Félix Brezo<p>From a <a href="https://mastodon.social/tags/ThreatIntelligence" class="mention hashtag" rel="tag">#<span>ThreatIntelligence</span></a> perspective, the <a href="https://mastodon.social/tags/TTPs" class="mention hashtag" rel="tag">#<span>TTPs</span></a> would be:</p><p>- <a href="https://mastodon.social/tags/T1059" class="mention hashtag" rel="tag">#<span>T1059</span></a>.003: Command and Scripting Interpreter: Unix Shell. SHC payloads to be run still need a shell to be identified in the system and that the code inside the payload is, in fact, a shell script.<br />- <a href="https://mastodon.social/tags/T1027" class="mention hashtag" rel="tag">#<span>T1027</span></a>.002: Obfuscated Files or Information: Software Packed with <a href="https://mastodon.social/tags/SHC" class="mention hashtag" rel="tag">#<span>SHC</span></a>.<br />- <a href="https://mastodon.social/tags/T1622" class="mention hashtag" rel="tag">#<span>T1622</span></a>: Debugger Evasion by using SHC with '-r'.<br />- <a href="https://mastodon.social/tags/T1105" class="mention hashtag" rel="tag">#<span>T1105</span></a>: Ingress Tool Transfer by downloading payloads from Github.<br />- <a href="https://mastodon.social/tags/T1496" class="mention hashtag" rel="tag">#<span>T1496</span></a>: Resource Hijacking with <a href="https://mastodon.social/tags/XMRig" class="mention hashtag" rel="tag">#<span>XMRig</span></a>.</p>