Skip to content

Latest commit

 

History

History
68 lines (50 loc) · 2.5 KB

self-deletion.md

File metadata and controls

68 lines (50 loc) · 2.5 KB
ID F0007
Objective(s) Defense Evasion
Related ATT&CK Techniques Indicator Removal on Host: Uninstall Malicious Application (T1630.001), Indicator Removal on Host: File Deletion (T1070.004)
Version 2.1
Created 14 August 2020
Last Modified 13 September 2023

Self Deletion

Malware may uninstall itself to avoid detection.

See ATT&CK: Indicator Removal on Host: Uninstall Malicious Application (T1630.001), Indicator Removal on Host: File Deletion (T1070.004).

Methods

Name ID Description
COMSPEC Environment Variable F0007.001 Uninstalls self via COMSPEC environment variable.

Use in Malware

Name Date Method Description
Terminator 2013 F0007.001 The RAT evades sandboxes by terminating and removing itself (DW20.exe) after installation. [1]
CozyCar 2010 -- CozyCar has a dll file that serves as a cleanup mechanism for its dropped binary. [2]
SearchAwesome 2018 -- The malware will monitor if a specific file gets deleted and then will delete itself. [3]
WannaCry 2017 -- WannaCry looks for a DNS entry and if the entry exists, it terminates and deletes itself. [4]

Detection

Tool: capa Mapping APIs
self delete Self Deletion::COMSPEC Environment Variable (F0007.001)

References

[1] https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2013/FireEye-Terminator_RAT.pdf

[2] https://unit42.paloaltonetworks.com/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke

[3] https://www.malwarebytes.com/blog/news/2018/10/mac-malware-intercepts-encrypted-web-traffic-for-ad-injection

[4] https://www.mandiant.com/resources/blog/wannacry-malware-profile