text1
stringlengths
7
2.5k
labels
stringlengths
9
100
During Night Dragon, threat actors used dynamic DNS services for C2.
['T1568']
For Operation Spalax, the threat actors used dynamic DNS services, including Duck DNS and DNS Exit, as part of their C2 infrastructure.
['T1568']
Gamaredon Group has incorporated dynamic DNS domains in its infrastructure.
['T1568']
Gelsemium can use dynamic DNS domain names in C2.
['T1568']
Gelsemium has used dynamic DNS in its C2 infrastructure.
['T1568']
NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2.
['T1568']
Tomiris has connected to a signalization server that provides a URL and port, and then Tomiris sends a GET request to that URL to establish C2.
['T1568']
UNC2452 used dynamic DNS resolution to construct and resolve to randomly-generated subdomains for C2.
['T1568']
Machete has used free dynamic DNS domains for C2.
['T1568.001']
TA505 has used fast flux to mask botnets by distributing payloads across multiple IPs.
['T1568.001']
gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses.
['T1568.001']
njRAT has used a fast flux DNS for C2 IP resolution.
['T1568.001']
Bazar can implement DGA using the current date as a seed variable.
['T1568.002']
CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.
['T1568.002']
CHOPSTICK can use a DGA for Fallback Channels, domains are generated by concatenating words from lists.
['T1568.002']
Conficker has used a DGA that seeds with the current UTC victim system date to generate domains.
['T1568.002']
DarkWatchman has used a DGA to generate a domain name for C2.
['T1568.002']
Ebury has used a DGA to generate a domain name for C2.
['T1568.002']
MiniDuke can use DGA to generate new Twitter URLs for C2.
['T1568.002']
Ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours.
['T1568.002']
QakBot can use domain generation algorithms in C2 communication.
['T1568.002']
ShadowPad uses a DGA that is based on the day of the month for C2 servers.
['T1568.002']
Shark can send DNS C2 communications using a unique domain generation algorithm.
['T1568.002']
SombRAT can use a custom DGA to generate a subdomain for C2.
['T1568.002']
TA551 has used a DGA to generate URLs from executed macros.
['T1568.002']
TeamTNT has created system services to execute cryptocurrency mining software.
['T1569']
AppleJeus has loaded a plist file using the "launchctl" command.
['T1569.001']
Calisto uses launchctl to enable screen sharing on the victim’s machine.
['T1569.001']
XCSSET loads a system level launchdaemon using the "launchctl load -w" command from "/System/Librarby/LaunchDaemons/ssh.plist".
['T1569.001']
macOS.OSAMiner has used `launchctl` to restart the Launch Agent.
['T1569.001']
APT38 has created new services or modified existing ones to run executables, commands, or scripts.
['T1569.002']
APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes.
['T1569.002']
APT41 used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader.
['T1569.002']
Anchor can create and execute services to load its payload.
['T1569.002']
Chimera has used PsExec to deploy beacons on compromised systems.
['T1569.002']
Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services.
['T1569.002']
During Operation Honeybee, threat actors ran "sc start" to start the COMSysApp as part of the service hijacking and "sc stop" to stop and reconfigure the COMSysApp.
['T1569.002']
During Operation Wocao, threat actors created services on remote systems for execution purposes.
['T1569.002']
Empire can use PsExec to execute a payload on a remote host.
['T1569.002']
FIN6 has created Windows services to execute encoded PowerShell commands.
['T1569.002']
HOPLIGHT has used svchost.exe to execute a malicious DLL .
['T1569.002']
HermeticWiper can create system services to aid in executing the payload.
['T1569.002']
HermeticWizard can use `OpenRemoteServiceManager` to create a service.
['T1569.002']
Honeybee launches a DLL file that gets executed as a service using svchost.exe
['T1569.002']
Hydraq uses svchost.exe to execute a malicious DLL included in a new service group.
['T1569.002']
HyperBro has the ability to start and stop a specified service.
['T1569.002']
Impacket contains various modules emulating other service execution tools such as PsExec.
['T1569.002']
InvisiMole has used Windows services as a way to execute its malicious payload.
['T1569.002']
Ke3chang has used a tool known as RemoteExec (similar to PsExec) to remotely execute batch scripts and binaries.
