value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
Some Backdoor.Oldrea samples use standard Base64 + bzip2 and some use standard Base64 + reverse XOR + RSA-2048 to decrypt data received from C2 servers.
1
accept
T1132.001
Data Encoding: Standard Encoding
BADNEWS encodes C2 traffic with base64. ;; BLINDINGCAN has encoded its C2 traffic with Base64. ;; Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server. ;; BS2005 uses Base64 encoding for communication in the message body of an HTTP request. ;; Carbanak encodes the message body of HTTP traffic with Base64. ;; ChChes can encode C2 data with a custom technique that utilizes Base64. ;; Cobian RAT obfuscates communications with the C2 server using Base64 encoding. ;; CORESHELL C2 messages are Base64-encoded. ;; Daserf uses custom base64 encoding to obfuscate HTTP traffic. ;; Denis encodes the data sent to the server in Base64. ;; Dipsind encodes C2 traffic with base64. ;; down_new has the ability to base64 encode C2 communications. ;; Ebury has encoded C2 traffic in hexadecimal format. ;; Elise exfiltrates data using cookie values that are Base64-encoded. ;; Some Felismus samples use a custom method for C2 traffic that utilizes Base64. ;; Fysbis can use Base64 to encode its C2 traffic. ;; gh0st RAT has used Zlib to compress C2 communications data before encrypting it. ;; HAFNIUM has used ASCII encoding for C2 traffic. ;; For C2 over HTTP Helminth encodes data with base64 and sends it via the Cookie" field of HTTP requests. For C2 over DNS Helminth converts ASCII characters into their hexadecimal values and sends the data in cleartext. ;; HOPLIGHT has utilized Zlib compression to obfuscate the communications payload. ;; Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests. ;; A JHUHUGIT variant encodes C2 POST data base64. ;; Kazuar encodes communications to the C2 server in Base64. ;; Kessel has exfiltrated data via hexadecimal-encoded subdomain fields of DNS queries. ;; KONNI has used a custom base64 key to encode stolen data before exfiltration. ;; A Lazarus Group malware sample encodes data with base64. ;; Machete has used base64 encoding. ;; MechaFlounder has the ability to use base16 encoded strings in C2. ;; Mis-Type uses Base64 encoding for C2 traffic. ;; Misdat network traffic is Base64-encoded plaintext. ;; More_eggs has used basE91 encoding along with encryption for C2 communication. ;; MuddyWater has used tools to encode C2 communications including Base64 encoding. ;; njRAT uses Base64 encoding for C2 traffic. ;; Octopus encodes C2 communications in Base64. ;; Okrum has used base64 to encode C2 communication. ;; OopsIE encodes data in hexadecimal format over the C2 channel. ;; Patchwork used Base64 to encode C2 traffic. ;; Responses from the Pisloader C2 server are base32-encoded. ;; PowerShower has the ability to encode C2 communications with base64 encoding. ;; POWERSTATS encoded C2 traffic with base64. ;; POWRUNER can use base64 encoded C2 communications. ;; Prikormka encodes C2 traffic with Base64. ;; QUADAGENT encodes C2 communications with base64. ;; Ramsay has used base64 to encode its C2 traffic. ;; RDAT can communicate with the C2 via base32-encoded subdomains. ;; Revenge RAT uses Base64 to encode information sent to the C2 server. ;; RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel. ;; S-Type uses Base64 encoding for C2 traffic. ;; Sandworm Team's BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server. ;; SeaDuke C2 traffic is base64-encoded. ;; Spark has encoded communications with the C2 server with base64. ;; SpeakUp encodes C&C communication using Base64. ;; SUNBURST used Base64 encoding in its C2 traffic. ;; TA551 has used encoded ASCII text for initial C2 communications. ;; TrickBot can Base64-encode C2 commands. ;; Tropic Trooper has used base64 encoding to hide command strings delivered from the C2. ;; Valak has returned C2 data as encoded ASCII. ;; WellMess has used Base64 encoding to uniquely identify communication to and from the C2. ;; Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests."
