{"description": "Enterprise techniques used by FakeM, ATT&CK software S0076 (v1.1)", "name": "FakeM (S0076)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "17", "navigator": "5.1.0"}, "techniques": [{"techniqueID": "T1001", "showSubtechniques": true}, {"techniqueID": "T1001.003", "comment": "[FakeM](https://attack.mitre.org/software/S0076) C2 traffic attempts to evade detection by resembling data generated by legitimate messenger applications, such as MSN and Yahoo! messengers. Additionally, some variants of [FakeM](https://attack.mitre.org/software/S0076) use modified SSL code for communications back to C2 servers, making SSL decryption ineffective.(Citation: Scarlet Mimic Jan 2016)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1573", "showSubtechniques": true}, {"techniqueID": "T1573.001", "comment": "The original variant of [FakeM](https://attack.mitre.org/software/S0076) encrypts C2 traffic using a custom encryption cipher that uses an XOR key of \u201cYHCRA\u201d and bit rotation between each XOR operation. Some variants of [FakeM](https://attack.mitre.org/software/S0076) use RC4 to encrypt C2 traffic.(Citation: Scarlet Mimic Jan 2016)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1056", "showSubtechniques": true}, {"techniqueID": "T1056.001", "comment": "[FakeM](https://attack.mitre.org/software/S0076) contains a keylogger module.(Citation: Scarlet Mimic Jan 2016)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1095", "comment": "Some variants of [FakeM](https://attack.mitre.org/software/S0076) use SSL to communicate with C2 servers.(Citation: Scarlet Mimic Jan 2016)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by FakeM", "color": "#66b1ff"}]}