prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Automated Collection
|
It has collected information automatically using the adversary's USBferry attack.
|
Automated Collection
|
For all non-removable drives on a victim, USBStealer executes automated collection of certain files for later exfiltration.
|
Automated Collection
|
Valak can download a module to search for and build a report of harvested credential data.
|
Automated Collection
|
VERMIN saves each collected file with the automatically generated format {0:dd-MM-yyyy}.txt .
|
Automated Collection
|
WindTail can identify and add files that possess specific file extensions to an array for archiving.
|
Automated Collection
|
Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.
|
Browser Session Hijacking
|
Agent Tesla has the ability to use form-grabbing to extract data from web data forms.
|
Browser Session Hijacking
|
Carberp has captured credentials when a user performs login through a SSL session.
|
Browser Session Hijacking
|
Chaes has used the Puppeteer module to hook and monitor the Chrome web browser to collect user information from infected hosts.
|
Browser Session Hijacking
|
Cobalt Strike can perform browser pivoting and inject into a user's browser to inherit cookies, authenticated HTTP sessions, and client SSL certificates.
|
Browser Session Hijacking
|
Dridex can perform browser attacks via web injects to steal information such as credentials, certificates, and cookies.
|
Browser Session Hijacking
|
Grandoreiro can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.
|
Browser Session Hijacking
|
IcedID has used web injection attacks to redirect victims to spoofed sites designed to harvest banking and other credentials. IcedID can use a self signed TLS certificate in connection with the spoofed site and simultaneously maintains a live connection with the legitimate site to display the correct URL and certificates in the browser.
|
Browser Session Hijacking
|
Melcoz can monitor the victim's browser for online banking sessions and display an overlay window to manipulate the session in the background.
|
Browser Session Hijacking
|
QakBot can use advanced web injects to steal web banking credentials.
|
Browser Session Hijacking
|
TrickBot uses web injects and browser redirection to trick the user into providing their login credentials on a fake or modified web page.
|
Browser Session Hijacking
|
Ursnif has injected HTML codes into banking sites to steal sensitive online banking information (ex: usernames and passwords).
|
Clipboard Data
|
Agent Tesla can steal data from the victim’s clipboard.
|
Clipboard Data
|
It used a Trojan called KEYLIME to collect data from the clipboard.
|
Clipboard Data
|
It has used tools capable of stealing contents of the clipboard.
|
Clipboard Data
|
Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries.
|
Clipboard Data
|
Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs.
|
Clipboard Data
|
Cadelspy has the ability to steal data from the clipboard.
|
Clipboard Data
|
Catchamas steals data stored in the clipboard.
|
Clipboard Data
|
Clambling has the ability to capture and store clipboard data.
|
Clipboard Data
|
CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds.
|
Clipboard Data
|
DarkComet can steal data from the clipboard.
|
Clipboard Data
|
DarkTortilla can download a clipboard information stealer module.
|
Clipboard Data
|
Empire can harvest clipboard data on both Windows and macOS systems.
|
Clipboard Data
|
Explosive has a function to use the OpenClipboard wrapper.
|
Clipboard Data
|
FlawedAmmyy can collect clipboard data.
|
Clipboard Data
|
Grandoreiro can capture clipboard data from a compromised host.
|
Clipboard Data
|
The executable version of Helminth has a module to log clipboard contents.
|
Clipboard Data
|
A JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image.
|
Clipboard Data
|
jRAT can capture clipboard data.
|
Clipboard Data
|
Koadic can retrieve the current content of the user clipboard.
|
Clipboard Data
|
KONNI had a feature to steal data from the clipboard.
|
Clipboard Data
|
It hijacks the clipboard data by creating an overlapped window that listens to keyboard events.
|
Clipboard Data
|
MacSpy can steal clipboard contents.
|
Clipboard Data
|
MarkiRAT can capture clipboard content.
|
Clipboard Data
|
Melcoz can monitor content saved to the clipboard.
|
Clipboard Data
|
Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.
|
Clipboard Data
|
During Operation Wocao, threat actors collected clipboard data in plaintext.
|
Clipboard Data
|
Remcos steals and modifies data from the clipboard.
|
Clipboard Data
|
Remexi collects text from the clipboard.
|
Clipboard Data
|
ROKRAT can extract clipboard data from a compromised host.
|
Clipboard Data
|
It collects data from the clipboard.
|
Clipboard Data
|
RunningRAT contains code to open and copy data from the clipboard.
|
Clipboard Data
|
TajMahal has the ability to steal data from the clipboard of an infected host.