1
accept
T1132.001
Data Encoding: Standard Encoding
AdFind can enumerate domain groups.
1
accept
T1069.002
Permission Groups Discovery: Domain Groups
BloodHound can collect information about domain groups and members.
1
accept
T1069.002
Permission Groups Discovery: Domain Groups
CrackMapExec can gather the user accounts within domain groups.
1
accept
T1069.002
Permission Groups Discovery: Domain Groups
Dragonfly 2.0 used batch scripts to enumerate administrators and users in the domain.
1
accept
T1069.002
Permission Groups Discovery: Domain Groups
dsquery can be used to gather information on permission groups within a domain.
1
accept
T1069.002
Permission Groups Discovery: Domain Groups
Egregor can conduct Active Directory reconnaissance using tools such as Sharphound or AdFind.
1
accept
T1069.002
Permission Groups Discovery: Domain Groups
GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.
1
accept
T1069.002
Permission Groups Discovery: Domain Groups
Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands net group Exchange Trusted Subsystem /domain and net group domain admins /domain. ;; Inception has used specific malware modules to gather domain membership. ;; Ke3chang performs discovery of permission groups net group /domain. ;; Kwampirs collects a list of domain groups with the command net localgroup /domain. ;; Commands such as net group /domain can be used in Net to gather information about and manipulate groups. ;; OilRig has used net group /domain net group “domain admins” /domain and net group “Exchange Trusted Subsystem” /domain to find domain group permission settings. ;; OSInfo specifically looks for Domain Admins and power users within the domain. ;; POWRUNER may collect domain group information by running net group /domain or a series of other commands on a victim. ;; REvil can identify the domain membership of a compromised host. ;; SoreFang can enumerate domain groups by executing net.exe group /domain. ;; Turla has used net group Domain Admins" /domain to identify domain administrators. ;; WellMess can identify domain group membership for the current user."
1
accept
T1069.002
Permission Groups Discovery: Domain Groups
admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails.
1
accept
T1204.002
User Execution: Malicious File
Agent Tesla has been executed through malicious e-mail attachments
1
accept
T1204.002
User Execution: Malicious File
Ajax Security Team has lured victims into executing malicious files.
1
accept
T1204.002
User Execution: Malicious File
AppleJeus has required user execution of a malicious MSI installer.
1
accept
T1204.002
User Execution: Malicious File
APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload.
1
accept
T1204.002
User Execution: Malicious File
APT12 has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing.
1
accept
T1204.002
User Execution: Malicious File
APT19 attempted to get users to launch malicious attachments delivered via spearphishing emails.
1
accept
T1204.002
User Execution: Malicious File
APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts. ;; APT29 has used various forms of spearphishing attempting to get a user to open attachments including but not limited to malicious Microsoft Word documents .pdf and .lnk files. ;; APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails. ;; APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment. ;; APT33 has used malicious e-mail attachments to lure victims into executing malware. ;; APT37 has sent spearphishing attachments attempting to get a user to open them. ;; APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment. ;; Astaroth has used malicious files including VBS LNK and HTML for execution. ;; BlackTech has used e-mails with malicious documents to lure victims into installing malware. ;; BLINDINGCAN has lured victims into executing malicious macros embedded within Microsoft Office documents. ;; BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails. ;; Bundlore has attempted to get users to execute a malicious .app file that looks like a Flash Player update. ;; Cardinal RAT lures victims into executing malicious macros embedded within Microsoft Excel documents. ;; CARROTBALL has been executed through users being lured into opening malicious e-mail attachments. ;; Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine. ;; CSPY Downloader has been delivered via malicious documents with embedded macros. ;; Dark Caracal makes their malware look like Flash Player Office or PDF documents in order to entice a user to click on it. ;; Darkhotel has sent spearphishing emails in an attempt to lure users into clicking on a malicious attachments. ;; DarkHydrus has sent malware that required users to hit the enable button in Microsoft Excel to allow an .iqy file to be downloaded. ;; Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open attachments. ;; Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments. ;; Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing. ;; FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails (often sent from compromised accounts). ;; FIN6 has used malicious documents to lure victims into allowing execution of PowerShell scripts. ;; FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file. ;; FIN8 