Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.
There are tools available from the host operating system to perform cleanup, but adversaries may use other tools as well.[1] Examples of built-in Command and Scripting Interpreter functions include del
on Windows and rm
or unlink
on Linux and macOS.
ID | Name | Description |
---|---|---|
C0028 | 2015 Ukraine Electric Power Attack |
During the 2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself after |
S0045 | ADVSTORESHELL |
ADVSTORESHELL can delete files and directories.[3] |
S0504 | Anchor |
Anchor can self delete its dropper after the malware is successfully deployed.[4] |
S1133 | Apostle |
Apostle writes batch scripts to disk, such as |
S0584 | AppleJeus | |
S0622 | AppleSeed |
AppleSeed can delete files from a compromised host after they are exfiltrated.[7] |
G0026 | APT18 |
APT18 actors deleted tools and batch files from victim systems.[8] |
G0007 | APT28 |
APT28 has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.[9] |
G0016 | APT29 |
APT29 has used SDelete to remove artifacts from victim networks.[10] |
G0022 | APT3 | |
G0050 | APT32 | |
G0082 | APT38 |
APT38 has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process.[13][14] |
G0087 | APT39 |
APT39 has used malware to delete files after they are deployed on a compromised host.[15] |
G0096 | APT41 | |
C0040 | APT41 DUST |
APT41 DUST deleted various artifacts from victim systems following use.[18] |
G1023 | APT5 |
APT5 has deleted scripts and web shells to evade detection.[19][20] |
G0143 | Aquatic Panda |
Aquatic Panda has deleted malicious executables from compromised machines.[21][22] |
S0456 | Aria-body |
Aria-body has the ability to delete files and directories on compromised hosts.[23] |
S0438 | Attor |
Attor’s plugin deletes the collected files and log files after exfiltration.[24] |
S0347 | AuditCred | |
S0344 | Azorult | |
S0414 | BabyShark |
BabyShark has cleaned up all files associated with the secondary payload execution.[27] |
S0475 | BackConfig |
BackConfig has the ability to remove files and folders related to previous infections.[28] |
S0093 | Backdoor.Oldrea |
Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim.[29] |
S1081 | BADHATCH |
BADHATCH has the ability to delete PowerShell scripts from a compromised machine.[30] |
S0234 | Bandook | |
S0239 | Bankshot |
Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system.[32] |
S0534 | Bazar |
Bazar can delete its loader using a batch file in the Windows temporary folder.[33] |
S0127 | BBSRAT | |
S0268 | Bisonal |
Bisonal will delete its dropper and VBS scripts from the victim’s machine.[35][36][37] |
S0069 | BLACKCOFFEE |
BLACKCOFFEE has the capability to delete files.[38] |
S0520 | BLINDINGCAN |
BLINDINGCAN has deleted itself and associated artifacts from victim machines.[39] |
S0657 | BLUELIGHT | |
S1161 | BPFDoor |
After initial setup, BPFDoor's original execution process deletes the dropped binary and exits.[41] |
G0060 | BRONZE BUTLER |
The BRONZE BUTLER uploader or malware the uploader uses |
S1039 | Bumblebee |
Bumblebee can uninstall its loader through the use of a |
C0032 | C0032 |
During the C0032 campaign, TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.[44] |
S0274 | Calisto |
Calisto has the capability to use |
S0030 | Carbanak | |
S0348 | Cardinal RAT |
Cardinal RAT can uninstall itself, including deleting its executable.[47] |
S0462 | CARROTBAT |
CARROTBAT has the ability to delete downloaded files from a compromised host.[48] |
S1043 | ccf32 |
ccf32 can delete files and folders from compromised machines.[49] |
S0674 | CharmPower |
CharmPower can delete created files from a compromised system.[50] |
S0107 | Cherry Picker |
Recent versions of Cherry Picker delete files and registry keys created by the malware.[51] |
G0114 | Chimera | |
S0106 | cmd | |
S1105 | COATHANGER |
COATHANGER removes files from victim environments following use in multiple instances.[54] |
