Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.2
|
|
|
A General alert detection (high severity) called "Fileless Powershell Malware" was generated due to PowerShell executing a paylaod with IEX and Get-Content.
[1]
|
|
Telemetry showed powershell.exe executing the schemas ADS with Get-Content and IEX.
|
|
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
[1]
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
-
Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.