Miscellaneous indicators
This section lists the indicators that do not fit into the other categories.
|
Indicator |
Description |
|---|---|
|
AutoitFileOperations |
The AutoIt script can perform multiple actions on files. This may be used for information gathering, persistence, or destruction. |
|
AutorunString |
The file has the capability to achieve persistence by using autorun mechanisms. |
|
CodepageLookupImports |
The file imports functions used to look up the codepage (location) of a running system. Malware uses this to differentiate in which country/region a system is running in to better target particular groups. |
|
MutexImports |
The file imports functions to create and manipulate mutex objects. Malware frequently uses mutexes to avoid infecting a system multiple times. |
|
OpenSSLStatic |
The file contains a version of OpenSSL compiled to appear stealthy. Malware does this to include cryptography functionality without leaving strong evidence of it. |
|
PListString |
The file has the capability to interact with property lists that are used by the operating system. This may be used to achieve persistence or to subvert various processes. |
|
PrivEscalationCryptBase |
The file shows evidence of attempting to use a privilege escalation using CryptBase. Malware uses this to gain more privileges on the affected system. |
|
ShellCommandString |
The file has the capability to use sensitive shell commands for reconnaissance, elevation of privilege, or data destruction. |
|
SystemCallSuspicious |
The file has the capability to monitor or control system and other processes, performing debug-like actions. |