value stringlengths 25 18k ⌀ | subtecnique int64 0 1 | answer stringclasses 2
values | id stringlengths 5 9 | name stringlengths 3 102 |
|---|---|---|---|---|
Comnie establishes persistence via a .lnk file in the victim’s startup path. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. ;; Dragonfly 2.0 manipulated .lnk files to gather user credentials in conjunction with Forced Authentication. ;; Empire can persist by modifying a .LNK file to include a backdoor. ;; FELIXROOT create... | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
Agent Tesla has the ability to extract credentials from configuration or support files. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
APT33 has used a variety of publicly available tools like LaZagne to gather credentials. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Azorult can steal credentials in files belonging to common software such as Skype Telegram and Steam. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs including The Bat! email client Outlook and Windows Credential Store. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Empire can use various modules to search for files containing passwords. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Fox Kitten has accessed files to gain valid credentials. ;; Hildegard has searched for SSH keys Docker credentials and Kubernetes service tokens. ;; jRAT can capture passwords from common chat applications such as MSN Messenger AOL Instant Messenger and and Google Talk. ;; LaZagne can obtain credentials from chats dat... | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Limit communications with the container service to local Unix sockets or remote access via SSH. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
Require secure port access to communicate with the APIs over TLS by disabling unauthenticated access to the Docker API and Kubernetes API Server. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
Use the principle of least privilege for privileged accounts such as the service account in Kubernetes. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
An adversary may access the Docker API to collect logs that contain credentials to cloud, container, and various other resources in the environment. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
Ensure containers are not running as root by default. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
Limit privileges of user accounts and remediate privilege escalation vectors so only authorized administrators can create container orchestration jobs. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
Threat actors can create clusters of containers to maintain persistence. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
Ransomware such as DarkMatter can utilize containers to schedule the execution of the encryption payload. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
APT23 abuses container creation programs such as Kubernetes to repeatedly execute malicious code. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
TeamTNT relies on users to download and execute malicious Docker images. | 1 | accept | T1204.003 | User Execution: Malicious Image |
TigerDownloader can be modified to be executed once a user is tricked into downloading a malicious AWS image. | 1 | accept | T1204.003 | User Execution: Malicious Image |
DarkSide ransomware can be executed once a user downloads a malicious GCP image. | 1 | accept | T1204.003 | User Execution: Malicious Image |
Persistence can be maintained via backdoor installations through the medium of malicious docker images. | 1 | accept | T1204.003 | User Execution: Malicious Image |
REvil ransomware can install itself once a user downloads an image that has been modified to contain malicious functionality. | 1 | accept | T1204.003 | User Execution: Malicious Image |
APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
APT33 has used password spraying to gain access to target systems. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Lazarus Group malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames which center around permutations of the username Administrator and weak passwords. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
MailSniper can be used for password spraying against Exchange and Office 365. ;; Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Chimera has used credential stuffing against victim's remote services to obtain valid accounts. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
TrickBot uses brute-force attack against RDP with rdpscanDll module. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
APT22 uses credential stuffing to enumerate the number of compromised accounts they can access. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
Skimmers, such as those utilised by Magecart, will often use credential stuffing to access multiple user accounts across multiple ecommerce websites. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
Credential stuffing is a technique often used by threat actors to gain access to new accounts which they can then abuse the trust of to assist in social engineering attacks. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
Ransomware such as REvil can credential stuff to gain access to more valid accounts before moving laterally and vertically within the network. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
Threat actors can credential stuff to gain access to users accounts if they reuse passwords. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
HyperStack can use default credentials to connect to IPC$ shares on remote machines. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
Stuxnet infected WinCC machines via a hardcoded database server password. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
Threat actors targeting government sectors will abuse default guest and administrator accounts on older windows OS to gain initial access. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
APT40 abuses default administrator accounts for initial access. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
Certain CobaltStrike beacons can maintain persistence via access to default administrator accounts. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
APT32 has used legitimate local admin account credentials. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
Emotet can brute force a local admin password then use it to facilitate lateral movement. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
FIN10 has moved laterally using the Local Administrator account. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
Operation Wocao has used local account credentials found during the intrusion for lateral movement and privilege escalation. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
PROMETHIUM has created admin accounts on a compromised host. ;; Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP. ;; Tropic Trooper has used known administrator account credentials to execute the backdoor directly. ;; Turla has abused local accounts that... | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
