value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
SparklingGoblin uses servers hosted by various providers for its C&C servers.
1
accept
T1583.004
Acquire Infrastructure: Server
APT1 has registered hundreds of domains for use in operations.
1
accept
T1583.001
Acquire Infrastructure: Domains
APT28 registered domains imitating NATO OSCE security websites Caucasus information resources and other organizations.
1
accept
T1583.001
Acquire Infrastructure: Domains
APT29 has acquired C2 domains through resellers.
1
accept
T1583.001
Acquire Infrastructure: Domains
APT32 has set up and operated websites to gather information and deliver malware.
1
accept
T1583.001
Acquire Infrastructure: Domains
Kimsuky has registered domains to spoof targeted organizations and trusted third parties.
1
accept
T1583.001
Acquire Infrastructure: Domains
Lazarus Group has acquired infrastructure related to their campaigns to act as distribution points and C2 channels.
1
accept
T1583.001
Acquire Infrastructure: Domains
menuPass has registered malicious domains for use in intrusion campaigns.
1
accept
T1583.001
Acquire Infrastructure: Domains
Mustang Panda have acquired C2 domains prior to operations. ;; Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites such as email login pages online file sharing and storage websites and password reset pages. ;; Silent Librarian has acquired domains to establish credential harvesting pages often spoofing the target organization and using free top level domains .TK .ML .GA .CF and .GQ. ;; UNC2452 has acquired C2 domains through resellers. ;; ZIRCONIUM has purchased domains for use in targeted campaigns.
1
accept
T1583.001
Acquire Infrastructure: Domains
Attackers may opt to configure and run their own DNS servers in support of operations.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
Adversaries may utilize DNS traffic for various tasks, including for Command and Control.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
APT31 will utilize their own DNS server for use when conducting malicious activities.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
Moses Staff will acquire their own infrastructure, usually domains and DNS.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
TigerRAT variants can be modified to utilize a threat actor's own DNS infrastructure.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting.
1
accept
T1583.005
Acquire Infrastructure: Botnet
Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.
1
accept
T1583.005
Acquire Infrastructure: Botnet
FreakOut attacked POS systems in order to use them as a botnet infrastructure.
1
accept
T1583.005
Acquire Infrastructure: Botnet
Mirai malware created a botnet used by multiple threat actor groups.
1
accept
T1583.005
Acquire Infrastructure: Botnet
Meris attacked Yandex with DDOS using botnets.
1
accept
T1583.005
Acquire Infrastructure: Botnet
APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
Adversaries may create self-signed SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
UNC2190 created self-signed certificates to spread SABBATH ransomware.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
FIN13 used SSL certificates for C2 communication via email.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
Lazarus Group has obtained SSL certificates for their C2 domains.
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages.
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting.
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free.
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for..
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Fox Kitten has used scripts to access credential information from the KeePass database.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
Operation Wocao has accessed and collected credentials from password managers.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
Proton gathers credentials in files for 1password.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
TrickBot can steal passwords from the KeePass open source password manager.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
MarkiRAT can gather information from the Keepass password manager.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts including Gmail and Yahoo Mail.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
Obtaining a token which grants access to a victim’s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
OAuth is one commonly implemented framework that issues tokens to users for access to Software-as-a-Service.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
4H RAT has the capability to create a remote shell.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
adbupd can run a copy of cmd.exe.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Following exploitation with LOWBALL malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
ADVSTORESHELL can create a remote shell and run a given command.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Anchor has used cmd.exe to run its self deletion routine.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
APT1 has used the Windows command shell to execute commands and batch scripting to automate execution.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