has leveraged Spearphishing Attachments attempting to gain User Execution. ;; Frankenstein has used trojanized Microsoft Word documents sent via email which prompted the victim to enable macros. ;; Gallmaker sent victims a lure document with a warning that asked victims to “enable content” for execution. ;; Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded. ;; Gorgon Group attempted to get users to launch malicious Microsoft Office attachments delivered via spearphishing emails. ;; Grandoreiro has infected victims via malicious attachments. ;; The GuLoader executable has been retrieved via embedded macros in malicious Word documents. ;; Hancitor has used malicious Microsoft Word documents sent via email which prompted the victim to enable macros. ;; Higaisa used malicious e-mail attachments to lure victims into executing LNK files. ;; IcedID has been executed through Word documents with malicious embedded macros. ;; Inception lured victims into clicking malicious files for machine reconnaissance and to execute malware. ;; InvisiMole can deliver trojanized versions of software and documents relying on user execution. ;; Javali has achieved execution through victims opening malicious attachments including MSI files with embedded VBScript. ;; JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer. ;; Kerrdown has gained execution through victims opening malicious files. ;; KGH_SPY has been spread through Word documents containing malicious macros. ;; Kimsuky has used attempted to lure victims into opening malicious e-mail attachments. ;; Lazarus Group has attempted to get users to launch a malicious Microsoft Word attachment delivered via a spearphishing email. ;; Leviathan has sent spearphishing attachments attempting to get a user to click. ;; Lokibot has been executed through malicious documents contained in spearphishing e-mails. ;; Machete has has relied on users opening malicious attachments delivered through spearphishing to execute malware. ;; menuPass has attempted to get victims to open malicious files such as Windows Shortcuts (.lnk) and/or Microsoft Office documents sent via email as part of spearphishing campaigns. ;; Metamorfo requires the user to double-click the executable to run the malicious HTA file. ;; Mofang's malicious spearphishing attachments required a user to open the file after receiving. ;; Molerats has sent malicious files via email that tricked users into clicking Enable Content to run an embedded macro and to download malicious archives. ;; MuddyWater has attempted to get users to enable macros and launch malicious Microsoft Word documents delivered via spearphishing emails. ;; Mustang Panda has sent malicious files requiring direct victim interaction to execute. ;; Naikon has convinced victims to open malicious attachments to execute malware. ;; NETWIRE has been executed through luring victims into opening malicious documents. ;; OilRig has delivered macro-enabled documents that required targets to click the enable content" button to execute the payload on the system. ;; OSX/Shlayer relies on users mounting and executing a malicious DMG file. ;; Patchwork embedded a malicious macro in a Word document and lured the victim to click on an icon to execute the malware. ;; PLATINUM has attempted to get users to open malicious files by sending spearphishing emails with attachments to victims. ;; PLEAD has been executed via malicious e-mail attachments. ;; PoetRAT has used spearphishing attachments to infect victims. ;; Pony has attempted to lure targets into downloading an attached executable (ZIP RAR or CAB archives) or document (PDF or other MS Office format). ;; PROMETHIUM has attempted to get users to execute compromised installation files for legitimate software including compression applications security software browsers file recovery applications and other tools and utilities. ;; Ramsay has been executed through malicious e-mail attachments. ;; Rancor attempted to get users to click on an embedded macro within a Microsoft Office Excel document to launch their malware. ;; REvil has been executed via malicious MS Word e-mail attachments. ;; Rifdoor has been executed from malicious Excel or Word documents containing macros. ;; RTM has attempted to lure victims into opening e-mail attachments to execute malicious code. ;; RTM has relied on users opening malicious email attachments decompressing the attached archive and double-clicking the executable within. ;; Sandworm Team has tricked unwitting recipients into clicking on spearphishing attachments and enabling malicious macros embedded within files. ;; Sharpshooter has sent malicious DOC and PDF files to targets so that they can be opened by a user. ;; Sidewinder has lured targets to click on malicious files to gain execution in the target environment. ;; Silence attempts to get users to launch malicious attachments delivered via spearphishing emails. ;; SQLRat relies on users clicking on an embedded image to execute the scripts. ;; StrongPity has been executed via compromised installation files for legitimate software including compression applications security software browsers file recovery applications and other tools and utilities. ;; SYSCON has been