<<< Hide Navigation Hide TOC >>>
Sticky Key Like Backdoor Execution (2fdefcb3-dbda-401e-ae23-f0db027628bc)
Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login screen
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Sticky Key Like Backdoor Execution (2fdefcb3-dbda-401e-ae23-f0db027628bc) | Sigma-Rules | Accessibility Features - T1546.008 (70e52b04-2a0c-4cea-9d18-7149f1df9dc5) | Attack Pattern | 1 |
Event Triggered Execution - T1546 (b6301b64-ef57-4cce-bb0b-77026f14a8db) | Attack Pattern | Accessibility Features - T1546.008 (70e52b04-2a0c-4cea-9d18-7149f1df9dc5) | Attack Pattern | 2 |