APT18 uses cmd.exe to execute commands on the victim’s machine. ;; An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. ;; APT29 used cmd.exe to execute commands on remote machines. ;; An APT3 downloader uses the Windows command cmd.exe" /C whoami. The group also uses a tool to execute commands on remote computers. ;; APT32 has used cmd.exe for execution. ;; APT37 has used the command-line interface. ;; APT38 has used a command-line tunneler NACHOCHEESE to give them shell access to a victim’s machine. ;; APT41 used cmd.exe /c to execute commands on remote machines.APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader. ;; Astaroth spawns a CMD process to execute commands. ;; AuditCred can open a reverse shell on the system to execute commands. ;; BabyShark has used cmd.exe to execute commands. ;; BackConfig can download and run batch files to execute commands on a compromised host. ;; Adversaries can direct BACKSPACE to execute from the command line on infected hosts or have BACKSPACE create a reverse shell. ;; BADNEWS is capable of executing commands via cmd.exe. ;; Bandook is capable of spawning a Windows command shell. ;; Bankshot uses the command-line interface to execute arbitrary commands. ;; Bazar can launch cmd.exe to perform reconnaissance commands. ;; BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. ;; BISCUIT has a command to launch a command shell on the system. ;; Bisonal can launch cmd.exe to execute commands on the system. ;; BLACKCOFFEE has the capability to create a reverse shell. ;; BlackMould can run cmd.exe with parameters. ;; BLINDINGCAN has executed commands via cmd.exe. ;; Blue Mockingbird has used batch script files to automate execution and deployment of payloads. ;; BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe. ;; BRONZE BUTLER has used batch scripts and the command-line interface for execution. ;; CALENDAR has a command to run cmd.exe to execute commands. ;; Carbanak has a command to create a reverse shell. ;; Cardinal RAT can execute commands. ;; CARROTBAT has the ability to execute command line arguments on a compromised host. ;; Caterpillar WebShell can run commands on the compromised asset with CMD functions. ;; Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts. ;; China Chopper's server component is capable of opening a command terminal. ;; cmd is used to execute programs and other actions at the command-line interface. ;; Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files. ;; Cobalt Strike uses a command-line interface to interact with systems. ;; Cobian RAT can launch a remote command shell interface for executing commands. ;; CoinTicker executes a bash script to establish a reverse shell. ;; Comnie executes BAT scripts. ;; ComRAT has used cmd.exe to execute commands. ;; Conti can utilize command line options to allow an attacker control over how it scans and encrypts files. ;; A module in CozyCar allows arbitrary commands to be executed by invoking C:\Windows\System32\cmd.exe. ;; Dark Caracal has used macros in Word documents that would download a second stage if executed. ;; DarkComet can launch a remote shell to execute commands on the victim’s machine. ;; Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. ;; Daserf can execute shell commands. ;; DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim’s machine. ;; Denis can launch a remote shell to execute arbitrary commands on the victim’s machine. ;; Dipsind can spawn remote shells. ;; DownPaper uses the command line. ;; Dragonfly 2.0 used various types of scripting to perform operations including batch scripts. ;; DropBook can execute arbitrary shell commands on the victims' machines. ;; Dtrack has used cmd.exe to add a persistent service. ;; ECCENTRICBANDWAGON can use cmd to execute commands on a victim’s machine. ;; Egregor has used batch files for execution and can launch Internet Explorer from cmd.exe. ;; Emissary has the capability to create a remote shell and execute specified commands. ;; Emotet has used cmd.exe to run a PowerShell script. ;; Empire has modules for executing scripts. ;; EvilBunny has an integrated scripting engine to download and execute Lua scripts. ;; Exaramel for Windows has a command to launch a remote shell and executes commands on the victim’s machine. ;; Felismus uses command line for execution. ;; FELIXROOT executes batch scripts on the victim’s machine and can launch a reverse shell for command execution. ;; FIN10 has executed malicious .bat files containing PowerShell commands. ;; FIN6 has used kill.bat script to disable security tools. ;; FIN7 used the command prompt to launch commands on the victim’s machine. ;; FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities. FIN8 executes commands remotely via cmd.exe. ;; Fox Kitten has used cmd.exe likely as a password changing mechanism. ;; Frankenstein has run a command script to set up persistence as a scheduled task named "WinUpdate" as well as other encoded commands from the command-line. ;; GALLIUM used the Windows command shell to execute commands. ;; Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file. ;; Gold Dragon uses cmd.exe to execute commands for discovery. ;; GoldenSpy can execute remote commands via the command-line interface. ;; GoldMax can spawn a command shell and execute native