Skip to content

Commit 45bd693

Browse files
authored
Update Cipher.yml
1 parent f927080 commit 45bd693

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

yml/OSBinaries/Cipher.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
22
Name: Cipher.exe
3-
Description: Windows binary can be used to overwrite deleted data in Windows directory and volume
3+
Description: File Encryption Utility
44
Author: Adetutu Ogunsowo
5-
Created: 2024-11-22 # YYYY-MM-DD (date the person created this file)
5+
Created: 2024-11-22
66
Commands:
7-
- Command: cipher /w:<directory>
8-
Description: Causes all deallocated space on <idrectory> to be overwritten
9-
Usecase: Attacker wants to permanently delete their artefacts, evidence, logs etc. and cannot be retrived by forensics means
10-
Category: Encode
7+
- Command: cipher /w:{PATH_ABSOLUTE:folder}
8+
Description: Zero out a file
9+
Usecase: Can be used to forensically erase a file
10+
Category: Tamper
1111
Privileges: User
12-
MitreID: T1485.001
12+
MitreID: T1485
1313
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
1414
Full_Path:
1515
- Path: c:\windows\system32\cipher.exe
1616
- Path: c:\windows\syswow64\cipher.exe
1717
Detection:
18-
- IOC: cipher.exe spawned
18+
- IOC: cipher.exe process with /w on the command line
1919
Resources:
2020
- Link: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/
2121
Acknowledgement:
2222
- Person: Ade Ogunsowo
23-
Handle: '@i_am_tutu'
23+
Handle: '@i_am_tutu'

0 commit comments

Comments
 (0)