[Intel]: https://www.trendmicro.com/en_gb/research/19/i/skidmap-linux-malware-uses-rootkit-capabilities-to-hide-cryptocurrency-mining-payload.html #111
Labels
missing:tag:Auditd
missing:tag:Non-persistentStorage
missing:tag:T1005
missing:tag:T1007
missing:tag:T1021.002
missing:tag:T1027.002
missing:tag:T1037
missing:tag:T1048
missing:tag:T1053.003
missing:tag:T1053.006
missing:tag:T1053.007
missing:tag:T1057
missing:tag:T1070.003
missing:tag:T1070.004
missing:tag:T1071.001
missing:tag:T1098.004
missing:tag:T1222
missing:tag:T1491
missing:tag:T1543.002
missing:tag:T1546.004
missing:tag:T1548.001
missing:tag:T1552.003
missing:tag:T1556.003
missing:tag:T1560
missing:tag:T1562.001
missing:tag:T1567
missing:tag:T1573
missing:tag:T1574.006
missing:tag:T1590
missing:tag:T1609
missing:tag:T1610
Area
Malware reports
Parent threat
Persistence, Privilege Escalation, Impact
Finding
https://www.trendmicro.com/en_gb/research/19/i/skidmap-linux-malware-uses-rootkit-capabilities-to-hide-cryptocurrency-mining-payload.html
Industry reference
attack:T1547.006:Kernel Modules and Extensions
Malware reference
SkidMap
Actor reference
No response
Component
No response
Scenario
No response
The text was updated successfully, but these errors were encountered: