| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | Command and Scripting Interpreter | FIVEHANDS can receive a command line argument to limit file encryption to specified directories.[1][2] | |
| Enterprise | T1486 | Data Encrypted for Impact | FIVEHANDS can use an embedded NTRU public key to encrypt data for ransom.[1][3][2] | |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | FIVEHANDS has the ability to decrypt its payload prior to execution.[1][3][2] | |
| Enterprise | T1083 | File and Directory Discovery | FIVEHANDS has the ability to enumerate files on a compromised host in order to encrypt files with specific extensions.[3][2] | |
| Enterprise | T1490 | Inhibit System Recovery | FIVEHANDS has the ability to delete volume shadow copies on compromised hosts.[1][3] | |
| Enterprise | T1135 | Network Share Discovery | FIVEHANDS can enumerate network shares and mounted drives on a network.[2] | |
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File | |
| Enterprise | T1047 | Windows Management Instrumentation | FIVEHANDS can use WMI to delete files on a target machine.[1][3] | |