text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
During Night Dragon, threat actors used dynamic DNS services for C2. | ['T1568'] |
For Operation Spalax, the threat actors used dynamic DNS services, including Duck DNS and DNS Exit, as part of their C2 infrastructure. | ['T1568'] |
Gamaredon Group has incorporated dynamic DNS domains in its infrastructure. | ['T1568'] |
Gelsemium can use dynamic DNS domain names in C2. | ['T1568'] |
Gelsemium has used dynamic DNS in its C2 infrastructure. | ['T1568'] |
NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2. | ['T1568'] |
Tomiris has connected to a signalization server that provides a URL and port, and then Tomiris sends a GET request to that URL to establish C2. | ['T1568'] |
UNC2452 used dynamic DNS resolution to construct and resolve to randomly-generated subdomains for C2. | ['T1568'] |
Machete has used free dynamic DNS domains for C2. | ['T1568.001'] |
TA505 has used fast flux to mask botnets by distributing payloads across multiple IPs. | ['T1568.001'] |
gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses. | ['T1568.001'] |
njRAT has used a fast flux DNS for C2 IP resolution. | ['T1568.001'] |
Bazar can implement DGA using the current date as a seed variable. | ['T1568.002'] |
CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost. | ['T1568.002'] |
CHOPSTICK can use a DGA for Fallback Channels, domains are generated by concatenating words from lists. | ['T1568.002'] |
Conficker has used a DGA that seeds with the current UTC victim system date to generate domains. | ['T1568.002'] |
DarkWatchman has used a DGA to generate a domain name for C2. | ['T1568.002'] |
Ebury has used a DGA to generate a domain name for C2. | ['T1568.002'] |
MiniDuke can use DGA to generate new Twitter URLs for C2. | ['T1568.002'] |
Ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours. | ['T1568.002'] |
QakBot can use domain generation algorithms in C2 communication. | ['T1568.002'] |
ShadowPad uses a DGA that is based on the day of the month for C2 servers. | ['T1568.002'] |
Shark can send DNS C2 communications using a unique domain generation algorithm. | ['T1568.002'] |
SombRAT can use a custom DGA to generate a subdomain for C2. | ['T1568.002'] |
TA551 has used a DGA to generate URLs from executed macros. | ['T1568.002'] |
TeamTNT has created system services to execute cryptocurrency mining software. | ['T1569'] |
AppleJeus has loaded a plist file using the "launchctl" command. | ['T1569.001'] |
Calisto uses launchctl to enable screen sharing on the victim’s machine. | ['T1569.001'] |
XCSSET loads a system level launchdaemon using the "launchctl load -w" command from "/System/Librarby/LaunchDaemons/ssh.plist". | ['T1569.001'] |
macOS.OSAMiner has used `launchctl` to restart the Launch Agent. | ['T1569.001'] |
APT38 has created new services or modified existing ones to run executables, commands, or scripts. | ['T1569.002'] |
APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes. | ['T1569.002'] |
APT41 used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader. | ['T1569.002'] |
Anchor can create and execute services to load its payload. | ['T1569.002'] |
Chimera has used PsExec to deploy beacons on compromised systems. | ['T1569.002'] |
Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services. | ['T1569.002'] |
During Operation Honeybee, threat actors ran "sc start" to start the COMSysApp as part of the service hijacking and "sc stop" to stop and reconfigure the COMSysApp. | ['T1569.002'] |
During Operation Wocao, threat actors created services on remote systems for execution purposes. | ['T1569.002'] |
Empire can use PsExec to execute a payload on a remote host. | ['T1569.002'] |
FIN6 has created Windows services to execute encoded PowerShell commands. | ['T1569.002'] |
HOPLIGHT has used svchost.exe to execute a malicious DLL . | ['T1569.002'] |
HermeticWiper can create system services to aid in executing the payload. | ['T1569.002'] |
HermeticWizard can use `OpenRemoteServiceManager` to create a service. | ['T1569.002'] |
Honeybee launches a DLL file that gets executed as a service using svchost.exe | ['T1569.002'] |
Hydraq uses svchost.exe to execute a malicious DLL included in a new service group. | ['T1569.002'] |
HyperBro has the ability to start and stop a specified service. | ['T1569.002'] |
Impacket contains various modules emulating other service execution tools such as PsExec. | ['T1569.002'] |
InvisiMole has used Windows services as a way to execute its malicious payload. | ['T1569.002'] |
Ke3chang has used a tool known as RemoteExec (similar to PsExec) to remotely execute batch scripts and binaries. | ['T1569.002'] |
Koadic can run a command on another machine using PsExec. | ['T1569.002'] |