executed by luring victims to open malicious e-mail attachments. ;; TA459 has attempted to get victims to open malicious Microsoft Word attachment sent via spearphishing. ;; TA505 has used lures to get users to enable content in malicious attachments and execute malicious files contained in archives. For example TA505 makes their malware look like legitimate Microsoft Word documents .pdf and/or .lnk files. ;; TA551 has prompted users to enable macros within spearphishing attachments to install malware. ;; The White Company has used phishing lure documents that trick users into opening them and infecting their computers. ;; TrickBot has attempted to get users to launch malicious documents to deliver its payload. ;; Tropic Trooper has lured victims into executing malware via malicious e-mail attachments. ;; A Word document delivering TYPEFRAME prompts the user to enable macro execution. ;; Valak has been executed via Microsoft Word documents containing malicious macros. ;; Whitefly has used malicious .exe or .dll files disguised as documents or images. ;; Windshift has used e-mail attachments to lure victims into executing malicious code. ;; Wizard Spider has lured victims to execute malware with spearphishing attachments containing macros to download either Emotet Bokbot or TrickBot."
1
accept
T1204.002
User Execution: Malicious File
AppleJeus's spearphishing links required user interaction to navigate to the malicious website.
1
accept
T1204.001
User Execution: Malicious Link
APT28 has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.
1
accept
T1204.001
User Execution: Malicious Link
APT29 has used various forms of spearphishing attempting to get a user to click on a malicous link.
1
accept
T1204.001
User Execution: Malicious Link
APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.
1
accept
T1204.001
User Execution: Malicious Link
APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.
1
accept
T1204.001
User Execution: Malicious Link
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link.
1
accept
T1204.001
User Execution: Malicious Link
BackConfig has compromised victims via links to URLs hosting malicious content.
1
accept
T1204.001
User Execution: Malicious Link
Bazar can gain execution via malicious links to decoy landing pages hosted on Google Docs. ;; BlackTech has used e-mails with malicious links to lure victims into installing malware. ;; Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine. ;; Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open links. ;; Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links. ;; Emotet has relied upon users clicking on a malicious link delivered through spearphishing. ;; Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file. ;; FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts). ;; FIN8 has leveraged Spearphishing Links attempting to gain User Execution. ;; Grandoreiro has used malicious links to gain execution on victim machines. ;; GuLoader has relied upon users clicking on links to malicious documents. ;; Hancitor has relied upon users clicking on a malicious link delivered through phishing. ;; Javali has achieved execution through victims clicking links to malicious websites. ;; Kerrdown has gained execution through victims opening malicious links. ;; Leviathan has sent spearphishing email links attempting to get a user to click. ;; Machete has has relied on users opening malicious links delivered through spearphishing to execute malware. ;; Melcoz has gained execution through victims opening malicious links. ;; Mofang's spearphishing emails required a user to click the link to connect to a compromised website. ;; Molerats has sent malicious links via email trick users into opening a RAR archive and running an executable. ;; MuddyWater has distributed URLs in phishing e-mails that link to lure documents. ;; Mustang Panda has sent malicious links directing victims to a Google Drive folder. ;; NETWIRE has been executed through convincing victims into clicking malicious links. ;; Night Dragon enticed users to click on links in spearphishing emails to download malware. ;; OilRig has delivered malicious links to achieve execution on the target system. ;; Patchwork has used spearphishing with links to try to get users to click download and open malicious files. ;; PLEAD has been executed via malicious links in e-mails. ;; Pony has attempted to lure targets into clicking links in spoofed emails from legitimate banks. ;; Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders. ;; Sidewinder has lured targets to click on malicious links to gain execution in the target environment. ;; TA505 has used lures to get users to click links in emails and attachments. For example TA505 makes their malware look like legitimate Microsoft Word documents .pdf and/or .lnk files. ;; TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education Culture Sports Science and Technology of Japan. ;; Turla has used spearphishing via a link to get users to download and run their malware. ;; Windshift has used links embedded in e-mails to lure victims into executing malicious code. ;; Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing. ;; ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware.
