text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
can be used to gather information about the operating system. | ['T1082'] |
can be used to identify remote systems within a network. | ['T1018'] |
can be used to install browser root certificates as a precursor to performing man-in-the-middle between connections to banking websites. Example command: certutil -addstore -f -user ROOT ProgramData\cert512121.der. | ['T1553.004'] |
can be used to locate certain types of files/directories in a system.(ex: locate all files with a specific extension, name, and/or age) | ['T1083'] |
can be used to schedule a task on a system. | ['T1053.005'] |
can be used to set up a proxy tunnel to allow remote host access to an infected host. | ['T1090'] |
can be used to subvert controls and possibly conceal command execution by not directly invoking . | ['T1202'] |
can bypass Windows UAC through either DLL hijacking, eventvwr, or appPaths. | ['T1548.002'] |
can capture a screenshot from a victim. | ['T1113'] |
can capture desktop screenshots in the PNG format and send them to the C2 server. | ['T1113'] |
can capture screenshots. | ['T1113'] |
can capture screenshots at a configurable interval. | ['T1113'] |
can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping. | ['T1113'] |
can capture screenshots of the victim’s machine. | ['T1113'] |
can capture the victim's screen. | ['T1113'] |
can change Internet Explorer settings to reduce warnings about malware activity. | ['T1562.001'] |
can collect CPU and architecture information from the victim’s machine. | ['T1082'] |
can collect data from a local system. | ['T1005'] |
can collect data from user directories. | ['T1005'] |
can collect operating system (OS) version information, processor information, system name, and information about installed disks from the victim. | ['T1082'] |
can communicate over a reverse proxy using SOCKS5. | ['T1090'] |
can communicate over FTP and send email over SMTP. | ['T1071'] |
can communicate over HTTP, SMTP, and POP3 for C2. | ['T1071'] |
can communicate over HTTP for C2. | ['T1071'] |
can communicate to its C2 over HTTP and HTTPS if directed. | ['T1071'] |
can communicate to its C2 over TCP using a custom binary protocol. | ['T1095'] |
can communicate using SOCKS. | ['T1095'] |
can compress data with Zip before sending it over C2. | ['T1560'] |
can conduct file browsing. | ['T1083'] |
can create a directory (C:\ProgramData\Mail\MailAg\gl) to use as a temporary directory for uploading files. | ['T1074'] |
can create a new service named msamger (Microsoft Security Accounts Manager), which mimics the legitimate Microsoft database by the same name. | ['T1036'] |
can create a new service named msamger (Microsoft Security Accounts Manager). | ['T1543.003'] |
can create a remote shell and run a given command. | ['T1059'] |
can create a shortcut in the Windows startup folder for persistence. | ['T1547.009', 'T1547.001'] |
can create backdoor accounts with the login "HelpAssistant" with the Limbo module. | ['T1136'] |
can delete all Registry entries created during its execution. | ['T1112'] |
can delete a specified file. | ['T1070.004'] |
can delete files and directories. | ['T1070.004'] |
can delete files and itself after infection to avoid analysis. | ['T1070.004'] |
can delete files and optionally overwrite with random data beforehand. | ['T1070.004'] |
can delete files off the system. | ['T1070.004'] |
can delete files on the victim’s machine. | ['T1070.004'] |
can delete files written to disk. | ['T1070.004'] |
can delete itself or specified files. | ['T1070.004'] |
can delete malware and associated artifacts from the victim. | ['T1070.004'] |
can delete services from the victim’s machine. | ['T1543.003'] |
can delete specified files. | ['T1070.004'] |
can deliver "beacon" payloads for lateral movement by leveraging remote COM execution. | ['T1021.003'] |
can disable Avira anti-virus. | ['T1562.001'] |
can disable Microsoft Office Protected View by changing Registry keys. | ['T1562.001'] |
can discover and collect victim system information. | ['T1082'] |
can download additional encrypted backdoors onto the victim via GIF files. | ['T1105'] |
can download additional files. | ['T1105'] |
can download additional files and payloads to compromised hosts. | ['T1105'] |
can download additional files from URLs. | ['T1105'] |
can download additional payloads onto the victim. | ['T1105'] |
can download and execute additional files. | ['T1105'] |
can download and execute an arbitary executable. | ['T1105'] |
can download and execute files. | ['T1105'] |
can download and launch additional payloads. | ['T1105'] |
can download and upload files to and from the victim’s machine. | ['T1105'] |
can download and upload files to the victim's machine. | ['T1105'] |
can download an executable to run on the victim. | ['T1105'] |
can download files from its C2 server to the victim's machine. | ['T1105'] |
can download files from remote servers. | ['T1105'] |
can download files from the C2 server to the victim’s machine. | ['T1105'] |
can download files off the target system to send back to the server. | ['T1005'] |
can download files onto the victim. | ['T1105'] |
can download files remotely. | ['T1105'] |
can download or upload files from its C2 server. | ['T1105'] |
can download remote files. | ['T1105'] |
can download remote files and additional payloads to the victim's machine. | ['T1105'] |
can download remote files onto victims. | ['T1105'] |
can drop a mouse-logger that will take small screenshots around at each click and then send back to the server. | ['T1113'] |
can dump credentials. | ['T1003'] |
can dump passwords and save them into \ProgramData\Mail\MailAg\pwds.txt. | ['T1003'] |
can dump the SAM database. | ['T1003'] |
can enable/disable RDP connection and can start a remote desktop session using a browser web socket client. | ['T1021.001'] |
can enable remote desktop on the victim's machine. | ['T1021.001'] |
can encrypt C2 traffic with AES. | ['T1573'] |
can enumerate active windows. | ['T1010'] |
can enumerate and search for files and directories. | ['T1083'] |
can enumerate drives and Remote Desktop sessions. | ['T1049'] |
can enumerate drives and their types. It can also change file permissions using cacls.exe. | ['T1083'] |
can enumerate local information for Linux hosts and find currently logged on users for Windows hosts. | ['T1033'] |
can enumerate processes. | ['T1057'] |
can enumerate Registry keys. | ['T1012'] |
can enumerate Registry values, keys, and data. | ['T1012'] |
can establish persistence by adding a Scheduled Task named "Microsoft Boost Kernel Optimization". | ['T1053.005'] |
can establish persistence by adding Registry Run keys. | ['T1547.001'] |
can establish persistence by creating a .lnk file in the Start menu. | ['T1547.001'] |
can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe. | ['T1547.009'] |
can establish persistence by creating a scheduled task. | ['T1053.005'] |
can establish persistence by setting the value “Shell” with “explorer.exe, %malware_pathfile%” under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. | ['T1547.004'] |
can establish persistence through the system screensaver by configuring it to execute the malware. | ['T1546.002'] |
can establish using a AppCertDLLs Registry key. | ['T1546.009'] |
can establish using a Registry run key. | ['T1547.001'] |
can execute a payload on a remote host with PowerShell. This technique does write any data to disk. | ['T1059.001'] |
can execute a task to download a file. | ['T1105'] |
can execute commands from its C2 server. | ['T1059'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.