Miscellaneous indicators
This section lists the indicators that do not fit into the other categories.
Indicator | Description |
---|---|
AutoitFileOperations | The AutoIt script can perform multiple actions on files. This may be used for information gathering, persistence, or destruction. |
AutorunString | The file has the capability to achieve persistence by using autorun mechanisms. |
CodepageLookupImports | The file imports functions used to look up the codepage (location) of a running system. Malware uses this to differentiate in which country/region a system is running in to better target particular groups. |
MutexImports | The file imports functions to create and manipulate mutex objects. Malware frequently uses mutexes to avoid infecting a system multiple times. |
OpenSSL Static | The file contains a version of OpenSSL compiled to appear stealthy. Malware does this to include cryptography functionality without leaving strong evidence of it. |
PListString | The file has the capability to interact with property lists that are used by the operating system. This may be used to achieve persistence or to subvert various processes. |
PrivEscalationCryptBase | The file shows evidence of attempting to use a privilege escalation using CryptBase. Malware uses this to gain more privileges on the affected system. |
ShellCommandString | The file has the capability to use sensitive shell commands for reconnaissance, elevation of privilege, or data destruction. |
SystemCallSuspicious | The file has the capability to monitor or control system and other processes, performing debug-like actions. |