| Name | Description | 
|---|---|
| ZEROCLEAR | 
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | Command and Scripting Interpreter | 
                                 ZeroCleare can receive command line arguments from an operator to corrupt the file system using the RawDisk driver.[3]  | 
                |
| .001 | PowerShell | 
                                     ZeroCleare can use a malicious PowerShell script to bypass Windows controls.[4]  | 
                    ||
| Enterprise | T1561 | .002 | Disk Wipe: Disk Structure Wipe | 
                                         ZeroCleare can corrupt the file system and wipe the system drive on targeted hosts.[3][2][4]  | 
                        
| Enterprise | T1068 | Exploitation for Privilege Escalation | 
                                 ZeroCleare has used a vulnerable signed VBoxDrv driver to bypass Microsoft Driver Signature Enforcement (DSE) protections and subsequently load the unsigned RawDisk driver.[4]  | 
                |
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion | 
                                         ZeroCleare has the ability to uninstall the RawDisk driver and delete the   | 
                        
| Enterprise | T1680 | Local Storage Discovery | 
                                 ZeroCleare can use the   | 
                |
| Enterprise | T1106 | Native API | 
                                 ZeroCleare can call the   | 
                |
| Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing | 
                                         ZeroCleare can deploy a vulnerable, signed driver on a compromised host to bypass operating system safeguards.[4]  | 
                        
| ID | Name | References | 
|---|---|---|
| G0049 | OilRig | 
                                                         OilRig collaborated on the destructive portion of the ZeroCleare attack.[4]  | 
                                        
| G1001 | HEXANE | 
                                                         HEXANE probed victim infrastructure in support of HomeLand Justice.[1]  | 
                                        
| ID | Name | Description | 
|---|---|---|
| C0038 | HomeLand Justice |