value
stringlengths 25
18k
⌀ | subtecnique
int64 0
1
| answer
stringclasses 2
values | id
stringlengths 5
9
| name
stringlengths 3
102
|
|---|---|---|---|---|
SparklingGoblin uses servers hosted by various providers for its C&C servers.
| 1
|
accept
|
T1583.004
|
Acquire Infrastructure: Server
|
APT1 has registered hundreds of domains for use in operations.
| 1
|
accept
|
T1583.001
|
Acquire Infrastructure: Domains
|
APT28 registered domains imitating NATO OSCE security websites Caucasus information resources and other organizations.
| 1
|
accept
|
T1583.001
|
Acquire Infrastructure: Domains
|
APT29 has acquired C2 domains through resellers.
| 1
|
accept
|
T1583.001
|
Acquire Infrastructure: Domains
|
APT32 has set up and operated websites to gather information and deliver malware.
| 1
|
accept
|
T1583.001
|
Acquire Infrastructure: Domains
|
Kimsuky has registered domains to spoof targeted organizations and trusted third parties.
| 1
|
accept
|
T1583.001
|
Acquire Infrastructure: Domains
|
Lazarus Group has acquired infrastructure related to their campaigns to act as distribution points and C2 channels.
| 1
|
accept
|
T1583.001
|
Acquire Infrastructure: Domains
|
menuPass has registered malicious domains for use in intrusion campaigns.
| 1
|
accept
|
T1583.001
|
Acquire Infrastructure: Domains
|
Mustang Panda have acquired C2 domains prior to operations. ;; Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites such as email login pages online file sharing and storage websites and password reset pages. ;; Silent Librarian has acquired domains to establish credential harvesting pages often spoofing the target organization and using free top level domains .TK .ML .GA .CF and .GQ. ;; UNC2452 has acquired C2 domains through resellers. ;; ZIRCONIUM has purchased domains for use in targeted campaigns.
| 1
|
accept
|
T1583.001
|
Acquire Infrastructure: Domains
|
Attackers may opt to configure and run their own DNS servers in support of operations.
| 1
|
accept
|
T1583.002
|
Acquire Infrastructure: Dns Server
|
Adversaries may utilize DNS traffic for various tasks, including for Command and Control.
| 1
|
accept
|
T1583.002
|
Acquire Infrastructure: Dns Server
|
APT31 will utilize their own DNS server for use when conducting malicious activities.
| 1
|
accept
|
T1583.002
|
Acquire Infrastructure: Dns Server
|
Moses Staff will acquire their own infrastructure, usually domains and DNS.
| 1
|
accept
|
T1583.002
|
Acquire Infrastructure: Dns Server
|
TigerRAT variants can be modified to utilize a threat actor's own DNS infrastructure.
| 1
|
accept
|
T1583.002
|
Acquire Infrastructure: Dns Server
|
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting.
| 1
|
accept
|
T1583.005
|
Acquire Infrastructure: Botnet
|
Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.
| 1
|
accept
|
T1583.005
|
Acquire Infrastructure: Botnet
|
FreakOut attacked POS systems in order to use them as a botnet infrastructure.
| 1
|
accept
|
T1583.005
|
Acquire Infrastructure: Botnet
|
Mirai malware created a botnet used by multiple threat actor groups.
| 1
|
accept
|
T1583.005
|
Acquire Infrastructure: Botnet
|
Meris attacked Yandex with DDOS using botnets.
| 1
|
accept
|
T1583.005
|
Acquire Infrastructure: Botnet
|
APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.
| 1
|
accept
|
T1587.003
|
Develop Capabilities: Digital Certificates
|
PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.
| 1
|
accept
|
T1587.003
|
Develop Capabilities: Digital Certificates
|
Adversaries may create self-signed SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic.
| 1
|
accept
|
T1587.003
|
Develop Capabilities: Digital Certificates
|
UNC2190 created self-signed certificates to spread SABBATH ransomware.
| 1
|
accept
|
T1587.003
|
Develop Capabilities: Digital Certificates
|
FIN13 used SSL certificates for C2 communication via email.
| 1
|
accept
|
T1587.003
|
Develop Capabilities: Digital Certificates
|
Lazarus Group has obtained SSL certificates for their C2 domains.
| 1
|
accept
|
T1588.004
|
Obtain Capabilities: Digital Certificates
|
Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages.
| 1
|
accept
|
T1588.004
|
Obtain Capabilities: Digital Certificates
|
Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting.
| 1
|
accept
|
T1588.004
|
Obtain Capabilities: Digital Certificates
|
Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free.
| 1
|
accept
|
T1588.004
|
Obtain Capabilities: Digital Certificates
|
Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for..
| 1
|
accept
|
T1588.004
|
Obtain Capabilities: Digital Certificates
|
Fox Kitten has used scripts to access credential information from the KeePass database.
