prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
System Network Configuration Discovery
|
USBferry can detect the infected machine's network topology using ipconfig and arp.
|
System Network Configuration Discovery
|
Valak has the ability to identify the domain and the MAC and IP addresses of an infected machine.
|
System Network Configuration Discovery
|
VERMIN gathers the local IP address.
|
System Network Configuration Discovery
|
Volgmer can gather the IP address from the victim's machine.
|
System Network Configuration Discovery
|
It has executed multiple commands to enumerate network topology and settings including ipconfig, netsh interface firewall show all, and netsh interface portproxy show all.
|
System Network Configuration Discovery
|
WannaCry will attempt to determine the local network segment it is a part of.
|
System Network Configuration Discovery
|
WellMail can identify the IP address of the victim system.
|
System Network Configuration Discovery
|
WellMess can identify the IP address and user domain on the target machine.
|
System Network Configuration Discovery
|
It has used ipconfig to identify the network configuration of a victim machine. It has also used the PowerShell cmdlet Get-ADComputer to collect IP address data from Active Directory.
|
System Network Configuration Discovery
|
Woody RAT can retrieve network interface and proxy information.
|
System Network Configuration Discovery
|
Xbash can collect IP addresses and local intranet information from a victim’s machine.
|
System Network Configuration Discovery
|
xCaon has used the GetAdaptersInfo() API call to get the victim's MAC address.
|
System Network Configuration Discovery
|
yty runs ipconfig /all and collects the domain name.
|
System Network Configuration Discovery
|
Zebrocy runs the ipconfig /all command.
|
System Network Configuration Discovery
|
ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server.
|
System Network Configuration Discovery
|
ItM has used a tool to enumerate proxy settings in the target environment.
|
System Network Configuration Discovery
|
zwShell can obtain the victim IP address.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has ensured web servers in a victim environment are Internet accessible before copying tools or malware to it.
|
System Network Configuration Discovery:Internet Connection Discovery
|
DarkTortilla can check for internet connectivity by issuing HTTP GET requests.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has used Ping and tracert for network reconnaissance efforts.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has used the Ping command to check connectivity to actor-controlled C2 servers.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has tested connectivity between a compromised machine and a C2 server using Ping with commands such as CSIDL_SYSTEM\cmd.exe /c ping -n 1.
|
System Network Configuration Discovery:Internet Connection Discovery
|
GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has checked for network connectivity from a compromised host using ping, including attempts to contact google[.]com.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has used tools including BITSAdmin to test internet connectivity from compromised hosts.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has conducted a network call out to a specific website as part of their initial discovery activity.
|
System Network Configuration Discovery:Internet Connection Discovery
|
More_eggs has used HTTP GET requests to check internet connectivity.
|
System Network Configuration Discovery:Internet Connection Discovery
|
Neoichor can check for Internet connectivity by contacting bing[.]com with the request format bing[.]com?id=<GetTickCount>.
|
System Network Configuration Discovery:Internet Connection Discovery
|
During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity.
|
System Network Configuration Discovery:Internet Connection Discovery
|
QakBot can measure the download speed on a targeted host.
|
System Network Configuration Discovery:Internet Connection Discovery
|
QuietSieve can check C2 connectivity with a ping to 8.8.8.8 (Google public DNS).
|
System Network Configuration Discovery:Internet Connection Discovery
|
Rising Sun can test a connection to a specified network IP address over a specified port number.
|
System Network Configuration Discovery:Internet Connection Discovery
|
During the SolarWinds Compromise, It used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.
|
System Network Configuration Discovery:Internet Connection Discovery
|
SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.
|
System Network Configuration Discovery:Internet Connection Discovery
|
SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has run scripts to check internet connectivity from compromised hosts.
|
System Network Configuration Discovery:Internet Connection Discovery
|
It has used tracert to check internet connectivity.
|
System Network Configuration Discovery:Internet Connection Discovery
|
Woody RAT can make Ping GET HTTP requests to its C2 server at regular intervals for network connectivity checks.
|
System Network Configuration Discovery:Wi-Fi Discovery
|
Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected.
|
System Network Configuration Discovery:Wi-Fi Discovery
|
Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.
|
System Network Configuration Discovery:Wi-Fi Discovery
|
It has collected names and passwords of all Wi-Fi networks to which a device has previously connected.
|
System Network Connections Discovery
|
It actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: netstat -ano >> %temp%\download
|
System Network Connections Discovery
|
It has used the netstat -naop tcp command to display TCP connections on a victim's machine.
|
System Network Connections Discovery
|
It used the net use command to get a listing on network connections.
|
System Network Connections Discovery
|
It has a tool that can enumerate current network connections.
|
System Network Connections Discovery
|
It used the netstat -anpo tcp command to display TCP connections on the victim's machine.
|
System Network Connections Discovery
|
It installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system.
|
System Network Connections Discovery
|
It has enumerated IP addresses of network resources and used the netstat command as part of network reconnaissance. The group has also used a malware variant, HIGHNOON, to enumerate active RDP sessions.
|
System Network Connections Discovery
|
Aria-body has the ability to gather TCP and UDP table status listings.
|
System Network Connections Discovery
|
Babuk can use "WNetOpenEnumW" and "WNetEnumResourceW" to enumerate files in network resources for encryption.
|
System Network Connections Discovery
|
It has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports.
|
System Network Connections Discovery
|
BADHATCH can execute netstat.exe -f on a compromised machine.
