Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .002 | Account Discovery: Domain Account |
Sykipot may use |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Sykipot has been known to establish persistence by adding programs to the Run Registry key.[2] |
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography | |
Enterprise | T1056 | .001 | Input Capture: Keylogging |
Sykipot contains keylogging functionality to steal passwords.[1] |
Enterprise | T1111 | Multi-Factor Authentication Interception |
Sykipot is known to contain functionality that enables targeting of smart card technologies to proxy authentication for connections to restricted network resources using detected hardware tokens.[1] |
|
Enterprise | T1057 | Process Discovery |
Sykipot may gather a list of running processes by running |
|
Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection |
Sykipot injects itself into running instances of outlook.exe, iexplore.exe, or firefox.exe.[3] |
Enterprise | T1018 | Remote System Discovery |
Sykipot may use |
|
Enterprise | T1016 | System Network Configuration Discovery |
Sykipot may use |
|
Enterprise | T1049 | System Network Connections Discovery |
Sykipot may use |
|
Enterprise | T1007 | System Service Discovery |