{"description": "Enterprise techniques used by Nebulae, ATT&CK software S0630 (v1.0)", "name": "Nebulae (S0630)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "18", "navigator": "5.2.0"}, "techniques": [{"techniqueID": "T1547", "showSubtechniques": true}, {"techniqueID": "T1547.001", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can achieve persistence through a Registry Run key.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1059", "showSubtechniques": true}, {"techniqueID": "T1059.003", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can use CMD to execute a process.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1543", "showSubtechniques": true}, {"techniqueID": "T1543.003", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can create a service to establish persistence.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1005", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) has the capability to upload collected files to C2.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1573", "showSubtechniques": true}, {"techniqueID": "T1573.001", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can use RC4 and XOR to encrypt C2 communications.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1083", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can list files and directories on a compromised host.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1574", "showSubtechniques": true}, {"techniqueID": "T1574.001", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can use DLL side-loading to gain execution.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1070", "showSubtechniques": true}, {"techniqueID": "T1070.004", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) has the ability to delete files and directories.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1105", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can download files from C2.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1680", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can discover logical drive information including the drive type, free space, and volume information.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1036", "showSubtechniques": true}, {"techniqueID": "T1036.004", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) has created a service named \"Windows Update Agent1\" to appear legitimate.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1036.005", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) uses functions named StartUserModeBrowserInjection and StopUserModeBrowserInjection indicating that it's trying to imitate chrome_frame_helper.dll.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1106", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) has the ability to use CreateProcess to execute a process.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1095", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can use TCP in C2 communications.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1057", "comment": "[Nebulae](https://attack.mitre.org/software/S0630) can enumerate processes on a target system.(Citation: Bitdefender Naikon April 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by Nebulae", "color": "#66b1ff"}]}