[Intel]: https://www.stormshield.com/news/orbit-analysis-of-a-linux-dedicated-malware/ #601
Labels
missing:tag:Non-persistentStorage
missing:tag:ProcessTreeSpoofing
missing:tag:ProcessTreeSpoofingForking
missing:tag:RedirectionToNull
missing:tag:T1001
missing:tag:T1003.008
missing:tag:T1005
missing:tag:T1021.004
missing:tag:T1027.002
missing:tag:T1040
missing:tag:T1048
missing:tag:T1053.003
missing:tag:T1057
missing:tag:T1059.006
missing:tag:T1070.002
missing:tag:T1070.003
missing:tag:T1070.004
missing:tag:T1071.001
missing:tag:T1078.003
missing:tag:T1083
missing:tag:T1205
missing:tag:T1491
missing:tag:T1546.004
missing:tag:T1548.003
missing:tag:T1552.003
missing:tag:T1556.003
missing:tag:T1560
missing:tag:T1562.004
missing:tag:T1567
missing:tag:T1573
missing:tag:T1574.006
new
Area
Malware reports
Parent threat
Persistence, Privilege Escalation
Finding
https://www.stormshield.com/news/orbit-analysis-of-a-linux-dedicated-malware/
Industry reference
No response
Malware reference
OrBit
/malware/binaries/OrBit
Actor reference
No response
Component
Linux
Scenario
No response
The text was updated successfully, but these errors were encountered: