Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography | |
.002 | Encrypted Channel: Asymmetric Cryptography | |||
Enterprise | T1041 | Exfiltration Over C2 Channel | ||
Enterprise | T1083 | File and Directory Discovery |
Mango can enumerate the contents of current working or other specified directories.[1] |
|
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Mango contains an unused capability to block endpoint security solutions from loading user-mode code hooks via a DLL in a specified process by using the |
Enterprise | T1106 | Native API | ||
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File | |
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Mango can create a scheduled task to run every 32 seconds to communicate with C2 and execute received commands.[1] |
Enterprise | T1082 | System Information Discovery |
Mango can collect the machine name of a compromised system which is later used as part of a unique victim identifier.[1] |
|
Enterprise | T1033 | System Owner/User Discovery |
Mango can collect the user name from a compromised system which is used to create a unique victim identifier.[1] |
|
Enterprise | T1204 | .002 | User Execution: Malicious File |
Mango has been executed through a Microsoft Word document with a malicious macro.[1] |