| 1
|
accept
|
T1555.005
|
Credentials from Password Stores: Password Managers
|
Operation Wocao has accessed and collected credentials from password managers.
| 1
|
accept
|
T1555.005
|
Credentials from Password Stores: Password Managers
|
Proton gathers credentials in files for 1password.
| 1
|
accept
|
T1555.005
|
Credentials from Password Stores: Password Managers
|
TrickBot can steal passwords from the KeePass open source password manager.
| 1
|
accept
|
T1555.005
|
Credentials from Password Stores: Password Managers
|
MarkiRAT can gather information from the Keepass password manager.
| 1
|
accept
|
T1555.005
|
Credentials from Password Stores: Password Managers
|
APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts including Gmail and Yahoo Mail.
| 1
|
accept
|
T1550.001
|
Use Alternate Authentication Material: Application Access Token
|
Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls.
| 1
|
accept
|
T1550.001
|
Use Alternate Authentication Material: Application Access Token
|
With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration.
| 1
|
accept
|
T1550.001
|
Use Alternate Authentication Material: Application Access Token
|
Obtaining a token which grants access to a victim’s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines.
| 1
|
accept
|
T1550.001
|
Use Alternate Authentication Material: Application Access Token
|
OAuth is one commonly implemented framework that issues tokens to users for access to Software-as-a-Service.
| 1
|
accept
|
T1550.001
|
Use Alternate Authentication Material: Application Access Token
|
4H RAT has the capability to create a remote shell.
| 1
|
accept
|
T1059.003
|
Command and Scripting Interpreter: Windows Command Shell
|
ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.
| 1
|
accept
|
T1059.003
|
Command and Scripting Interpreter: Windows Command Shell
|
adbupd can run a copy of cmd.exe.
| 1
|
accept
|
T1059.003
|
Command and Scripting Interpreter: Windows Command Shell
|
Following exploitation with LOWBALL malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer.
| 1
|
accept
|
T1059.003
|
Command and Scripting Interpreter: Windows Command Shell
|
ADVSTORESHELL can create a remote shell and run a given command.
| 1
|
accept
|
T1059.003
|
Command and Scripting Interpreter: Windows Command Shell
|
Anchor has used cmd.exe to run its self deletion routine.
| 1
|
accept
|
T1059.003
|
Command and Scripting Interpreter: Windows Command Shell
|
APT1 has used the Windows command shell to execute commands and batch scripting to automate execution.
| 1
|
accept
|
T1059.003
|
Command and Scripting Interpreter: Windows Command Shell
|
APT18 uses cmd.exe to execute commands on the victim’s machine. ;; An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. ;; APT29 used cmd.exe to execute commands on remote machines. ;; An APT3 downloader uses the Windows command cmd.exe" /C whoami. The group also uses a tool to execute commands on remote computers. ;; APT32 has used cmd.exe for execution. ;; APT37 has used the command-line interface. ;; APT38 has used a command-line tunneler NACHOCHEESE to give them shell access to a victim’s machine. ;; APT41 used cmd.exe /c to execute commands on remote machines.APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader. ;; Astaroth spawns a CMD process to execute commands. ;; AuditCred can open a reverse shell on the system to execute commands. ;; BabyShark has used cmd.exe to execute commands. ;; BackConfig can download and run batch files to execute commands on a compromised host. ;; Adversaries can direct BACKSPACE to execute from the command line on infected hosts or have BACKSPACE create a reverse shell. ;; BADNEWS is capable of executing commands via cmd.exe. ;; Bandook is capable of spawning a Windows command shell. ;; Bankshot uses the command-line interface to execute arbitrary commands. ;; Bazar can launch cmd.exe to perform reconnaissance commands. ;; BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. ;; BISCUIT has a command to launch a command shell on the system. ;; Bisonal can launch cmd.exe to execute commands on the system. ;; BLACKCOFFEE has the capability to create a reverse shell. ;; BlackMould can run cmd.exe with parameters. ;; BLINDINGCAN has executed commands via cmd.exe. ;; Blue Mockingbird has used batch script files to automate execution and deployment of payloads. ;; BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe. ;; BRONZE BUTLER has used batch scripts and the command-line interface for execution. ;; CALENDAR has a command to run cmd.exe to execute commands. ;; Carbanak has a command to create a reverse shell. ;; Cardinal RAT can execute commands. ;; CARROTBAT has the ability to execute command line arguments on a compromised host. ;; Caterpillar WebShell can run commands on the compromised asset with CMD functions. ;; Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts. ;; China Chopper's server component is capable of opening a command terminal. ;; cmd is used to execute programs and other actions at the command-line interface. ;; Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files. ;; Cobalt Strike uses a command-line interface to interact with systems. ;; Cobian RAT can launch a remote command shell interface for executing commands. ;; CoinTicker executes a bash script to establish a reverse shell. ;; Comnie executes BAT scripts. ;; ComRAT has used cmd.exe to execute commands. ;; Conti can utilize command line options to allow an attacker control over how it scans and encrypts files. ;; A module in CozyCar allows arbitrary commands to be executed by invoking C:\Windows\System32\cmd.exe. ;; Dark Caracal has used macros in Word documents that would download a second stage if executed. ;; DarkComet can launch a