prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
System Network Configuration Discovery
|
BADFLICK has captured victim IP address details.
|
System Network Configuration Discovery
|
Bandook has a command to get the public IP address from a system.
|
System Network Configuration Discovery
|
Bazar can collect the IP address and NetBIOS name of an infected machine.
|
System Network Configuration Discovery
|
Bisonal can execute ipconfig on the victim’s machine.
|
System Network Configuration Discovery
|
BlackEnergy has gathered information about network IP configurations using ipconfig.exe and about routing tables using route.exe.
|
System Network Configuration Discovery
|
BLINDINGCAN has collected the victim machine's local IP address information and MAC address.
|
System Network Configuration Discovery
|
BLUELIGHT can collect IP information from the victim’s machine.
|
System Network Configuration Discovery
|
Bonadan can find the external IP address of the infected host.
|
System Network Configuration Discovery
|
BoxCaon can collect the victim's MAC address by using the GetAdaptersInfo API.
|
System Network Configuration Discovery
|
Brave Prince gathers network configuration information as well as the ARP cache.
|
System Network Configuration Discovery
|
During C0015, the threat actors used code to obtain the external public-facing IPv4 address of the compromised host.
|
System Network Configuration Discovery
|
During C0017, It used cmd.exe /c ping %userdomain% for discovery.
|
System Network Configuration Discovery
|
During C0018, the threat actors ran nslookup and Advanced IP Scanner on the target network.
|
System Network Configuration Discovery
|
Calisto runs the ifconfig command to obtain the IP address from the victim’s machine.
|
System Network Configuration Discovery
|
Carbon can collect the IP address of the victims and other computers on the network using the commands: ipconfig -all nbtstat -n, and nbtstat -s.
|
System Network Configuration Discovery
|
Catchamas gathers the Mac address, IP address, and the network adapter information from the victim’s machine.
|
System Network Configuration Discovery
|
Caterpillar WebShell can gather the IP address from the victim's machine using the IP config command.
|
System Network Configuration Discovery
|
CharmPower has the ability to use ipconfig to enumerate system network settings.
|
System Network Configuration Discovery
|
It has used ipconfig, Ping, and tracert to enumerate the IP address and network environment and settings of the local host.
|
System Network Configuration Discovery
|
Chrommme can enumerate the IP address of a compromised host.
|
System Network Configuration Discovery
|
Clambling can enumerate the IP address of a compromised machine.
|
System Network Configuration Discovery
|
Cobalt Strike can determine the NetBios name and the IP addresses of targets machines including domain controllers.
|
System Network Configuration Discovery
|
Comnie uses ipconfig /all and route PRINT to identify network adapter and interface information.
|
System Network Configuration Discovery
|
Conti can retrieve the ARP cache from the local system by using the GetIpNetTable() API call and check to ensure IP addresses it connects to are for local, non-Internet, systems.
|
System Network Configuration Discovery
|
CrackMapExec can collect DNS information from the targeted system.
|
System Network Configuration Discovery
|
CreepySnail can use getmac and Get-NetIPAddress to enumerate network settings.
|
System Network Configuration Discovery
|
Crimson contains a command to collect the victim MAC address and LAN IP.
|
System Network Configuration Discovery
|
Cuba can retrieve the ARP cache from the local system by using GetIpNetTable.
|
System Network Configuration Discovery
|
Cyclops Blink can use the Linux API if_nameindex to gather network interface names.
|
System Network Configuration Discovery
|
It has collected the IP address and network adapter information from the victim’s machine.
|
System Network Configuration Discovery
|
DEADEYE can discover the DNS domain name of a targeted system.
|
System Network Configuration Discovery
|
Denis uses ipconfig to gather the IP address from the system.
|
System Network Configuration Discovery
|
Diavol can enumerate victims' local and external IPs when registering with C2.
|
System Network Configuration Discovery
|
down_new has the ability to identify the MAC address of a compromised host.
|
System Network Configuration Discovery
|
It has used batch scripts to enumerate network information, including information about trusts, zones, and the domain.
|
System Network Configuration Discovery
|
Dtrack can collect the host's IP addresses using the ipconfig command.
|
System Network Configuration Discovery
|
The reconnaissance modules used with Duqu can collect information on network configuration.
|
System Network Configuration Discovery
|
Dyre has the ability to identify network settings on a compromised host.
|
System Network Configuration Discovery
|
It used the command ipconfig to obtain information about network configurations.
|
System Network Configuration Discovery
|
EKANS can determine the domain of a compromised host.
|
System Network Configuration Discovery
|
Elise executes ipconfig /all after initial communication is made to the remote server.
|
System Network Configuration Discovery
|
Emissary has the capability to execute the command ipconfig /all.
|
System Network Configuration Discovery
|
Empire can acquire network configuration information like DNS servers, public IP, and network proxies used by a host.
|
System Network Configuration Discovery
|
Epic uses the nbtstat -n and nbtstat -s commands on the victim’s machine.
|
System Network Configuration Discovery
|
Explosive has collected the MAC address from the victim's machine.
|
System Network Configuration Discovery
|
FALLCHILL collects MAC address and local IP address information from the victim.
|
System Network Configuration Discovery
|
FatDuke can identify the MAC address on the target computer.
|
System Network Configuration Discovery
|
Felismus collects the victim LAN IP address and sends it to the C2 server.
|
System Network Configuration Discovery
|
FELIXROOT collects information about the network including the IP address and DHCP server.
|
System Network Configuration Discovery
|
It has used nslookup and ipconfig for network reconnaissance efforts. It has also utilized a compromised Symantec Altiris console and LanDesk account to retrieve network information.