commands. ;; Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel. ;; Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system. ;; GravityRAT executes commands remotely on the infected host. ;; GreyEnergy uses cmd.exe to execute itself in-memory. ;; H1N1 kills and disables services by using cmd.exe. ;; HARDRAIN uses cmd.exe to execute netshcommands. ;; HAWKBALL has created a cmd.exe reverse shell executed commands and uploaded output via the command line. ;; hcdLoader provides command-line access to the compromised system. ;; Helminth can provide a remote shell. One version of Helminth uses batch scripting. ;; Hi-Zor has the ability to create a reverse shell. ;; HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution. ;; Higaisa used cmd.exe for execution. ;; Hikit has the ability to create a remote shell and run given commands. ;; HOMEFRY uses a command-line interface. ;; Several commands are supported by the Honeybee's implant via the command-line interface and there’s also a utility to execute any custom command on an infected endpoint. Honeybee used batch scripting. ;; HOPLIGHT can launch cmd.exe to execute commands on the system. ;; HotCroissant can remotely open applications on the infected host with the ShellExecuteA command. ;; HTTPBrowser is capable of spawning a reverse shell on a victim. ;; httpclient opens cmd.exe on the victim. ;; Indrik Spider has used batch scripts on victim's machines. ;; InnaputRAT launches a shell to execute commands on the victim’s machine. ;; InvisiMole can launch a remote shell to execute commands. ;; Ixeshe is capable of executing commands via cmd. ;; JCry has used cmd.exe to launch PowerShell. ;; JHUHUGIT uses a .bat file to execute a .dll. ;; JPIN can use the command-line utility cacls.exe to change file permissions. ;; jRAT has command line access. ;; Kasidet can execute commands using cmd.exe. ;; Kazuar uses cmd.exe to execute commands on the victim’s machine. ;; Ke3chang has used batch scripts in its malware to install persistence mechanisms. ;; KeyBoy can launch interactive shells for communicating with the victim machine. ;; KEYMARBLE can execute shell commands using cmd.exe. ;; KGH_SPY has the ability to set a Registry key to run a cmd.exe command. ;; Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host (Jscript) and runs arbitrary shellcode . ;; KOMPROGO is capable of creating a reverse shell. ;; KONNI has used cmd.exe execute arbitrary commands on the infected host across different stages of the infection change. ;; Lazarus Group malware uses cmd.exe to execute commands on victims. A Destover-like variant used by Lazarus Group uses a batch file mechanism to delete its binaries from the system. ;; Leviathan uses a backdoor known as BADFLICK that is is capable of generating a reverse shell and has used multiple types of scripting for execution including JavaScript and JavaScript Scriptlets in XML.. ;; LightNeuron is capable of executing commands via cmd.exe. ;; Linfo creates a backdoor through which remote attackers can start a remote shell. ;; LookBack executes the cmd.exe command. ;; LoudMiner used a batch script to run the Linux virtual machine as a service. ;; Lucifer can issue shell commands to download and execute additional payloads. ;; Machete has used batch files to initiate additional downloads of malicious files. ;; Magic Hound has used the command-line interface. ;; The Maze encryption process has used batch scripts with various commands. ;; MCMD can launch a console process (cmd.exe) with redirected standard input and output. ;; MechaFlounder has the ability to run commands on a compromised host. ;; MegaCortex has used .cmd scripts on the victim's system. ;; menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files. ;; Metamorfo has used cmd.exe /c to execute files. ;; Micropsia creates a command-line shell using cmd.exe. ;; MirageFox has the capability to execute commands using cmd.exe. ;; Mis-Type uses cmd.exe to run commands for enumerating the host. ;; Misdat is capable of providing shell functionality to the attacker to execute commands. ;; Mivast has the capability to open a remote shell and run basic commands. ;; MoleNet can execute commands via the command line utility. ;; MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes including to restart and uninstall itself. ;; More_eggs has used cmd.exe for execution. ;; Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server. ;; MuddyWater has used a custom tool for creating reverse shells. ;; MURKYTOP uses the command-line interface. ;; Mustang Panda has executed HTA files via cmd.exe and used batch scripts for collection. ;; NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files. ;; NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory. ;; NETEAGLE allows adversaries to execute shell commands on the infected host. ;; Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload. ;; NETWIRE can issue commands using cmd.exe. ;; njRAT can launch a command shell interface for executing commands. ;; OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros. ;; OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts. ;; Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version. ;; OopsIE uses the command prompt to execute commands on the victim's machine. ;; Operation Wocao has spawned a new cmd.exe process to execute commands. ;; Orz can execute shell