| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Delay Execution - T1678 (a1df809c-7d0e-459f-8fe5-25474bab770b) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Upload Malware - T1608.001 (3ee16395-03f0-4690-a32e-69ce9ada0f9e) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Steal Application Access Token - T1528 (890c9858-598c-401d-a4d5-c67ebcdd703a) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Code Repositories - T1593.003 (70910fbd-58dc-4c1c-8c48-814d11fcd022) |
Attack Pattern |
1 |
| Cloud Secrets Management Stores - T1555.006 (cfb525cc-5494-401d-a82b-2539ca46a561) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Credentials In Files - T1552.001 (837f9164-50af-4ac0-8219-379d8a74cefc) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Match Legitimate Resource Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) |
Attack Pattern |
1 |
| Installer Packages - T1546.016 (da051493-ae9c-4b1b-9760-c009c46c9b56) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Compromise Software Dependencies and Development Tools - T1195.001 (191cc6af-1bb2-4344-ab5f-28e496638720) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Code Repositories - T1213.003 (cff94884-3b1c-4987-a70b-6d5643c621c3) |
Attack Pattern |
1 |
| Systemd Service - T1543.002 (dfefe2ed-4389-4318-8762-f0272b350a1b) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Exfiltration Over C2 Channel - T1041 (92d7da27-2d91-488e-a00c-059dc162766d) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Account Manipulation - T1098 (a10641f4-87b4-45a3-a906-92a149cb2c27) |
Attack Pattern |
1 |
| Break Process Trees - T1036.009 (34a80bc4-80f2-46e6-94ff-f3265a4b657c) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Data Destruction - T1485 (d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Poisoned Pipeline Execution - T1677 (7655ac3b-dfde-49c5-a967-242856174434) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Exfiltration Over Webhook - T1567.004 (43f2776f-b4bd-4118-94b8-fee47e69676d) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
JavaScript - T1059.007 (0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Exfiltration to Code Repository - T1567.001 (86a96bf6-cf8b-411c-aaeb-8959944d64f7) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Automated Collection - T1119 (30208d3e-0d6b-43c8-883e-44462a514619) |
Attack Pattern |
1 |
| Ignore Process Interrupts - T1564.011 (4a2975db-414e-4c0c-bd92-775987514b4b) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Unix Shell - T1059.004 (a9d4b653-6915-42af-98b2-5758c4ceee56) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Cloud Accounts - T1078.004 (f232fa7a-025c-4d43-abc7-318e81a73d65) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Subvert Trust Controls - T1553 (b83e166d-13d7-4b52-8677-dff90c548fd7) |
Attack Pattern |
1 |
| Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
Cloud Instance Metadata API - T1552.005 (19bf235b-8620-4997-b5b4-94e0659ed7c3) |
Attack Pattern |
1 |
| Disable or Modify Tools - T1685 (bbde9781-60aa-4b8a-a911-895b0c1b3872) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Application Access Token - T1550.001 (f005e783-57d4-4837-88ad-dbe7faee1c51) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Sudo and Sudo Caching - T1548.003 (1365fe3b-0f50-455d-b4da-266ce31c23b0) |
Attack Pattern |
Shai-Hulud - S9008 (de376fb9-1093-4f59-8d13-aed61042701d) |
Malware |
1 |
| Stage Capabilities - T1608 (84771bc3-f6a0-403e-b144-01af70e5fda0) |
Attack Pattern |
Upload Malware - T1608.001 (3ee16395-03f0-4690-a32e-69ce9ada0f9e) |
Attack Pattern |
2 |
| Search Open Websites/Domains - T1593 (a0e6614a-7740-4b24-bd65-f1bde09fc365) |