1
accept
T1204.001
User Execution: Malicious Link
APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software.
1
accept
T1195.002
Supply Chain Compromise: Compromise Software Supply Chain
APT41 gained access to production environments where they could inject malicious code into legitimate signed files and widely distribute them to end users.
1
accept
T1195.002
Supply Chain Compromise: Compromise Software Supply Chain
CCBkdr was added to a legitimate signed version 5.33 of the CCleaner software and distributed on CCleaner's distribution site.
1
accept
T1195.002
Supply Chain Compromise: Compromise Software Supply Chain
Cobalt Group has compromised legitimate web browser updates to deliver a backdoor.
1
accept
T1195.002
Supply Chain Compromise: Compromise Software Supply Chain
Dragonfly has placed trojanized installers on legitimate vendor app stores.
1
accept
T1195.002
Supply Chain Compromise: Compromise Software Supply Chain
GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR.
1
accept
T1195.002
Supply Chain Compromise: Compromise Software Supply Chain
GoldenSpy has been packaged with a legitimate tax preparation software.
1
accept
T1195.002
Supply Chain Compromise: Compromise Software Supply Chain
Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one. ;; SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product. ;; UNC2452 gained initial network access via a trojanized update of SolarWinds Orion software.
1
accept
T1195.002
Supply Chain Compromise: Compromise Software Supply Chain
null
1
accept
T1195.001
Supply Chain Compromise: Compromise Software Dependencies And Development Tools
APT10 (HOGFISH) will commonly comprise the software dependency of a company with the aim of gaining access to said company's infrastructure and their customers.
1
accept
T1195.001
Supply Chain Compromise: Compromise Software Dependencies And Development Tools
Supply chain compromise was common with COVID-19 domains, as over 5000 domains were registered within a few months, with many aiming to deliver malware.
1
accept
T1195.001
Supply Chain Compromise: Compromise Software Dependencies And Development Tools
Rowhammer attacks compromise RAM, leading to the potential compromise of systems that use RAM from manufacturers that are vulnerable to such attacks.
1
accept
T1195.001
Supply Chain Compromise: Compromise Software Dependencies And Development Tools
A Javascript skimmer named Pipka can skim the credentials of customers of over 27 e-commerce sites.
1
accept
T1195.001
Supply Chain Compromise: Compromise Software Dependencies And Development Tools
APT41 will use supply chain compromise attacks for initial access.
1
accept
T1195.001
Supply Chain Compromise: Compromise Software Dependencies And Development Tools
APT38 has used DYEPACK to manipulate SWIFT messages en route to a printer.
1
accept
T1565.002
Data Manipulation: Transmitted Data Manipulation
LightNeuron is capable of modifying email content headers and attachments during transit.
1
accept
T1565.002
Data Manipulation: Transmitted Data Manipulation
Melcoz can monitor the clipboard for cryptocurrency addresses and change the intended address to one controlled by the adversary.
1
accept
T1565.002
Data Manipulation: Transmitted Data Manipulation
Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses which it then overwrites with the attacker's address.
1
accept
T1565.002
Data Manipulation: Transmitted Data Manipulation
Ransomware such as Babuk will modify the data within transmissions between their C2 servers and the compromised host to hide their malicious activity.
1
accept
T1565.002
Data Manipulation: Transmitted Data Manipulation
APT38 has used DYEPACK to create delete and alter records in databases used for SWIFT transactions.
1
accept
T1565.001
Data Manipulation: Stored Data Manipulation
FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as “hacked "phish " and “malware" in a likely attempt to prevent organizations from communicating about their activities.
