value stringlengths 25 18k ⌀ | subtecnique int64 0 1 | answer stringclasses 2
values | id stringlengths 5 9 | name stringlengths 3 102 |
|---|---|---|---|---|
Install persistence through rc.d services: rc.d (/etc/rc.d/init.d/linux_kill).
| 1 | accept | T1037.004 | Boot or Logon Initialization Scripts: Rc Scripts |
Backwards compatibility on Ubuntu allowed attackers to achieve persistence via RC scripts.
| 1 | accept | T1037.004 | Boot or Logon Initialization Scripts: Rc Scripts |
As the malware tries to achieve persistence, Hatching Triage analysis reports suspicious behavior: “Modifies rc script.” | 1 | accept | T1037.004 | Boot or Logon Initialization Scripts: Rc Scripts |
APT41 has configured payloads to load via LD_PRELOAD. | 1 | accept | T1574.006 | Hijack Execution Flow: Dynamic Linker Hijacking |
Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD. | 1 | accept | T1574.006 | Hijack Execution Flow: Dynamic Linker Hijacking |
HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable. | 1 | accept | T1574.006 | Hijack Execution Flow: Dynamic Linker Hijacking |
Hildegard has modified /etc/ld.so.preload to intercept shared library import functions. | 1 | accept | T1574.006 | Hijack Execution Flow: Dynamic Linker Hijacking |
Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists. | 1 | accept | T1574.006 | Hijack Execution Flow: Dynamic Linker Hijacking |
APT32 has used JavaScript for drive-by downloads and C2 communications. | 1 | accept | T1059.007 | Command and Scripting Interpreter: Javascript |
Astaroth uses JavaScript to perform its core functionalities. | 1 | accept | T1059.007 | Command and Scripting Interpreter: Javascript |
Bundlore can execute JavaScript by injecting it into the victim's browser. | 1 | accept | T1059.007 | Command and Scripting Interpreter: Javascript |
Cobalt Group has executed JavaScript scriptlets on the victim's machine. | 1 | accept | T1059.007 | Command and Scripting Interpreter: Javascript |
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions. | 1 | accept | T1059.007 | Command and Scripting Interpreter: Javascript |
Evilnum has used malicious JavaScript files on the victim's machine. | 1 | accept | T1059.007 | Command and Scripting Interpreter: Javascript |
FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites. | 1 | accept | T1059.007 | Command and Scripting Interpreter: Javascript |
FIN7 used JavaScript scripts to help perform tasks on the victim's machine. ;; GRIFFON is written in and executed as JavaScript. ;; Higaisa used JavaScript to execute additional files. ;; InvisiMole can use a JavaScript file as part of its execution chain. ;; jRAT has been distributed as HTA files with JScript. ;; Kim... | 1 | accept | T1059.007 | Command and Scripting Interpreter: Javascript |
Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites. | 1 | accept | T1608.005 | Stage Capabilities: Link Target |
The attackers prepared over 39,000 phishing pages mimicking the four platforms' login pages.
| 1 | accept | T1608.005 | Stage Capabilities: Link Target |
They used Ngrok’s paid option to acquire customized phishing URLs displaying Meta’s trademarks (such as hxxp://facebook[.]in[.]ngrok[.]io/).
| 1 | accept | T1608.005 | Stage Capabilities: Link Target |
Prior to the attack, they registered typosquatted domains, set up phishing pages and employed URL shortener service.
| 1 | accept | T1608.005 | Stage Capabilities: Link Target |
The attacker placed archived malicious Office Documents at the link target. | 1 | accept | T1608.005 | Stage Capabilities: Link Target |
APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update. | 1 | accept | T1608.004 | Stage Capabilities: Drive |
Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest. | 1 | accept | T1608.004 | Stage Capabilities: Drive |
The attackers prepared an malvertizing: an ad combined of image and a JavaScript, which contained malicious code, and pushed it to legitimate websites via ad networks.
