Home >
Enterprise >
Participants >
CrowdStrike >
Masquerading (T1036)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
11.A.6
|
|
|||||
17.A.2
|
Tactic Defense Evasion (TA0005) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
1.A.2
|
|
|||||
6.A.3
|
Tactic Defense Evasion (TA0005) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
APT3 |
||||||||
Step | ATT&CK Pattern |
|
||||||
16.I.1.2
|
|
|||||||
19.A.1.1
|
Tactic Defense Evasion (TA0005) |
|
||||||
19.B.1.3
|
Tactic Defense Evasion (TA0005) |
|
Procedure
Empire: Executed binary (recycler.exe) is a renamed copy of the WinRAR binary
Footnotes
- For any alert in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was shown to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


[3]