1
accept
T1565.001
Data Manipulation: Stored Data Manipulation
SUNSPOT created a copy of the SolarWinds Orion software source file with a .bk extension to backup the original content wrote SUNBURST using the same filename but with a .tmp extension and then moved SUNBURST using MoveFileEx to the original filename with a .cs extension so it could be compiled within Orion software."
1
accept
T1565.001
Data Manipulation: Stored Data Manipulation
XMRLocker will delete log files to obfuscate malicious activity.
1
accept
T1565.001
Data Manipulation: Stored Data Manipulation
REvil will compromise end users and modify data stored on machines to hide their presence before delivery of an encryption payload.
1
accept
T1565.001
Data Manipulation: Stored Data Manipulation
The APT1 group is known to have used RDP during operations.
1
accept
T1021.001
Remote Services: Remote Desktop Protocol
APT3 enables the Remote Desktop Protocol for persistence. APT3 has also interacted with compromised systems to browse and copy files through RDP sessions.
1
accept
T1021.001
Remote Services: Remote Desktop Protocol
APT39 has been seen using RDP for lateral movement and persistence in some cases employing the rdpwinst tool for mangement of multiple sessions.
1
accept
T1021.001
Remote Services: Remote Desktop Protocol
APT41 used RDP for lateral movement.
1
accept
T1021.001
Remote Services: Remote Desktop Protocol
The Axiom group is known to have used RDP during operations.
1
accept
T1021.001
Remote Services: Remote Desktop Protocol
Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.
1
accept
T1021.001
Remote Services: Remote Desktop Protocol
Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions.
1
accept
T1021.001
Remote Services: Remote Desktop Protocol
Chimera has used RDP to access targeted systems. ;; Cobalt Group has used Remote Desktop Protocol to conduct lateral movement. ;; Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel. ;; DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard. ;; Dragonfly 2.0 moved laterally via RDP. ;; FIN10 has used RDP to move laterally to systems in the victim environment. ;; FIN6 used RDP to move laterally in victim networks. ;; FIN8 has used RDP for Lateral Movement. ;; Fox Kitten has used RDP to log in and move laterally in the target environment. ;; Imminent Monitor has a module for performing remote desktop access. ;; jRAT can support RDP control. ;; Koadic can enable remote desktop on the victim's machine. ;; Lazarus Group malware SierraCharlie uses RDP for propagation. ;; Leviathan has targeted RDP credentials and used it to move through the victim environment. ;; menuPass has used RDP connections to move across the victim network. ;; njRAT has a module for performing remote desktop access. ;; OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment. ;; Patchwork attempted to use RDP to move laterally. ;; Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client. ;; Pysa has laterally moved using RDP connections. ;; QuasarRAT has a module for performing remote desktop access. ;; Revenge RAT has a plugin to perform RDP access. ;; SDBbot has the ability to use RDP to connect to victim's machines. ;; ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel. ;; Silence has used RDP for lateral movement. ;; Stolen Pencil utilized RDP for direct remote point-and-click access. ;; TEMP.Veles utilized RDP throughout an operation. ;; Wizard Spider has used RDP for lateral movement. ;; zwShell has used RDP for lateral movement. ;; ZxShell has remote desktop functionality.
1
accept
T1021.001
Remote Services: Remote Desktop Protocol
Cobalt Strike can make tokens from known credentials.
1
accept
T1134.003
Access Token Manipulation: Make And Impersonate Token
RC2CL backdoor can modify access tokens to escalate privilege to the privileges of a process to the ones associated with the new token.
1
accept
T1134.003
Access Token Manipulation: Make And Impersonate Token
Through creating a new login session and setting the token to another thread, LazyCat can escalate privileges.
1
accept
T1134.003
Access Token Manipulation: Make And Impersonate Token
The SetThreadToken command ifsoften used by malware to impersonate legitimate threads or processes,
1
accept
T1134.003
Access Token Manipulation: Make And Impersonate Token
The creation of duplicate tokens allows for adversaries to escalate their privileges.
1
accept
T1134.003
Access Token Manipulation: Make And Impersonate Token
Keydnap uses the keychaindump project to read securityd memory.
