value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
Comnie establishes persistence via a .lnk file in the victim’s startup path.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. ;; Dragonfly 2.0 manipulated .lnk files to gather user credentials in conjunction with Forced Authentication. ;; Empire can persist by modifying a .LNK file to include a backdoor. ;; FELIXROOT create...
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
Agent Tesla has the ability to extract credentials from configuration or support files.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Azorult can steal credentials in files belonging to common software such as Skype Telegram and Steam.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs including The Bat! email client Outlook and Windows Credential Store.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Empire can use various modules to search for files containing passwords.
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Fox Kitten has accessed files to gain valid credentials. ;; Hildegard has searched for SSH keys Docker credentials and Kubernetes service tokens. ;; jRAT can capture passwords from common chat applications such as MSN Messenger AOL Instant Messenger and and Google Talk. ;; LaZagne can obtain credentials from chats dat...
1
accept
T1552.001
Unsecured Credentials: Credentials In Files
Limit communications with the container service to local Unix sockets or remote access via SSH.
1
accept
T1552.007
Unsecured Credentials: Container Api
Require secure port access to communicate with the APIs over TLS by disabling unauthenticated access to the Docker API and Kubernetes API Server.
1
accept
T1552.007
Unsecured Credentials: Container Api
Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls.
1
accept
T1552.007
Unsecured Credentials: Container Api
Use the principle of least privilege for privileged accounts such as the service account in Kubernetes.
1
accept
T1552.007
Unsecured Credentials: Container Api
An adversary may access the Docker API to collect logs that contain credentials to cloud, container, and various other resources in the environment.
1
accept
T1552.007
Unsecured Credentials: Container Api
Ensure containers are not running as root by default.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
Limit privileges of user accounts and remediate privilege escalation vectors so only authorized administrators can create container orchestration jobs.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
Threat actors can create clusters of containers to maintain persistence.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
Ransomware such as DarkMatter can utilize containers to schedule the execution of the encryption payload.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
APT23 abuses container creation programs such as Kubernetes to repeatedly execute malicious code.
1
accept
T1053.007
Scheduled Task/Job: Container Orchestration Job
TeamTNT relies on users to download and execute malicious Docker images.
1
accept
T1204.003
User Execution: Malicious Image
TigerDownloader can be modified to be executed once a user is tricked into downloading a malicious AWS image.
1
accept
T1204.003
User Execution: Malicious Image
DarkSide ransomware can be executed once a user downloads a malicious GCP image.
1
accept
T1204.003
User Execution: Malicious Image
Persistence can be maintained via backdoor installations through the medium of malicious docker images.
1
accept
T1204.003
User Execution: Malicious Image
REvil ransomware can install itself once a user downloads an image that has been modified to contain malicious functionality.
1
accept
T1204.003
User Execution: Malicious Image
APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks.
1
accept
T1110.003
Brute Force: Password Spraying
APT33 has used password spraying to gain access to target systems.
1
accept
T1110.003
Brute Force: Password Spraying
Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts.
1
accept
T1110.003
Brute Force: Password Spraying
CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password.
1
accept
T1110.003
Brute Force: Password Spraying
Lazarus Group malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames which center around permutations of the username Administrator and weak passwords.
1
accept
T1110.003
Brute Force: Password Spraying
Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.
1
accept
T1110.003
Brute Force: Password Spraying
Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server.
1
accept
T1110.003
Brute Force: Password Spraying
MailSniper can be used for password spraying against Exchange and Office 365. ;; Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets.
1
accept
T1110.003
Brute Force: Password Spraying
Chimera has used credential stuffing against victim's remote services to obtain valid accounts.
1
accept
T1110.004
Brute Force: Credential Stuffing
TrickBot uses brute-force attack against RDP with rdpscanDll module.
1
accept
T1110.004
Brute Force: Credential Stuffing
APT22 uses credential stuffing to enumerate the number of compromised accounts they can access.
