Home >
Enterprise >
Participants >
Trend Micro >
File and Directory Discovery (T1083)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
4.A.1
|
Tactic Discovery (TA0007) |
|
||||
5.B.4
![]() |
Tactic Discovery (TA0007) |
|
||||
7.C.2
|
Tactic Discovery (TA0007) |
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
2.A.1
|
Tactic Discovery (TA0007) |
|
||||||
4.C.1
|
Tactic Discovery (TA0007) |
|
||||||
9.B.2
|
Tactic Discovery (TA0007) |
|
||||||
11.A.9
|
Tactic Discovery (TA0007) |
|
||||||
12.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Checked that the payload is not inside a folder path that contains "sample" or is the length of a hash value using PowerShell
Criteria
powershell.exe executing (Get-Item -Path ".\" -Verbose).FullName
Footnotes
- The logic used to produce this detection was configured after the start of the evaluation, so it is identified as a Detection Configuration Change.