|
System Network Configuration Discovery
|
Flagpro has been used to execute the ipconfig /all command on a victim system.
|
System Network Configuration Discovery
|
During Frankenstein, the threat actors used Empire to find the public IP address of a compromised system.
|
System Network Configuration Discovery
|
FunnyDream can parse the ProxyServer string in the Registry to discover http proxies.
|
System Network Configuration Discovery
|
During FunnyDream, the threat actors used ipconfig for discovery on remote systems.
|
System Network Configuration Discovery
|
It used ipconfig /all to obtain information about the victim network configuration. The group also ran a modified version of NBTscan to identify available NetBIOS name servers.
|
System Network Configuration Discovery
|
GeminiDuke collects information on network settings and Internet proxy settings from the victim.
|
System Network Configuration Discovery
|
GoldMax retrieved a list of the system's network interface after execution.
|
System Network Configuration Discovery
|
Grandoreiro can determine the IP and physical location of the compromised host via IPinfo.
|
System Network Configuration Discovery
|
GravityRAT collects the victim IP address, MAC address, as well as the victim account domain name.
|
System Network Configuration Discovery
|
Green Lambert can obtain proxy information from a victim's machine using system environment variables.
|
System Network Configuration Discovery
|
GrimAgent can enumerate the IP and domain of a target system.
|
System Network Configuration Discovery
|
It has collected IP information via IPInfo.
|
System Network Configuration Discovery
|
It has used Ping and tracert for network discovery.
|
System Network Configuration Discovery
|
It used ipconfig to gather network configuration information.
|
System Network Configuration Discovery
|
HotCroissant has the ability to identify the IP address of the compromised machine.
|
System Network Configuration Discovery
|
Hydraq creates a backdoor through which remote attackers can retrieve IP addresses of compromised machines.
|
System Network Configuration Discovery
|
The IceApple ifconfig module can iterate over all network interfaces on the host and retrieve the name, description, MAC address, DNS suffix, DNS servers, gateways, IPv4 addresses, and subnet masks.
|
System Network Configuration Discovery
|
ifconfig can be used to display adapter configuration on Unix systems, including information for TCP/IP, DNS, and DHCP.
|
System Network Configuration Discovery
|
iKitten will look for the current IP address.
|
System Network Configuration Discovery
|
Industroyer’s 61850 payload component enumerates connected network adapters and their corresponding IP addresses.
|
System Network Configuration Discovery
|
InvisiMole gathers information on the IP forwarding table, MAC address, configured proxy, and network SSID.
|
System Network Configuration Discovery
|
ipconfig can be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP.
|
System Network Configuration Discovery
|
Ixeshe enumerates the IP address, network proxy settings, and domain name from a victim's system.
|
System Network Configuration Discovery
|
A JHUHUGIT variant gathers network interface card information.
|
System Network Configuration Discovery
|
JPIN can obtain network information, including DNS, IP, and proxies.
|
System Network Configuration Discovery
|
jRAT can gather victim internal and external IPs.
|
System Network Configuration Discovery
|
Kazuar gathers information about network adapters.
|
System Network Configuration Discovery
|
It has performed local network configuration discovery using ipconfig.
|
System Network Configuration Discovery
|
Kessel has collected the DNS address of the infected host.
|
System Network Configuration Discovery
|
Kevin can collect the MAC address and other information from a victim machine using ipconfig/all.
|
System Network Configuration Discovery
|
KeyBoy can determine the public or WAN IP address for the system.
|
System Network Configuration Discovery
|
KEYMARBLE gathers the MAC address of the victim’s machine.
|
System Network Configuration Discovery
|
It has used ipconfig/all to gather network configuration information.
|
System Network Configuration Discovery
|
Koadic can retrieve the contents of the IP routing table as well as information about the Windows domain.
|
System Network Configuration Discovery
|
Kobalos can record the IP address of the target machine.
|
System Network Configuration Discovery
|
KONNI can collect the IP address from the victim’s machine.
|
System Network Configuration Discovery
|
KOPILUWAK can use Arp to discover a target's network configuration setttings.
|
System Network Configuration Discovery
|
Kwampirs collects network adapter and interface information by using the commands ipconfig /all, arp -a and route print. It also collects the system's MAC address with getmac and domain configuration with net config workstation.
|
System Network Configuration Discovery
|
It malware IndiaIndia obtains and sends to its C2 server information about the first network interface card’s configuration, including IP address, gateways, subnet mask, DHCP information, and whether WINS is available.
|
System Network Configuration Discovery
|
LightNeuron gathers information about network adapters using the Win32 API call GetAdaptersInfo.
|
System Network Configuration Discovery
|
LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera.
|
System Network Configuration Discovery
|
Lizar can retrieve network information from a compromised host.
|
System Network Configuration Discovery
|
Lokibot has the ability to discover the domain name of the infected host.
|
System Network Configuration Discovery
|
LoudMiner used a script to gather the IP address of the infected machine before sending to the C2.
|
System Network Configuration Discovery
|
Lucifer can collect the IP address of a compromised host.
|
System Network Configuration Discovery
|
It collects the MAC address of the target computer and other network configuration information.
|
System Network Configuration Discovery
|
MacMa can collect IP addresses from a compromised host.
|
System Network Configuration Discovery
|
Mafalda can use the GetAdaptersInfo function to retrieve information about network adapters and the GetIpNetTable function to retrieve the IPv4 to physical network address mapping table.
|
System Network Configuration Discovery
|
It malware gathers the victim's local IP address, MAC address, and external IP address.
|
System Network Configuration Discovery
|
It has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.