prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Hide Artifacts
|
OSX/Shlayer has used the mktemp utility to make random and unique filenames for payloads, such as export tmpDir="$(mktemp -d /tmp/XXXXXXXXXXXX)" or mktemp -t Installer.
|
Hide Artifacts
|
Tarrask is able to create "hidden" scheduled tasks by deleting the Security Descriptor (SD) registry value.
|
Hide Artifacts
|
WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide it's attempts to elevate privileges through IFileOperation.
|
Hide Artifacts:Hidden Files and Directories
|
Agent Tesla has created hidden folders.
|
Hide Artifacts:Hidden Files and Directories
|
AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings.
|
Hide Artifacts:Hidden Files and Directories
|
It has saved files with hidden file attributes.
|
Hide Artifacts:Hidden Files and Directories
|
It's macOS backdoor hides the clientID file via a chflags function.
|
Hide Artifacts:Hidden Files and Directories
|
Attor can set attributes of log files and directories to HIDDEN, SYSTEM, ARCHIVE, or a combination of those.
|
Hide Artifacts:Hidden Files and Directories
|
BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view.
|
Hide Artifacts:Hidden Files and Directories
|
Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.
|
Hide Artifacts:Hidden Files and Directories
|
Carberp has created a hidden file in the Startup folder of the current user.
|
Hide Artifacts:Hidden Files and Directories
|
ccf32 has created a hidden directory on targeted systems, naming it after the current local time (year, month, and day).
|
Hide Artifacts:Hidden Files and Directories
|
Clambling has the ability to set its file attributes to hidden.
|
Hide Artifacts:Hidden Files and Directories
|
CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc, /private/tmp/.info.py, /private/tmp/.server.sh, ~/Library/LaunchAgents/.espl.plist, ~/Library/Containers/.[random string]/[random string].
|
Hide Artifacts:Hidden Files and Directories
|
Dacls has had its payload named with a dot prefix to make it hidden from view in the Finder application.
|
Hide Artifacts:Hidden Files and Directories
|
EnvyScout can use hidden directories and files to hide malicious executables.
|
Hide Artifacts:Hidden Files and Directories
|
Explosive has commonly set file and path attributes to hidden.
|
Hide Artifacts:Hidden Files and Directories
|
It has created hidden files and folders within a compromised Linux system /tmp directory. It also has used attrib.exe to hide gathered local host information.
|
Hide Artifacts:Hidden Files and Directories
|
FruitFly saves itself with a leading "." to make it a hidden file.
|
Hide Artifacts:Hidden Files and Directories
|
It has hidden files on a compromised host.
|
Hide Artifacts:Hidden Files and Directories
|
iKitten saves itself with a leading "." so that it's hidden from users by default.
|
Hide Artifacts:Hidden Files and Directories
|
Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden.
|
Hide Artifacts:Hidden Files and Directories
|
InvisiMole can create hidden system directories.
|
Hide Artifacts:Hidden Files and Directories
|
Ixeshe sets its own executable file's attributes to hidden.
|
Hide Artifacts:Hidden Files and Directories
|
The Komplex payload is stored in a hidden directory at /Users/Shared/.local/kextd.
|
Hide Artifacts:Hidden Files and Directories
|
It has used a VBA Macro to set its file attributes to System and Hidden and has named files with a dot prefix to hide them from the Finder application.
|
Hide Artifacts:Hidden Files and Directories
|
Lokibot has the ability to copy itself to a hidden file and directory.
|
Hide Artifacts:Hidden Files and Directories
|
LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to "hidden".
|
Hide Artifacts:Hidden Files and Directories
|
It has used malware to store malicious binaries in hidden directories on victim's USB drives.
|
Hide Artifacts:Hidden Files and Directories
|
It has the capability to exfiltrate stolen data to a hidden folder on a removable drive.
|
Hide Artifacts:Hidden Files and Directories
|
MacSpy stores itself in ~/Library/.DS_Stores/
|
Hide Artifacts:Hidden Files and Directories
|
Micropsia creates a new hidden directory to store all components' outputs in a dedicated sub-folder for each.
