text1
stringlengths
7
2.5k
labels
stringlengths
9
100
has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients.
['T1598.002']
has conducted port scans on a host.
['T1046']
has connected to C2 servers through proxies.
['T1090']
has copied its backdoor across open network shares, including ADMIN$, C$WINDOWS, D$WINDOWS, and E$WINDOWS.
['T1021.002']
has created a scheduled task named “AdobeFlashSync” to establish persistence.
['T1036']
has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access.
['T1550.003']
has created new services to establish persistence.
['T1543.003']
has created Windows tasks to establish persistence.
['T1053.005']
has deleted and overwrote files to cover tracks.
['T1070.004']
has deleted existing logs and exfiltrated file archives from a victim.
['T1070.004']
has deleted files associated with their payload after execution.
['T1070.004']
has deleted Registry keys during post compromise cleanup activities.
['T1112']
has deleted tmp and prefetch files during post compromise cleanup activities.
['T1070.004']
has delivered and by executing PowerShell commands through DDE in Word documents.
['T1559.002']
has delivered malicious links and macro-enabled documents that required targets to click the "enable content" button to execute the payload on the system.
['T1204']
has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.
['T1598.003']
has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.
['T1598.002']
has deployed a bootkit along with to ensure its persistence on the victim. The bootkit shares code with some variants of .
['T1542.003']
has deployed backup web shells and obtained OWA account credentials during intrusions that it subsequently used to attempt to regain access when evicted from a victim network.
['T1108']
has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally.
['T1105']
has detached network shares after exfiltrating files, likely to evade detection.
['T1070.005']
has detected security tools.
['T1518.001']
has disabled host-based firewalls. The group has also globally opened port 3389.
['T1562.001']
has distributed targeted emails containing links to malicious documents with embedded macros.
['T1598.003']
has distributed targeted emails containing Word documents with embedded malicious macros.
['T1598.002']
has downloaded additional code and files from servers onto victims.
['T1105']
has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.
['T1105']
has downloaded additional malware, including by using .
['T1105']
has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload.
['T1105']
has downloaded additional scripts and files from adversary-controlled servers. has also used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.
['T1105']
has downloaded second stage malware from compromised websites.
['T1105']
has dumped credentials, including by using .
['T1003']
has dumped credentials from victims. Specifically, the group has used the tool GET5 Penetrator to look for remote login and hard-coded credentials.
['T1003']
has encoded payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key.
['T1027']
has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.
['T1027']
has encrypted and encoded data in its malware, including by using base64.
['T1027']
has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear.
['T1573']
has encrypted C2 traffic with RSA.
['T1573']
has encrypted documents and malicious executables.
['T1027']
has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys, as well as by creating shortcuts in the Internet Explorer Quick Start folder.
['T1547.001']
has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn “%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe” to establish persistence.
['T1547.001']
has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire.
['T1053.005']
has established persistence by using the Registry option in PowerShell Empire to add a Run key.
['T1547.001']
has exfiltrated data in HTTP POST headers.
['T1071']
has exfiltrated data over FTP separately from its primary C2 channel over DNS.
['T1048']
has exfiltrated files stolen from file shares.
['T1039']
has exfiltrated files stolen from local systems.
['T1005']
has exploited Adobe Flash vulnerability CVE-2018-4878 for execution.
['T1203']
has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges.
['T1068']
has exploited Microsoft Word vulnerability CVE-2014-4114 for execution.
['T1203']
has exploited Microsoft Word vulnerability CVE-2017-0199 for execution.
['T1203']
has exploited the CVE-2016-0167 local vulnerability.
['T1068']
has functionality to copy itself to network shares.
['T1080']
has functionality to remove Registry Run key persistence as a cleanup procedure.
['T1112']
has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.
['T1187']
has gathered information about local network connections using .
['T1049']
has infected victims by tricking them into visiting compromised watering hole websites.
['T1189']
has infected victims using watering holes.
['T1189']
has injected SMB URLs into malicious Word spearphishing attachments to initiate .
['T1221']
has inserted garbage characters into code, presumably to avoid anti-virus detection.
['T1027.001']
has installed updates and new malware on victims.
['T1105']
has interacted with compromised systems to browse and copy files through its graphical user interface in sessions.
['T1061']
has keylogging functionality.
['T1056']
has leveraged a zero-day vulnerability to escalate privileges.
['T1068']
has leveraged multiple types of spearphishing in order to attempt to get a user to open links and attachments.
['T1204']
has masqueraded as legitimate Adobe Content Management System files.
['T1036']
has masqueraded as legitimate software update packages such as Adobe Acrobat Reader and Intel.
['T1036']
has modules that are capable of capturing audio.
['T1123']
has obfuscated code using base64 and gzip compression.
['T1027']
has obfuscated DLLs and functions using dummy API calls inserted between real instructions.
['T1027.001']
has obfuscated strings in by base64 encoding, and then encrypting them.
['T1027']
has packed malware payloads before delivery to victims.
['T1027.002']
has performed C2 using DNS via A, OPT, and TXT records.
['T1071']
has performed credential dumping with and Lazagne.
['T1003']
has performed DLL search order hijacking to execute their payload.
['T1574.001']
has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil).
['T1113']
has performed timestomping on victim files.
['T1070.006']
has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet.
['T1102']
has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
['T1037']
has registered itself as a scheduled task to run each time the current user logs in.
['T1053.005']
has registered itself as a service to establish persistence.
['T1543.003']
has registered its persistence module on domain controllers as a Windows LSA (Local System Authority) password filter to dump credentials any time a domain, local user, or administrator logs in or changes a password.
['T1003']
has retrieved internal documents from machines inside victim environments, including by using to stage documents before.
['T1005']
has run a keylogger plug-in on a victim.
['T1056']
has run a plug-in on a victim to spread through the local network by using and accessing admin shares.
['T1021.002']
has run hostname and systeminfo on a victim.
['T1082']
has run net user, net user /domain, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim.
['T1087']
has run whoami on a victim.
['T1033']
has sent a C2 response that was base64-encoded.
['T1132']
has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents.
['T1598.002']
has sent malicious Word OLE compound documents to victims.
['T1559.002']
has sent malware that required users to hit the enable button in Microsoft Excel to allow an .iqy file to be downloaded.
['T1204']
has sent spearphishing attachments attempting to get a user to open them.
['T1204']
has sent spearphishing emails with malicious attachments, including .rtf, .doc, and .xls files.
['T1598.002']
has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.
['T1598.002']
has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution. The group has also used an exploit toolkit known as Threadkit that launches .bat files.
['T1064']
has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile, Get-Webconfig, Get-ApplicationHost, Get-SiteListPassword, Get-CachedGPPPassword, and Get-RegistryAutoLogon.
['T1552.002']
has sometimes used drive-by attacks against vulnerable browser plugins.
['T1189']
has staged encrypted archives for exfiltration on Internet-facing servers that had previously been compromised with .
['T1074']
has targeted victims using spearphishing emails with malicious Microsoft Word attachments.
['T1598.002']