G0080 | Cobalt Group |
Cobalt Group deleted the DLL dropper from the victim’s machine to cover their tracks.[55] |
S0115 | Crimson |
Crimson has the ability to delete files from a compromised host.[56][57][58] |
S0498 | Cryptoistic |
Cryptoistic has the ability delete files from a compromised host.[59] |
S0527 | CSPY Downloader |
CSPY Downloader has the ability to self delete.[60] |
S0625 | Cuba |
Cuba can use the command |
C0029 | Cutting Edge |
During Cutting Edge, threat actors deleted |
S1014 | DanBot |
DanBot can delete its configuration file after installation.[64] |
S0673 | DarkWatchman |
DarkWatchman has been observed deleting its original launcher after installation.[65] |
S0354 | Denis |
Denis has a command to delete files from the victim’s machine.[66][67] |
S0021 | Derusbi |
Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes.[68][69] |
G0035 | Dragonfly |
Dragonfly has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.[70] |
S0502 | Drovorub |
Drovorub can delete specific files from a compromised host.[71] |
S0567 | Dtrack | |
S0062 | DustySky |
DustySky can delete files it creates from the infected system.[73] |
S0593 | ECCENTRICBANDWAGON |
ECCENTRICBANDWAGON can delete log files generated from the malware stored at |
S0081 | Elise |
Elise is capable of launching a remote shell on the host to delete itself.[75] |
G1003 | Ember Bear |
Ember Bear deletes files related to lateral movement to avoid detection.[76] |
S0091 | Epic | |
S0396 | EvilBunny |
EvilBunny has deleted the initial dropper after running through the environment checks.[78] |
G0120 | Evilnum | |
S0401 | Exaramel for Linux |
Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file.[80] |
S0181 | FALLCHILL |
FALLCHILL can delete malware and associated artifacts from the victim.[81] |
S0512 | FatDuke | |
S0267 | FELIXROOT |
FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components.[83] |
S0679 | Ferocious | |
G0051 | FIN10 |
FIN10 has used batch scripts and scheduled tasks to delete critical system files.[85] |
G0053 | FIN5 |
FIN5 uses SDelete to clean up the environment and attempt to prevent detection.[86] |
G0037 | FIN6 | |
G0061 | FIN8 |
FIN8 has deleted tmp and prefetch files during post compromise cleanup activities. FIN8 has also deleted PowerShell scripts to evade detection on compromised machines.[88][89] |
S0381 | FlawedAmmyy |
FlawedAmmyy can execute batch scripts to delete files.[90] |
S0277 | FruitFly | |
S1044 | FunnyDream |
FunnyDream can delete files including its dropper component.[49] |
S0410 | Fysbis | |
G0047 | Gamaredon Group |
Gamaredon Group tools can delete files used during an operation.[93][94][95] |
S0168 | Gazer |
Gazer has commands to delete files and persistence mechanisms from the victim.[96][97] |
S0666 | Gelsemium |
Gelsemium can delete its dropper component from the targeted system.[98] |
S0032 | gh0st RAT | |
S0249 | Gold Dragon |
Gold Dragon deletes one of its files, 2.hwp, from the endpoint after establishing persistence.[101] |
S0493 | GoldenSpy |
GoldenSpy's uninstaller can delete registry entries, files and folders, and finally itself once these tasks have been completed.[102] |
S0531 | Grandoreiro |
Grandoreiro can delete .LNK files created in the Startup folder.[103] |
S0690 | Green Lambert |
Green Lambert can delete the original executable after initial installation in addition to unused functions.[104][105] |
S0342 | GreyEnergy |
GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API.[106] |
S0632 | GrimAgent |
GrimAgent can delete old binaries on a compromised host.[107] |
G0043 | Group5 |
Malware used by Group5 is capable of remotely deleting files from victims.[108] |
S0561 | GuLoader |
GuLoader can delete its executable from the |
S0151 | HALFBAKED | |
S0499 | Hancitor |
Hancitor has deleted files using the VBA |
S0391 | HAWKBALL | |
S0697 | HermeticWiper |