remote shell to execute commands on the victim’s machine. ;; Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. ;; Daserf can execute shell commands. ;; DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim’s machine. ;; Denis can launch a remote shell to execute arbitrary commands on the victim’s machine. ;; Dipsind can spawn remote shells. ;; DownPaper uses the command line. ;; Dragonfly 2.0 used various types of scripting to perform operations including batch scripts. ;; DropBook can execute arbitrary shell commands on the victims' machines. ;; Dtrack has used cmd.exe to add a persistent service. ;; ECCENTRICBANDWAGON can use cmd to execute commands on a victim’s machine. ;; Egregor has used batch files for execution and can launch Internet Explorer from cmd.exe. ;; Emissary has the capability to create a remote shell and execute specified commands. ;; Emotet has used cmd.exe to run a PowerShell script. ;; Empire has modules for executing scripts. ;; EvilBunny has an integrated scripting engine to download and execute Lua scripts. ;; Exaramel for Windows has a command to launch a remote shell and executes commands on the victim’s machine. ;; Felismus uses command line for execution. ;; FELIXROOT executes batch scripts on the victim’s machine and can launch a reverse shell for command execution. ;; FIN10 has executed malicious .bat files containing PowerShell commands. ;; FIN6 has used kill.bat script to disable security tools. ;; FIN7 used the command prompt to launch commands on the victim’s machine. ;; FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities. FIN8 executes commands remotely via cmd.exe. ;; Fox Kitten has used cmd.exe likely as a password changing mechanism. ;; Frankenstein has run a command script to set up persistence as a scheduled task named "WinUpdate" as well as other encoded commands from the command-line. ;; GALLIUM used the Windows command shell to execute commands. ;; Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file. ;; Gold Dragon uses cmd.exe to execute commands for discovery. ;; GoldenSpy can execute remote commands via the command-line interface. ;; GoldMax can spawn a command shell and execute native commands. ;; Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel. ;; Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system. ;; GravityRAT executes commands remotely on the infected host. ;; GreyEnergy uses cmd.exe to execute itself in-memory. ;; H1N1 kills and disables services by using cmd.exe. ;; HARDRAIN uses cmd.exe to execute netshcommands. ;; HAWKBALL has created a cmd.exe reverse shell executed commands and uploaded output via the command line. ;; hcdLoader provides command-line access to the compromised system. ;; Helminth can provide a remote shell. One version of Helminth uses batch scripting. ;; Hi-Zor has the ability to create a reverse shell. ;; HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution. ;; Higaisa used cmd.exe for execution. ;; Hikit has the ability to create a remote shell and run given commands. ;; HOMEFRY uses a command-line interface. ;; Several commands are supported by the Honeybee's implant via the command-line interface and there’s also a utility to execute any custom command on an infected endpoint. Honeybee used batch scripting. ;; HOPLIGHT can launch cmd.exe to execute commands on the system. ;; HotCroissant can remotely open applications on the infected host with the ShellExecuteA command. ;; HTTPBrowser is capable of spawning a reverse shell on a victim. ;; httpclient opens cmd.exe on the victim. ;; Indrik Spider has used batch scripts on victim's machines. ;; InnaputRAT launches a shell to execute commands on the victim’s machine. ;; InvisiMole can launch a remote shell to execute commands. ;; Ixeshe is capable of executing commands via cmd. ;; JCry has used cmd.exe to launch PowerShell. ;; JHUHUGIT uses a .bat file to execute a .dll. ;; JPIN can use the command-line utility cacls.exe to change file permissions. ;; jRAT has command line access. ;; Kasidet can execute commands using cmd.exe. ;; Kazuar uses cmd.exe to execute commands on the victim’s machine. ;; Ke3chang has used batch scripts in its malware to install persistence mechanisms. ;; KeyBoy can launch interactive shells for communicating with the victim machine. ;; KEYMARBLE can execute shell commands using cmd.exe. ;; KGH_SPY has the ability to set a Registry key to run a cmd.exe command. ;; Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host (Jscript) and runs arbitrary shellcode . ;; KOMPROGO is capable of creating a reverse shell. ;; KONNI has used cmd.exe execute arbitrary commands on the infected host across different stages of the infection change. ;; Lazarus Group malware uses cmd.exe to execute commands on victims. A Destover-like variant used by Lazarus Group uses a batch file mechanism to delete its binaries from the system. ;; Leviathan uses a backdoor known as BADFLICK that is is capable of generating a reverse shell and has used multiple types of scripting for execution including JavaScript and JavaScript Scriptlets in XML.. ;; LightNeuron is capable of executing commands via cmd.exe. ;; Linfo creates a backdoor through which remote attackers can start a remote shell. ;; LookBack executes the cmd.exe command. ;; LoudMiner used a batch script to run the Linux virtual machine as a service. ;; Lucifer can issue shell commands to download and execute additional payloads. ;; Machete has used batch files to initiate additional downloads of malicious files. ;; Magic Hound has used the command-line interface. ;; The Maze encryption process has used batch scripts with various commands. ;; MCMD can launch a console process (cmd.exe) with redirected standard input and output. ;; MechaFlounder has