prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Software Discovery:Security Software Discovery
|
The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list, the dropper will exit.
|
Software Discovery:Security Software Discovery
|
Crimson contains a command to collect information about anti-virus software on the victim.
|
Software Discovery:Security Software Discovery
|
It has searched for anti-malware strings and anti-virus processes running on the system.
|
Software Discovery:Security Software Discovery
|
DarkTortilla can check for the Kaspersky Anti-Virus suite.
|
Software Discovery:Security Software Discovery
|
DarkWatchman can search for anti-virus products on the system.
|
Software Discovery:Security Software Discovery
|
down_new has the ability to detect anti-virus products and processes on a compromised host.
|
Software Discovery:Security Software Discovery
|
DustySky checks for the existence of anti-virus.
|
Software Discovery:Security Software Discovery
|
Empire can enumerate antivirus software on the target.
|
Software Discovery:Security Software Discovery
|
Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them.
|
Software Discovery:Security Software Discovery
|
EvilBunny has been observed querying installed antivirus software.
|
Software Discovery:Security Software Discovery
|
EVILNUM can search for anti-virus products on the system.
|
Software Discovery:Security Software Discovery
|
Felismus checks for processes associated with anti-virus vendors.
|
Software Discovery:Security Software Discovery
|
FELIXROOT checks for installed security software like antivirus and firewall.
|
Software Discovery:Security Software Discovery
|
Ferocious has checked for AV software as part of its persistence process.
|
Software Discovery:Security Software Discovery
|
It has used Registry keys to detect and avoid executing in potential sandboxes.
|
Software Discovery:Security Software Discovery
|
FinFisher probes the system to check for antimalware processes.
|
Software Discovery:Security Software Discovery
|
Flame identifies security software such as antivirus through the Security module.
|
Software Discovery:Security Software Discovery
|
FlawedAmmyy will attempt to detect anti-virus products during the initial infection.
|
Software Discovery:Security Software Discovery
|
During Frankenstein, the threat actors used WMI queries to determine if analysis tools were running on a compromised system.
|
Software Discovery:Security Software Discovery
|
FunnyDream can identify the processes for Bkav antivirus.
|
Software Discovery:Security Software Discovery
|
Gelsemium can check for the presence of specific security products.
|
Software Discovery:Security Software Discovery
|
Gold Dragon checks for anti-malware products and processes.
|
Software Discovery:Security Software Discovery
|
Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections.
|
Software Discovery:Security Software Discovery
|
InvisiMole can check for the presence of network sniffers, AV, and BitDefender firewall.
|
Software Discovery:Security Software Discovery
|
JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.
|
Software Discovery:Security Software Discovery
|
jRAT can list security software, such as by using WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details.
|
Software Discovery:Security Software Discovery
|
Kasidet has the ability to identify any anti-virus installed on the infected system.
|
Software Discovery:Security Software Discovery
|
It has checked for the presence of antivirus software with powershell Get-CimInstance -Namespace root/securityCenter2 – classname antivirusproduct.
|
Software Discovery:Security Software Discovery
|
LiteDuke has the ability to check for the presence of Kaspersky security software.
|
Software Discovery:Security Software Discovery
|
LitePower can identify installed AV software.
|
Software Discovery:Security Software Discovery
|
Lizar can search for processes associated with an anti-virus product from list.
|
Software Discovery:Security Software Discovery
|
Mafalda can search for a variety of security software programs, EDR systems, and malware analysis tools.
|
Software Discovery:Security Software Discovery
|
MarkiRAT can check for running processes on the victim’s machine to look for Kaspersky and Bitdefender antivirus products.
|
Software Discovery:Security Software Discovery
|
Metamorfo collects a list of installed antivirus software from the victim’s system.
|
Software Discovery:Security Software Discovery
|
Meteor has the ability to search for Kaspersky Antivirus on a victim's machine.
|
Software Discovery:Security Software Discovery
|
Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI.
|
Software Discovery:Security Software Discovery
|
MoleNet can use WMI commands to check the system for firewall and antivirus software.
|
Software Discovery:Security Software Discovery
|
More_eggs can obtain information on installed anti-malware programs.
|
Software Discovery:Security Software Discovery
|
Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system.
|
Software Discovery:Security Software Discovery
|
It has used malware to check running processes against a hard-coded list of security tools often used by malware researchers.
|
Software Discovery:Security Software Discovery
|
It uses commands such as netsh advfirewall firewall to discover local firewall settings.
|
Software Discovery:Security Software Discovery
|
netsh can be used to discover system firewall settings.
|
Software Discovery:Security Software Discovery
|
Netwalker can detect and terminate active security software-related processes on infected systems.
|
Software Discovery:Security Software Discovery
|
NotPetya determines if specific antivirus programs are running on an infected host machine.
|
Software Discovery:Security Software Discovery
|
During Operation Wocao, threat actors used scripts to detect security software.
|
Software Discovery:Security Software Discovery
|
Pacu can enumerate AWS security services, including WAF rules and GuardDuty detectors.
|
Software Discovery:Security Software Discovery
|
It scanned the "Program Files" directories for a directory with the string "Total Security" (the installation path of the "360 Total Security" antivirus tool).
|
Software Discovery:Security Software Discovery
|
PipeMon can check for the presence of ESET and Kaspersky security software.
|
Software Discovery:Security Software Discovery
|
POWERSTATS has detected security tools.
