Vault7: CIA Hacking Tools Revealed
Navigation: » Latest version
Owner: User #20873595
Grasshopper Persistence Techniques
Delivered Techniques:
| Grasshopper Module Name | Number of Stubs  | 
Execution Level | BitBucket Link | Description | 
|---|---|---|---|---|
| Service DLL | 6 | System | Service DLL | Registers a Service DLLDynamic Link Library to be launched on reboot | 
| Service Proxy | 3 | System | Service Proxy | Sits in the spot of a normal service, gets called instead, will then call that normal service | 
| Scheduled Task | 3 | System | Scheduled Task | Creates a scheduled task to execute on reboot | 
| Run Key | 1 | System | Run Key | Creates a Run Key to run at reboot | 
In Progress Techniques:
| Grasshopper Module Name | BitBucket Link | Execution Level  | 
Description | 
|---|---|---|---|
| Icon Overlay | Icon Overlay | User | Registers an Icon Overlay comm object that will load a DLLDynamic Link Library whenever explorer.exe is started, as the current user | 
| WMI Persistence | WMI Persistence | ||
The Weasels:
The Weasels are a set of techniques developed by ESD(Branch) contractors under the Bronze Forge program.
| Grasshopper Module Name | Description | 
|---|---|
| BitingWeasel 1.1 | IGD Searcher DLLDynamic Link Library for BITS service | 
| SneakyWeasel 1.1 | Service DLLDynamic Link Library with Hijack (lol!) | 
| TimidWeasel 1.1 | Windows Time Provider | 
| TunnellingWeasel 1.1 | Pluggable interface to the built-in Teredo | 
| GraveWeasel 1.0 | 
 Creates a local-machine Windows Group Policy Startup Script (Maybe only runs as LOCAL SERVICE)  |