S0469 ABK

ABK has the ability to identify the installed anti-virus product on the compromised host.[2]

G0082 APT38

APT38 has identified security software, configurations, defensive tools, and sensors installed on a compromised system.[3]

S0373 Astaroth

Astaroth checks for the presence of Avast antivirus in the C:\Program\Files\ folder. [4]

S0473 Avenger

Avenger has the ability to identify installed anti-virus products on a compromised host.[2]

S0337 BadPatch

BadPatch uses WMI to enumerate installed security products in the victim’s environment.[5]

S0534 Bazar

Bazar can identify the installed antivirus engine.[6]

S0657 BLUELIGHT

BLUELIGHT can collect a list of anti-virus products installed on a machine.[7]

S0471 build_downer

build_downer has the ability to detect if the infected host is running an anti-virus process.[2]

S0484 Carberp

Carberp has queried the infected system's registry searching for specific registry keys associated with antivirus products.[8]

S0023 CHOPSTICK

CHOPSTICK checks for antivirus and forensics software.[9]

S0611 Clop

Clop can search for processes with antivirus and antimalware product names.[10][11]

G0080 Cobalt Group

Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine.[12]

S0244 Comnie

Comnie attempts to detect several anti-virus products.[13]

S0492 CookieMiner

CookieMiner has checked for the presence of "Little Snitch", macOS network monitoring and application firewall software, stopping and exiting if it is found.[14]

S0046 CozyCar

The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list, the dropper will exit.[15]

S0115 Crimson

Crimson contains a command to collect information about anti-virus software on the victim.[16][17]

G0012 Darkhotel

Darkhotel has searched for anti-malware strings and anti-virus processes running on the system.[18][19]

S0472 down_new

down_new has the ability to detect anti-virus products and processes on a compromised host.[2]

S0062 DustySky

DustySky checks for the existence of anti-virus.[20]

S0363 Empire

Empire can enumerate antivirus software on the target.[21]

S0091 Epic

Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them.[22]

S0396 EvilBunny

EvilBunny has been observed querying installed antivirus software.[23]

S0568 EVILNUM

EVILNUM can search for anti-virus products on the system.[24]

S0171 Felismus

Felismus checks for processes associated with anti-virus vendors.[25]

S0267 FELIXROOT

FELIXROOT checks for installed security software like antivirus and firewall.[26]

G0061 FIN8

FIN8 has used Registry keys to detect and avoid executing in potential sandboxes.[27]

S0182 FinFisher

FinFisher probes the system to check for antimalware processes.[28][29]

S0143 Flame

Flame identifies security software such as antivirus through the Security module.[30][31]

S0381 FlawedAmmyy

FlawedAmmyy will attempt to detect anti-virus products during the initial infection.[32]

G0101 Frankenstein

Frankenstein has used WMI queries to detect if virtualization environments or analysis tools were running on the system.[33]

S0249 Gold Dragon

Gold Dragon checks for anti-malware products and processes.[34]

S0531 Grandoreiro

Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections.[35][35]

S0260 InvisiMole

InvisiMole can check for the presence of network sniffers, AV, and BitDefender firewall.[36]

S0201 JPIN

JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.[37]

S0283 jRAT

jRAT can list security software, such as by using WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details.[38][39]

S0088 Kasidet

Kasidet has the ability to identify any anti-virus installed on the infected system.[40]

S0513 LiteDuke

LiteDuke has the ability to check for the presence of Kaspersky security software.[41]

S0652 MarkiRAT

MarkiRAT can check for running processes on the victim’s machine to look for Kaspersky and Bitdefender antivirus products.[42]

S0455 Metamorfo

Metamorfo collects a list of installed antivirus software from the victim’s system.[43][44]

S0339 Micropsia

Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI.[45][46]

S0553 MoleNet

MoleNet can use WMI commands to check the system for firewall and antivirus software.[47]

S0284 More_eggs

More_eggs can obtain information on installed anti-malware programs.[48]

S0256 Mosquito

Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system.[49]

G0069 MuddyWater

MuddyWater has used malware to check running processes against a hard-coded list of security tools often used by malware researchers.[50]

G0019 Naikon

Naikon uses commands such as netsh advfirewall firewall to discover local firewall settings.[51]

