Description
The System Information Gathering feature in malware serves as an initial reconnaissance tool, collecting a wealth of details about the compromised system's hardware and software configurations. This can include data such as operating system version, installed applications, network interfaces, and even the presence of security solutions. The gathered information can be pivotal for attackers in understanding the landscape they are operating in and in identifying vulnerabilities or weak spots for further exploitation. Significantly, the details about user privileges, running processes, and system configurations can reveal opportunities for privilege escalation. By knowing what level of access is available or what security patches may be missing, attackers can tailor their subsequent actions to exploit these weak points, thus ensuring a more effective and deeper level of system compromise. In essence, System Information Gathering provides a foundational knowledge base that guides the rest of the malware's activities, making it a crucial first step in a targeted attack.
| Categories | Spy / Surveillance, Lateral Movements, Privilege Escalation | 
| Dangerousness | High | 
Existing Techniques
| Name | Associated Feature(s) | Has Snippet | Matching Sample | 
|---|---|---|---|
|  Hardware Information Gathering | System Information Gathering | 0 | |
|  Session Information Gathering | System Information Gathering | 0 | |
|  Windows Users Enumeration | System Information Gathering | 0 | 
 Back Orifice 1.20
Back Orifice 1.20
     SubSeven 1.0
SubSeven 1.0
     SubSeven 1.1
SubSeven 1.1
     SubSeven 1.2
SubSeven 1.2
     Coma 1.0.9
Coma 1.0.9
     SubSeven 1.3
SubSeven 1.3
     SubSeven 1.4
SubSeven 1.4
     SubSeven 1.5
SubSeven 1.5
     SubSeven 1.6
SubSeven 1.6
     SubSeven 1.7
SubSeven 1.7
     SubSeven 1.8
SubSeven 1.8
     SubSeven 1.9
SubSeven 1.9
     Back Orifice 2000 (BO2K) 1.0
Back Orifice 2000 (BO2K) 1.0
     Vampire 1.2
Vampire 1.2
     SubSeven 1.9 Apocalypse
SubSeven 1.9 Apocalypse
     SubSeven 2.0
SubSeven 2.0
     SubSeven 2.1
SubSeven 2.1
     Hack a Tack 2000
Hack a Tack 2000
     SubSeven 2.1.1 GOLD edition
SubSeven 2.1.1 GOLD edition
     SubSeven 2.1.2 M.U.I.E
SubSeven 2.1.2 M.U.I.E
     Y3K rat 1.0
Y3K rat 1.0
     SubSeven 2.1.3 BONUS
SubSeven 2.1.3 BONUS
     SubSeven 2.1.4 DEFCON 8
SubSeven 2.1.4 DEFCON 8
     Y3K rat 1.5
Y3K rat 1.5
     SubSeven 2.2
SubSeven 2.2
     Y3K rat 1.6 MS
Y3K rat 1.6 MS
     Optix Pro 1.0
Optix Pro 1.0
     Net-Devil 1.5
Net-Devil 1.5
     Ghost 2.4
Ghost 2.4
     Beast 1.8
Beast 1.8
     MoSucker 3.0b
MoSucker 3.0b
     Beast 1.90
Beast 1.90
     Turkojan 1.0
Turkojan 1.0
     Beast 1.91
Beast 1.91
     Beast 1.92
Beast 1.92
     SubSeven 2.1.5 Legends
SubSeven 2.1.5 Legends
     CIA 1.0
CIA 1.0
     CIA 1.1
CIA 1.1
     Beast 2.00
Beast 2.00
     Beast 2.01
Beast 2.01
     LanFiltrator 1.1 Fix 1
LanFiltrator 1.1 Fix 1
     Optix Pro 1.32
Optix Pro 1.32
     CIA 1.2
CIA 1.2
     Beast 2.05
Beast 2.05
     Beast 2.02
Beast 2.02
     Fearless Lite 1.01
Fearless Lite 1.01
     ProRat 1.1
ProRat 1.1
     Hue 1.0
Hue 1.0
     ProRat 1.2
ProRat 1.2
     ProRat 1.3
ProRat 1.3