|
Hide Artifacts:Hidden Files and Directories
|
It's PlugX variant has created a hidden folder on USB drives named RECYCLE.BIN to store malicious executables and collected data.
|
Hide Artifacts:Hidden Files and Directories
|
NETWIRE can copy itself to and launch itself from hidden folders.
|
Hide Artifacts:Hidden Files and Directories
|
Before exfiltration, Okrum's backdoor has used hidden files to store logs and outputs from backdoor commands.
|
Hide Artifacts:Hidden Files and Directories
|
OSX/Shlayer has executed a .command script from a hidden directory in a mounted DMG.
|
Hide Artifacts:Hidden Files and Directories
|
OSX_OCEANLOTUS.D sets the main loader file’s attributes to hidden.
|
Hide Artifacts:Hidden Files and Directories
|
PlugX can modify the characteristics of folders to hide them from the compromised user.
|
Hide Artifacts:Hidden Files and Directories
|
PoetRAT has the ability to hide and unhide files.
|
Hide Artifacts:Hidden Files and Directories
|
QakBot has placed its payload in hidden subdirectories.
|
Hide Artifacts:Hidden Files and Directories
|
QuasarRAT has the ability to set file attributes to "hidden" to hide files from the compromised user's view in Windows File Explorer.
|
Hide Artifacts:Hidden Files and Directories
|
Rising Sun can modify file attributes to hide files.
|
Hide Artifacts:Hidden Files and Directories
|
It downloaded a file "libprocesshider", which could hide files on the target system.
|
Hide Artifacts:Hidden Files and Directories
|
SLOTHFULMEDIA has been created with a hidden attribute to insure it's not visible to the victim.
|
Hide Artifacts:Hidden Files and Directories
|
SysUpdate has the ability to set file attributes to hidden.
|
Hide Artifacts:Hidden Files and Directories
|
ThiefQuest hides a copy of itself in the user's ~/Library directory by using a . at the beginning of the file name followed by 9 random characters.
|
Hide Artifacts:Hidden Files and Directories
|
It can hide legitimate directories and replace them with malicious copies of the same name.
|
Hide Artifacts:Hidden Files and Directories
|
It has created a hidden directory under C:\ProgramData\Apple\Updates\ and C:\Users\Public\Documents\Flash\.
|
Hide Artifacts:Hidden Files and Directories
|
WannaCry uses attrib +h to make some of its files hidden.
|
Hide Artifacts:Hidden Files and Directories
|
WastedLocker has copied a random file from the Windows System32 folder to the %APPDATA% location under a different hidden filename.
|
Hide Artifacts:Hidden Files and Directories
|
XCSSET uses a hidden folder named .xcassets and .git to embed itself in Xcode.
|
Hide Artifacts:Hidden Users
|
It has modified the Registry to hide created user accounts.
|
Hide Artifacts:Hidden Users
|
It has run reg add ‘HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList’ /v to hide a newly created user.
|
Hide Artifacts:Hidden Users
|
SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen.
|
Hide Artifacts:Hidden Window
|
Agent Tesla has used ProcessWindowStyle.Hidden to hide windows.
|
Hide Artifacts:Hidden Window
|
It used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.
|
Hide Artifacts:Hidden Window
|
It has used the WindowStyle parameter to conceal PowerShell windows.
|
Hide Artifacts:Hidden Window
|
It has been known to use -WindowStyle Hidden to conceal PowerShell windows.
|
Hide Artifacts:Hidden Window
|
It has used the WindowStyle parameter to conceal PowerShell windows.
|
Hide Artifacts:Hidden Window
|
Astaroth loads its module with the XSL script parameter vShow set to zero, which opens the application with a hidden window.
|
Hide Artifacts:Hidden Window
|
AsyncRAT can hide the execution of scheduled tasks using ProcessWindowStyle.Hidden.
|
Hide Artifacts:Hidden Window
|
AvosLocker has hidden its console window by using the ShowWindow API function.
|
Hide Artifacts:Hidden Window
|
BONDUPDATER uses -windowstyle hidden to conceal a PowerShell window that downloads a payload.
|
Hide Artifacts:Hidden Window
|
It has used -w hidden and -windowstyle hidden to conceal PowerShell windows.