S0108 netsh

netsh can be used to discover system firewall settings.[52][53]

S0457 Netwalker

Netwalker can detect and terminate active security software-related processes on infected systems.[54]

S0368 NotPetya

NotPetya determines if specific antivirus programs are running on an infected host machine.[55]

G0116 Operation Wocao

Operation Wocao has used scripts to detect security software.[56]

G0040 Patchwork

Patchwork scanned the "Program Files" directories for a directory with the string "Total Security" (the installation path of the "360 Total Security" antivirus tool).[57]

S0501 PipeMon

PipeMon can check for the presence of ESET and Kaspersky security software.[58]

S0223 POWERSTATS

POWERSTATS has detected security tools.[59]

S0184 POWRUNER

POWRUNER may collect information on the victim's anti-virus software.[60]

S0113 Prikormka

A module in Prikormka collects information from the victim about installed anti-virus software.[61]

S0196 PUNCHBUGGY

PUNCHBUGGY can gather AVs registered in the system.[62]

S0650 QakBot

QakBot can identify the installed antivirus product on a targeted system.[63][64][64][65]

S0125 Remsec

Remsec has a plugin to detect active drivers of some security products.[66]

G0106 Rocke

Rocke used scripts which detected and uninstalled antivirus software.[67][68]

S0270 RogueRobin

RogueRobin enumerates running processes to search for Wireshark and Windows Sysinternals suite.[69][70]

S0240 ROKRAT

ROKRAT checks for debugging tools.[71][72]

S0148 RTM

RTM can obtain information about security software on the victim.[73]

G0121 Sidewinder

Sidewinder has used the Windows service winmgmts:\.\root\SecurityCenter2 to check installed antivirus products.[74]

S0468 Skidmap

Skidmap has the ability to check if /usr/sbin/setenforce exists. This file controls what mode SELinux is in.[75]

S0646 SpicyOmelette

SpicyOmelette can check for the presence of 29 different antivirus tools.[76]

S0380 StoneDrill

StoneDrill can check for antivirus and antimalware programs.[77]

S0142 StreamEx

StreamEx has the ability to scan for security tools such as firewalls and antivirus tools.[78]

S0491 StrongPity

StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload.[79]

S0603 Stuxnet

Stuxnet enumerates the currently running processes related to a variety of security products.[80]

S0559 SUNBURST

SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.[81][82]

S0098 T9000

T9000 performs checks for various antivirus and security products during installation.[83]

S0467 TajMahal

TajMahal has the ability to identify which anti-virus products, firewalls, and anti-spyware products are in use.[84]

S0057 Tasklist

Tasklist can be used to enumerate security software currently running on a system by process name of known products.[85]

G0139 TeamTNT

TeamTNT has searched for security products on infected machines.[86]

G0089 The White Company

The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.[87]

S0595 ThiefQuest

ThiefQuest uses the kill_unwanted function to get a list of running processes, compares each process with an encrypted list of "unwanted" security related programs, and kills the processes for security related programs.[88]

G0081 Tropic Trooper

Tropic Trooper can search for anti-virus software running on the system.[89]

G0010 Turla

Turla has obtained information on security software, including security logging information that may indicate whether their malware has been detected.[90]

S0476 Valak

Valak can determine if a compromised host has security products installed.[91]

S0257 VERMIN

VERMIN uses WMI to check for anti-virus software installed on the system.[92]

S0579 Waterbear

Waterbear can find the presence of a specific security software.[93]

G0112 Windshift

Windshift has used malware to identify installed AV and commonly used forensic and malware analysis tools.[94]

S0176 Wingbird

Wingbird checks for the presence of Bitdefender security software.[95]

G0102 Wizard Spider

Wizard Spider has used WMI to identify anti-virus products installed on a victim's machine.[96]

S0653 xCaon

xCaon has checked for the existence of Kaspersky antivirus software on the system.[97]

S0658 XCSSET

XCSSET searches firewall configuration files located in /Library/Preferences/ and uses csrutil status to determine if System Integrity Protection is enabled.[98]

S0388 YAHOYAH

YAHOYAH checks for antimalware solution processes on the system.[99]

S0330 Zeus Panda

Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.[100][101]