the ability to run commands on a compromised host. ;; MegaCortex has used .cmd scripts on the victim's system. ;; menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files. ;; Metamorfo has used cmd.exe /c to execute files. ;; Micropsia creates a command-line shell using cmd.exe. ;; MirageFox has the capability to execute commands using cmd.exe. ;; Mis-Type uses cmd.exe to run commands for enumerating the host. ;; Misdat is capable of providing shell functionality to the attacker to execute commands. ;; Mivast has the capability to open a remote shell and run basic commands. ;; MoleNet can execute commands via the command line utility. ;; MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes including to restart and uninstall itself. ;; More_eggs has used cmd.exe for execution. ;; Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server. ;; MuddyWater has used a custom tool for creating reverse shells. ;; MURKYTOP uses the command-line interface. ;; Mustang Panda has executed HTA files via cmd.exe and used batch scripts for collection. ;; NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files. ;; NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory. ;; NETEAGLE allows adversaries to execute shell commands on the infected host. ;; Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload. ;; NETWIRE can issue commands using cmd.exe. ;; njRAT can launch a command shell interface for executing commands. ;; OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros. ;; OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts. ;; Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version. ;; OopsIE uses the command prompt to execute commands on the victim's machine. ;; Operation Wocao has spawned a new cmd.exe process to execute commands. ;; Orz can execute shell commands. Orz can execute commands with JavaScript. ;; Out1 can use native command line for execution. ;; Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines. ;; PHOREAL is capable of creating reverse shell. ;; Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell. ;; PLAINTEE uses cmd.exe to execute commands on the victim’s machine. ;; PLEAD has the ability to execute shell commands on the compromised host. ;; PlugX allows actors to spawn a reverse shell on a victim. ;; PoetRAT has called cmd through a Word document macro. ;; PoisonIvy creates a backdoor through which remote attackers can open a command-line interface. ;; Pony has used batch scripts to delete itself after execution. ;; PowerDuke runs cmd.exe /c and sends the output to its C2. ;; POWRUNER can execute commands from its C2 server. ;; Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c " > %temp%\PM* .tmp 2>&1". ;; Pteranodon can execute commands on the victim. ;; QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine. ;; QuasarRAT can launch a remote shell to execute commands on the victim’s machine. ;; Ragnar Locker has used cmd.exe and batch scripts to execute commands. ;; Rancor has used cmd.exe to execute commmands. ;; RATANKBA uses cmd.exe to execute commands. ;; RDAT has executed commands using cmd.exe /c. ;; RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell. ;; Remcos can launch a remote command line to execute commands on the victim’s machine. ;; Remexi silently executes received commands with cmd.exe. ;; Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine. ;; REvil can use the Windows command line to delete volume shadow copies and disable recovery. ;; RGDoor uses cmd.exe to execute commands on the victim’s machine. ;; Rising Sun executed commands using cmd.exe. ;; RobbinHood uses cmd.exe on the victim's computer. ;; RogueRobin uses Windows Script Components. ;; RTM uses the command line and rundll32.exe to execute. ;; RunningRAT uses a batch file to kill a security program task and then attempts to remove itself. ;; Ryuk has used cmd.exe to create a Registry entry to establish persistence. ;; Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell. ;; SamSam uses custom batch scripts to execute some of its components. ;; SDBbot has the ability to use the command shell to execute commands on a compromised host. ;; SeaDuke is capable of executing commands. ;; Seasalt uses cmd.exe to create a reverse shell on the infected endpoint. ;; SEASHARPEE can execute commands on victims. ;; ServHelper can execute shell commands against cmd. ;; SharpStage can execute arbitrary commands with the command line. ;; ShimRat can be issued a command shell function from the C2. ;; Silence has used Windows command-line to run commands. ;; SLOTHFULMEDIA can open a command line to execute commands. ;; SNUGRIDE is capable of executing commands and spawning a reverse shell. ;; Sowbug has used command line during its intrusions. ;; Spark can use cmd.exe to run commands. ;; SQLRat has used SQL to execute JavaScript and VB scripts on the host system. ;; StreamEx has the ability to remotely execute commands. ;; Several tools used by Suckfly have been command-line driven. ;; SYSCON has the ability to execute commands through cmd on a compromised host. ;; TA505 has executed commands using cmd.exe. ;; TA551 has used cmd.exe to execute commands. ;; TAINTEDSCRIBE can enable Windows CLI access and execute files. ;; TDTESS provides a reverse shell on the victim. ;; TEXTMATE executes cmd.exe to provide a reverse shell to adversaries. ;; Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands. ;; Threat Group-3390 has used command-line interfaces for execution. ;; TinyZBot supports execution from the command-line. ;; TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine. ;; Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process. ;; Tropic Trooper has used Windows command scripts. ;; TSCookie has the ability to execute