Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
Enterprise | T1574 | .001 | Hijack Execution Flow: DLL Search Order Hijacking |
Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to |
Enterprise | T1105 | Ingress Tool Transfer |
ID | Name | References |
---|---|---|
G0006 | APT1 |