Hierarchy Classification

Hierarchy Classification


xd
M1: Sensitive information theft

refers to obtaining sensitive information and sending it to attackers without the user's knowledge or permission. Various types of information may be collected or stolen. Sensitive information includes system information such as the operating system platform and system file information such as ssh information and sensitive directories.

xd
M2: Sensitive file operation

refers to the deletion, modification (encryption), and creation of sensitive files without the user's knowledge or permission, which affects the normal use of the system.

xd
M3: Malicious software import

refers to running a malicious executable software in a package without the user's knowledge or permission, or remotely downloading and executing a malicious executable software through a network connection, including ransomware, mining software etc.

xd
M4: Reverse shell

refers to listening to a certain TCP/UDP port without the user's knowledge or permission, the controlled end initiates a request to the port, and forwards the input and output of its command line to the control end.

xd
M5: Suspicious command execution

refers to the execution of system commands through functions such as exec without the user's knowledge or permission, along with the obfuscation and compression of some commands.