LoudMiner started the cryptomining virtual machine as a service on the infected machine. | ['T1569.002'] |
NotPetya can use PsExec to help propagate itself across a network. | ['T1569.002'] |
Okrum's loader can create a new service named NtmsSvc to execute the payload. | ['T1569.002'] |
Olympic Destroyer utilizes PsExec to help propagate itself across a network. | ['T1569.002'] |
Operation Wocao has created services on remote systems for execution purposes. | ['T1569.002'] |
PoshC2 contains an implementation of PsExec for remote execution. | ['T1569.002'] |
Proxysvc registers itself as a service on the victim’s machine to run as a standalone process. | ['T1569.002'] |
Pupy uses PsExec to execute a payload or commands on a remote host. | ['T1569.002'] |
RemoteCMD can execute commands remotely by creating a new service on the remote system. | ['T1569.002'] |
Shamoon creates a new service named “ntssrv” to execute the payload. Shamoon can also spread via PsExec. | ['T1569.002'] |
SysUpdate can manage services and processes. | ['T1569.002'] |
The "net start" and "net stop" commands can be used in Net to execute or stop Windows services. | ['T1569.002'] |
TinyTurla can install itself as a service on compromised machines. | ['T1569.002'] |
WastedLocker can execute itself as a service. | ['T1569.002'] |
Winexe installs a service on the remote system, executes the command, then uninstalls the service. | ['T1569.002'] |
Winnti for Windows can run as a service using svchost.exe. | ['T1569.002'] |
Wizard Spider has used services.exe to execute scripts and executables during lateral movement within a victim network. | ['T1569.002'] |
APT32 has deployed tools after moving laterally using administrative accounts. | ['T1570'] |
Aoqin Dragon has spread malware in target networks by copying modules to folders masquerading as removable devices. | ['T1570'] |
BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers. | ['T1570'] |
Chimera has copied tools between compromised hosts using SMB. | ['T1570'] |
During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network. | ['T1570'] |
DustySky searches for network drives and removable media and duplicates itself onto them. | ['T1570'] |
Expand can be used to download or upload a file over a network share. | ['T1570'] |
FIN10 has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally. | ['T1570'] |
GALLIUM has used PsExec to move laterally between hosts in the target network. | ['T1570'] |
HermeticWizard can copy files to other machines on a compromised network. | ['T1570'] |
Kerrdown can download additional software including Cobalt Strike from servers on the victim's network. | ['T1570'] |
LockerGoga has been observed moving around the victim network via SMB, indicating the actors behind this ransomware are manually copying files form computer to computer instead of self-propagating. | ['T1570'] |
Olympic Destroyer attempts to copy itself to remote machines on the network. | ['T1570'] |
Operation Wocao has used SMB to copy files to and from target systems. | ['T1570'] |
PsExec can be used to download or upload a file over a network share. | ['T1570'] |
Sandworm Team has used `move` to transfer files to a network share. | ['T1570'] |
Shamoon attempts to copy itself to remote machines on the network. | ['T1570'] |
Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network. | ['T1570'] |
Turla RPC backdoors can be used to transfer files to/from victim machines on the local network. | ['T1570'] |
WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit. | ['T1570'] |
Wizard Spider has used stolen credentials to copy tools into the "%TEMP%" directory of domain controllers. | ['T1570'] |
cmd can be used to copy files to/from a remotely connected internal system. | ['T1570'] |
esentutl can be used to copy files to/from a remote share. | ['T1570'] |
ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment. | ['T1570'] |
APT-C-36 has used port 4050 for C2 communications. | ['T1571'] |
APT33 has used HTTP over TCP ports 808 and 880 for command and control. | ['T1571'] |
An APT32 backdoor can use HTTP over a non-standard TCP port (e.g 14146) which is specified in the backdoor configuration. | ['T1571'] |
BADCALL communicates on ports 443 and 8000 with a FakeTLS method. | ['T1571'] |
Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method. | ['T1571'] |
BendyBear has used a custom RC4 and XOR encrypted protocol over port 443 for C2. | ['T1571'] |
Cyclops Blink can use non-standard ports for C2 not typically associated with HTTP or HTTPS traffic. | ['T1571'] |
DarkVishnya used ports 5190 and 7900 for shellcode listeners, and 4444, 4445, 31337 for shellcode C2. | ['T1571'] |
Derusbi has used unencrypted HTTP on port 443 for C2. | ['T1571'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.