IXESHE
Description
(Trend Micro) The IXESHE malware binary allowed the attackers to easily take over and maintain complete control of victims’ systems to do the following: • List all services, processes, and drives • Terminate processes and services • Download and upload files • Start processes and services • Get victims’ user names • Get a machine’s name and domain name • Download and execute arbitrary files • Cause a system to pause or sleep for a specified number of minutes • Spawn a remote shell • List all current files and directories
Names
Name |
---|
IXESHE |
Category
Malware
Type
- Reconnaissance
- Backdoor
- Info stealer
- Exfiltration
Information
Mitre Attack
Alienvault Otx
Other Information
Uuid
b3f77eac-3137-4786-9b60-748f23797aa3
Last Card Change
2020-04-22