shell commands on the infected host. ;; Turla RPC backdoors have used cmd.exe to execute commands. ;; TURNEDUP is capable of creating a reverse shell. ;; TYPEFRAME can uninstall malware components using a batch script. TYPEFRAME can execute commands using a shell. ;; UBoatRAT can start a command shell. ;; Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon providing a reverse shell upon receipt of a special packet ;; UNC2452 used cmd.exe to execute commands on remote machines. ;; UPPERCUT uses cmd.exe to execute commands on the victim’s machine. ;; USBferry can execute various Windows commands. ;; Volgmer can execute commands on the victim's machine. ;; WEBC2 can open an interactive command shell. ;; WellMess can execute command line scripts received from C2. ;; Wiarp creates a backdoor through which remote attackers can open a command line interface. ;; Wizard Spider has used cmd.exe to execute commands on a victim's machine. ;; XTunnel has been used to execute remote commands. ;; Zebrocy uses cmd.exe to execute commands on the system. ;; Zeus Panda can launch an interface where it can execute several commands on the victim’s PC. ;; ZIRCONIUM has used a tool to open a Windows Command Shell on a remote host. ;; ZLib has the ability to execute shell commands. ;; zwShell can launch command-line shells. ;; ZxShell can launch a reverse command shell."
| 1
|
accept
|
T1059.003
|
Command and Scripting Interpreter: Windows Command Shell
|
AppleJeus has been distributed via spearphishing link.
| 1
|
accept
|
T1566.002
|
Phishing: Spearphishing Link
|
APT1 has sent spearphishing emails containing hyperlinks to malicious files.
| 1
|
accept
|
T1566.002
|
Phishing: Spearphishing Link
|
APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites.
| 1
|
accept
|
T1566.002
|
Phishing: Spearphishing Link
|
APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.
| 1
|
accept
|
T1566.002
|
Phishing: Spearphishing Link
|
APT32 has sent spearphishing emails containing malicious links.
| 1
|
accept
|
T1566.002
|
Phishing: Spearphishing Link
|
APT33 has sent spearphishing emails containing links to .hta files.
| 1
|
accept
|
T1566.002
|
Phishing: Spearphishing Link
|
APT39 leveraged spearphishing emails with malicious links to initially compromise victims.
| 1
|
accept
|
T1566.002
|
Phishing: Spearphishing Link
|
Bazar has been spread via e-mails with embedded malicious links. ;; BlackTech has used spearphishing e-mails with links to cloud services to deliver malware. ;; Cobalt Group has sent emails with URLs pointing to malicious documents. ;; Dragonfly 2.0 used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites. ;; Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server. ;; Emotet has been delivered by phishing emails containing links. ;; Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive. ;; FIN4 has used spearphishing emails (often sent from compromised accounts) containing malicious links. ;; FIN8 has distributed targeted emails containing links to malicious documents with embedded macros. ;; Grandoreiro has been spread via malicious links embedded in e-mails. ;; GuLoader has been spread in phishing campaigns using malicious web links. ;; Hancitor has been delivered via phishing emails which contained malicious links. ;; Javali has been delivered via malicious links embedded in e-mails. ;; Kerrdown has been distributed via e-mails containing a malicious link. ;; Kimsuky has used an email containing a link to a document that contained malicious macros. ;; Leviathan has sent spearphishing emails with links often using a fraudulent lookalike domain and stolen branding. ;; Machete has sent phishing emails that contain a link to an external server with ZIP and RAR archives. ;; Magic Hound sent shortened URL links over email to victims. The URLs linked to Word documents with malicious macros that execute PowerShells scripts to download Pupy. ;; Melcoz has been spread through malicious links embedded in e-mails. ;; Mofang delivered spearphishing emails with malicious links included. ;; Molerats has sent phishing emails with malicious links included. ;; MuddyWater has sent targeted spearphishing e-mails with malicious links. ;; Mustang Panda has delivered spearphishing links to their target. ;; NETWIRE has been spread via e-mail campaigns utilizing malicious links. ;; Night Dragon sent spearphishing emails containing links to compromised websites where malware was downloaded. ;; OilRig has sent spearphising emails with malicious links to potential victims. ;; Patchwork has used spearphishing with links to deliver files with exploits to initial victims. The group has also used embedded image tags (known as web bugs) with unique per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages. ;; Pony has been delivered via spearphishing emails which contained malicious links. ;; Sandworm Team has crafted phishing emails containing malicious hyperlinks. ;; Sidewinder has sent e-mails with malicious links often crafted for specific targets. ;; Stolen Pencil sent spearphishing emails containing links to domains controlled by the threat actor. ;; TA505 has sent spearphishing emails containing malicious links. ;; TrickBot has been delivered via malicious links in phishing e-mails. ;; Turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access. ;; Valak has been delivered via malicious links in e-mail. ;; Windshift has sent spearphishing emails with links to harvest credentials and deliver malware. ;; Wizard Spider has sent phishing emails containing a link to an actor-controlled Google Drive document or other free online file hosting services. ;; ZIRCONIUM has used malicious links and web beacons in e-mails for malware download and to track hits to attacker-controlled URL's.
