Subtechnique ID stringlengths 9 9 | technique stringlengths 3 43 | subtech stringlengths 3 58 ⌀ | Value stringlengths 2 483 |
|---|---|---|---|
T1036.004 | Masquerading | Masquerade Task Or Service | OSX_OCEANLOTUS.D has disguised its app bundle by adding special characters to the filename and using the icon for legitimate Word documents. |
T1036.004 | Masquerading | Masquerade Task Or Service | In one instance menuPass added PlugX as a service with a display name of "Corel Writing Tools Utility." |
T1036.004 | Masquerading | Masquerade Task Or Service | POWERSTATS has created a scheduled task named "MicrosoftEdge" to establish persistence. |
T1036.004 | Masquerading | Masquerade Task Or Service | PROMETHIUM has named services to appear legitimate. |
T1036.004 | Masquerading | Masquerade Task Or Service | New services created by RawPOS are made to appear like legitimate Windows services with names such as "Windows Management Help Service" "Microsoft Support" and "Windows Advanced Task Manager". |
T1036.004 | Masquerading | Masquerade Task Or Service | RDAT has used Windows Video Service as a name for malicious services. |
T1036.004 | Masquerading | Masquerade Task Or Service | RTM has named the scheduled task it creates "Windows Update". |
T1036.004 | Masquerading | Masquerade Task Or Service | Seasalt has masqueraded as a service called "SaSaut" with a display name of "System Authorization Service" in an apparent attempt to masquerade as a legitimate service. |
T1036.004 | Masquerading | Masquerade Task Or Service | Shamoon creates a new service namedntssrv that attempts to appear legitimate; the service's display name isMicrosoft Network Realtime Inspection Service and its description isHelps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols. Newer versions creat... |
T1036.004 | Masquerading | Masquerade Task Or Service | ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems. |
T1036.004 | Masquerading | Masquerade Task Or Service | SLOTHFULMEDIA has named a service it establishes on victim machines as "TaskFrame" to hide its malicious purpose. |
T1036.004 | Masquerading | Masquerade Task Or Service | StrongPity has named services to appear legitimate. |
T1036.004 | Masquerading | Masquerade Task Or Service | To establish persistence Truvasys adds a Registry Run key with a value "TaskMgr" in an attempt to masquerade as the legitimate Windows Task Manager. |
T1036.004 | Masquerading | Masquerade Task Or Service | UNC2452 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate. |
T1036.004 | Masquerading | Masquerade Task Or Service | Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application Background Security and Windows presumably as a way to masquerade as a legitimate service. |
T1036.004 | Masquerading | Masquerade Task Or Service | Wizard Spider has used scheduled tasks to install TrickBot using task names to appear legitimate such as WinDotNet GoogleTask or Sysnetsf. It has also used common document file names for other malware binaries. |
T1036.004 | Masquerading | Masquerade Task Or Service | ZIRCONIUM has created a run key named Dropbox Update Setup to mask a persistence mechanism for a malicious binary." |
T1003.006 | OS Credential Dumping | Dcsync | APT29 leveraged privileged accounts to replicate directory service data with domain controllers. |
T1003.006 | OS Credential Dumping | Dcsync | Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DCSync/NetSync. |
T1003.006 | OS Credential Dumping | Dcsync | Operation Wocao has used Mimikatz's DCSync to dump credentials from the memory of the targeted system. |
T1003.006 | OS Credential Dumping | Dcsync | UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers. |
T1003.006 | OS Credential Dumping | Dcsync | The attacker discovered domain controllers (DCs) and submitted a replication request. This prompted the primary DC to replicate the credentials of other DCs back to the compromised domain administrator, using the Directory Replication Service (DRS) remote protocol. |
T1003.004 | OS Credential Dumping | Lsa Secrets | APT33 has used a variety of publicly available tools like LaZagne to gather credentials. |
T1003.004 | OS Credential Dumping | Lsa Secrets | CosmicDuke collects LSA secrets. |
T1003.004 | OS Credential Dumping | Lsa Secrets | CrackMapExec can dump hashed passwords from LSA secrets for the targeted system. |
T1003.004 | OS Credential Dumping | Lsa Secrets | Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes. |
T1003.004 | OS Credential Dumping | Lsa Secrets | gsecdump can dump LSA secrets. |
T1003.004 | OS Credential Dumping | Lsa Secrets | SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information. |
T1003.004 | OS Credential Dumping | Lsa Secrets | Ke3chang has dumped credentials including by using gsecdump. |
T1003.004 | OS Credential Dumping | Lsa Secrets | LaZagne can perform credential dumping from LSA secrets to obtain account and password information. |
T1003.004 | OS Credential Dumping | Lsa Secrets | Leafminer used several tools for retrieving login and password information including LaZagne. |
T1003.004 | OS Credential Dumping | Lsa Secrets | menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials. |
T1003.004 | OS Credential Dumping | Lsa Secrets | Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the LSA. |