admin@338 has sent emails with malicious Microsoft Office documents attached. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
The primary delivered mechaism for Agent Tesla is through email phishing messages. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
Ajax Security Team has used personalized spearphishing attachments. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT1 has sent spearphishing emails containing malicious attachments. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT12 has sent emails with malicious Microsoft Office documents and PDFs attached. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments. ;; APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims. ;; APT30 has used spearphishing emails with malicious DOC attachments. ;; APT32 has sent spearphishing emails with a ma... | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
AppleJeus has waited a specified time before downloading a second stage payload. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
Bazar can use a timer to delay execution of core functionality. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
Egregor can perform a long sleep (greater than or equal to 3 minutes) to evade detection. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
FatDuke can turn itself on or off at random intervals. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
GoldMax has set an execution trigger date and time stored as an ASCII Unix/Epoch time value. ;; Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API and checking whether the time has been accelerated. ;; Pony has delayed execution using a built-in function to avoid detection and ana... | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
Hildegard has queried the Cloud Instance Metadata API for cloud credentials. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
TeamTNT has queried the AWS instance metadata service for credentials. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
APT33 will query Cloud Instance APIs to harvest insecurely stored credentials that can then be used for user enumeration. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
In addition to credential harvesting, other valuable data can be extracted by threat actors via the AWS instance if it is not properly secured. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
APT25 can harvest credentials from Cloud Instance APIs, then use those credentials to gain access to systems. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
Backdoor.Oldrea collects address book information from Outlook. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Emotet has been observed leveraging a module that can scrape email addresses from Outlook. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Grandoreiro can parse Outlook .pst files to extract e-mail addresses. | 1 | accept | T1087.003 | Account Discovery: Email Account |
MailSniper can be used to obtain account names from Exchange and Office 365 using the Get-GlobalAddressList cmdlet. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Ruler can be used to enumerate Exchange users and dump the GAL. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Sandworm Team used malware to enumerate email settings including usernames and passwords from the M.E.Doc application. | 1 | accept | T1087.003 | Account Discovery: Email Account |
TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server. | 1 | accept | T1087.003 | Account Discovery: Email Account |
TrickBot collects email addresses from Outlook.;;Threat actors will often attempt to gather more targets by using tools that lists of users from memory, and combine this with a company’s email naming convention to create a target list of email addresses. ;; Some actors use open-source malware and tools to target and s... | 1 | accept | T1087.003 | Account Discovery: Email Account |
Threat actors will attempt to gather cloud accounts and their appropriate groups in attempts to find weak or default settings to exploit for malicious purposes. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
Identifying cloud groups and cloud permissions can be accomplished by various commands, such as: ‘az ad user get-member-groups’ to get groups associated to a user account in Azure. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
Some actors and malware will attempt to launch commands, via PowerShell for example (among others), to gather cloud group user settings and permissions for Google with the command: ‘GET https://cloudidentity.googleapis.com/v1/groups’. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
As more organizations utilize cloud services, more actors and malware will attempt to engage in malicious activity by locating cloud groups and their corresponding cloud user settings. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
Targeting an access control list (ACL) could grant actors the ability to discover cloud account users and settings, for Amazon Web Services (AWS) this can be done with the ‘GetBucketAcl’ command. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
Drovorub can use kernel modules to establish persistence. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Threat actors can leverage malicious loadable kernel modules (LKMs) to gain Rootkit level access on an affected machine. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Actors are always looking for ways keep control of an infected machine, one way this can be done is through malicious kernel modules to covertly escalate privileges and maintain persistence. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
LKMs used by actors and malware are often loaded into the ‘/lib/modules/’ with a .ko extension on Linux systems. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Malware trying to get kernel access may run commands before loading a malicious module, and some of these include ‘modprobe’, ‘insmod’, ‘lsmod’, ‘rmmod’, and ‘modinfo’. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Some malware will attempt to load Kexts into the kernel, which create new rows in KextPolicy tables. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Dok persists via a plist login item. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
LoudMiner used plists to execute shell scripts and maintain persistence on boot. LoudMiner also added plist files in /Library/LaunchDaemons with KeepAlive set to true which would restart the process if stopped. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
NETWIRE can persist via startup options for Login items. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
Property list (plist) files can be manipulated by malware to execute their own malicious executables. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
Some malware will create property list files (.plist) to download and execute code as part of maintaining persistence. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
macOs malware may try to use the ‘plist’ command to manipulate keys in property list (plist) files to elevate privileges or establish persistence. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.