commands. Orz can execute commands with JavaScript. ;; Out1 can use native command line for execution. ;; Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines. ;; PHOREAL is capable of creating reverse shell. ;; Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell. ;; PLAINTEE uses cmd.exe to execute commands on the victim’s machine. ;; PLEAD has the ability to execute shell commands on the compromised host. ;; PlugX allows actors to spawn a reverse shell on a victim. ;; PoetRAT has called cmd through a Word document macro. ;; PoisonIvy creates a backdoor through which remote attackers can open a command-line interface. ;; Pony has used batch scripts to delete itself after execution. ;; PowerDuke runs cmd.exe /c and sends the output to its C2. ;; POWRUNER can execute commands from its C2 server. ;; Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c " > %temp%\PM* .tmp 2>&1". ;; Pteranodon can execute commands on the victim. ;; QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine. ;; QuasarRAT can launch a remote shell to execute commands on the victim’s machine. ;; Ragnar Locker has used cmd.exe and batch scripts to execute commands. ;; Rancor has used cmd.exe to execute commmands. ;; RATANKBA uses cmd.exe to execute commands. ;; RDAT has executed commands using cmd.exe /c. ;; RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell. ;; Remcos can launch a remote command line to execute commands on the victim’s machine. ;; Remexi silently executes received commands with cmd.exe. ;; Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine. ;; REvil can use the Windows command line to delete volume shadow copies and disable recovery. ;; RGDoor uses cmd.exe to execute commands on the victim’s machine. ;; Rising Sun executed commands using cmd.exe. ;; RobbinHood uses cmd.exe on the victim's computer. ;; RogueRobin uses Windows Script Components. ;; RTM uses the command line and rundll32.exe to execute. ;; RunningRAT uses a batch file to kill a security program task and then attempts to remove itself. ;; Ryuk has used cmd.exe to create a Registry entry to establish persistence. ;; Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell. ;; SamSam uses custom batch scripts to execute some of its components. ;; SDBbot has the ability to use the command shell to execute commands on a compromised host. ;; SeaDuke is capable of executing commands. ;; Seasalt uses cmd.exe to create a reverse shell on the infected endpoint. ;; SEASHARPEE can execute commands on victims. ;; ServHelper can execute shell commands against cmd. ;; SharpStage can execute arbitrary commands with the command line. ;; ShimRat can be issued a command shell function from the C2. ;; Silence has used Windows command-line to run commands. ;; SLOTHFULMEDIA can open a command line to execute commands. ;; SNUGRIDE is capable of executing commands and spawning a reverse shell. ;; Sowbug has used command line during its intrusions. ;; Spark can use cmd.exe to run commands. ;; SQLRat has used SQL to execute JavaScript and VB scripts on the host system. ;; StreamEx has the ability to remotely execute commands. ;; Several tools used by Suckfly have been command-line driven. ;; SYSCON has the ability to execute commands through cmd on a compromised host. ;; TA505 has executed commands using cmd.exe. ;; TA551 has used cmd.exe to execute commands. ;; TAINTEDSCRIBE can enable Windows CLI access and execute files. ;; TDTESS provides a reverse shell on the victim. ;; TEXTMATE executes cmd.exe to provide a reverse shell to adversaries. ;; Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands. ;; Threat Group-3390 has used command-line interfaces for execution. ;; TinyZBot supports execution from the command-line. ;; TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine. ;; Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process. ;; Tropic Trooper has used Windows command scripts. ;; TSCookie has the ability to execute shell commands on the infected host. ;; Turla RPC backdoors have used cmd.exe to execute commands. ;; TURNEDUP is capable of creating a reverse shell. ;; TYPEFRAME can uninstall malware components using a batch script. TYPEFRAME can execute commands using a shell. ;; UBoatRAT can start a command shell. ;; Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon providing a reverse shell upon receipt of a special packet ;; UNC2452 used cmd.exe to execute commands on remote machines. ;; UPPERCUT uses cmd.exe to execute commands on the victim’s machine. ;; USBferry can execute various Windows commands. ;; Volgmer can execute commands on the victim's machine. ;; WEBC2 can open an interactive command shell. ;; WellMess can execute command line scripts received from C2. ;; Wiarp creates a backdoor through which remote attackers can open a command line interface. ;; Wizard Spider has used cmd.exe to execute commands on a victim's machine. ;; XTunnel has been used to execute remote commands. ;; Zebrocy uses cmd.exe to execute commands on the system. ;; Zeus Panda can launch an interface where it can execute several commands on the victim’s PC. ;; ZIRCONIUM has used a tool to open a Windows Command Shell on a remote host. ;; ZLib has the ability to execute shell commands. ;; zwShell can launch command-line shells. ;; ZxShell can launch a reverse command shell."
