text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
achieves persistence by making an entry in the Registry's Run key. | ['T1547.001'] |
achieves persistence by setting a Registry Run key, with the path depending on whether the victim account has user or administrator access. | ['T1547.001'] |
actors have been known to copy files to the network shares of other computers to move laterally. | ['T1021.002'] |
actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence. | ['T1546.008'] |
actors have split RAR files for exfiltration into parts. | ['T1030'] |
actors have used and a modified version of called Wrapikatz to dump credentials. They have also dumped credentials from domain controllers. | ['T1003'] |
actors have used DLL side-loading. Actors have used legitimate Kaspersky anti-virus variants in which the DLL acts as a stub loader that loads and executes the shell code. | ['T1574.002'] |
actors leverage legitimate credentials to log into external remote services. | ['T1078', 'T1133'] |
actors obtained a list of active processes on the victim and sent them to C2 servers. | ['T1057'] |
actors obtain legitimate credentials using a variety of methods and use them to further lateral movement on victim networks. | ['T1078'] |
actors spawned shells on remote systems on a victim network to execute commands. | ['T1059'] |
actors used compromised credentials for the victim's endpoint management platform, Altiris, to move laterally. | ['T1078'] |
actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. | ['T1078'] |
actors used the following command following exploitation of a machine with malware to display network connections: netstat -ano >> %temp%\download | ['T1049'] |
actors used the following command following exploitation of a machine with malware to obtain information about services: net start >> %temp%\download | ['T1007'] |
actors used the following commands after exploiting a machine with malware to obtain information about files and directories: dir c:\ >> %temp%\download dir "c:\Documents and Settings" >> %temp%\download dir "c:\Program Files\" >> %temp%\download dir d:\ >> %temp%\download | ['T1083'] |
actors used the following commands following exploitation of a machine with malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download | ['T1087'] |
actors used the following command to rename one of their tools to a benign file name: ren "%temp%\upload" audiodg.exe | ['T1036'] |
actors used the native Windows task scheduler tool to use scheduled tasks for execution on a victim network. | ['T1053.005'] |
actors use nbtscan to discover vulnerable systems. | ['T1016'] |
actors use the Hunter tool to conduct network service discovery for vulnerable systems. | ['T1046'] |
actors use to schedule tasks to run self-extracting RAR archives, which install or on other victims on a network. | ['T1053.005'] |
added "junk data" to each encoded string, preventing trivial decoding without knowledge of the junk removal algorithm. Each implant was given a "junk length" value when created, tracked by the controller software to allow seamless communication but prevent analysis of the command protocol on the wire. | ['T1001'] |
added junk data to outgoing UDP packets to peer implants. | ['T1001'] |
added newly created accounts to the administrators group to maintain elevated access. | ['T1098'] |
added Registry Run keys to establish persistence. | ['T1547.001'] |
adds a .lnk file to the Windows startup folder. | ['T1547.009'] |
adds a .plist file to the /Library/LaunchAgents folder to maintain persistence. | ['T1543.001'] |
adds an entry to the rc.common file for persistence. | ['T1037.004'] |
adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service. | ['T1036'] |
adds a new service named NetAdapter to establish persistence. | ['T1543.003'] |
adds a Registry Run key for ctfmon.exe to establish persistence. | ['T1547.001'] |
adds a Registry Run key for persistence and adds a script in the Startup folder to deploy the payload. | ['T1547.001'] |
adds a Registry Run key to establish persistence. | ['T1547.001'] |
adds Registry Run keys to achieve persistence. | ['T1547.001'] |
A Destover-like implant used by can obtain the current system time and send it to the C2 server. | ['T1124'] |
A Destover-like variant used by uses a batch file mechanism to delete its binaries from the system. | ['T1064'] |
A dropper used by installs itself into the ASEP Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run with a value named McUpdate. | ['T1547.001'] |
Adversaries can instruct to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. | ['T1053.005', 'T1021.002', 'T1078'] |
A file stealer can communicate over HTTP for C2. | ['T1071'] |
A file stealer can gather the victim's computer name and drive serial numbers to send to a C2 server. | ['T1082'] |
A file stealer can gather the victim's username to send to a C2 server. | ['T1033'] |
A file stealer can run a TaskScheduler DLL to add persistence. | ['T1053.005'] |
A file stealer has the capability to steal data from newly connected logical volumes on a system, including USB drives. | ['T1025'] |
A file stealer transfers collected files to a hardcoded C2 server. | ['T1041'] |
After collecting files and logs from the victim, encrypts some collected data with Blowfish. | ['T1486'] |
After compromising a victim, lists all running processes. | ['T1057'] |
After copying itself to a DLL file, a variant of calls the DLL file using rundll32.exe. | ['T1218.011'] |
After decrypting itself in memory, downloads a DLL file from its C2 server and loads it in the memory space of a hidden Internet Explorer process. This “downloaded” file is actually not dropped onto the system. | ['T1055'] |
After downloading its main config file, downloads multiple payloads from C2 servers. | ['T1105'] |
After encrypting C2 data, converts it into a hexadecimal representation and then encodes it into base64. | ['T1001'] |
