prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
System Owner
|
Gold Dragon collects the endpoint victim's username and uses it as a basis for downloading additional components from the C2 server.
|
System Owner
|
Goopy has the ability to enumerate the infected system's user name.
|
System Owner
|
Grandoreiro can collect the username from the victim's machine.
|
System Owner
|
GravityRAT collects the victim username along with other account information (account type, description, full name, SID and status).
|
System Owner
|
GrimAgent can identify the user id on a target machine.
|
System Owner
|
It has used whoami to gather user information.
|
System Owner
|
can collect the victim user name.
|
System Owner
|
HAWKBALL can collect the user name of the system.
|
System Owner
|
It has run whoami on compromised machines to identify the current user.
|
System Owner
|
HotCroissant has the ability to collect the username on the infected host.
|
System Owner
|
InvisiMole lists local users and session information.
|
System Owner
|
Ixeshe collects the username from the victim’s machine.
|
System Owner
|
JPIN can obtain the victim user name.
|
System Owner
|
Kazuar gathers information on users.
|
System Owner
|
It has used implants capable of collecting the signed-in username.
|
System Owner
|
Koadic can identify logged in users across the domain and views user sessions.
|
System Owner
|
The OsInfo function in Komplex collects the current running username.
|
System Owner
|
KONNI can collect the username from the victim’s machine.
|
System Owner
|
KOPILUWAK can conduct basic network reconnaissance on the victim machine with whoami, to get user details.
|
System Owner
|
Kwampirs collects registered owner details by using the commands systeminfo and net config workstation.
|
System Owner
|
Various It malware enumerates logged-on users.
|
System Owner
|
Linux Rabbit opens a socket on port 22 and if it receives a response it attempts to obtain the machine's hostname and Top-Level Domain.
|
System Owner
|
LiteDuke can enumerate the account name on a targeted system.
|
System Owner
|
LitePower can determine if the current user has admin privileges.
|
System Owner
|
Lizar can collect the username from the system.
|
System Owner
|
Lokibot has the ability to discover the username on the infected host.
|
System Owner
|
Lucifer has the ability to identify the username on a compromised host.
|
System Owner
|
It has used a malicious DLL to collect the username from compromised hosts.
|
System Owner
|
MacMa can collect the username from the compromised machine.
|
System Owner
|
Mafalda can collect the username from a compromised host.
|
System Owner
|
It malware has obtained the victim username and sent it to the C2 server.
|
System Owner
|
MarkiRAT can retrieve the victim’s username.
|
System Owner
|
MechaFlounder has the ability to identify the username and hostname on a compromised host.
|
System Owner
|
metaMain can collect the username from a compromised host.
|
System Owner
|
Metamorfo has collected the username from the victim's machine.
|
System Owner
|
Micropsia collects the username from the victim’s machine.
|
System Owner
|
Milan can identify users registered to a targeted machine.
|
System Owner
|
MirageFox can gather the username from the victim’s machine.
|
System Owner
|
Mis-Type runs tests to determine the privilege level of the compromised user.
|
System Owner
|
MoonWind obtains the victim username.
|
System Owner
|
More_eggs has the capability to gather the username from the victim's machine.
|
System Owner
|
Mosquito runs whoami on the victim’s machine.
|
System Owner
|
It has used malware that can collect the victim’s username.
|
System Owner
|
NanHaiShu collects the username from the victim.
|
System Owner
|
NBTscan can list active users on the system.
|
System Owner
|
NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel.
|
System Owner
|
Neoichor can collect the user name from a victim's machine.
|
System Owner
|
During Night Dragon, threat actors used password cracking and pass-the-hash tools to discover usernames and passwords.
|
System Owner
|
njRAT enumerates the current user during the initial infection.
|
System Owner
|
NOKKI can collect the username from the victim’s machine.
|
System Owner
|
ObliqueRAT can check for blocklisted usernames on infected endpoints.
|
System Owner
|
Octopus can collect the username from the victim’s machine.
|
System Owner
|
It has run whoami on a victim.
|
System Owner
|
Okrum can collect the victim username.
|
System Owner
|
During Operation CuckooBees, the threat actors used the query user and whoami commands as part of their advanced reconnaissance.
|
System Owner
|
During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system.
|
System Owner
|
It collected the victim username and whether it was running as admin, then sent the information to its C2 server.
|
System Owner
|
PoetRAT sent username, computer name, and the previously generated UUID in reply to a "who" command from C2.
|
System Owner
|
PowerDuke has commands to get the current user's name and SID.
|
System Owner
|
PowerShower has the ability to identify the current user on the infected host.
|
System Owner
|
POWERSTATS has the ability to identify the username on the compromised host.
|
System Owner
|
POWRUNER may collect information about the currently logged in user by running whoami on a victim.
|
System Owner
|
A module in Prikormka collects information from the victim about the current user name.
|
System Owner
|
Pupy can enumerate local information for Linux hosts and find currently logged on users for Windows hosts.
|
System Owner
|
PyDCrypt has probed victim machines with whoami and has collected the username from the machine.
|
System Owner
|
QakBot can identify the user name on a compromised system.
|
System Owner
|
QUADAGENT gathers the victim username.
|
System Owner
|
QuasarRAT can enumerate the username and account type.
|
System Owner
|
RATANKBA runs the whoami and query user commands.
|
System Owner
|
RCSession can gather system owner information, including user and administrator privileges.
|
System Owner
|
Reaver collects the victim's username.
|
System Owner
|
RedLeaves can obtain information about the logged on user both locally and for Remote Desktop sessions.
|
System Owner
|
Remsec can obtain information about the current user.
|
System Owner
|
Revenge RAT gathers the username from the system.
|
System Owner
|
RGDoor executes the whoami on the victim’s machine.
|
System Owner
|
Rifdoor has the ability to identify the username on the compromised host.
|
System Owner
|
Rising Sun can detect the username of the infected host.
|
System Owner
|
RogueRobin collects the victim’s username and whether that user is an admin.
|
System Owner
|
ROKRAT can collect the username from a compromised host.
|
System Owner
|
It can obtain the victim username and permissions.
|
System Owner
|
S-Type has run tests to determine the privilege level of the compromised user.
|
System Owner
|
Saint Bot can collect the username from a compromised host.
|
System Owner
|
It has collected the username from a compromised host.
|
System Owner
|
SDBbot has the ability to identify the user on a compromised host.
|
System Owner
|
ServHelper will attempt to enumerate the username of the victim.
|
System Owner
|
ShadowPad has collected the username of the victim system.
|
System Owner
|
SHARPSTATS has the ability to identify the username on the compromised host.
|
System Owner
|
SideTwist can collect the username on a targeted system.
|
System Owner
|
It has used tools to identify the user of a compromised host.
|
System Owner
|
SILENTTRINITY can gather a list of logged on users.
|
System Owner
|
SLOTHFULMEDIA has collected the username from a victim machine.
|
System Owner
|
Small Sieve can obtain the id of a logged in user.
|
System Owner
|
SMOKEDHAM has used whoami commands to identify system owners.
|
System Owner
|
SodaMaster can identify the username on a compromised host.
|
System Owner
|
SombRAT can execute getinfo to identify the username on a compromised host.
|
System Owner
|
Spark has run the whoami command and has a built-in command to identify the user logged in.
|
System Owner
|
SpeakUp uses the whoami command.
|
System Owner
|
Squirrelwaffle can collect the user name from a compromised host.
|
System Owner
|
SslMM sends the logged-on username to its hard-coded C2.
|
System Owner
|
STARWHALE can gather the username from an infected host.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.