1
accept
T1555.002
Credentials from Password Stores: Securityd Memory
Malware such as Mimikatz can elevate themselves to root privileges and then read Securityd's memory to harvest plaintext passwords.
1
accept
T1555.002
Credentials from Password Stores: Securityd Memory
APT15, a chinese based threat actor, acquire password through reading Securityd's memory.
1
accept
T1555.002
Credentials from Password Stores: Securityd Memory
REvil utilizes many methods of credential harvesting, including reading plaintext passwords from a root account.
1
accept
T1555.002
Credentials from Password Stores: Securityd Memory
Qakbot can read passwords from Securityd's memory.
1
accept
T1555.002
Credentials from Password Stores: Securityd Memory
Calisto collects Keychain storage data and copies those passwords/tokens to a file.
1
accept
T1555.001
Credentials from Password Stores: Keychain
iKitten collects the keychains on the system.
1
accept
T1555.001
Credentials from Password Stores: Keychain
LaZagne can obtain credentials from macOS Keychains.
1
accept
T1555.001
Credentials from Password Stores: Keychain
Proton gathers credentials in files for keychains.
1
accept
T1555.001
Credentials from Password Stores: Keychain
Matiex keylogger can harvest passwords from keychains.
1
accept
T1555.001
Credentials from Password Stores: Keychain
APT37 has signed its malware with an invalid digital certificates listed as “Tencent Technology (Shenzhen) Company Limited.”
1
accept
T1036.001
Masquerading: Invalid Code Signature
BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate.
1
accept
T1036.001
Masquerading: Invalid Code Signature
The NETWIRE client has been signed by fake and invalid digital certificates.
1
accept
T1036.001
Masquerading: Invalid Code Signature
Regin stage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation.
1
accept
T1036.001
Masquerading: Invalid Code Signature
Windshift has used revoked certificates to sign malware.
1
accept
T1036.001
Masquerading: Invalid Code Signature
WindTail has been incompletely signed with revoked certificates.
1
accept
T1036.001
Masquerading: Invalid Code Signature
Anchor has been signed with valid certificates to evade detection by security tools.
1
accept
T1553.002
Subvert Trust Controls: Code Signing
AppleJeus has used a valid digital signature from Sectigo to appear legitimate.
1
accept
T1553.002
Subvert Trust Controls: Code Signing
APT29 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle.
1
accept
T1553.002
Subvert Trust Controls: Code Signing
APT41 leveraged code-signing certificates to sign malware when targeting both gaming and non-gaming organizations.
1
accept
T1553.002
Subvert Trust Controls: Code Signing
BackConfig has been signed with self signed digital certificates mimicking a legitimate software company.
1
accept
T1553.002
Subvert Trust Controls: Code Signing
Bazar has been signed with fake certificates including those appearing to be from VB CORPORATE PTY. LTD.
1
accept
T1553.002
Subvert Trust Controls: Code Signing
BLINDINGCAN has been signed with code-signing certificates such as CodeRipper.
