prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Indicator Removal:Clear Windows Event Logs
|
It has used Cobalt Strike to empty log files.
|
Indicator Removal:Clear Windows Event Logs
|
KillDisk deletes Application, Security, Setup, and System Windows Event Logs.
|
Indicator Removal:Clear Windows Event Logs
|
Lucifer can clear and remove event logs.
|
Indicator Removal:Clear Windows Event Logs
|
Mafalda can delete Windows Event logs by invoking the OpenEventLogW and ClearEventLogW functions.
|
Indicator Removal:Clear Windows Event Logs
|
Meteor can use Wevtutil to remove Security, System and Application Event Viewer logs.
|
Indicator Removal:Clear Windows Event Logs
|
NotPetya uses wevtutil to clear the Windows event logs.
|
Indicator Removal:Clear Windows Event Logs
|
Olympic Destroyer will attempt to clear the System and Security event logs using wevtutil.
|
Indicator Removal:Clear Windows Event Logs
|
During Operation Wocao, the threat actors deleted all Windows system and security event logs using /Q /c wevtutil cl system and /Q /c wevtutil cl security.
|
Indicator Removal:Clear Windows Event Logs
|
Pupy has a module to clear event logs with PowerShell.
|
Indicator Removal:Clear Windows Event Logs
|
RunningRAT contains code to clear event logs.
|
Indicator Removal:Clear Windows Event Logs
|
SynAck clears event logs.
|
Indicator Removal:Clear Windows Event Logs
|
Wevtutil can be used to clear system and security event logs from the system.
|
Indicator Removal:Clear Windows Event Logs
|
ZxShell has a command to clear system event logs.
|
Indicator Removal:Clear Linux or Mac System Logs
|
MacMa can clear possible malware traces such as application logs.
|
Indicator Removal:Clear Linux or Mac System Logs
|
Proton removes logs from /var/logs and /Library/logs.
|
Indicator Removal:Clear Linux or Mac System Logs
|
It has cleared log files within the /var/log/ folder.
|
Indicator Removal:Clear Linux or Mac System Logs
|
It has removed system logs from /var/log/syslog.
|
Indicator Removal:Clear Command History
|
It attempted to remove evidence of some of its activity by deleting Bash histories.
|
Indicator Removal:Clear Command History
|
Hildegard has used history -c to clear script shell logs.
|
Indicator Removal:Clear Command History
|
Kobalos can remove all command history on compromised hosts.
|
Indicator Removal:Clear Command History
|
It has routinely deleted log files on a compromised router, including automatic log deletion through the use of the logrotate utility.
|
Indicator Removal:Clear Command History
|
It has removed mailbox export requests from compromised Exchange servers.
|
Indicator Removal:Clear Command History
|
It has used Wevtutil to remove PowerShell execution logs.
|
Indicator Removal:Clear Command History
|
It has cleared command history with history -c.
|
Indicator Removal:File Deletion
|
During the 2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself after FONTCACHE.DAT, rundll32.exe, and the associated .lnk file is delivered.
|
Indicator Removal:File Deletion
|
ADVSTORESHELL can delete files and directories.
|
Indicator Removal:File Deletion
|
Anchor can self delete its dropper after the malware is successfully deployed.
|
Indicator Removal:File Deletion
|
AppleJeus has deleted the MSI file after installation.
|
Indicator Removal:File Deletion
|
AppleSeed can delete files from a compromised host after they are exfiltrated.
|
Indicator Removal:File Deletion
|
It actors deleted tools and batch files from victim systems.
|
Indicator Removal:File Deletion
|
It has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.
|
Indicator Removal:File Deletion
|
It has used SDelete to remove artifacts from victim networks.
|
Indicator Removal:File Deletion
|
It has a tool that can delete files.
|
Indicator Removal:File Deletion
|
It's macOS backdoor can receive a "delete" command.
|
Indicator Removal:File Deletion
|
It has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process.
|
Indicator Removal:File Deletion
|
It has used malware to delete files after they are deployed on a compromised host.
|
Indicator Removal:File Deletion
|
It deleted files from the system.
|
Indicator Removal:File Deletion
|
It has deleted malicious executables from compromised machines.
|
Indicator Removal:File Deletion
|
Aria-body has the ability to delete files and directories on compromised hosts.
|
Indicator Removal:File Deletion
|
Attor’s plugin deletes the collected files and log files after exfiltration.
|
Indicator Removal:File Deletion
|
AuditCred can delete files from the system.
|
Indicator Removal:File Deletion
|
Azorult can delete files from victim machines.
|
Indicator Removal:File Deletion
|
BabyShark has cleaned up all files associated with the secondary payload execution.
|
Indicator Removal:File Deletion
|
BackConfig has the ability to remove files and folders related to previous infections.
|
Indicator Removal:File Deletion
|
Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim.
|
Indicator Removal:File Deletion
|
BADHATCH has the ability to delete PowerShell scripts from a compromised machine.
|
Indicator Removal:File Deletion
|
Bandook has a command to delete a file.
|
Indicator Removal:File Deletion
|
Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system.