| 1
|
accept
|
T1566.002
|
Phishing: Spearphishing Link
|
APT29 created tokens using compromised SAML signing certificates.
| 1
|
accept
|
T1606.002
|
Forge Web Credentials: Saml Tokens
|
UNC2452 created tokens using compromised SAML signing certificates.
| 1
|
accept
|
T1606.002
|
Forge Web Credentials: Saml Tokens
|
Supply chain breaches, such as Solarwinds, are partially exploited via forged credentials that obtain access such as the forging of SMAL tokens.
| 1
|
accept
|
T1606.002
|
Forge Web Credentials: Saml Tokens
|
APT30 can break single sign on (SSO) if it is SMAL v2.0 through the forgery of SMAL tokens.
| 1
|
accept
|
T1606.002
|
Forge Web Credentials: Saml Tokens
|
Threat actors can change the normal 1 hour limit upon the legitimacy of a token through accessing the AccessTokenLifetime element.
| 1
|
accept
|
T1606.002
|
Forge Web Credentials: Saml Tokens
|
Agent Tesla can gather credentials from a number of browsers.
| 1
|
accept
|
T1555.003
|
Credentials from Password Stores: Credentials From Web Browsers
|
Ajax Security Team has used FireMalv custom-developed malware which collected passwords from the Firefox browser storage.
| 1
|
accept
|
T1555.003
|
Credentials from Password Stores: Credentials From Web Browsers
|
APT3 has used tools to dump passwords from browsers.
| 1
|
accept
|
T1555.003
|
Credentials from Password Stores: Credentials From Web Browsers
|
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.
| 1
|
accept
|
T1555.003
|
Credentials from Password Stores: Credentials From Web Browsers
|
APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.
| 1
|
accept
|
T1555.003
|
Credentials from Password Stores: Credentials From Web Browsers
|
Azorult can steal credentials from the victim's browser.
| 1
|
accept
|
T1555.003
|
Credentials from Password Stores: Credentials From Web Browsers
|
Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool.
| 1
|
accept
|
T1555.003
|
Credentials from Password Stores: Credentials From Web Browsers
|
BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox Google Chrome and Internet Explorer. ;; Carberp's passw.plug plugin can gather passwords saved in Opera Internet Explorer Safari Firefox and Chrome. ;; ChChes steals credentials stored inside Internet Explorer. ;; CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials. ;; CosmicDuke collects user credentials including passwords for various programs including Web browsers. ;; Crimson contains a module to steal credentials from Web browsers on the victim machine. ;; Emotet has been observed dropping browser password grabber modules. ;; Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome. ;; FIN6 has used the Stealer One credential stealer to target web browsers. ;; Grandoreiro can steal cookie data and credentials from Google Chrome. ;; H1N1 dumps usernames and passwords from Firefox Internet Explorer and Outlook. ;; Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords. ;; Inception used a browser plugin to steal passwords and sessions from Internet Explorer Chrome Opera Firefox Torch and Yandex. ;; Javali can capture login credentials from open browsers including Firefox Chrome Internet Explorer and Edge. ;; jRAT can capture passwords from common web browsers such as Internet Explorer Google Chrome and Firefox. ;; KeyBoy attempts to collect passwords from browsers. ;; KGH_SPY has the ability to steal data from the Chrome Edge Firefox Thunderbird and Opera browsers. ;; Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers. ;; KONNI can steal profiles (containing credential information) from Firefox Chrome and Opera. ;; LaZagne can obtain credentials from web browsers such as Google Chrome Internet Explorer and Firefox. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers. ;; Machete collects stored credentials from several web browsers. ;; Melcoz has the ability to steal credentials from web browsers. ;; Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DPAPI. ;; Molerats used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims. ;; MuddyWater has run tools including Browser64 to steal passwords saved in victim web browsers. ;; NETWIRE has the ability to steal credentials from web browsers including Internet Explorer Opera Yandex and Chrome. ;; njRAT has a module that steals passwords saved in victim web browsers. ;; OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. OilRig has also used tool named PICKPOCKET to dump passwords from web browsers. ;; OLDBAIT collects credentials from Internet