1
accept
T1110.004
Brute Force: Credential Stuffing
Skimmers, such as those utilised by Magecart, will often use credential stuffing to access multiple user accounts across multiple ecommerce websites.
1
accept
T1110.004
Brute Force: Credential Stuffing
Credential stuffing is a technique often used by threat actors to gain access to new accounts which they can then abuse the trust of to assist in social engineering attacks.
1
accept
T1110.004
Brute Force: Credential Stuffing
Ransomware such as REvil can credential stuff to gain access to more valid accounts before moving laterally and vertically within the network.
1
accept
T1110.004
Brute Force: Credential Stuffing
Threat actors can credential stuff to gain access to users accounts if they reuse passwords.
1
accept
T1110.004
Brute Force: Credential Stuffing
HyperStack can use default credentials to connect to IPC$ shares on remote machines.
1
accept
T1078.001
Valid Accounts: Default Accounts
Stuxnet infected WinCC machines via a hardcoded database server password.
1
accept
T1078.001
Valid Accounts: Default Accounts
Threat actors targeting government sectors will abuse default guest and administrator accounts on older windows OS to gain initial access.
1
accept
T1078.001
Valid Accounts: Default Accounts
APT40 abuses default administrator accounts for initial access.
1
accept
T1078.001
Valid Accounts: Default Accounts
Certain CobaltStrike beacons can maintain persistence via access to default administrator accounts.
1
accept
T1078.001
Valid Accounts: Default Accounts
APT32 has used legitimate local admin account credentials.
1
accept
T1078.003
Valid Accounts: Local Accounts
Cobalt Strike can use known credentials to run commands and spawn processes as a local user account.
1
accept
T1078.003
Valid Accounts: Local Accounts
Emotet can brute force a local admin password then use it to facilitate lateral movement.
1
accept
T1078.003
Valid Accounts: Local Accounts
FIN10 has moved laterally using the Local Administrator account.
1
accept
T1078.003
Valid Accounts: Local Accounts
HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers.
1
accept
T1078.003
Valid Accounts: Local Accounts
NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems.
1
accept
T1078.003
Valid Accounts: Local Accounts
Operation Wocao has used local account credentials found during the intrusion for lateral movement and privilege escalation.
1
accept
T1078.003
Valid Accounts: Local Accounts
PROMETHIUM has created admin accounts on a compromised host. ;; Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP. ;; Tropic Trooper has used known administrator account credentials to execute the backdoor directly. ;; Turla has abused local accounts that...
1
accept
T1078.003
Valid Accounts: Local Accounts
admin@338 has sent emails with malicious Microsoft Office documents attached.
1
accept
T1566.001
Phishing: Spearphishing Attachment
The primary delivered mechaism for Agent Tesla is through email phishing messages.
1
accept
T1566.001
Phishing: Spearphishing Attachment
Ajax Security Team has used personalized spearphishing attachments.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT1 has sent spearphishing emails containing malicious attachments.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT12 has sent emails with malicious Microsoft Office documents and PDFs attached.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.
1
accept
T1566.001
Phishing: Spearphishing Attachment
APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments. ;; APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims. ;; APT30 has used spearphishing emails with malicious DOC attachments. ;; APT32 has sent spearphishing emails with a ma...
1
accept
T1566.001
Phishing: Spearphishing Attachment
AppleJeus has waited a specified time before downloading a second stage payload.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
Bazar can use a timer to delay execution of core functionality.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
Egregor can perform a long sleep (greater than or equal to 3 minutes) to evade detection.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
FatDuke can turn itself on or off at random intervals.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system.
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
GoldMax has set an execution trigger date and time stored as an ASCII Unix/Epoch time value. ;; Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API and checking whether the time has been accelerated. ;; Pony has delayed execution using a built-in function to avoid detection and ana...