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
AppleJeus has been distributed via spearphishing link.
1
accept
T1566.002
Phishing: Spearphishing Link
APT1 has sent spearphishing emails containing hyperlinks to malicious files.
1
accept
T1566.002
Phishing: Spearphishing Link
APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites.
1
accept
T1566.002
Phishing: Spearphishing Link
APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.
1
accept
T1566.002
Phishing: Spearphishing Link
APT32 has sent spearphishing emails containing malicious links.
1
accept
T1566.002
Phishing: Spearphishing Link
APT33 has sent spearphishing emails containing links to .hta files.
1
accept
T1566.002
Phishing: Spearphishing Link
APT39 leveraged spearphishing emails with malicious links to initially compromise victims.
1
accept
T1566.002
Phishing: Spearphishing Link
Bazar has been spread via e-mails with embedded malicious links. ;; BlackTech has used spearphishing e-mails with links to cloud services to deliver malware. ;; Cobalt Group has sent emails with URLs pointing to malicious documents. ;; Dragonfly 2.0 used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites. ;; Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server. ;; Emotet has been delivered by phishing emails containing links. ;; Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive. ;; FIN4 has used spearphishing emails (often sent from compromised accounts) containing malicious links. ;; FIN8 has distributed targeted emails containing links to malicious documents with embedded macros. ;; Grandoreiro has been spread via malicious links embedded in e-mails. ;; GuLoader has been spread in phishing campaigns using malicious web links. ;; Hancitor has been delivered via phishing emails which contained malicious links. ;; Javali has been delivered via malicious links embedded in e-mails. ;; Kerrdown has been distributed via e-mails containing a malicious link. ;; Kimsuky has used an email containing a link to a document that contained malicious macros. ;; Leviathan has sent spearphishing emails with links often using a fraudulent lookalike domain and stolen branding. ;; Machete has sent phishing emails that contain a link to an external server with ZIP and RAR archives. ;; Magic Hound sent shortened URL links over email to victims. The URLs linked to Word documents with malicious macros that execute PowerShells scripts to download Pupy. ;; Melcoz has been spread through malicious links embedded in e-mails. ;; Mofang delivered spearphishing emails with malicious links included. ;; Molerats has sent phishing emails with malicious links included. ;; MuddyWater has sent targeted spearphishing e-mails with malicious links. ;; Mustang Panda has delivered spearphishing links to their target. ;; NETWIRE has been spread via e-mail campaigns utilizing malicious links. ;; Night Dragon sent spearphishing emails containing links to compromised websites where malware was downloaded. ;; OilRig has sent spearphising emails with malicious links to potential victims. ;; Patchwork has used spearphishing with links to deliver files with exploits to initial victims. The group has also used embedded image tags (known as web bugs) with unique per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages. ;; Pony has been delivered via spearphishing emails which contained malicious links. ;; Sandworm Team has crafted phishing emails containing malicious hyperlinks. ;; Sidewinder has sent e-mails with malicious links often crafted for specific targets. ;; Stolen Pencil sent spearphishing emails containing links to domains controlled by the threat actor. ;; TA505 has sent spearphishing emails containing malicious links. ;; TrickBot has been delivered via malicious links in phishing e-mails. ;; Turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access. ;; Valak has been delivered via malicious links in e-mail. ;; Windshift has sent spearphishing emails with links to harvest credentials and deliver malware. ;; Wizard Spider has sent phishing emails containing a link to an actor-controlled Google Drive document or other free online file hosting services. ;; ZIRCONIUM has used malicious links and web beacons in e-mails for malware download and to track hits to attacker-controlled URL's.