HermeticWiper has the ability to overwrite its own file with random bites.[113][114] |
S1027 | Heyoka Backdoor |
Heyoka Backdoor has the ability to delete folders and files from a targeted system.[115] |
S0087 | Hi-Zor |
Hi-Zor deletes its RAT installer file as it executes its DLL payload file.[116] |
S0601 | Hildegard | |
S0431 | HotCroissant |
HotCroissant has the ability to clean up installed files, delete files, and delete itself from the victim’s machine.[118] |
S0070 | HTTPBrowser |
HTTPBrowser deletes its original installer file once installation is complete.[119] |
S0203 | Hydraq |
Hydraq creates a backdoor through which remote attackers can delete files.[120][121] |
S0398 | HyperBro | |
S1022 | IceApple |
IceApple can delete files and directories from targeted systems.[123] |
S0434 | Imminent Monitor |
Imminent Monitor has deleted files related to its dynamic debugger feature.[124] |
G1032 | INC Ransom |
INC Ransom has uninstalled tools from compromised endpoints after use.[125] |
S0259 | InnaputRAT |
InnaputRAT has a command to delete files.[126] |
S0260 | InvisiMole |
InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers.[127][128] |
S1132 | IPsec Helper |
IPsec Helper can delete itself when given the appropriate command.[5] |
S0015 | Ixeshe |
Ixeshe has a command to delete a file from the machine.[129] |
S0044 | JHUHUGIT |
The JHUHUGIT dropper can delete itself from the victim. Another JHUHUGIT variant has the capability to delete specified files.[130][131] |
S0201 | JPIN |
JPIN's installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running.[132] |
S0283 | jRAT |
jRAT has a function to delete files from the victim’s machine.[133] |
S0265 | Kazuar | |
S1020 | Kevin |
Kevin can delete files created on the victim's machine.[135] |
S0271 | KEYMARBLE |
KEYMARBLE has the capability to delete files off the victim’s machine.[136] |
S0607 | KillDisk | |
G0094 | Kimsuky |
Kimsuky has deleted the exfiltrated data on disk after transmission. Kimsuky has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk.[138][139][140] |
S0437 | Kivars |
Kivars has the ability to uninstall malware from the infected host.[141] |
S0162 | Komplex | |
S0356 | KONNI | |
C0035 | KV Botnet Activity |
KV Botnet Activity removes on-disk copies of tools and other artifacts after it the primary botnet payload has been loaded into memory on the victim device.[144] |
S1160 | Latrodectus |
Latrodectus has the ability to delete itself.[145][146] |
G0032 | Lazarus Group |
Lazarus Group malware has deleted files in various ways, including "suicide scripts" to delete malware binaries from the victim. Lazarus Group also uses secure file deletion to delete files from the victim.[147][148] |
S0395 | LightNeuron |
LightNeuron has a function to delete files.[149] |
S0211 | Linfo |
Linfo creates a backdoor through which remote attackers can delete files.[150] |
S0513 | LiteDuke |
LiteDuke can securely delete files by first writing random data to the file.[82] |
S0372 | LockerGoga |
LockerGoga has been observed deleting its original launcher after execution.[151] |
S0447 | Lokibot |
Lokibot will delete its dropped files after bypassing UAC.[152] |
S0582 | LookBack |
LookBack removes itself after execution and can delete files on the system.[153] |
S0451 | LoudMiner | |
S1142 | LunarMail |
LunarMail can delete the previously used staging directory and files on subsequent rounds of exfiltration and replace it with a new one.[155] |
S1141 | LunarWeb |
LunarWeb can self-delete from a compromised host if safety checks of C2 connectivity fail.[155] |
S0409 | Machete |
Once a file is uploaded, Machete will delete it from the machine.[156] |
S1016 | MacMa | |
S0282 | MacSpy | |
G0059 | Magic Hound |
Magic Hound has deleted and overwrote files to cover tracks.[159][160][161] |
G0045 | menuPass |
A menuPass macro deletes files after it has decoded and decompressed them.[162][163] |
S0443 | MESSAGETAP |
