MALWARE-TOOLS --
MALWARE-TOOLS Win.Malware.ReconShark variant payload download
This rule looks for bytes known to be specific to a Win.Malware.ReconShark variant payload.
This rule fires on attempts to download a Win.Malware.ReconShark variant payload.
Attacks/Scans seen in the wild
No known false positives
Cisco Talos Intelligence Group
MITRE::ATT&CK Framework::Enterprise::Execution::User Execution::Malicious File
None
No information provided
None
MITRE TTP | T1204.002 Malicious File |
---|---|
MITRE ID | T1204.002 |
Tactic | Execution |
Technique | User Execution |
Subtechnique | Malicious File |
Description | An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from Spearphishing Attachment. Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl. |