1
accept
T1566.002
Phishing: Spearphishing Link
APT29 created tokens using compromised SAML signing certificates.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
UNC2452 created tokens using compromised SAML signing certificates.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
Supply chain breaches, such as Solarwinds, are partially exploited via forged credentials that obtain access such as the forging of SMAL tokens.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
APT30 can break single sign on (SSO) if it is SMAL v2.0 through the forgery of SMAL tokens.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
Threat actors can change the normal 1 hour limit upon the legitimacy of a token through accessing the AccessTokenLifetime element.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
Agent Tesla can gather credentials from a number of browsers.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
Ajax Security Team has used FireMalv custom-developed malware which collected passwords from the Firefox browser storage.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
APT3 has used tools to dump passwords from browsers.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
Azorult can steal credentials from the victim's browser.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox Google Chrome and Internet Explorer. ;; Carberp's passw.plug plugin can gather passwords saved in Opera Internet Explorer Safari Firefox and Chrome. ;; ChChes steals credentials stored inside Internet Explorer. ;; CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials. ;; CosmicDuke collects user credentials including passwords for various programs including Web browsers. ;; Crimson contains a module to steal credentials from Web browsers on the victim machine. ;; Emotet has been observed dropping browser password grabber modules. ;; Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome. ;; FIN6 has used the Stealer One credential stealer to target web browsers. ;; Grandoreiro can steal cookie data and credentials from Google Chrome. ;; H1N1 dumps usernames and passwords from Firefox Internet Explorer and Outlook. ;; Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords. ;; Inception used a browser plugin to steal passwords and sessions from Internet Explorer Chrome Opera Firefox Torch and Yandex. ;; Javali can capture login credentials from open browsers including Firefox Chrome Internet Explorer and Edge. ;; jRAT can capture passwords from common web browsers such as Internet Explorer Google Chrome and Firefox. ;; KeyBoy attempts to collect passwords from browsers. ;; KGH_SPY has the ability to steal data from the Chrome Edge Firefox Thunderbird and Opera browsers. ;; Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers. ;; KONNI can steal profiles (containing credential information) from Firefox Chrome and Opera. ;; LaZagne can obtain credentials from web browsers such as Google Chrome Internet Explorer and Firefox. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers. ;; Machete collects stored credentials from several web browsers. ;; Melcoz has the ability to steal credentials from web browsers. ;; Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DPAPI. ;; Molerats used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims. ;; MuddyWater has run tools including Browser64 to steal passwords saved in victim web browsers. ;; NETWIRE has the ability to steal credentials from web browsers including Internet Explorer Opera Yandex and Chrome. ;; njRAT has a module that steals passwords saved in victim web browsers. ;; OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. OilRig has also used tool named PICKPOCKET to dump passwords from web browsers. ;; OLDBAIT collects credentials from Internet Explorer Mozilla Firefox and Eudora. ;; Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers. ;; Patchwork dumped the login data database from \AppData\Local\Google\Chrome\User Data\Default\Login Data. ;; PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator Mozilla Firefox Mozilla Thunderbird and Internet Explorer. ;; PLEAD has the ability to steal saved credentials from web browsers. ;; PoetRAT has used a Python tool named Browdec.exe to steal browser credentials. ;; A module in Prikormka gathers logins and passwords stored in applications on the victims including Google Chrome Mozilla Firefox and several other browsers. ;; Proton gathers credentials for Google Chrome. ;; Pupy can use Lazagne for harvesting credentials. ;; QuasarRAT can obtain passwords from common web browsers. ;; RedLeaves can gather browser usernames and passwords. ;; ROKRAT steals credentials stored in Web browsers by querying the sqlite database. ;; Sandworm Team's CredRaptor tool can collect saved passwords from various internet browsers. ;; Smoke Loader searches for credentials stored from web browsers. ;; Stealth Falcon malware gathers passwords from multiple sources including Internet Explorer Firefox and Chrome. ;; Stolen Pencil has used tools that are capable of obtaining credentials from web browsers. ;; TA505 has used malware to gather credentials from Internet Explorer. ;; TrickBot can obtain passwords stored in files from web browsers such as Chrome Firefox Internet Explorer and Microsoft Edge sometimes using esentutl. ;; Trojan.Karagany can steal data and credentials from browsers. ;; TSCookie has the ability to steal saved passwords from the Internet Explorer Edge Firefox and Chrome browsers. ;; Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine. ;; XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords. ;; Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files. ;; ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
APT29 used a forged duo-sid cookie to bypass MFA set on an email account.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
UNC2452 used a forged duo-sid cookie to bypass MFA set on an email account.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
Attackers bypass some multi-factor authentication protocols since the session is already authenticated.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
Threat actors may have used browser cookies to defeat MFA with a “pass-the-cookie” attack.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
Solarwinds attackers bypassed MFA to obtain access on multiple target networks.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
TA505 has used .iso files to deploy malicious .lnk files.
1
accept
T1553.005
Subvert Trust Controls: Mark
Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls.