Explorer Mozilla Firefox and Eudora. ;; Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers. ;; Patchwork dumped the login data database from \AppData\Local\Google\Chrome\User Data\Default\Login Data. ;; PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator Mozilla Firefox Mozilla Thunderbird and Internet Explorer. ;; PLEAD has the ability to steal saved credentials from web browsers. ;; PoetRAT has used a Python tool named Browdec.exe to steal browser credentials. ;; A module in Prikormka gathers logins and passwords stored in applications on the victims including Google Chrome Mozilla Firefox and several other browsers. ;; Proton gathers credentials for Google Chrome. ;; Pupy can use Lazagne for harvesting credentials. ;; QuasarRAT can obtain passwords from common web browsers. ;; RedLeaves can gather browser usernames and passwords. ;; ROKRAT steals credentials stored in Web browsers by querying the sqlite database. ;; Sandworm Team's CredRaptor tool can collect saved passwords from various internet browsers. ;; Smoke Loader searches for credentials stored from web browsers. ;; Stealth Falcon malware gathers passwords from multiple sources including Internet Explorer Firefox and Chrome. ;; Stolen Pencil has used tools that are capable of obtaining credentials from web browsers. ;; TA505 has used malware to gather credentials from Internet Explorer. ;; TrickBot can obtain passwords stored in files from web browsers such as Chrome Firefox Internet Explorer and Microsoft Edge sometimes using esentutl. ;; Trojan.Karagany can steal data and credentials from browsers. ;; TSCookie has the ability to steal saved passwords from the Internet Explorer Edge Firefox and Chrome browsers. ;; Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine. ;; XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords. ;; Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files. ;; ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.
| 1
|
accept
|
T1555.003
|
Credentials from Password Stores: Credentials From Web Browsers
|
APT29 used a forged duo-sid cookie to bypass MFA set on an email account.
| 1
|
accept
|
T1550.004
|
Use Alternate Authentication Material: Web Session Cookie
|
UNC2452 used a forged duo-sid cookie to bypass MFA set on an email account.
| 1
|
accept
|
T1550.004
|
Use Alternate Authentication Material: Web Session Cookie
|
Attackers bypass some multi-factor authentication protocols since the session is already authenticated.
| 1
|
accept
|
T1550.004
|
Use Alternate Authentication Material: Web Session Cookie
|
Threat actors may have used browser cookies to defeat MFA with a “pass-the-cookie” attack.
| 1
|
accept
|
T1550.004
|
Use Alternate Authentication Material: Web Session Cookie
|
Solarwinds attackers bypassed MFA to obtain access on multiple target networks.
| 1
|
accept
|
T1550.004
|
Use Alternate Authentication Material: Web Session Cookie
|
TA505 has used .iso files to deploy malicious .lnk files.
| 1
|
accept
|
T1553.005
|
Subvert Trust Controls: Mark
|
Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls.
| 1
|
accept
|
T1553.005
|
Subvert Trust Controls: Mark
|
Attackers use ZIP archives to disseminate malware, bypassing security controls.
| 1
|
accept
|
T1553.005
|
Subvert Trust Controls: Mark
|
Maldocs often abuse MOTW policies to get users to run macros and ActiveX controls.
| 1
|
accept
|
T1553.005
|
Subvert Trust Controls: Mark
|
Adversaries bypass Microsoft SmartScreen using archive files that do not have MOTW NTFS streams.
| 1
|
accept
|
T1553.005
|
Subvert Trust Controls: Mark
|
admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download
| 1
|
accept
|
T1087.001
|
Account Discovery: Local Account
|
Agent Tesla can collect account information from the victim’s machine.
| 1
|
accept
|
T1087.001
|
Account Discovery: Local Account
|
APT1 used the commands net localgroup net user and net group to find accounts on the system.
| 1
|
accept
|
T1087.001
|
Account Discovery: Local Account
|
APT3 has used a tool that can obtain info about local and global group users power users and administrators.
| 1
|
accept
|
T1087.001
|
Account Discovery: Local Account
|
APT32 enumerated administrative users using the commands net localgroup administrators.
| 1
|
accept
|
T1087.001
|
Account Discovery: Local Account
|
Bankshot gathers domain and account names/information through process monitoring.
| 1
|
accept
|
T1087.001
|
Account Discovery: Local Account
|
Bazar can identify administrator accounts on an infected host.