|
Hide Artifacts:Hidden Window
|
Cuba has executed hidden PowerShell windows.
|
Hide Artifacts:Hidden Window
|
It has used -WindowStyle Hidden to conceal PowerShell windows.
|
Hide Artifacts:Hidden Window
|
It has used -w hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.
|
Hide Artifacts:Hidden Window
|
It has used hidcon to run batch files in a hidden console window.
|
Hide Artifacts:Hidden Window
|
It has used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.
|
Hide Artifacts:Hidden Window
|
HAMMERTOSS has used -WindowStyle hidden to conceal PowerShell windows.
|
Hide Artifacts:Hidden Window
|
It used a payload that creates a hidden window.
|
Hide Artifacts:Hidden Window
|
HotCroissant has the ability to hide the window for operations performed on a given file.
|
Hide Artifacts:Hidden Window
|
InvisiMole has executed legitimate tools in hidden windows.
|
Hide Artifacts:Hidden Window
|
Kevin can hide the current window from the targeted user via the ShowWindow API function.
|
Hide Artifacts:Hidden Window
|
KeyBoy uses -w Hidden to conceal a PowerShell window that downloads a payload.
|
Hide Artifacts:Hidden Window
|
It has used an information gathering module that will hide an AV software window from the victim.
|
Hide Artifacts:Hidden Window
|
Kivars has the ability to conceal its activity through hiding active windows.
|
Hide Artifacts:Hidden Window
|
Koadic has used the command Powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden to hide its window.
|
Hide Artifacts:Hidden Window
|
KOCTOPUS has used -WindowsStyle Hidden to hide the command window.
|
Hide Artifacts:Hidden Window
|
It malware has a function to determine whether the C2 server wishes to execute the newly dropped file in a hidden window.
|
Hide Artifacts:Hidden Window
|
MCMD can modify processes to prevent them from being visible on the desktop.
|
Hide Artifacts:Hidden Window
|
Metamorfo has hidden its GUI using the ShowWindow() WINAPI call.
|
Hide Artifacts:Hidden Window
|
Meteor can hide its console window upon execution to decrease its visibility to a victim.
|
Hide Artifacts:Hidden Window
|
It executed PowerShell in a hidden window.
|
Hide Artifacts:Hidden Window
|
PowerShower has added a registry key so future powershell.exe instances are spawned with coordinates for a window position off-screen by default.
|
Hide Artifacts:Hidden Window
|
QuasarRAT can hide process windows and make web requests invisible to the compromised user. Requests marked as invisible have been sent with user-agent string Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A though QuasarRAT can only be run on Windows systems.
|
Hide Artifacts:Hidden Window
|
QUIETCANARY can execute processes in a hidden window.
|
Hide Artifacts:Hidden Window
|
QuietSieve has the ability to execute payloads in a hidden window.
|
Hide Artifacts:Hidden Window
|
SharpDisco can hide windows using ProcessWindowStyle.Hidden.
|
Hide Artifacts:Hidden Window
|
SILENTTRINITY has the ability to set its window state to hidden.
|
Hide Artifacts:Hidden Window
|
Snip3 can execute PowerShell scripts in a hidden window.
|
Hide Artifacts:Hidden Window
|
StrongPity has the ability to hide the console window for its document search module from the user.
|
Hide Artifacts:Hidden Window
|
Ursnif droppers have used COM properties to execute malware in hidden windows.
|
Hide Artifacts:Hidden Window
|
WindTail can instruct the OS to execute an application without a dock icon or menu.
|
Hide Artifacts:NTFS File Attributes
|
Anchor has used NTFS to hide files.
|
Hide Artifacts:NTFS File Attributes
|
It used NTFS alternate data streams to hide their payloads.
|
Hide Artifacts:NTFS File Attributes
|
Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads.
|
Hide Artifacts:NTFS File Attributes
|
BitPaymer has copied itself to the :bin alternate data stream of a newly created file.
|
Hide Artifacts:NTFS File Attributes
|
The DEADEYE.EMBED variant of DEADEYE can embed its payload in an alternate data stream of a local file.
|
Hide Artifacts:NTFS File Attributes
|
esentutl can be used to read and write alternate data streams.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.