|
System Network Connections Discovery
|
BlackEnergy has gathered information about local network connections using netstat.
|
System Network Connections Discovery
|
Carbon uses the netstat -r and netstat -an commands.
|
System Network Connections Discovery
|
CharmPower can use netsh wlan show profiles to list specific Wi-Fi profile details.
|
System Network Connections Discovery
|
It has used netstat -ano | findstr EST to discover network connections.
|
System Network Connections Discovery
|
Cobalt Strike can produce a sessions report from compromised hosts.
|
System Network Connections Discovery
|
Comnie executes the netstat -ano command.
|
System Network Connections Discovery
|
Conti can enumerate routine network connections from a compromised host.
|
System Network Connections Discovery
|
CrackMapExec can discover active sessions for a targeted system.
|
System Network Connections Discovery
|
Cuba can use the function GetIpNetTable to recover the last connections to the victim's machine.
|
System Network Connections Discovery
|
Dtrack can collect network and active connection information.
|
System Network Connections Discovery
|
The discovery modules used with Duqu can collect information on network connections.
|
System Network Connections Discovery
|
It employed a PowerShell script called RDPConnectionParser to read and filter the Windows event log "Microsoft-Windows-TerminalServices-RDPClient/Operational"(Event ID 1024) to obtain network information from RDP connections. It has also used netstat from a compromised system to obtain network connection information.
|
System Network Connections Discovery
|
Egregor can enumerate all connected drives.
|
System Network Connections Discovery
|
Empire can enumerate the current network connections of a host.
|
System Network Connections Discovery
|
Epic uses the net use, net session, and netstat commands to gather information on network connections.
|
System Network Connections Discovery
|
It has used netstat and other net commands for network reconnaissance efforts.
|
System Network Connections Discovery
|
Flagpro has been used to execute netstat -ano on a compromised host.
|
System Network Connections Discovery
|
During FunnyDream, the threat actors used netstat to discover network connections on remote systems.
|
System Network Connections Discovery
|
It used netstat -oan to obtain information about the victim network connections.
|
System Network Connections Discovery
|
GravityRAT uses the netstat command to find open ports on the victim’s machine.
|
System Network Connections Discovery
|
It has used netstat to monitor connections to specific ports.
|
System Network Connections Discovery
|
jRAT can list network connections.
|
System Network Connections Discovery
|
It performs local network connection discovery using netstat.
|
System Network Connections Discovery
|
KONNI has used net session on the victim's machine.
|
System Network Connections Discovery
|
KOPILUWAK can use netstat, Arp, and Net to discover current TCP connections.
|
System Network Connections Discovery
|
Kwampirs collects a list of active and listening connections by using the command netstat -nao as well as a list of available network mappings with net use.
|
System Network Connections Discovery
|
It has used net use to identify and establish a network connection with a remote host.
|
System Network Connections Discovery
|
Lizar has a plugin to retrieve information about all active network sessions on the infected server.
|
System Network Connections Discovery
|
Lucifer can identify the IP and port numbers for all remote connections from the compromised host.
|
System Network Connections Discovery
|
It uses the netsh wlan show networks mode=bssid and netsh wlan show interfaces commands to list all nearby WiFi networks and connected interfaces.
|
System Network Connections Discovery
|
Mafalda can use the GetExtendedTcpTable function to retrieve information about established TCP connections.
|
System Network Connections Discovery
|
It has used quser.exe to identify existing RDP connections.
|
System Network Connections Discovery
|
Maze has used the "WNetOpenEnumW", "WNetEnumResourceW", "WNetCloseEnum" and "WNetAddConnection2W" functions to enumerate the network resources on the infected machine.
|
System Network Connections Discovery
|
It has used net use to conduct connectivity checks to machines.
|
System Network Connections Discovery
|
After loading the keyword and phone data files, MESSAGETAP begins monitoring all network connections to and from the victim server.
|
System Network Connections Discovery
|
It has used a PowerShell backdoor to check for Skype connections on the target machine.
|
System Network Connections Discovery
|
It has used netstat -ano to determine network connection information.
|
System Network Connections Discovery
|
nbtstat can be used to discover current NetBIOS sessions.
|
System Network Connections Discovery
|
Commands such as net use and net session can be used in Net to gather information about network connections from a particular host.
|
System Network Connections Discovery
|
netstat can be used to enumerate local network connections, including active TCP connections and other network statistics.
|
System Network Connections Discovery
|
NETWIRE can capture session logon details from a compromised host.
|
System Network Connections Discovery
|
It has used netstat -an on a victim to get a listing of network connections.
|
System Network Connections Discovery
|
Okrum was seen using NetSess to discover NetBIOS sessions.
|
System Network Connections Discovery
|
During Operation CuckooBees, the threat actors used the net session, net use, and netstat commands as part of their advanced reconnaissance.
|
System Network Connections Discovery
|
During Operation Wocao, threat actors collected a list of open connections on the infected system using netstat and checks whether it has an internet connection.
|
System Network Connections Discovery
|
OSInfo enumerates the current network connections similar to net use .
|
System Network Connections Discovery
|
Once inside a Virtual Private Cloud, Pacu can attempt to identify DirectConnect, VPN, or VPC Peering.
|
System Network Connections Discovery
|
PlugX has a module for enumerating TCP and UDP network connections and associated processes using the netstat command.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.