Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell |
NKAbuse is initially installed and executed through an initial shell script.[2] |
Enterprise | T1498 | Network Denial of Service |
NKAbuse enables multiple types of network denial of service capabilities across several protocols post-installation.[2] |
|
Enterprise | T1057 | Process Discovery |
NKAbuse will check victim systems to ensure only one copy of the malware is running.[2] |
|
Enterprise | T1090 | .003 | Proxy: Multi-hop Proxy |
NKAbuse has abused the NKN public blockchain protocol for its C2 communications.[1][2] |
Enterprise | T1053 | .003 | Scheduled Task/Job: Cron |
NKAbuse uses a Cron job to establish persistence when infecting Linux hosts.[2] |
Enterprise | T1113 | Screen Capture | ||
Enterprise | T1082 | System Information Discovery |
NKAbuse conducts multiple system checks and includes these in subsequent "heartbeat" messages to the malware's command and control server.[2] |
|
Enterprise | T1016 | .001 | System Network Configuration Discovery: Internet Connection Discovery |
NKAbuse utilizes external services such as |