1
accept
T1497.003
Virtualization/Sandbox Evasion: Time Based Evasion
Hildegard has queried the Cloud Instance Metadata API for cloud credentials.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
TeamTNT has queried the AWS instance metadata service for credentials.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
APT33 will query Cloud Instance APIs to harvest insecurely stored credentials that can then be used for user enumeration.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
In addition to credential harvesting, other valuable data can be extracted by threat actors via the AWS instance if it is not properly secured.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
APT25 can harvest credentials from Cloud Instance APIs, then use those credentials to gain access to systems.
1
accept
T1552.005
Unsecured Credentials: Cloud Instance Metadata Api
Backdoor.Oldrea collects address book information from Outlook.
1
accept
T1087.003
Account Discovery: Email Account
Emotet has been observed leveraging a module that can scrape email addresses from Outlook.
1
accept
T1087.003
Account Discovery: Email Account
Grandoreiro can parse Outlook .pst files to extract e-mail addresses.
1
accept
T1087.003
Account Discovery: Email Account
MailSniper can be used to obtain account names from Exchange and Office 365 using the Get-GlobalAddressList cmdlet.
1
accept
T1087.003
Account Discovery: Email Account
Ruler can be used to enumerate Exchange users and dump the GAL.
1
accept
T1087.003
Account Discovery: Email Account
Sandworm Team used malware to enumerate email settings including usernames and passwords from the M.E.Doc application.
1
accept
T1087.003
Account Discovery: Email Account
TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server.
1
accept
T1087.003
Account Discovery: Email Account
TrickBot collects email addresses from Outlook.;;Threat actors will often attempt to gather more targets by using tools that lists of users from memory, and combine this with a company’s email naming convention to create a target list of email addresses. ;; Some actors use open-source malware and tools to target and s...
1
accept
T1087.003
Account Discovery: Email Account
Threat actors will attempt to gather cloud accounts and their appropriate groups in attempts to find weak or default settings to exploit for malicious purposes.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
Identifying cloud groups and cloud permissions can be accomplished by various commands, such as: ‘az ad user get-member-groups’ to get groups associated to a user account in Azure.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
Some actors and malware will attempt to launch commands, via PowerShell for example (among others), to gather cloud group user settings and permissions for Google with the command: ‘GET https://cloudidentity.googleapis.com/v1/groups’.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
As more organizations utilize cloud services, more actors and malware will attempt to engage in malicious activity by locating cloud groups and their corresponding cloud user settings.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
Targeting an access control list (ACL) could grant actors the ability to discover cloud account users and settings, for Amazon Web Services (AWS) this can be done with the ‘GetBucketAcl’ command.
1
accept
T1069.003
Permission Groups Discovery: Cloud Groups
Drovorub can use kernel modules to establish persistence.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Threat actors can leverage malicious loadable kernel modules (LKMs) to gain Rootkit level access on an affected machine.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Actors are always looking for ways keep control of an infected machine, one way this can be done is through malicious kernel modules to covertly escalate privileges and maintain persistence.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
LKMs used by actors and malware are often loaded into the ‘/lib/modules/’ with a .ko extension on Linux systems.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Malware trying to get kernel access may run commands before loading a malicious module, and some of these include ‘modprobe’, ‘insmod’, ‘lsmod’, ‘rmmod’, and ‘modinfo’.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Some malware will attempt to load Kexts into the kernel, which create new rows in KextPolicy tables.
1
accept
T1547.006
Boot or Logon Autostart Execution: Kernel Modules And Extensions
Dok persists via a plist login item.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
LoudMiner used plists to execute shell scripts and maintain persistence on boot. LoudMiner also added plist files in /Library/LaunchDaemons with KeepAlive set to true which would restart the process if stopped.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
NETWIRE can persist via startup options for Login items.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
Property list (plist) files can be manipulated by malware to execute their own malicious executables.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
Some malware will create property list files (.plist) to download and execute code as part of maintaining persistence.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification
macOs malware may try to use the ‘plist’ command to manipulate keys in property list (plist) files to elevate privileges or establish persistence.
1
accept
T1547.011
Boot or Logon Autostart Execution: Plist Modification