T1003.004 | OS Credential Dumping | Lsa Secrets | MuddyWater has performed credential dumping with LaZagne. |
T1003.004 | OS Credential Dumping | Lsa Secrets | OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. |
T1003.004 | OS Credential Dumping | Lsa Secrets | Pupy can use Lazagne for harvesting credentials. |
T1003.004 | OS Credential Dumping | Lsa Secrets | Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers. |
T1110.001 | Brute Force | Password Guessing | APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days. |
T1110.001 | Brute Force | Password Guessing | China Chopper's server component can perform brute force password guessing against authentication portals. |
T1110.001 | Brute Force | Password Guessing | CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network. |
T1110.001 | Brute Force | Password Guessing | Emotet has been observed using a hard coded list of passwords to brute force user accounts. |
T1110.001 | Brute Force | Password Guessing | Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords. |
T1110.001 | Brute Force | Password Guessing | P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH FTP POP3 MySQL MSSQL and PostgreSQL services. |
T1110.001 | Brute Force | Password Guessing | Pony has used a small dictionary of common passwords against a collected list of local accounts. |
T1110.001 | Brute Force | Password Guessing | SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels. |
T1110.001 | Brute Force | Password Guessing | Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports. |
T1557.002 | Man | man | Cleaver has used custom tools to facilitate ARP cache poisoning. |
T1557.002 | Man | man | Irancyber hacking skills have evolved to include customized private tools with ARP poisoning function.
|
T1557.002 | Man | man | AlirezaC++ tools include the following techniques:
ARP poisoning
|
T1557.002 | Man | man | Jasus is an ARP cache poisoner developed by the Operation Cleaver team.
|
T1557.002 | Man | man | Cain & Abel is a publicly available toolkit with the ability to conduct attacks like ARP cache poisoning in order to capture credentials being transmitted on the network. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts such as communication with I/O ports and using VM-specific instructions. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name BIOS and motherboard information. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | CSPY Downloader can search loaded modules PEB structure file paths Registry keys and memory to determine if it is being debugged or running in a virtual environment. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names if a filename ends with .Md5.exe and if the program is executed from the root of the C:\ drive as well as checks for sandbox-related libraries. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Denis ran multiple system checks looking for processor and register characteristics to evade emulation and analysis. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Dyre can detect sandbox analysis environments by inspecting the process list and Registry. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | EvilBunny's dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | FinFisher obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list in order to check for sandbox/virtualized environments. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Frankenstein has used WMI queries to check if various security applications were running including VMWare and Virtualbox. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | GoldMax will check if it is being run in a virtualized environment by comparing the collected MAC address to c8:27:cc:c2:37:5a. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Grandoreiro can detect VMWare via its I/O port and Virtual PC via the vpcext instruction. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | GravityRAT uses WMI to check the BIOS and manufacturer information for strings like VMWare" "Virtual" and "XEN" and another WMI request to get the current temperature of the hardware to determine if it's a virtual machine environment. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | InvisiMole can check for artifacts of VirtualBox Virtual PC and VMware environment and terminate itself if they are detected. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Lucifer can check for specific usernames computer names device drivers DLL's and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | MegaCortex has checked the number of CPUs in the system to avoid being run in a sandbox or emulator. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI query SELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if itrunning in a virtual environment. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | OSX_OCEANLOTUS.D has a variant that checks a number of system parameters to see if it is being run on real hardware or in a virtual machine environment. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | PlugX checks if VMware tools is running in the background by searching for any process named "vmtoolsd". |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | PoetRAT checked the size of the hard drive to determine if it was being run in a sandbox environment. In the event of sandbox detection it would delete itself by overwriting the malware scripts with the contents of "License.txt" and exiting. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Pupy has a module that checks a number of indicators on the system to determine if its running on a virtual machine. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Remcos searches for Sandboxie and VMware on the system. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | RogueRobin uses WMI to check BIOS version for VBOX bochs qemu virtualbox and vm to check for evidence that the script might be executing within an analysis environment. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | ROKRAT checks for sandboxing libraries. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Smoke Loader scans processes to perform anti-VM checks. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | SUNBURST checked the domain name of the compromised host to verify it was running in a real environment. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | SynAck checks its directory location in an attempt to avoid launching in a sandbox. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | ThiefQuest uses a function named is_debugging to perform anti-debugging logic. The function invokes sysctl checking the returned value of P_TRACED. ThiefQuest also calls ptrace with the PTRACE_DENY_ATTACH flag to prevent debugging. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | Trojan.Karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | UBoatRAT checks for virtualization software such as VMWare VirtualBox or QEmu on the compromised machine. |
T1497.001 | Virtualization/Sandbox Evasion | System Checks | yty has some basic anti-sandbox detection that tries to detect Virtual PC Sandboxie and VMware. " |
T1556.003 | Modify Authentication Process | Pluggable Authentication Modules | Ebury can deactivate PAM modules to tamper with the sshd configuration. |
T1556.003 | Modify Authentication Process | Pluggable Authentication Modules | Skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users. |
T1556.003 | Modify Authentication Process | Pluggable Authentication Modules | This malware downgrades security features by deactivating pluggable authentication modules (PAM) modules.
|
T1556.003 | Modify Authentication Process | Pluggable Authentication Modules | The malware replaces the systempam_unix.so file (the module responsible for standard Unix authentication) with its own malicious version (detected as Backdoor.Linux.PAMDOR.A). As shown in Figure 2, this malicious pam_unix.so file accepts a specific password for any users, thus allowing the attackers to log in as any us... |
T1556.003 | Modify Authentication Process | Pluggable Authentication Modules | Our roadmap is pretty simple: add a custom PAM module that logs the credential in plaintext and send it to our C&C though a DNS resolution. |
T1556.002 | Modify Authentication Process | Password Filter Dll | Remsec harvests plain-text credentials as a password filter registered on domain controllers. |
T1556.002 | Modify Authentication Process | Password Filter Dll | Strider has registered its persistence module on domain controllers as a Windows LSA (Local System Authority) password filter to acquire credentials any time a domain local user or administrator logs in or changes a password. |
T1556.002 | Modify Authentication Process | Password Filter Dll | The library was masquerading as a Windows password filter, which is something administrators typically use to ensure passwords match specific requirements for length and complexity. The module started every time a network or local user logged in or changed a password, and it was able to view passcodes in plaintext.
|
T1556.002 | Modify Authentication Process | Password Filter Dll | ProjectSauron usually registers its persistence module on domain controllers as a Windows LSA (Local. System Authority) password filter.
|
T1556.002 | Modify Authentication Process | Password Filter Dll | The library was registered as a Windows password filter and had access to sensitive data such as administrative passwords in cleartext. |
T1556.004 | Modify Authentication Process | Network Device Authentication | SYNful Knock has the capability to add its own custom backdoor password when it modifies the operating system of the affected network device. |
T1556.004 | Modify Authentication Process | Network Device Authentication | The SYNful Knock implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules provides unrestricted access using a secret backdoor password while preventing the size of the image from changing.
|
T1556.004 | Modify Authentication Process | Network Device Authentication | Adversaries used Patch System Image to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices.
|
T1556.004 | Modify Authentication Process | Network Device Authentication | Attacker modified the system image to provide attacker-controlled network devices access using a specific password.
|
T1556.004 | Modify Authentication Process | Network Device Authentication | After the initial access to the router, hackers modified its operation system in a way to install a backdoor access for network device authentication. |
T1556.001 | Modify Authentication Process | Domain Controller Authentication | Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.