After encrypting log files, the log encryption module in deletes the original, unencrypted files from the host. | ['T1070'] |
After initial compromise, will download a second stage to establish a more permanent presence on the affected system. | ['T1104'] |
After using raw sockets to communicate with its C2 server, uses a decrypted string to create HTTP POST requests. | ['T1071'] |
aggregates collected data in a tmp file. | ['T1074'] |
A implant file was named ASPNET_FILTER.DLL, mimicking the legitimate ASP.NET ISAPI filter DLL with the same name. | ['T1036'] |
A Javascript backdoor added a local_update_check value under the Registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to establish persistence. Additionally, a custom executable containing Metasploit shellcode is saved to the Startup folder to gain persistence. | ['T1547.001'] |
A JavaScript backdoor has used Google Apps Script as its C2 server. | ['T1102'] |
A keylogging tool used by gathers network information from the victim, including the MAC address, IP address, WINS, DHCP server, and gateway. | ['T1016'] |
A Linux version of checks if the victim user ID is anything other than zero (normally used for root), and the malware will not execute if it does not have root privileges. also gathers the username of the victim. | ['T1033'] |
allows actors to spawn a reverse shell on a victim. | ['T1059'] |
allows adversaries to enumerate and modify the infected host's file system. It supports searching for directories, creating directories, listing directory contents, reading and writing to files, retrieving file attributes, and retrieving volume information. | ['T1083'] |
allows adversaries to execute shell commands on the infected host. | ['T1059'] |
allows adversaries to modify the way the "beacon" payload communicates. This is called "Malleable C2" in the manual and is intended to allow a penetration test team to mimic known APT C2 methods. | ['T1095'] |
allows adversaries to search for files. | ['T1083'] |
A macro deletes files after it has decoded and decompressed them. | ['T1070.004'] |
A malware sample adds persistence on the system by creating a shortcut in the user’s Startup folder. | ['T1547.009'] |
A malware sample encodes data with base64. | ['T1132'] |
A malware sample performs reflective DLL injection. | ['T1055'] |
A module has a default C2 port of 13000. | ['T1571'] |
A module in collects information from the victim about installed anti-virus software. | ['T1518.001'] |
A module in collects information from the victim about its IP addresses and MAC addresses. | ['T1016'] |
A module in collects information from the victim about the current user name. | ['T1033'] |
A module in collects information from the victim about Windows OS version, computer name, battery info, and physical memory. | ['T1082'] |
A module in collects information on available printers and disk drives. | ['T1120'] |
An backdoor may collect the entire contents of an inserted USB device. | ['T1025'] |
An downloader creates persistence by creating the following scheduled task: schtasks /create /tn "mysc" /tr C:\Users\Public\test.exe /sc ONLOGON /ru "System". | ['T1053.005'] |
An downloader establishes SOCKS5 connections for its initial C2. | ['T1090', 'T1095'] |
An downloader first establishes a SOCKS5 connection to 192.157.198[.]103 using TCP port 1913; once the server response is verified, it then requests a connection to 192.184.60[.]229 on TCP port 81. | ['T1104'] |
An downloader uses the Windows command "cmd.exe" /C whoami. The group also uses a tool to execute commands on remote computers. | ['T1059'] |
An downloader uses the Windows command "cmd.exe" /C whoami to verify that it is running with the elevated privileges of “System.” | ['T1033'] |
An executable dropped onto victims by aims to inject the specified DLL into a process that would normally be accessing the network, including Outlook Express (msinm.exe), Outlook (outlook.exe), Internet Explorer (iexplore.exe), and Firefox (firefox.exe). | ['T1055'] |
An HTTP malware variant decrypts strings using single-byte XOR keys. | ['T1140'] |
An HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\. | ['T1547.001'] |
An HTTP malware variant used Base64 to encode communications to the C2 server. | ['T1132'] |
An loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. | ['T1037'] |
An loader Trojan uses a batch script to run its payload. | ['T1064'] |
An loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions. | ['T1057'] |
An older variant of performs UAC bypass. | ['T1548.002'] |
An older version of has a module that monitors all mounted volumes for files with the extensions .doc, .docx, .pgp, .gpg, .m2f, or .m2o. | ['T1083'] |
An Port 22 malware variant registers itself as a service. | ['T1543.003'] |
A payload deletes Resiliency Registry keys created by Microsoft Office applications in an apparent effort to trick users into thinking there were no issues during application runs. | ['T1112'] |
A payload has searched all fixed drives on the victim for files matching a specified list of extensions. | ['T1083'] |
A payload uses process hollowing to hide the UAC bypass vulnerability exploitation inside svchost.exe. | ['T1055.012'] |
A payload was packed with UPX. | ['T1027.002'] |
APIs and strings in some variants are RC4 encrypted. Another variant is encoded with XOR. | ['T1027'] |
apparently altered samples by adding four bytes of random letters in a likely attempt to change the file hashes. | ['T1027.001', 'T1027.005'] |
appears to have functionality to modify remote Registry information. | ['T1112'] |
appends a file signature header (randomly selected from six file types) to encrypted data prior to upload or download. | ['T1027'] |
appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk. | ['T1027.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.