1
accept
T1553.002
Subvert Trust Controls: Code Signing
BOOSTWRITE has been signed by a valid CA. ;; ChChes samples were digitally signed with a certificate originally used by Hacking Team that was later leaked and subsequently revoked. ;; Cobalt Strike can use self signed Java applets to execute signed applet attacks. ;; CopyKittens digitally signed an executable with a stolen certificate from legitimate company AI Squared. ;; CSPY Downloader has come signed with revoked certificates. ;; Darkhotel has used code-signing certificates on its malware that are either forged due to weak keys or stolen. Darkhotel has also stolen certificates and signed backdoors and downloaders with them. ;; Some Daserf samples were signed with a stolen digital certificate. ;; Ebury has installed a self-signed RPM package mimicking the original system package on RPM based systems. ;; Turla has used valid digital certificates from Sysprint AG to sign its Epic dropper. ;; FIN6 has used Comodo code-signing certificates. ;; FIN7 has signed Carbanak payloads with legally purchased code signing certificates. FIN7 has also digitally signed their phishing documents backdoors and other staging tools to bypass security controls. ;; GALLIUM has used stolen certificates to sign its tools including those from Whizzimo LLC. ;; Gazer versions are signed with various valid certificates; one was likely faked and issued by Comodo for Solid Loop Ltd " and another was issued for "Ultimate Computer Support Ltd." ;; GreyEnergy digitally signs the malware with a code-signing certificate. ;; Helminth samples have been signed with legitimate compromised code signing certificates owned by software company AI Squared. ;; Honeybee uses a dropper called MaoCheng that harvests a stolen digital signature from Adobe Systems. ;; Janicab used a valid AppleDeveloperID to sign the code to get past security restrictions. ;; Kimsuky has signed files with the name EGIS CO . Ltd.. ;; Leviathan has used stolen code signing certificates to sign malware. ;; LockerGoga has been signed with stolen certificates in order to make it look more legitimate. ;; Metamorfo has digitally signed executables using AVAST Software certificates. ;; Molerats has used forged Microsoft code-signing certificates on malware. ;; More_eggs has used a signed binary shellcode loader and a signed Dynamic Link Library (DLL) to create a reverse shell. ;; Nerex drops a signed Microsoft DLL to disk. ;; Patchwork has signed malware with self-signed certificates from fictitious and spoofed legitimate software companies. ;; PipeMon its installer and tools are signed with stolen code-signing certificates. ;; PROMETHIUM has signed code with self-signed certificates. ;; A QuasarRAT .dll file is digitally signed by a certificate from AirVPN. ;; RTM samples have been signed with a code-signing certificates. ;; Silence has used a valid certificate to sign their primary loader Silence.Downloader (aka TrueBot). ;; StrongPity has been signed with self-signed certificates. ;; Suckfly has used stolen certificates to sign its malware. ;; SUNBURST was digitally signed by SolarWinds from March - May 2020. ;; TA505 has signed payloads with code signing certificates from Thawte and Sectigo. ;; TrickBot has come with a signed downloader component. ;; UNC2452 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle. ;; Winnti Group used stolen certificates to sign its malware. ;; Wizard Spider has used Digicert code-signing certificates for some of its malware."
1
accept
T1553.002
Subvert Trust Controls: Code Signing
Agent Tesla has the ability to extract credentials from the Registry.
1
accept
T1552.002
Unsecured Credentials: Credentials In Registry
APT32 used Outlook Credential Dumper to harvest credentials stored in Windows registry.
1
accept
T1552.002
Unsecured Credentials: Credentials In Registry
PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile Get-Webconfig Get-ApplicationHost Get-SiteListPassword Get-CachedGPPPassword and Get-RegistryAutoLogon.
1
accept
T1552.002
Unsecured Credentials: Credentials In Registry
Reg may be used to find credentials in the Windows Registry.
1
accept
T1552.002
Unsecured Credentials: Credentials In Registry
TrickBot has retrieved PuTTY credentials by querying the Software\SimonTatham\Putty\Sessions registry key
1
accept
T1552.002
Unsecured Credentials: Credentials In Registry
Valak can use the clientgrabber module to steal e-mail credentials from the Registry.
1
accept
T1552.002
Unsecured Credentials: Credentials In Registry
Kinsing has searched bash_history for credentials.
1
accept
T1552.003
Unsecured Credentials: Bash History
Tropic Trooper favors the tactic of harvesting credentials from a bash_history file.
1
accept
T1552.003
Unsecured Credentials: Bash History
The ransomware Diavol contains functionality that allows it to search user's historical bash commands for usernames and passwords that were used as parameters.
1
accept
T1552.003
Unsecured Credentials: Bash History
FIN13 can enumerate their user credentials via searching the bash_history file of users for insecurely stored passwords.
1
accept
T1552.003
Unsecured Credentials: Bash History
The ~/.bash_history directory can contain credentials for APT groups to harvest if they are stored insecurely.
1
accept
T1552.003
Unsecured Credentials: Bash History
Anchor has come with a packed payload.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing
APT29 used UPX to pack files.
1
accept
T1027.002
Obfuscated Files or Information: Software Packing