| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1574 | .006 | Hijack Execution Flow: Dynamic Linker Hijacking |
MEDUSA can execute code through dynamic linker hijacking of the |
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File | |
| Enterprise | T1563 | .001 | Remote Service Session Hijacking: SSH Hijacking |
MEDUSA can be configured to capture SSH credentials via SSH hijacking.[1] |
| Enterprise | T1014 | Rootkit |
MEDUSA is a rootkit with command execution and credential logging capabilities.[1] |
|
| ID | Name | Description |
|---|---|---|
| C0056 | RedPenguin |
MEDUSA was used for command execution and persistence during RedPenguin.[2] |