Description
[Snip3](https://attack.mitre.org/software/S1086) is a sophisticated crypter-as-a-service that has been used since at least 2021 to obfuscate and load numerous strains of malware including [AsyncRAT](https://attack.mitre.org/software/S1087), [Revenge RAT](https://attack.mitre.org/software/S0379), [Agent Tesla](https://attack.mitre.org/software/S0331), and [NETWIRE](https://attack.mitre.org/software/S0198).(Citation: Morphisec Snip3 May 2021)(Citation: Telefonica Snip3 December 2021)
External References
Techniques Used by This Malware
- T1027 — Obfuscated Files or Information
- T1027.001 — Binary Padding
- T1047 — Windows Management Instrumentation
- T1055.012 — Process Hollowing
- T1059.001 — PowerShell
- T1059.005 — Visual Basic
- T1082 — System Information Discovery
- T1102 — Web Service
- T1104 — Multi-Stage Channels
- T1105 — Ingress Tool Transfer
- T1140 — Deobfuscate/Decode Files or Information
- T1189 — Drive-by Compromise
- T1204.001 — Malicious Link
- T1204.002 — Malicious File
- T1497.001 — System Checks
- T1497.003 — Time Based Evasion
- T1547.001 — Registry Run Keys / Startup Folder
- T1564.003 — Hidden Window
- T1566.001 — Spearphishing Attachment
- T1566.002 — Spearphishing Link