Once loaded into memory, MESSAGETAP deletes the keyword_parm.txt and parm.txt configuration files from disk. [164] |
G1013 | Metador |
Metador has quickly deleted |
S1059 | metaMain |
metaMain has deleted collected items after uploading the content to its C2 server.[165][166] |
S0455 | Metamorfo |
Metamorfo has deleted itself from the system after execution.[167][168] |
S0688 | Meteor |
Meteor will delete the folder containing malicious scripts if it detects the hostname as |
S1015 | Milan |
Milan can delete files via |
S0083 | Misdat | |
S0149 | MoonWind | |
S0284 | More_eggs | |
S1047 | Mori |
Mori can delete its DLL file and related files by Registry value.[173] |
S0256 | Mosquito | |
S1135 | MultiLayer Wiper |
MultiLayer Wiper uses a batch file, |
S0233 | MURKYTOP | |
G0129 | Mustang Panda |
Mustang Panda will delete their tools and files, and kill processes after their objectives are reached.[176] |
S0228 | NanHaiShu |
NanHaiShu launches a script to delete their original decoy file to cover tracks.[177] |
S0630 | Nebulae |
Nebulae has the ability to delete files and directories.[178] |
S1147 | Nightdoor | |
S0385 | njRAT | |
S0353 | NOKKI | |
S0346 | OceanSalt | |
G0049 | OilRig |
OilRig has deleted files associated with their payload after execution.[184][185] |
S0439 | Okrum |
Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers.[186] |
S0264 | OopsIE |
OopsIE has the capability to delete files and scripts from the victim's machine.[187] |
C0022 | Operation Dream Job |
During Operation Dream Job, Lazarus Group removed all previously delivered files from a compromised computer.[188] |
C0006 | Operation Honeybee |
During Operation Honeybee, the threat actors used batch files that reduced their fingerprint on a compromised system by deleting malware-related files.[189] |
C0014 | Operation Wocao |
During Operation Wocao, the threat actors consistently removed traces of their activity by first overwriting a file using |
S0352 | OSX_OCEANLOTUS.D |
OSX_OCEANLOTUS.D has a command to delete a file from the system. OSX_OCEANLOTUS.D deletes the app bundle and dropper after execution.[191][192][193] |
S1017 | OutSteel |
OutSteel can delete itself following the successful execution of a follow-on payload.[194] |
S0598 | P.A.S. Webshell |
P.A.S. Webshell can delete scripts from a subdirectory of /tmp after they are run.[80] |
S0208 | Pasam |
Pasam creates a backdoor through which remote attackers can delete files.[195] |
G0040 | Patchwork |
Patchwork removed certain files and replaced them so they could not be retrieved.[196] |
S0556 | Pay2Key | |
S1050 | PcShare |
PcShare has deleted its files and components from a compromised host.[49] |
S0587 | Penquin |
Penquin can delete downloaded executables after running them.[198] |
S0517 | Pillowmint |
Pillowmint has deleted the filepath |
G1040 | Play |
Play has used tools including Wevtutil to remove malicious files from compromised hosts.[200] |
S0435 | PLEAD |
PLEAD has the ability to delete files on the compromised host.[141] |
S0067 | pngdowner |
pngdowner deletes content from C2 communications that was saved to the user's temporary directory.[201] |
S0428 | PoetRAT |
PoetRAT has the ability to overwrite scripts and delete itself if a sandbox environment is detected.[202] |
S0453 | Pony |
Pony has used scripts to delete itself after execution.[203] |
S0139 | PowerDuke |
PowerDuke has a command to write random data across a file and delete it.[204] |
S0441 | PowerShower |
PowerShower has the ability to remove all files created during the dropper process.[205] |
S0223 | POWERSTATS |
POWERSTATS can delete all files on the C:\, D:\, E:\ and, F:\ drives using PowerShell Remove-Item commands.[206] |
S0113 | Prikormka |
After encrypting its own log files, the log encryption module in Prikormka deletes the original, unencrypted files from the host.[207] |
S0654 | ProLock |
ProLock can remove files containing its payload after they are executed.[208] |
