prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
System Network Configuration Discovery
|
Milan can run C:\Windows\system32\cmd.exe /c cmd /c ipconfig /all 2>&1 to discover network settings.
|
System Network Configuration Discovery
|
Mis-Type may create a file containing the results of the command cmd.exe /c ipconfig /all.
|
System Network Configuration Discovery
|
MoonWind obtains the victim IP address.
|
System Network Configuration Discovery
|
More_eggs has the capability to gather the IP address from the victim's machine.
|
System Network Configuration Discovery
|
It has collected the domain name of a compromised network.
|
System Network Configuration Discovery
|
Mosquito uses the ipconfig command.
|
System Network Configuration Discovery
|
It has used malware to collect the victim’s IP address and domain name.
|
System Network Configuration Discovery
|
It has used ipconfig and arp to determine network configuration information.
|
System Network Configuration Discovery
|
Naid collects the domain name from a compromised host.
|
System Network Configuration Discovery
|
It uses commands such as netsh interface show to discover network interface settings.
|
System Network Configuration Discovery
|
NanHaiShu can gather information about the victim proxy server.
|
System Network Configuration Discovery
|
NanoCore gathers the IP address from the victim’s machine.
|
System Network Configuration Discovery
|
NBTscan can be used to collect MAC addresses.
|
System Network Configuration Discovery
|
nbtstat can be used to discover local NetBIOS domain names.
|
System Network Configuration Discovery
|
Neoichor can gather the IP address from an infected host.
|
System Network Configuration Discovery
|
NETWIRE can collect the IP address of a compromised host.
|
System Network Configuration Discovery
|
Nltest may be used to enumerate the parent domain of a local machine using /parentdomain.
|
System Network Configuration Discovery
|
NOKKI can gather information on the victim IP address.
|
System Network Configuration Discovery
|
OceanSalt can collect the victim’s IP address.
|
System Network Configuration Discovery
|
Octopus can collect the host IP address from the victim’s machine.
|
System Network Configuration Discovery
|
It has run ipconfig /all on a victim.
|
System Network Configuration Discovery
|
Okrum can collect network information, including the host IP address, DNS, and proxy information.
|
System Network Configuration Discovery
|
Olympic Destroyer uses API calls to enumerate the infected system's ARP table.
|
System Network Configuration Discovery
|
During Operation CuckooBees, the threat actors used ipconfig, nbtstat, tracert, route print, and cat /etc/hosts commands.
|
System Network Configuration Discovery
|
During Operation Wocao, threat actors discovered the local network configuration with ipconfig.
|
System Network Configuration Discovery
|
Orz can gather victim proxy information.
|
System Network Configuration Discovery
|
OSInfo discovers the current domain information.
|
System Network Configuration Discovery
|
OSX_OCEANLOTUS.D can collect the network interface MAC address on the infected host.
|
System Network Configuration Discovery
|
Pay2Key can identify the IP and MAC addresses of the compromised host.
|
System Network Configuration Discovery
|
PcShare can obtain the proxy settings of a compromised machine using InternetQueryOptionA and its IP address by running nslookup myip.opendns.comresolver1.opendns.com\r\n.
|
System Network Configuration Discovery
|
Penquin can report the IP of the compromised host to attacker controlled infrastructure.
|
System Network Configuration Discovery
|
PingPull can retrieve the IP address of a compromised host.
|
System Network Configuration Discovery
|
PipeMon can collect and send the local IP address, RDP information, and the network adapter physical address as a part of its C2 beacon.
|
System Network Configuration Discovery
|
Pisloader has a command to collect the victim's IP address.
|
System Network Configuration Discovery
|
PLAINTEE uses the ipconfig /all command to gather the victim’s IP address.
|
System Network Configuration Discovery
|
PoshC2 can enumerate network adapter information.
|
System Network Configuration Discovery
|
PowerDuke has a command to get the victim's domain and NetBIOS name.
|
System Network Configuration Discovery
|
PowerShower has the ability to identify the current Windows domain of the infected host.
|
System Network Configuration Discovery
|
POWERSTATS can retrieve IP, network adapter configuration information, and domain from compromised hosts.
|
System Network Configuration Discovery
|
POWRUNER may collect network configuration data by running ipconfig /all on a victim.
|
System Network Configuration Discovery
|
A module in Prikormka collects information from the victim about its IP addresses and MAC addresses.
|
System Network Configuration Discovery
|
Proxysvc collects the network adapter information and domain/username information based on current remote sessions.
|
System Network Configuration Discovery
|
Pupy has built in commands to identify a host’s IP address and find out other network configuration settings by viewing connected sessions.
|
System Network Configuration Discovery
|
Pysa can perform network reconnaissance using the Advanced IP Scanner tool.
|
System Network Configuration Discovery
|
QakBot can use net config workstation, arp -a, nslookup, and ipconfig /all to gather network configuration information.
|
System Network Configuration Discovery
|
QUADAGENT gathers the current domain the victim system belongs to.
|
System Network Configuration Discovery
|
QuasarRAT has the ability to enumerate the Wide Area Network (WAN) IP through requests to ip-api[.]com, freegeoip[.]net, or api[.]ipify[.]org observed with user-agent string Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0.
|
System Network Configuration Discovery
|
QUIETCANARY can identify the default proxy setting on a compromised host.
|
System Network Configuration Discovery
|
Ramsay can use ipconfig and Arp to collect network configuration information, including routing information and ARP tables.
