Skip to content

Latest commit

 

History

History
59 lines (48 loc) · 1.94 KB

exploitation-for-client-execution.md

File metadata and controls

59 lines (48 loc) · 1.94 KB
ID E1203
Objective(s) Execution, Impact
Related ATT&CK Techniques Exploitation for Client Execution (T1203)
Impact Type Breach
Version 3.0
Created 1 August 2019
Last Modified 1 March 2023

Exploitation for Client Execution

Software is exploited - either because of a vulnerability or through its designed features - to gain access for malware. In general, exploitation may be done by a human attacker, but MBC focuses on software exploits implemented in code. Malware-specific details are below.

See ATT&CK: Exploitation for Client Execution (T1203).

Methods

Name ID Description
File Transfer Protocol (FTP) Servers E1203.m03 Malware leverages an FTP server.
Java-based Web Servers E1203.m02 Malware leverages a Java-based web server.
Red Hat JBoss Enterprise Products E1203.m04 Malware leverages JBoss Enterprise products.
Remote Desktop Protocols E1203.m01 RDP is used by malware.
Sysinternals E1203.m05 Sysinternals tools are used for additional command line functionality.
Windows Utilities E1203.m06 One or more Windows utilities are used.

Use in Malware

Name Date Method Description
SamSam 2015 E1203.m01 Attackers associated with SamSam exploit vulnerabilities in remote desktop protocols (RDP), Java-based web servers, or file transfer protocol (FTP) servers. [1]

References

[1] https://blog.malwarebytes.com/cybercrime/2018/05/samsam-ransomware-need-know/