{"description": "Enterprise techniques used by CorKLOG, ATT&CK software S1235 (v1.0)", "name": "CorKLOG (S1235)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "19", "navigator": "5.3.2"}, "techniques": [{"techniqueID": "T1543", "showSubtechniques": true}, {"techniqueID": "T1543.003", "comment": "[CorKLOG](https://attack.mitre.org/software/S1235) has created a service to establish persistence.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1074", "showSubtechniques": true}, {"techniqueID": "T1074.001", "comment": "[CorKLOG](https://attack.mitre.org/software/S1235) has stored the captured data in an encrypted file using a 48-character RC4 key.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1140", "comment": "[CorKLOG](https://attack.mitre.org/software/S1235) has decoded XOR encrypted strings.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1574", "showSubtechniques": true}, {"techniqueID": "T1574.001", "comment": "[CorKLOG](https://attack.mitre.org/software/S1235) has leveraged legitimate binaries to conduct DLL side-loading.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1056", "showSubtechniques": true}, {"techniqueID": "T1056.001", "comment": "[CorKLOG](https://attack.mitre.org/software/S1235) has captured keystrokes.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1027", "showSubtechniques": true}, {"techniqueID": "T1027.013", "comment": "[CorKLOG](https://attack.mitre.org/software/S1235) has encrypted collected contents using RC4.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)  [CorKLOG](https://attack.mitre.org/software/S1235) has also utilized XOR encrypted strings.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1053", "showSubtechniques": true}, {"techniqueID": "T1053.005", "comment": "[CorKLOG](https://attack.mitre.org/software/S1235) has achieved persistence through the creation of a scheduled task named TableInputServices by using the command `schtasks /create /tn TabletlnputServices /tr /sc minute /mo 10 /f`.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1553", "showSubtechniques": true}, {"techniqueID": "T1553.002", "comment": "[CorKLOG](https://attack.mitre.org/software/S1235) has used legitimate signed binaries such as lcommute.exe for follow-on execution of malicious DLLs through DLL side-loading.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by CorKLOG", "color": "#66b1ff"}]}