|
Clipboard Data
|
TinyZBot contains functionality to collect information from the clipboard.
|
Clipboard Data
|
VERMIN collects data stored in the clipboard.
|
Clipboard Data
|
Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect.
|
Data from Cloud Storage
|
AADInternals can collect files from a user’s OneDrive.
|
Data from Cloud Storage
|
During C0027, It accessed victim OneDrive environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides.
|
Data from Cloud Storage
|
It has obtained files from the victim's cloud storage instances.
|
Data from Cloud Storage
|
Pacu can enumerate and download files stored in AWS storage services, such as S3 buckets.
|
Data from Cloud Storage
|
Peirates can dump the contents of AWS S3 buckets. It can also retrieve service account tokens from kOps buckets in Google Cloud Storage or S3.
|
Data from Information Repositories
|
It has collected files from various information repositories.
|
Data from Information Repositories
|
It has collected schemas and user accounts from systems running SQL Server.
|
Data from Information Repositories
|
It has accessed victim security and IT environments and Microsoft Teams to mine valuable information.
|
Data from Information Repositories
|
It has searched a victim's network for organization collaboration channels like MS Teams or Slack to discover further high-privilege account credentials.
|
Data from Information Repositories
|
P.A.S. Webshell has the ability to list and extract data from SQL databases.
|
Data from Information Repositories
|
During the SolarWinds Compromise, It accessed victims' internal knowledge repositories (wikis) to view sensitive corporate information on products, services, and internal business operations.
|
Data from Information Repositories
|
It has used a custom .NET tool to collect documents from an organization's internal central database.
|
Data from Information Repositories:Confluence
|
It has searched a victim's network for collaboration platforms like Confluence and JIRA to discover further high-privilege account credentials.
|
Data from Information Repositories:Sharepoint
|
It has collected information from Microsoft SharePoint services within target networks.
|
Data from Information Repositories:Sharepoint
|
During C0027, It accessed victim SharePoint environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides.
|
Data from Information Repositories:Sharepoint
|
It has collected documents from the victim's SharePoint.
|
Data from Information Repositories:Sharepoint
|
It used a SharePoint enumeration and data dumping tool known as spwebmember.
|
Data from Information Repositories:Sharepoint
|
It has searched a victim's network for collaboration platforms like SharePoint to discover further high-privilege account credentials.
|
Data from Information Repositories:Sharepoint
|
spwebmember is used to enumerate and dump information from Microsoft SharePoint.
|
Data from Information Repositories:Code Repositories
|
It has searched a victim's network for code repositories like GitLab and GitHub to discover further high-privilege account credentials.
|
Data from Information Repositories:Code Repositories
|
During the SolarWinds Compromise, It downloaded source code from code repositories.
|
Data from Local System
|
Action RAT can collect local data from an infected machine.
|
Data from Local System
|
Amadey can collect information from a compromised host.
|
Data from Local System
|
It has collected large numbers of files from compromised network systems for later extraction.
|
Data from Local System
|
AppleSeed can collect data on a compromised host.
|
Data from Local System
|
It has collected files from a local victim.
|
Data from Local System
|
It has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.
|
Data from Local System
|
It has stolen data from compromised hosts.
|
Data from Local System
|
It will identify Microsoft Office documents on the victim's computer.
|
Data from Local System
|
It has collected data from victims' local systems.
|
Data from Local System
|
It has collected data from a compromised host.
|
Data from Local System
|
It has used various tools to steal files from the compromised host.
|
Data from Local System
|
It has uploaded files and data from a compromised host.
|
Data from Local System
|
AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine.
|
Data from Local System
|
It has collected data from a compromised network.
|
Data from Local System
|
BADFLICK has uploaded files from victims' machines.
|
Data from Local System
|
When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.
|
Data from Local System
|
BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.
|
Data from Local System
|
Bandook can collect local files from the system .
|
Data from Local System
|
Bankshot collects files from the local system.
|
Data from Local System
|
Bazar can retrieve information from the infected machine.
|
Data from Local System
|
Bisonal has collected information from a compromised host.
|
Data from Local System
|
BlackMould can copy files on a compromised host.
|
Data from Local System
|
BLINDINGCAN has uploaded files from victim machines.
|
Data from Local System
|
BoxCaon can upload files from a compromised host.
|
Data from Local System
|
It has exfiltrated files stolen from local systems.
|
Data from Local System
|
Brute Ratel C4 has the ability to upload files from a compromised system.
|
Data from Local System
|
Bumblebee can capture and compress stolen credentials from the Registry and volume shadow copies.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.