1
accept
T1553.005
Subvert Trust Controls: Mark
Attackers use ZIP archives to disseminate malware, bypassing security controls.
1
accept
T1553.005
Subvert Trust Controls: Mark
Maldocs often abuse MOTW policies to get users to run macros and ActiveX controls.
1
accept
T1553.005
Subvert Trust Controls: Mark
Adversaries bypass Microsoft SmartScreen using archive files that do not have MOTW NTFS streams.
1
accept
T1553.005
Subvert Trust Controls: Mark
admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download
1
accept
T1087.001
Account Discovery: Local Account
Agent Tesla can collect account information from the victim’s machine.
1
accept
T1087.001
Account Discovery: Local Account
APT1 used the commands net localgroup net user and net group to find accounts on the system.
1
accept
T1087.001
Account Discovery: Local Account
APT3 has used a tool that can obtain info about local and global group users power users and administrators.
1
accept
T1087.001
Account Discovery: Local Account
APT32 enumerated administrative users using the commands net localgroup administrators.
1
accept
T1087.001
Account Discovery: Local Account
Bankshot gathers domain and account names/information through process monitoring.
1
accept
T1087.001
Account Discovery: Local Account
Bazar can identify administrator accounts on an infected host.
1
accept
T1087.001
Account Discovery: Local Account
BitPaymer can enumerate the sessions for each user logged onto the infected host. ;; BloodHound can identify users with local administrator rights. ;; Chimera has used net user for account discovery. ;; Comnie uses the net user command. ;; The discovery modules used with Duqu can collect information on accounts and permissions. ;; Elise executes net user after initial communication is made to the remote server. ;; Empire can acquire local and domain user account information. ;; Epic gathers a list of all user accounts privilege classes and time of last logon. ;; Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts. ;; GeminiDuke collects information on local user accounts from the victim. ;; HyperStack can enumerate all account names on a remote share. ;; InvisiMole has a command to list account information on the victim’s machine. ;; Kazuar gathers information on local groups and members on the victim’s machine. ;; Ke3chang performs account discovery using commands such as net localgroup administrators and net group REDACTED" /domain on specific permissions groups. ;; Kwampirs collects a list of accounts with the command net users. ;; Mis-Type may create a file containing the results of the command cmd.exe /c net user {Username}. ;; MURKYTOP has the capability to retrieve information about users on remote hosts. ;; Commands under net user can be used in Net to gather information about and manipulate user accounts. ;; OilRig has run net user net user /domain net group “domain admins” /domain and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim. ;; OSInfo enumerates local and domain users ;; P.A.S. Webshell can display the /etc/passwd file on a compromised host. ;; Pony has used the NetUserEnum function to enumerate local accounts. ;; Poseidon Group searches for administrator accounts on both the local victim machine and the network. ;; PoshC2 can enumerate local and domain user account information. ;; PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token. ;; POWERSTATS can retrieve usernames from compromised hosts. ;; PUNCHBUGGY can gather user names. ;; Pupy uses PowerView and Pywerview to perform discovery commands such as net user net group net local group etc. ;; RATANKBA uses the net user command. ;; Remsec can obtain a list of users. ;; S-Type runs the command net user on a victim. S-Type also runs tests to determine the privilege level of the compromised user. ;; SHOTPUT has a command to retrieve information about connected users. ;; SoreFang can collect usernames from the local system via net.exe user. ;; Threat Group-3390 has used net user to conduct internal discovery of systems. ;; TrickBot collects the users of the system. ;; Turla has used net user to enumerate local accounts on the system. ;; USBferry can use net user to gather information about local accounts. ;; Valak has the ability to enumerate local admin accounts."
1
accept
T1087.001
Account Discovery: Local Account
adbupd can use a WMI script to achieve persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
APT29 has used WMI event subscriptions for persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
Leviathan has used WMI for persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
PoshC2 has the ability to persist on a system using WMI events.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
POSHSPY uses a WMI event subscription to establish persistence. ;; POWERTON can use WMI for persistence. ;; RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started. ;; SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup. ;; Turla has used WMI event filters and consumers to establish persistence. ;; UNC2452 used WMI event subscriptions for persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
APT29 drops a Windows shortcut file for execution.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
APT39 has modified LNK shortcuts.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
Astaroth's initial payload is a malicious .LNK file.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
Bazar can establish persistence by writing shortcuts to the Windows Startup folder.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification