References

Type
Url
Description

technique

https://capec.mitre.org/data/definitions/94.html


technique

https://attack.mitre.org/techniques/T1557


technique

https://capec.mitre.org/data/definitions/577.html


technique

https://attack.mitre.org/techniques/T1033


technique

https://documents.trendmicro.com/assets/wp/wp-criminal-hideouts-for-lease.pdf

Max Goncharov. (2015, July 15). Criminal Hideouts for Lease: Bulletproof Hosting Services. Retrieved March 6, 2017.


technique

https://attack.mitre.org/techniques/T1583


technique

https://thisissecurity.stormshield.com/2014/08/20/poweliks-command-line-confusion/

B. Ancel. (2014, August 20). Poweliks – Command Line Confusion. Retrieved March 5, 2018.


technique

https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pd

Merces, F. (2014). CPL Malware Malicious Control Panel Items. Retrieved November 1, 2017.


technique

https://attack.mitre.org/techniques/T1218/011


technique

https://docs.docker.com/engine/api/v1.41/

Docker. (n.d.). Docker Engine API v1.41 Reference. Retrieved March 31, 2021.