['T1569.002']
Koadic can run a command on another machine using PsExec.
['T1569.002']
LoudMiner started the cryptomining virtual machine as a service on the infected machine.
['T1569.002']
NotPetya can use PsExec to help propagate itself across a network.
['T1569.002']
Okrum's loader can create a new service named NtmsSvc to execute the payload.
['T1569.002']
Olympic Destroyer utilizes PsExec to help propagate itself across a network.
['T1569.002']
Operation Wocao has created services on remote systems for execution purposes.
['T1569.002']
PoshC2 contains an implementation of PsExec for remote execution.
['T1569.002']
Proxysvc registers itself as a service on the victim’s machine to run as a standalone process.
['T1569.002']
Pupy uses PsExec to execute a payload or commands on a remote host.
['T1569.002']
RemoteCMD can execute commands remotely by creating a new service on the remote system.
['T1569.002']
Shamoon creates a new service named “ntssrv” to execute the payload. Shamoon can also spread via PsExec.
['T1569.002']
SysUpdate can manage services and processes.
['T1569.002']
The "net start" and "net stop" commands can be used in Net to execute or stop Windows services.
['T1569.002']
TinyTurla can install itself as a service on compromised machines.
['T1569.002']
WastedLocker can execute itself as a service.
['T1569.002']
Winexe installs a service on the remote system, executes the command, then uninstalls the service.
['T1569.002']
Winnti for Windows can run as a service using svchost.exe.
['T1569.002']
Wizard Spider has used services.exe to execute scripts and executables during lateral movement within a victim network.
['T1569.002']
APT32 has deployed tools after moving laterally using administrative accounts.
['T1570']
Aoqin Dragon has spread malware in target networks by copying modules to folders masquerading as removable devices.
['T1570']
BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers.
['T1570']
Chimera has copied tools between compromised hosts using SMB.
['T1570']
During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network.
['T1570']
DustySky searches for network drives and removable media and duplicates itself onto them.
['T1570']
Expand can be used to download or upload a file over a network share.
['T1570']
FIN10 has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally.
['T1570']
GALLIUM has used PsExec to move laterally between hosts in the target network.
['T1570']
HermeticWizard can copy files to other machines on a compromised network.
['T1570']
Kerrdown can download additional software including Cobalt Strike from servers on the victim's network.
['T1570']
LockerGoga has been observed moving around the victim network via SMB, indicating the actors behind this ransomware are manually copying files form computer to computer instead of self-propagating.
['T1570']
Olympic Destroyer attempts to copy itself to remote machines on the network.
['T1570']
Operation Wocao has used SMB to copy files to and from target systems.
['T1570']
PsExec can be used to download or upload a file over a network share.
['T1570']
Sandworm Team has used `move` to transfer files to a network share.
['T1570']
Shamoon attempts to copy itself to remote machines on the network.
['T1570']
Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network.
['T1570']
Turla RPC backdoors can be used to transfer files to/from victim machines on the local network.
['T1570']
WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.
['T1570']
Wizard Spider has used stolen credentials to copy tools into the "%TEMP%" directory of domain controllers.
['T1570']
cmd can be used to copy files to/from a remotely connected internal system.
['T1570']
esentutl can be used to copy files to/from a remote share.
['T1570']
ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.
['T1570']
APT-C-36 has used port 4050 for C2 communications.
['T1571']
APT33 has used HTTP over TCP ports 808 and 880 for command and control.
['T1571']
An APT32 backdoor can use HTTP over a non-standard TCP port (e.g 14146) which is specified in the backdoor configuration.
['T1571']
BADCALL communicates on ports 443 and 8000 with a FakeTLS method.
['T1571']
Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method.
['T1571']
BendyBear has used a custom RC4 and XOR encrypted protocol over port 443 for C2.
['T1571']
Cyclops Blink can use non-standard ports for C2 not typically associated with HTTP or HTTPS traffic.
['T1571']
DarkVishnya used ports 5190 and 7900 for shellcode listeners, and 4444, 4445, 31337 for shellcode C2.
['T1571']
Derusbi has used unencrypted HTTP on port 443 for C2.
['T1571']