S0279 | Proton | |
S0238 | Proxysvc |
Proxysvc can delete files indicated by the attacker and remove itself from disk using a batch file.[148] |
S0147 | Pteranodon |
Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes.[209] |
S0196 | PUNCHBUGGY |
PUNCHBUGGY can delete files written to disk.[88][210] |
S1032 | PyDCrypt |
PyDCrypt will remove all created artifacts such as dropped executables.[211] |
S0583 | Pysa | |
S0650 | QakBot |
QakBot can delete folders and files including overwriting its executable with legitimate programs.[213][214][215][208] |
S0269 | QUADAGENT |
QUADAGENT has a command to delete its Registry key and scheduled task.[216] |
S1148 | Raccoon Stealer |
Raccoon Stealer can remove files related to use and installation.[217] |
S0629 | RainyDay |
RainyDay has the ability to uninstall itself by deleting its service and files.[178] |
S1130 | Raspberry Robin |
Raspberry Robin can delete its initial delivery script from disk during execution.[218] |
S0662 | RCSession | |
S0495 | RDAT |
RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system.[220] |
S0416 | RDFSNIFFER |
RDFSNIFFER has the capability of deleting local files.[221] |
S0172 | Reaver |
Reaver deletes the original dropped file from the victim.[222] |
G1039 | RedCurl | |
S0153 | RedLeaves | |
S0125 | Remsec |
Remsec is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data.[227][228][229] |
S0496 | REvil |
REvil can mark its binary code for deletion after reboot.[230] |
S0448 | Rising Sun |
Rising Sun can delete files and artifacts it creates.[231] |
S1150 | ROADSWEEP |
ROADSWEEP can use embedded scripts to remove itself from the infected host.[232][233] |
G0106 | Rocke | |
S0240 | ROKRAT | |
S0148 | RTM |
RTM can delete all files created during its execution.[236][237] |
S0253 | RunningRAT |
RunningRAT contains code to delete files from the victim’s machine.[101] |
S0085 | S-Type |
S-Type has deleted files it has created on a compromised host.[170] |
S1018 | Saint Bot |
Saint Bot can run a batch script named |
S0074 | Sakula |
Some Sakula samples use cmd.exe to delete temporary files.[238] |
S0370 | SamSam |
SamSam has been seen deleting its own files and payloads to make analysis of the attack more difficult.[239] |
G0034 | Sandworm Team |
Sandworm Team has used backdoors that can delete files used in an attack from an infected system.[137][240][241] |
S0461 | SDBbot |
SDBbot has the ability to delete files from a compromised host.[242] |
S0195 | SDelete |
SDelete deletes data in a way that makes it unrecoverable.[1] |
S0053 | SeaDuke |
SeaDuke can securely delete files, including deleting itself from the victim.[243] |
S0345 | Seasalt | |
S0382 | ServHelper |
ServHelper has a module to delete itself from the infected machine.[245][246] |
S1019 | Shark |
Shark can delete files downloaded to the compromised host.[64] |
S0444 | ShimRat |
ShimRat can uninstall itself from compromised hosts, as well create and modify directories, delete, move, copy, and rename files.[247] |
S0589 | Sibot |
Sibot will delete itself if a certain server response is received.[248] |
G0091 | Silence |
Silence has deleted artifacts, including scheduled tasks, communicates files from the C2 and other logs.[249][250] |
S0692 | SILENTTRINITY |
SILENTTRINITY can remove files from the compromised host.[251] |
S0533 | SLOTHFULMEDIA |
SLOTHFULMEDIA has deleted itself and the 'index.dat' file on a compromised machine to remove recent Internet history from the system.[252] |
C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 routinely removed their tools, including custom backdoors, once remote access was achieved.[253] |
S0615 | SombRAT |
SombRAT has the ability to run |
S0374 | SpeakUp |
SpeakUp deletes files to remove evidence on the machine. [255] |
S0390 | SQLRat |
SQLRat has used been observed deleting scripts once used.[256] |
S0380 | StoneDrill |