|
System Network Configuration Discovery
|
RATANKBA gathers the victim’s IP address via the ipconfig -all command.
|
System Network Configuration Discovery
|
Reaver collects the victim's IP address.
|
System Network Configuration Discovery
|
RedLeaves can obtain information about network parameters.
|
System Network Configuration Discovery
|
Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache.
|
System Network Configuration Discovery
|
Revenge RAT collects the IP address and MAC address from the system.
|
System Network Configuration Discovery
|
Rifdoor has the ability to identify the IP address of the compromised host.
|
System Network Configuration Discovery
|
Rising Sun can detect network adapter and IP address information.
|
System Network Configuration Discovery
|
RogueRobin gathers the IP address and domain from the victim’s machine.
|
System Network Configuration Discovery
|
route can be used to discover routing configuration information.
|
System Network Configuration Discovery
|
Royal can enumerate IP addresses using GetIpAddrTable.
|
System Network Configuration Discovery
|
Ryuk has called GetIpNetTable in attempt to identify all mounted drives and hosts that have Address Resolution Protocol (ARP) entries.
|
System Network Configuration Discovery
|
S-Type has used ipconfig /all on a compromised host.
|
System Network Configuration Discovery
|
Saint Bot can collect the IP address of a victim machine.
|
System Network Configuration Discovery
|
Sardonic has the ability to execute the ipconfig command.
|
System Network Configuration Discovery
|
SDBbot has the ability to determine the domain name and whether a proxy is configured on a compromised host.
|
System Network Configuration Discovery
|
ShadowPad has collected the domain name of the victim system.
|
System Network Configuration Discovery
|
Shamoon obtains the target's IP address and local network segment.
|
System Network Configuration Discovery
|
SHARPSTATS has the ability to identify the domain of the compromised host.
|
System Network Configuration Discovery
|
ShimRatReporter gathered the local proxy, domain, IP, routing tables, mac address, gateway, DNS servers, and DHCP status information from an infected host.
|
System Network Configuration Discovery
|
Sibot checked if the compromised system is configured to use proxies.
|
System Network Configuration Discovery
|
It has identified the IP address of a compromised host.
|
System Network Configuration Discovery
|
SideTwist has the ability to collect the domain name on a compromised host.
|
System Network Configuration Discovery
|
It has used malware to collect information on network interfaces, including the MAC address.
|
System Network Configuration Discovery
|
Sliver has the ability to gather network configuration information.
|
System Network Configuration Discovery
|
Small Sieve can obtain the IP address of a victim host.
|
System Network Configuration Discovery
|
SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via ipconfig.exe /all.
|
System Network Configuration Discovery
|
SpeakUp uses the ifconfig -a command.
|
System Network Configuration Discovery
|
SpicyOmelette can identify the IP of a compromised system.
|
System Network Configuration Discovery
|
Squirrelwaffle has collected the victim’s external IP address.
|
System Network Configuration Discovery
|
STARWHALE has the ability to collect the IP address of an infected host.
|
System Network Configuration Discovery
|
It malware gathers the Address Resolution Protocol (ARP) table from the victim.
|
System Network Configuration Discovery
|
StrongPity can identify the IP address of a compromised host.
|
System Network Configuration Discovery
|
Stuxnet collects the IP address of a compromised system.
|
System Network Configuration Discovery
|
SUNBURST collected all network interface MAC addresses that are up and not loopback devices, as well as IP address, DHCP configuration, and domain information.
|
System Network Configuration Discovery
|
Sykipot may use ipconfig /all to gather system network configuration details.
|
System Network Configuration Discovery
|
Sys10 collects the local IP address of the victim and sends it to the C2.
|
System Network Configuration Discovery
|
SysUpdate can collected the IP address and domain name of a compromised host.
|
System Network Configuration Discovery
|
T9000 gathers and beacons the MAC and IP addresses during installation.
|
System Network Configuration Discovery
|
Taidoor has collected the MAC address of a compromised host; it can also use GetAdaptersInfo to identify network adapters.
|
System Network Configuration Discovery
|
TajMahal has the ability to identify the MAC address on an infected host.
|
System Network Configuration Discovery
|
It has enumerated the host machine’s IP address.
|
System Network Configuration Discovery
|
It actors use NBTscan to discover vulnerable systems.
|
System Network Configuration Discovery
|
Torisma can collect the local MAC address using GetAdaptersInfo as well as the system's IP address.
|
System Network Configuration Discovery
|
TrickBot obtains the IP address, location, and other relevant network information from the victim’s machine.
|
System Network Configuration Discovery
|
Trojan.Karagany can gather information on the network configuration of a compromised host.
|
System Network Configuration Discovery
|
It has used scripts to collect the host's network topology.
|
System Network Configuration Discovery
|
TSCookie has the ability to identify the IP of the infected host.
|
System Network Configuration Discovery
|
Turian can retrieve the internal IP address of a compromised host.
|
System Network Configuration Discovery
|
It surveys a system upon check-in to discover network configuration details using the arp -a, nbtstat -n, net config, ipconfig /all, and route commands, as well as NBTscan. It RPC backdoors have also retrieved registered RPC interface information from process memory.
|
System Network Configuration Discovery
|
Unknown Logger can obtain information about the victim's IP address.
|
System Network Configuration Discovery
|
UPPERCUT has the capability to gather the victim's proxy information.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.