| 1
|
accept
|
T1087.001
|
Account Discovery: Local Account
|
BitPaymer can enumerate the sessions for each user logged onto the infected host. ;; BloodHound can identify users with local administrator rights. ;; Chimera has used net user for account discovery. ;; Comnie uses the net user command. ;; The discovery modules used with Duqu can collect information on accounts and permissions. ;; Elise executes net user after initial communication is made to the remote server. ;; Empire can acquire local and domain user account information. ;; Epic gathers a list of all user accounts privilege classes and time of last logon. ;; Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts. ;; GeminiDuke collects information on local user accounts from the victim. ;; HyperStack can enumerate all account names on a remote share. ;; InvisiMole has a command to list account information on the victim’s machine. ;; Kazuar gathers information on local groups and members on the victim’s machine. ;; Ke3chang performs account discovery using commands such as net localgroup administrators and net group REDACTED" /domain on specific permissions groups. ;; Kwampirs collects a list of accounts with the command net users. ;; Mis-Type may create a file containing the results of the command cmd.exe /c net user {Username}. ;; MURKYTOP has the capability to retrieve information about users on remote hosts. ;; Commands under net user can be used in Net to gather information about and manipulate user accounts. ;; OilRig has run net user net user /domain net group “domain admins” /domain and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim. ;; OSInfo enumerates local and domain users ;; P.A.S. Webshell can display the /etc/passwd file on a compromised host. ;; Pony has used the NetUserEnum function to enumerate local accounts. ;; Poseidon Group searches for administrator accounts on both the local victim machine and the network. ;; PoshC2 can enumerate local and domain user account information. ;; PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token. ;; POWERSTATS can retrieve usernames from compromised hosts. ;; PUNCHBUGGY can gather user names. ;; Pupy uses PowerView and Pywerview to perform discovery commands such as net user net group net local group etc. ;; RATANKBA uses the net user command. ;; Remsec can obtain a list of users. ;; S-Type runs the command net user on a victim. S-Type also runs tests to determine the privilege level of the compromised user. ;; SHOTPUT has a command to retrieve information about connected users. ;; SoreFang can collect usernames from the local system via net.exe user. ;; Threat Group-3390 has used net user to conduct internal discovery of systems. ;; TrickBot collects the users of the system. ;; Turla has used net user to enumerate local accounts on the system. ;; USBferry can use net user to gather information about local accounts. ;; Valak has the ability to enumerate local admin accounts."
| 1
|
accept
|
T1087.001
|
Account Discovery: Local Account
|
adbupd can use a WMI script to achieve persistence.
| 1
|
accept
|
T1546.003
|
Event Triggered Execution: Windows Management Instrumentation Event Subscription
|
APT29 has used WMI event subscriptions for persistence.
| 1
|
accept
|
T1546.003
|
Event Triggered Execution: Windows Management Instrumentation Event Subscription
|
APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts.
| 1
|
accept
|
T1546.003
|
Event Triggered Execution: Windows Management Instrumentation Event Subscription
|
Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.
| 1
|
accept
|
T1546.003
|
Event Triggered Execution: Windows Management Instrumentation Event Subscription
|
Leviathan has used WMI for persistence.
| 1
|
accept
|
T1546.003
|
Event Triggered Execution: Windows Management Instrumentation Event Subscription
|
Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence.
| 1
|
accept
|
T1546.003
|
Event Triggered Execution: Windows Management Instrumentation Event Subscription
|
PoshC2 has the ability to persist on a system using WMI events.
| 1
|
accept
|
T1546.003
|
Event Triggered Execution: Windows Management Instrumentation Event Subscription
|
POSHSPY uses a WMI event subscription to establish persistence. ;; POWERTON can use WMI for persistence. ;; RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started. ;; SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup. ;; Turla has used WMI event filters and consumers to establish persistence. ;; UNC2452 used WMI event subscriptions for persistence.
| 1
|
accept
|
T1546.003
|
Event Triggered Execution: Windows Management Instrumentation Event Subscription
|
APT29 drops a Windows shortcut file for execution.
| 1
|
accept
|
T1547.009
|
Boot or Logon Autostart Execution: Shortcut Modification
|
APT39 has modified LNK shortcuts.
| 1
|
accept
|
T1547.009
|
Boot or Logon Autostart Execution: Shortcut Modification
|
Astaroth's initial payload is a malicious .LNK file.
| 1
|
accept
|
T1547.009
|
Boot or Logon Autostart Execution: Shortcut Modification
|
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.
| 1
|
accept
|
T1547.009
|
Boot or Logon Autostart Execution: Shortcut Modification
|
Bazar can establish persistence by writing shortcuts to the Windows Startup folder.
| 1
|
accept
|
T1547.009
|
Boot or Logon Autostart Execution: Shortcut Modification
|
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.
| 1
|
accept
|
T1547.009
|
Boot or Logon Autostart Execution: Shortcut Modification
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.