| 1 | accept | T1608.004 | Stage Capabilities: Drive |
Second stage of the Magecart attack included injecting malicious Javascript on the vulnerable checkout pages.
| 1 | accept | T1608.004 | Stage Capabilities: Drive |
This APT group was looking to compromise industry’s online publications to prepare for watering whole attacks. | 1 | accept | T1608.004 | Stage Capabilities: Drive |
Adversaries created self-signed certificates and installed them on their web servers.
| 1 | accept | T1608.003 | Stage Capabilities: Install Digital Certificate |
Attackers installed Let’s Encrypt certificates on their phishing servers to gain additional trust from the visitors.
| 1 | accept | T1608.003 | Stage Capabilities: Install Digital Certificate |
They prepare phishing pages with valid SSL/TLS certificates installed.
| 1 | accept | T1608.003 | Stage Capabilities: Install Digital Certificate |
According to PhishLabs, in the last quarter of 2019, 74% of reported phishing websites were 'secure,' being both HTTPS and with the lock symbol, meaning cybercriminals installed SSL certificates and circumvented so-called verification processes.
| 1 | accept | T1608.003 | Stage Capabilities: Install Digital Certificate |
Actors installed SSL certificates they made using OpenSSL (where you can even be your own Certificate Authority). | 1 | accept | T1608.003 | Stage Capabilities: Install Digital Certificate |
Threat Group-3390 has staged tools including gsecdump and WCE on previously compromised websites. | 1 | accept | T1608.002 | Stage Capabilities: Upload Tool |
Prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled.
| 1 | accept | T1608.002 | Stage Capabilities: Upload Tool |
Threat actor placed several double-purpose tools on his GitHub repository.
| 1 | accept | T1608.002 | Stage Capabilities: Upload Tool |
The attackers uploaded Remote Utilities RAT tool to a third-party compromised website to be used if the victim environment won’t have a remote administration tool installed.
| 1 | accept | T1608.002 | Stage Capabilities: Upload Tool |
FIN5 staged a customized version of PsExec. | 1 | accept | T1608.002 | Stage Capabilities: Upload Tool |
APT32 has hosted malicious payloads in Dropbox Amazon S3 and Google Drive for use during targeting. | 1 | accept | T1608.001 | Stage Capabilities: Upload Malware |
They were posting obfuscated malicious payloads on Pastebin to be used later during the attack.
| 1 | accept | T1608.001 | Stage Capabilities: Upload Malware |
Some of the compromised websites were used to stage post-compromise malware such as keyloggers.
| 1 | accept | T1608.001 | Stage Capabilities: Upload Malware |
These government hackers staged malicious Java scripts on the Microsoft typosquatted domains they registered earlier.
| 1 | accept | T1608.001 | Stage Capabilities: Upload Malware |
Gamaredon stage malicious VBA scripts on various compromised websites. | 1 | accept | T1608.001 | Stage Capabilities: Upload Malware |
APT41 has used search order hijacking to execute malicious payloads such as Winnti RAT. | 1 | accept | T1574.001 | Hijack Execution Flow: Dll Search Order Hijacking |
Astaroth can launch itself via DLL Search Order Hijacking. | 1 | accept | T1574.001 | Hijack Execution Flow: Dll Search Order Hijacking |
BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library which then loads the gdiplus library and ultimately loads the local Dwrite dll. | 1 | accept | T1574.001 | Hijack Execution Flow: Dll Search Order Hijacking |
Crutch can persist via DLL search order hijacking on Google Chrome Mozilla Firefox or Microsoft OneDrive. | 1 | accept | T1574.001 | Hijack Execution Flow: Dll Search Order Hijacking |
Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges. | 1 | accept | T1574.001 | Hijack Execution Flow: Dll Search Order Hijacking |
Empire contains modules that can discover and exploit various DLL hijacking opportunities. | 1 | accept | T1574.001 | Hijack Execution Flow: Dll Search Order Hijacking |
Evilnum has used the malware variant TerraTV to load a malicious DLL placed in the TeamViewer directory instead of the original Windows DLL located in a system folder. | 1 | accept | T1574.001 | Hijack Execution Flow: Dll Search Order Hijacking |
A FinFisher variant uses DLL search order hijacking. ;; Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism. ;; HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary VPDN_LU.exe to load a malicious DLL that mimics a legitimate Symantec DLL navlu... | 1 | accept | T1574.001 | Hijack Execution Flow: Dll Search Order Hijacking |
APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. | 1 | accept | T1574.002 | Hijack Execution Flow: Dll Side |
APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools. | 1 | accept | T1574.002 | Hijack Execution Flow: Dll Side |
APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate signed executable (AcroTranscoder). | 1 | accept | T1574.002 | Hijack Execution Flow: Dll Side |
APT41 used legitimate executables to perform DLL side-loading of their malware. | 1 | accept | T1574.002 | Hijack Execution Flow: Dll Side |
BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. | 1 | accept | T1574.002 | Hijack Execution Flow: Dll Side |
DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper. | 1 | accept | T1574.002 | Hijack Execution Flow: Dll Side |
BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories. | 1 | accept | T1574.002 | Hijack Execution Flow: Dll Side |
BRONZE BUTLER has used legitimate applications to side-load malicious DLLs. ;; Chimera has used side loading to place malicious DLLs in memory. ;; Denis exploits a security vulnerability to load a fake DLL and execute its code. ;; Egregor has used DLL side-loading to execute its payload. ;; FinFisher uses DLL side-loa... | 1 | accept | T1574.002 | Hijack Execution Flow: Dll Side |
APT39 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows. | 1 | accept | T1553.006 | Subvert Trust Controls: Code Signing Policy Modification |
BlackEnergy has enabled the TESTSIGNING boot configuration option to facilitate loading of a driver component. | 1 | accept | T1553.006 | Subvert Trust Controls: Code Signing Policy Modification |
Hikit has attempted to disable driver signing verification by tampering with several Registry keys prior to the loading of a rootkit driver component. | 1 | accept | T1553.006 | Subvert Trust Controls: Code Signing Policy Modification |
Turla has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges. | 1 | accept | T1553.006 | Subvert Trust Controls: Code Signing Policy Modification |
ESPecter patches Windows kernel function SepInitializeCodeIntegrity directly in memory to disable Driver Signature Enforcement (DSE). | 1 | accept | T1553.006 | Subvert Trust Controls: Code Signing Policy Modification |
APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment.
| 1 | accept | T1562.003 | Impair Defenses: Impair Command History Logging |
Attackers set SaveNothing option for PSReadLine to turn off logging PowerShell command history.
| 1 | accept | T1562.003 | Impair Defenses: Impair Command History Logging |
Threat actors set the command history size to zero (export HISTFILESIZE=0) to prevent logging of commands.
| 1 | accept | T1562.003 | Impair Defenses: Impair Command History Logging |
Prior to executing PowerShell commands, attackers meddled with PSReadLine module to disable logging.