|
Software Discovery:Security Software Discovery
|
POWRUNER may collect information on the victim's anti-virus software.
|
Software Discovery:Security Software Discovery
|
A module in Prikormka collects information from the victim about installed anti-virus software.
|
Software Discovery:Security Software Discovery
|
PUNCHBUGGY can gather AVs registered in the system.
|
Software Discovery:Security Software Discovery
|
QakBot can identify the installed antivirus product on a targeted system.
|
Software Discovery:Security Software Discovery
|
Remsec has a plugin detect security products via active drivers.
|
Software Discovery:Security Software Discovery
|
It used scripts which detected and uninstalled antivirus software.
|
Software Discovery:Security Software Discovery
|
RogueRobin enumerates running processes to search for Wireshark and Windows Sysinternals suite.
|
Software Discovery:Security Software Discovery
|
It can obtain information about security software on the victim.
|
Software Discovery:Security Software Discovery
|
It uses a loader DLL file to collect AV product names from an infected host.
|
Software Discovery:Security Software Discovery
|
It has used the Windows service winmgmts:\.\root\SecurityCenter2 to check installed antivirus products.
|
Software Discovery:Security Software Discovery
|
SILENTTRINITY can determine if an anti-virus product is installed through the resolution of the service's virtual SID.
|
Software Discovery:Security Software Discovery
|
Skidmap has the ability to check if /usr/sbin/setenforce exists. This file controls what mode SELinux is in.
|
Software Discovery:Security Software Discovery
|
SpicyOmelette can check for the presence of 29 different antivirus tools.
|
Software Discovery:Security Software Discovery
|
StoneDrill can check for antivirus and antimalware programs.
|
Software Discovery:Security Software Discovery
|
StreamEx has the ability to scan for security tools such as firewalls and antivirus tools.
|
Software Discovery:Security Software Discovery
|
StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload.
|
Software Discovery:Security Software Discovery
|
Stuxnet enumerates the currently running processes related to a variety of security products.
|
Software Discovery:Security Software Discovery
|
SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.
|
Software Discovery:Security Software Discovery
|
T9000 performs checks for various antivirus and security products during installation.
|
Software Discovery:Security Software Discovery
|
It has used tools to search victim systems for security products such as antivirus and firewall software.
|
Software Discovery:Security Software Discovery
|
TajMahal has the ability to identify which anti-virus products, firewalls, and anti-spyware products are in use.
|
Software Discovery:Security Software Discovery
|
Tasklist can be used to enumerate security software currently running on a system by process name of known products.
|
Software Discovery:Security Software Discovery
|
It has searched for security products on infected machines.
|
Software Discovery:Security Software Discovery
|
It has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.
|
Software Discovery:Security Software Discovery
|
ThiefQuest uses the kill_unwanted function to get a list of running processes, compares each process with an encrypted list of "unwanted" security related programs, and kills the processes for security related programs.
|
Software Discovery:Security Software Discovery
|
It can search for anti-virus software running on the system.
|
Software Discovery:Security Software Discovery
|
It has obtained information on security software, including security logging information that may indicate whether their malware has been detected.
|
Software Discovery:Security Software Discovery
|
Valak can determine if a compromised host has security products installed.
|
Software Discovery:Security Software Discovery
|
VERMIN uses WMI to check for anti-virus software installed on the system.
|
Software Discovery:Security Software Discovery
|
Waterbear can find the presence of a specific security software.
|
Software Discovery:Security Software Discovery
|
WhisperGate can recognize the presence of monitoring tools on a target system.
|
Software Discovery:Security Software Discovery
|
It has used malware to identify installed AV and commonly used forensic and malware analysis tools.
|
Software Discovery:Security Software Discovery
|
Wingbird checks for the presence of Bitdefender security software.
|
Software Discovery:Security Software Discovery
|
It has used WMI to identify anti-virus products installed on a victim's machine.
|
Software Discovery:Security Software Discovery
|
Woody RAT can detect Avast Software, Doctor Web, Kaspersky, AVG, ESET, and Sophos antivirus programs.
|
Software Discovery:Security Software Discovery
|
xCaon has checked for the existence of Kaspersky antivirus software on the system.
|
Software Discovery:Security Software Discovery
|
XCSSET searches firewall configuration files located in /Library/Preferences/ and uses csrutil status to determine if System Integrity Protection is enabled.
|
Software Discovery:Security Software Discovery
|
YAHOYAH checks for antimalware solution processes on the system.
|
Software Discovery:Security Software Discovery
|
Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.
|
Software Discovery:Security Software Discovery
|
ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.
|
System Information Discovery
|
4H RAT sends an OS version identifier in its beacons.
|
System Information Discovery
|
Action RAT has the ability to collect the hostname, OS version, and OS architecture of an infected host.
|
System Information Discovery
|
It actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: ver >> %temp%\download systeminfo >> %temp%\download
|
System Information Discovery
|
ADVSTORESHELL can run Systeminfo to gather information about the victim.
|
System Information Discovery
|
Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system.
|
System Information Discovery
|
Amadey has collected the computer name and OS version from a compromised machine.
|
System Information Discovery
|
Anchor can determine the hostname and linux version on a compromised host.
|
System Information Discovery
|
AppleJeus has collected the victim host information after infection.
|
System Information Discovery
|
AppleSeed can identify the OS version of a targeted system.
|
System Information Discovery
|
It can collect system information from the victim’s machine.
|
System Information Discovery
|
It collected system architecture information. It used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.