[Intel]: https://cujo.com/threat-alert-krane-malware/ #391
Labels
missing:tag:Non-persistentStorage
missing:tag:T1005
missing:tag:T1021.002
missing:tag:T1021.004
missing:tag:T1027.002
missing:tag:T1048
missing:tag:T1053.003
missing:tag:T1057
missing:tag:T1059.006
missing:tag:T1070.003
missing:tag:T1070.004
missing:tag:T1070.006
missing:tag:T1071.001
missing:tag:T1083
missing:tag:T1098.004
missing:tag:T1205
missing:tag:T1222
missing:tag:T1491
missing:tag:T1518
missing:tag:T1546.004
missing:tag:T1548.001
missing:tag:T1552.003
missing:tag:T1552.004
missing:tag:T1560
missing:tag:T1567
missing:tag:T1573
Area
Malware reports
Parent threat
Initial Access, Persistence, Defense Evasion, Impact
Finding
https://cujo.com/threat-alert-krane-malware/
Industry reference
attack:T1110.003:Password Spraying
attack:T098:Account Manipulation
attack:T1105:Ingress Tool Transfer
attack:T1562.003:Impair Command History Logging
attack:T1070.002:Clear Linux or Mac System Logs
attack:T1082:System Information Discovery
attack:T1018:Remote System Discovery
attack:T1021:Remote Services
uses:Non-persistentStorage
Malware reference
Krane
wltm
Actor reference
No response
Component
No response
Scenario
No response
The text was updated successfully, but these errors were encountered: