text1
stringlengths
7
2.5k
labels
stringlengths
9
100
can be used to gather information about the operating system.
['T1082']
can be used to identify remote systems within a network.
['T1018']
can be used to install browser root certificates as a precursor to performing man-in-the-middle between connections to banking websites. Example command: certutil -addstore -f -user ROOT ProgramData\cert512121.der.
['T1553.004']
can be used to locate certain types of files/directories in a system.(ex: locate all files with a specific extension, name, and/or age)
['T1083']
can be used to schedule a task on a system.
['T1053.005']
can be used to set up a proxy tunnel to allow remote host access to an infected host.
['T1090']
can be used to subvert controls and possibly conceal command execution by not directly invoking .
['T1202']
can bypass Windows UAC through either DLL hijacking, eventvwr, or appPaths.
['T1548.002']
can capture a screenshot from a victim.
['T1113']
can capture desktop screenshots in the PNG format and send them to the C2 server.
['T1113']
can capture screenshots.
['T1113']
can capture screenshots at a configurable interval.
['T1113']
can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping.
['T1113']
can capture screenshots of the victim’s machine.
['T1113']
can capture the victim's screen.
['T1113']
can change Internet Explorer settings to reduce warnings about malware activity.
['T1562.001']
can collect CPU and architecture information from the victim’s machine.
['T1082']
can collect data from a local system.
['T1005']
can collect data from user directories.
['T1005']
can collect operating system (OS) version information, processor information, system name, and information about installed disks from the victim.
['T1082']
can communicate over a reverse proxy using SOCKS5.
['T1090']
can communicate over FTP and send email over SMTP.
['T1071']
can communicate over HTTP, SMTP, and POP3 for C2.
['T1071']
can communicate over HTTP for C2.
['T1071']
can communicate to its C2 over HTTP and HTTPS if directed.
['T1071']
can communicate to its C2 over TCP using a custom binary protocol.
['T1095']
can communicate using SOCKS.
['T1095']
can compress data with Zip before sending it over C2.
['T1560']
can conduct file browsing.
['T1083']
can create a directory (C:\ProgramData\Mail\MailAg\gl) to use as a temporary directory for uploading files.
['T1074']
can create a new service named msamger (Microsoft Security Accounts Manager), which mimics the legitimate Microsoft database by the same name.
['T1036']
can create a new service named msamger (Microsoft Security Accounts Manager).
['T1543.003']
can create a remote shell and run a given command.
['T1059']
can create a shortcut in the Windows startup folder for persistence.
['T1547.009', 'T1547.001']
can create backdoor accounts with the login "HelpAssistant" with the Limbo module.
['T1136']
can delete all Registry entries created during its execution.
['T1112']
can delete a specified file.
['T1070.004']
can delete files and directories.
['T1070.004']
can delete files and itself after infection to avoid analysis.
['T1070.004']
can delete files and optionally overwrite with random data beforehand.
['T1070.004']
can delete files off the system.
['T1070.004']
can delete files on the victim’s machine.
['T1070.004']
can delete files written to disk.
['T1070.004']
can delete itself or specified files.
['T1070.004']
can delete malware and associated artifacts from the victim.
['T1070.004']
can delete services from the victim’s machine.
['T1543.003']
can delete specified files.
['T1070.004']
can deliver "beacon" payloads for lateral movement by leveraging remote COM execution.
['T1021.003']
can disable Avira anti-virus.
['T1562.001']
can disable Microsoft Office Protected View by changing Registry keys.
['T1562.001']
can discover and collect victim system information.
['T1082']
can download additional encrypted backdoors onto the victim via GIF files.
['T1105']
can download additional files.
['T1105']
can download additional files and payloads to compromised hosts.
['T1105']
can download additional files from URLs.
['T1105']
can download additional payloads onto the victim.
['T1105']
can download and execute additional files.
['T1105']
can download and execute an arbitary executable.
['T1105']
can download and execute files.
['T1105']
can download and launch additional payloads.
['T1105']
can download and upload files to and from the victim’s machine.
['T1105']
can download and upload files to the victim's machine.
['T1105']
can download an executable to run on the victim.
['T1105']
can download files from its C2 server to the victim's machine.
['T1105']
can download files from remote servers.
['T1105']
can download files from the C2 server to the victim’s machine.
['T1105']
can download files off the target system to send back to the server.
['T1005']
can download files onto the victim.
['T1105']
can download files remotely.
['T1105']
can download or upload files from its C2 server.
['T1105']
can download remote files.
['T1105']
can download remote files and additional payloads to the victim's machine.
['T1105']
can download remote files onto victims.
['T1105']
can drop a mouse-logger that will take small screenshots around at each click and then send back to the server.
['T1113']
can dump credentials.
['T1003']
can dump passwords and save them into \ProgramData\Mail\MailAg\pwds.txt.
['T1003']
can dump the SAM database.
['T1003']
can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.
['T1021.001']
can enable remote desktop on the victim's machine.
['T1021.001']
can encrypt C2 traffic with AES.
['T1573']
can enumerate active windows.
['T1010']
can enumerate and search for files and directories.
['T1083']
can enumerate drives and Remote Desktop sessions.
['T1049']
can enumerate drives and their types. It can also change file permissions using cacls.exe.
['T1083']
can enumerate local information for Linux hosts and find currently logged on users for Windows hosts.
['T1033']
can enumerate processes.
['T1057']
can enumerate Registry keys.
['T1012']
can enumerate Registry values, keys, and data.
['T1012']
can establish persistence by adding a Scheduled Task named "Microsoft Boost Kernel Optimization".
['T1053.005']
can establish persistence by adding Registry Run keys.
['T1547.001']
can establish persistence by creating a .lnk file in the Start menu.
['T1547.001']
can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe.
['T1547.009']
can establish persistence by creating a scheduled task.
['T1053.005']
can establish persistence by setting the value “Shell” with “explorer.exe, %malware_pathfile%” under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon.
['T1547.004']
can establish persistence through the system screensaver by configuring it to execute the malware.
['T1546.002']
can establish using a AppCertDLLs Registry key.
['T1546.009']
can establish using a Registry run key.
['T1547.001']
can execute a payload on a remote host with PowerShell. This technique does write any data to disk.
['T1059.001']
can execute a task to download a file.
['T1105']
can execute commands from its C2 server.
['T1059']