Attack Pattern |
Code Repositories - T1593.003 (70910fbd-58dc-4c1c-8c48-814d11fcd022) |
Attack Pattern |
2 |
| Cloud Secrets Management Stores - T1555.006 (cfb525cc-5494-401d-a82b-2539ca46a561) |
Attack Pattern |
Credentials from Password Stores - T1555 (3fc9b85a-2862-4363-a64d-d692e3ffbee0) |
Attack Pattern |
2 |
| Unsecured Credentials - T1552 (435dfb86-2697-4867-85b5-2fef496c0517) |
Attack Pattern |
Credentials In Files - T1552.001 (837f9164-50af-4ac0-8219-379d8a74cefc) |
Attack Pattern |
2 |
| Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) |
Attack Pattern |
Match Legitimate Resource Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) |
Attack Pattern |
2 |
| Installer Packages - T1546.016 (da051493-ae9c-4b1b-9760-c009c46c9b56) |
Attack Pattern |
Event Triggered Execution - T1546 (b6301b64-ef57-4cce-bb0b-77026f14a8db) |
Attack Pattern |
2 |
| Compromise Software Dependencies and Development Tools - T1195.001 (191cc6af-1bb2-4344-ab5f-28e496638720) |
Attack Pattern |
Supply Chain Compromise - T1195 (3f18edba-28f4-4bb9-82c3-8aa60dcac5f7) |
Attack Pattern |
2 |
| Data from Information Repositories - T1213 (d28ef391-8ed4-45dc-bc4a-2f43abf54416) |
Attack Pattern |
Code Repositories - T1213.003 (cff94884-3b1c-4987-a70b-6d5643c621c3) |
Attack Pattern |
2 |
| Systemd Service - T1543.002 (dfefe2ed-4389-4318-8762-f0272b350a1b) |
Attack Pattern |
Create or Modify System Process - T1543 (106c0cf6-bf73-4601-9aa8-0945c2715ec5) |
Attack Pattern |
2 |
| PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) |
Attack Pattern |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
2 |
| Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) |
Attack Pattern |
Break Process Trees - T1036.009 (34a80bc4-80f2-46e6-94ff-f3265a4b657c) |
Attack Pattern |
2 |
| Exfiltration Over Web Service - T1567 (40597f16-0963-4249-bf4c-ac93b7fb9807) |
Attack Pattern |
Exfiltration Over Webhook - T1567.004 (43f2776f-b4bd-4118-94b8-fee47e69676d) |
Attack Pattern |
2 |
| JavaScript - T1059.007 (0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d) |
Attack Pattern |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
2 |
| Exfiltration Over Web Service - T1567 (40597f16-0963-4249-bf4c-ac93b7fb9807) |
Attack Pattern |
Exfiltration to Code Repository - T1567.001 (86a96bf6-cf8b-411c-aaeb-8959944d64f7) |
Attack Pattern |
2 |
| Ignore Process Interrupts - T1564.011 (4a2975db-414e-4c0c-bd92-775987514b4b) |
Attack Pattern |
Hide Artifacts - T1564 (22905430-4901-4c2a-84f6-98243cb173f8) |
Attack Pattern |
2 |
| Application Layer Protocol - T1071 (355be19c-ffc9-46d5-8d50-d6a036c675b6) |
Attack Pattern |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
2 |
| Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
Unix Shell - T1059.004 (a9d4b653-6915-42af-98b2-5758c4ceee56) |
Attack Pattern |
2 |
| Cloud Accounts - T1078.004 (f232fa7a-025c-4d43-abc7-318e81a73d65) |
Attack Pattern |
Valid Accounts - T1078 (b17a1a56-e99c-403c-8948-561df0cffe81) |
Attack Pattern |
2 |
| Unsecured Credentials - T1552 (435dfb86-2697-4867-85b5-2fef496c0517) |
Attack Pattern |
Cloud Instance Metadata API - T1552.005 (19bf235b-8620-4997-b5b4-94e0659ed7c3) |
Attack Pattern |
2 |
| Application Access Token - T1550.001 (f005e783-57d4-4837-88ad-dbe7faee1c51) |
Attack Pattern |
Use Alternate Authentication Material - T1550 (51a14c76-dd3b-440b-9c20-2bf91d25a814) |
Attack Pattern |
2 |
| Sudo and Sudo Caching - T1548.003 (1365fe3b-0f50-455d-b4da-266ce31c23b0) |
Attack Pattern |
Abuse Elevation Control Mechanism - T1548 (67720091-eee3-4d2d-ae16-8264567f6f5b) |
Attack Pattern |
2 |