StoneDrill has been observed deleting the temporary files once they fulfill their task.[257] |
S1034 | StrifeWater |
StrifeWater can self delete to cover its tracks.[258] |
S0491 | StrongPity |
StrongPity can delete previously exfiltrated files from the compromised host.[259][260] |
S0603 | Stuxnet |
Stuxnet uses an RPC server that contains a routine for file deletion and also removes itself from the system through a DLL export by deleting specific files.[261] |
S0559 | SUNBURST | |
S0562 | SUNSPOT |
Following the successful injection of SUNBURST, SUNSPOT deleted a temporary file it created named |
S0663 | SysUpdate |
SysUpdate can delete its configuration file from the targeted system.[264] |
S0011 | Taidoor |
Taidoor can use |
S0586 | TAINTEDSCRIBE |
TAINTEDSCRIBE can delete files from a compromised host.[266] |
S0164 | TDTESS |
TDTESS creates then deletes log files during installation of itself as a service.[267] |
G0139 | TeamTNT |
TeamTNT has used a payload that removes itself after running. TeamTNT also has deleted locally staged files for collecting credentials or scan results for local IP addresses after exfiltrating them.[268][269] |
G0089 | The White Company |
The White Company has the ability to delete its malware entirely from the target system.[270] |
G0027 | Threat Group-3390 |
Threat Group-3390 has deleted existing logs and exfiltrated file archives from a victim.[271][272] |
S0094 | Trojan.Karagany |
Trojan.Karagany has used plugins with a self-delete capability.[273] |
G0081 | Tropic Trooper |
Tropic Trooper has deleted dropper files on an infected system using command scripts.[274] |
S0263 | TYPEFRAME | |
S0022 | Uroburos |
Uroburos can run a |
S0386 | Ursnif |
Ursnif has deleted data staged in tmp files after exfiltration.[277] |
S0136 | USBStealer |
USBStealer has several commands to delete files associated with the malware from the victim.[278] |
S0442 | VBShower |
VBShower has attempted to complicate forensic analysis by deleting all the files contained in |
S0257 | VERMIN | |
S1154 | VersaMem |
VersaMem deleted files related to initial installation such as temporary files related to the PID of the main web process.[281] |
S0180 | Volgmer |
Volgmer can delete files and itself after infection to avoid analysis.[282] |
G1017 | Volt Typhoon |
Volt Typhoon has run |
S0689 | WhisperGate |
WhisperGate can delete tools from a compromised host after execution.[285] |
S0155 | WINDSHIELD |
WINDSHIELD is capable of file deletion along with other file system interaction.[286] |
S0466 | WindTail |
WindTail has the ability to receive and execute a self-delete command.[287] |
S0176 | Wingbird |
Wingbird deletes its payload along with the payload's parent process after it finishes copying files.[288] |
S0141 | Winnti for Windows |
Winnti for Windows can delete the DLLs for its various components from a compromised host.[289] |
G0102 | Wizard Spider |
Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use.[290] |
S1065 | Woody RAT |
Woody RAT has the ability to delete itself from disk by creating a suspended notepad process and writing shellcode to delete a file into the suspended process using |
S0161 | XAgentOSX |
XAgentOSX contains the deletFileFromPath function to delete a specified file using the NSFileManager:removeFileAtPath method.[292] |
S0251 | Zebrocy |
Zebrocy has a command to delete files and directories.[293][294][295] |
S1151 | ZeroCleare |
ZeroCleare has the ability to uninstall the RawDisk driver and delete the |
S0330 | Zeus Panda |
Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track.[297] |
S0350 | zwShell |
zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots.[298] |
S0412 | ZxShell |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor executed commands and arguments for actions that could be utilized to unlink, rename, or delete files. |
DS0022 | File | File Deletion |
Monitor for unexpected deletion of files from the system |