| 1 | accept | T1562.003 | Impair Defenses: Impair Command History Logging |
After getting the initial access to the Windows Server, hackers changed PSReadLine logging destination to confuse incident responders. | 1 | accept | T1562.003 | Impair Defenses: Impair Command History Logging |
APT-C-36 has disguised its scheduled tasks as those used by Google. | 1 | accept | T1036.004 | Masquerading: Masquerade Task Or Service |
APT29 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate. | 1 | accept | T1036.004 | Masquerading: Masquerade Task Or Service |
APT32 has used hidden or non-printing characters to help masquerade service names such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name install_flashplayer.exe". | 1 | accept | T1036.004 | Masquerading: Masquerade Task Or Service |
Attor's dispatcher disguises itself as a legitimate task (i.e. the task name and description appear legitimate). | 1 | accept | T1036.004 | Masquerading: Masquerade Task Or Service |
Bazar can create a task named to appear benign. | 1 | accept | T1036.004 | Masquerading: Masquerade Task Or Service |
build_downer has added itself to the Registry Run key as "NVIDIA" to appear legitimate. | 1 | accept | T1036.004 | Masquerading: Masquerade Task Or Service |
Carbanak has copied legitimate service names to use for malicious services. | 1 | accept | T1036.004 | Masquerading: Masquerade Task Or Service |
Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service. ;; ComRAT has used a task name associated with Windows SQM Consolidator. ;; Crutch has established persistence with a scheduled task impersonating the Outlook item finder. ;; CSPY Downloader has attempted to app... | 1 | accept | T1036.004 | Masquerading: Masquerade Task Or Service |
APT29 leveraged privileged accounts to replicate directory service data with domain controllers. | 1 | accept | T1003.006 | OS Credential Dumping: Dcsync |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DCSync/NetSync. | 1 | accept | T1003.006 | OS Credential Dumping: Dcsync |
Operation Wocao has used Mimikatz's DCSync to dump credentials from the memory of the targeted system. | 1 | accept | T1003.006 | OS Credential Dumping: Dcsync |
UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers. | 1 | accept | T1003.006 | OS Credential Dumping: Dcsync |
The attacker discovered domain controllers (DCs) and submitted a replication request. This prompted the primary DC to replicate the credentials of other DCs back to the compromised domain administrator, using the Directory Replication Service (DRS) remote protocol. | 1 | accept | T1003.006 | OS Credential Dumping: Dcsync |
APT33 has used a variety of publicly available tools like LaZagne to gather credentials. | 1 | accept | T1003.004 | OS Credential Dumping: Lsa Secrets |
CosmicDuke collects LSA secrets. | 1 | accept | T1003.004 | OS Credential Dumping: Lsa Secrets |
CrackMapExec can dump hashed passwords from LSA secrets for the targeted system. | 1 | accept | T1003.004 | OS Credential Dumping: Lsa Secrets |
Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes. | 1 | accept | T1003.004 | OS Credential Dumping: Lsa Secrets |
gsecdump can dump LSA secrets. | 1 | accept | T1003.004 | OS Credential Dumping: Lsa Secrets |
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information. | 1 | accept | T1003.004 | OS Credential Dumping: Lsa Secrets |
Ke3chang has dumped credentials including by using gsecdump. | 1 | accept | T1003.004 | OS Credential Dumping: Lsa Secrets |
LaZagne can perform credential dumping from LSA secrets to obtain account and password information. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials. ;; Mimikat... | 1 | accept | T1003.004 | OS Credential Dumping: Lsa Secrets |
APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days. | 1 | accept | T1110.001 | Brute Force: Password Guessing |
China Chopper's server component can perform brute force password guessing against authentication portals. | 1 | accept | T1110.001 | Brute Force: Password Guessing |
CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network. | 1 | accept | T1110.001 | Brute Force: Password Guessing |
Emotet has been observed using a hard coded list of passwords to brute force user accounts. | 1 | accept | T1110.001 | Brute Force: Password Guessing |
Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords. | 1 | accept | T1110.001 | Brute Force: Password Guessing |
P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH FTP POP3 MySQL MSSQL and PostgreSQL services. | 1 | accept | T1110.001 | Brute Force: Password Guessing |
Pony has used a small dictionary of common passwords against a collected list of local accounts. | 1 | accept | T1110.001 | Brute Force: Password Guessing |
SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels. ;; Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports. | 1 | accept | T1110.001 | Brute Force: Password Guessing |
Cleaver has used custom tools to facilitate ARP cache poisoning. | 1 | accept | T1557.002 | Man |
Iran’s cyber hacking skills have evolved to include customized private tools with ARP poisoning function.
| 1 | accept | T1557.002 | Man |
Alireza’s C++ tools include the following techniques:
• ARP poisoning
| 1 | accept | T1557.002 | Man |
Jasus is an ARP cache poisoner developed by the Operation Cleaver team.
| 1 | accept | T1557.002 | Man |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.