|
Indicator Removal:File Deletion
|
Bazar can delete its loader using a batch file in the Windows temporary folder.
|
Indicator Removal:File Deletion
|
BBSRAT can delete files and directories.
|
Indicator Removal:File Deletion
|
Bisonal will delete its dropper and VBS scripts from the victim’s machine.
|
Indicator Removal:File Deletion
|
BLACKCOFFEE has the capability to delete files.
|
Indicator Removal:File Deletion
|
BLINDINGCAN has deleted itself and associated artifacts from victim machines.
|
Indicator Removal:File Deletion
|
BLUELIGHT can uninstall itself.
|
Indicator Removal:File Deletion
|
The It uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated.
|
Indicator Removal:File Deletion
|
Bumblebee can uninstall its loader through the use of a Sdl command.
|
Indicator Removal:File Deletion
|
Calisto has the capability to use rm -rf to remove folders and files from the victim's machine.
|
Indicator Removal:File Deletion
|
It has a command to delete files.
|
Indicator Removal:File Deletion
|
Cardinal RAT can uninstall itself, including deleting its executable.
|
Indicator Removal:File Deletion
|
CARROTBAT has the ability to delete downloaded files from a compromised host.
|
Indicator Removal:File Deletion
|
ccf32 can delete files and folders from compromised machines.
|
Indicator Removal:File Deletion
|
CharmPower can delete created files from a compromised system.
|
Indicator Removal:File Deletion
|
Recent versions of Cherry Picker delete files and registry keys created by the malware.
|
Indicator Removal:File Deletion
|
It has performed file deletion to evade detection.
|
Indicator Removal:File Deletion
|
cmd can be used to delete files from the file system.
|
Indicator Removal:File Deletion
|
It deleted the DLL dropper from the victim’s machine to cover their tracks.
|
Indicator Removal:File Deletion
|
Crimson has the ability to delete files from a compromised host.
|
Indicator Removal:File Deletion
|
Cryptoistic has the ability delete files from a compromised host.
|
Indicator Removal:File Deletion
|
CSPY Downloader has the ability to self delete.
|
Indicator Removal:File Deletion
|
Cuba can use the command cmd.exe /c del to delete its artifacts from the system.
|
Indicator Removal:File Deletion
|
DanBot can delete its configuration file after installation.
|
Indicator Removal:File Deletion
|
DarkWatchman has been observed deleting its original launcher after installation.
|
Indicator Removal:File Deletion
|
Denis has a command to delete files from the victim’s machine.
|
Indicator Removal:File Deletion
|
Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes.
|
Indicator Removal:File Deletion
|
It has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.
|
Indicator Removal:File Deletion
|
Drovorub can delete specific files from a compromised host.
|
Indicator Removal:File Deletion
|
Dtrack can remove its persistence and delete itself.
|
Indicator Removal:File Deletion
|
DustySky can delete files it creates from the infected system.
|
Indicator Removal:File Deletion
|
ECCENTRICBANDWAGON can delete log files generated from the malware stored at C:\windows\temp\tmp0207.
|
Indicator Removal:File Deletion
|
Elise is capable of launching a remote shell on the host to delete itself.
|
Indicator Removal:File Deletion
|
Epic has a command to delete a file from the machine.
|
Indicator Removal:File Deletion
|
EvilBunny has deleted the initial dropper after running through the environment checks.
|
Indicator Removal:File Deletion
|
It has deleted files used during infection.
|
Indicator Removal:File Deletion
|
Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file.
|
Indicator Removal:File Deletion
|
FALLCHILL can delete malware and associated artifacts from the victim.
|
Indicator Removal:File Deletion
|
FatDuke can secure delete its DLL.
|
Indicator Removal:File Deletion
|
FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components.
|
Indicator Removal:File Deletion
|
Ferocious can delete files from a compromised host.
|
Indicator Removal:File Deletion
|
It has used batch scripts and scheduled tasks to delete critical system files.
|
Indicator Removal:File Deletion
|
It uses SDelete to clean up the environment and attempt to prevent detection.
|
Indicator Removal:File Deletion
|
It has removed files from victim machines.
|
Indicator Removal:File Deletion
|
It has deleted tmp and prefetch files during post compromise cleanup activities. It has also deleted PowerShell scripts to evade detection on compromised machines.
|
Indicator Removal:File Deletion
|
FlawedAmmyy can execute batch scripts to delete files.
|
Indicator Removal:File Deletion
|
FruitFly will delete files on the system.
|
Indicator Removal:File Deletion
|
FunnyDream can delete files including its dropper component.
|
Indicator Removal:File Deletion
|
Fysbis has the ability to delete files.
|
Indicator Removal:File Deletion
|
It tools can delete files used during an operation.
|
Indicator Removal:File Deletion
|
Gazer has commands to delete files and persistence mechanisms from the victim.
|
Indicator Removal:File Deletion
|
Gelsemium can delete its dropper component from the targeted system.
|
Indicator Removal:File Deletion
|
gh0st RAT has the capability to to delete files.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.