can use net user to gather information about local accounts.(Citation: TrendMicro Tropic Trooper May 2020)\t", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1059", "showSubtechniques": true}, {"techniqueID": "T1059.003", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can execute various Windows commands.(Citation: TrendMicro Tropic Trooper May 2020)\t", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1005", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can collect information from an air-gapped host machine.(Citation: TrendMicro Tropic Trooper May 2020)\t", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1083", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can detect the victim's file or folder list.(Citation: TrendMicro Tropic Trooper May 2020)\t", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1120", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can check for connected USB devices.(Citation: TrendMicro Tropic Trooper May 2020)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1057", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can use tasklist to gather information about the process running on the infected system.(Citation: TrendMicro Tropic Trooper May 2020)\t", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1018", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can use net view to gather information about remote systems.(Citation: TrendMicro Tropic Trooper May 2020)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1091", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can copy its installer to attached USB storage devices.(Citation: TrendMicro Tropic Trooper May 2020)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1218", "showSubtechniques": true}, {"techniqueID": "T1218.011", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can execute rundll32.exe in memory to avoid detection.(Citation: TrendMicro Tropic Trooper May 2020)\t", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1016", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can detect the infected machine's network topology using ipconfig and arp.(Citation: TrendMicro Tropic Trooper May 2020)\t", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1049", "comment": "[USBferry](https://attack.mitre.org/software/S0452) can use netstat and nbtstat to detect active network connections.(Citation: TrendMicro Tropic Trooper May 2020)\t", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by USBferry", "color": "#66b1ff"}]}