Name | Description |
---|---|
Gelsevirine | |
Gelsenicine | |
Gelsemine |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control |
Gelsemium can bypass UAC to elevate process privileges on a compromised host.[1] |
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1560 | .002 | Archive Collected Data: Archive via Library |
Gelsemium can compress embedded executables with the zlib library.[1] |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | |
.012 | Boot or Logon Autostart Execution: Print Processors |
Gelsemium can drop itself in |
||
Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
Enterprise | T1083 | File and Directory Discovery | ||
Enterprise | T1070 | .004 | Indicator Removal on Host: File Deletion |
Gelsemium can delete its dropper component from the targeted system.[1] |
.006 | Indicator Removal on Host: Timestomp |
Gelsemium has the ability to perform timestomping on targeted systems.[1] |
||
Enterprise | T1105 | Ingress Tool Transfer |
Gelsemium can download additional plug-ins to a compromised host.[1] |
|
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Gelsemium can set its persistence in the Registry with the key value |
Enterprise | T1112 | Modify Registry |
Gelsemium has the ability to store its components in the Registry.[1] |
|
Enterprise | T1095 | Non-Application Layer Protocol |
Gelsemium has the ability to use TCP and UDP in C2 communications.[1] |
|
Enterprise | T1027 | Obfuscated Files or Information | ||
.001 | Binary Padding |
Gelsemium can use junk code to hide functions and evade detection.[1] |
||
Enterprise | T1057 | Process Discovery | ||
Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection |
Gelsemium has the ability to inject DLLs into specific processes.[1] |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Gelsemium can check for the presence of specific security products.[1] |
Enterprise | T1082 | System Information Discovery |
Gelsemium can determine the operating system and whether a targeted machine has a 32 or 64 bit architecture.[1] |
|
Enterprise | T1033 | System Owner/User Discovery |
Gelsemium has the ability to distinguish between a standard user and an administrator on a compromised host.[1] |
ID | Name | References |
---|---|---|
G0141 | Gelsemium |