text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
has used credential dumping tools. | ['T1003'] |
has used credential dumping tools such as and Lazagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. | ['T1003'] |
has used custom DNS Tunneling protocols for C2. | ['T1095'] |
has used CVE-2014-6324 to escalate privileges. | ['T1068'] |
has used CVE-2015-4902 to bypass security features. | ['T1211'] |
has used Daniel Bohannon’s Invoke-Obfuscation framework. The group also used files with base64 encoded PowerShell commands. | ['T1027'] |
has used DLL search order hijacking. | ['T1574.001'] |
has used DLL side-loading. | ['T1574.002'] |
has used DLL side-loading to load malicious payloads. | ['T1574.002'] |
has used encoded PowerShell scripts uploaded to installations to download and install , as well as to evade defenses. | ['T1064'] |
has used encoded PowerShell scripts uploaded to installations to download and install . also used PowerShell scripts to evade defenses. | ['T1059.001'] |
has used exploits to increase their levels of rights and privileges. | ['T1068'] |
has used filenames and Registry key names associated with Windows Defender. | ['T1036'] |
has used Flash Player (CVE-2016-4117, CVE-2018-4878) and Word (CVE-2017-0199) exploits for execution. | ['T1203'] |
has used for credential dumping, as well as Metasploit’s NTDSGRAB module to obtain a copy of the victim's Active Directory database. | ['T1003'] |
has used fragmented strings, environment variables, standard input (stdin), and native character-replacement functionalities to obfuscate commands. | ['T1027'] |
has used HTTP, HTTPS, and DNS for command and control. | ['T1071'] |
has used HTTP for C2, including sending error codes in Cookie headers. | ['T1071'] |
has used HTTP for C2. | ['T1071'] |
has used HTTP requests for command and control. | ['T1071'] |
has used in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has used certutil -decode to decode files on the victim’s machine when dropping . | ['T1140'] |
has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. | ['T1071'] |
has used keyloggers that are also capable of dumping credentials. | ['T1003'] |
has used keylogging tools. | ['T1056'] |
has used legitimate access granted to Managed Service Providers in order to access victims of interest. | ['T1199'] |
has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment. | ['T1078', 'T1133'] |
has used macros in s as well as executed VBScripts on victim machines. | ['T1064'] |
has used macros in Word documents that would download a second stage if executed. | ['T1064'] |
has used malicious macros embedded inside Office documents to execute files. | ['T1064'] |
has used Metasploit to perform reflective DLL injection in order to escalate privileges. | ['T1055'] |
has used Meterpreter to enumerate users on remote systems. | ['T1033'] |
has used Mshta.exe to execute its payload. | ['T1218.005'] |
has used mshta.exe to execute VBScript to execute malicious code on victim systems. | ['T1218.005'] |
has used multiple software exploits for common client software, like Microsoft Word and Adobe Reader, to gain code execution as part of. | ['T1203'] |
has used multiple types of scripting for execution, including JavaScript, JavaScript Scriptlets in XML, and VBScript. | ['T1064'] |
has used net.exe in a script with net accounts /domain to find the password policy of a domain. | ['T1201'] |
has used net group /domain, net localgroup administrators, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to find group permission settings on a victim. | ['T1069'] |
has used netstat -an on a victim to get a listing of network connections. | ['T1049'] |
has used net time to check the local time on a target system. | ['T1124'] |
has used net use to conduct internal discovery of systems. The group has also used quser.exe to identify existing RDP sessions on a victim. | ['T1049'] |
has used network scanning and enumeration tools, including . | ['T1018'] |
has used ping to identify other machines of interest. | ['T1018'] |
has used port 8080 for C2. | ['T1043'] |
has used port 80 for C2. | ['T1043'] |
has used ports 53, 80, 443, and 8080 for C2. | ['T1043'] |
has used ports 8060 and 8888 for C2. | ['T1571'] |
has used powershell.exe to download and execute scripts. | ['T1059.001'] |
has used PowerShell-based tools and shellcode loaders for execution. | ['T1059.001'] |
has used PowerShell for execution. | ['T1059.001'] |
has used PowerShell for execution and privilege escalation. | ['T1059.001'] |
has used PowerShell for execution of a payload. | ['T1059.001'] |
has used PowerShell on victim systems to download and run payloads after exploitation. | ['T1064', 'T1059.001'] |
has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents. | ['T1059.001'] |
has used PowerShell scripts to download and execute programs in memory, without writing to disk. | ['T1064', 'T1059.001'] |
has used process hollowing in iexplore.exe to load the implant. | ['T1055.012'] |
has used Putty Secure Copy Client (PSCP) to transfer data. | ['T1021'] |
has used Putty to access compromised systems. | ['T1021'] |
has used RAR to compress collected data before. | ['T1560'] |
has used RAR to stage and compress local folders. | ['T1560'] |
has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. | ['T1573'] |
has used RC4 to encrypt C2 traffic. | ['T1573'] |
has used RDP connections to move across the victim network. | ['T1021.001'] |
has used RDP for. | ['T1021.001'] |
has used RDP to move laterally to systems in the victim environment. | ['T1021.001'] |
has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike. | ['T1547.001'] |
has used reg query “HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default” on a victim to query the Registry. | ['T1012'] |
has used regsvr32.exe to execute a server variant of in victim networks. | ['T1218.010'] |
has used regsvr32 for execution. | ['T1218.010'] |
has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment. | ['T1021.001'] |
has used Remote Desktop Protocol to conduct lateral movement. | ['T1021.001'] |
has used scheduled tasks to persist on victim systems. | ['T1053.005'] |
has used sc query on a victim to gather information about services. | ['T1007'] |
has used several different keyloggers. | ['T1056'] |
has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions. | ['T1016'] |
has used shell and VBS scripts as well as embedded macros for execution. | ['T1064'] |
has used shellcode to download Meterpreter after compromising a victim. | ['T1105'] |
has used spearphishing via a link to get users to download and run their malware. | ['T1204'] |
has used spearphishing with an attachment to deliver files with exploits to initial victims. | ['T1598.002'] |
has used stolen certificates to sign its malware. | ['T1553.002'] |
has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor. The group has also moved laterally using the Local Administrator account. | ['T1078'] |
has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly. | ['T1189'] |
has used TeamViewer to preserve remote access in case control using the Cobalt Strike module was lost. | ['T1108'] |
has used Technet and Pastebin web pages for command and control. | ['T1102'] |
has used the command-line interface. | ['T1059'] |
has used the command-line interface for execution. | ['T1059'] |
has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic. | ['T1090.004'] |
has used the Microsoft administration tool csvde.exe to export Active Directory data. | ['T1087'] |
has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key HKCU\Software\Microsoft\Office test\Special\Perf to execute code. | ['T1137'] |
has used the open source tool Essential NetTools to map the network and build a list of targets. | ['T1018'] |
has used the Plink utility to create SSH tunnels. | ['T1573'] |
has used the Plink utility to tunnel RDP back to C2 infrastructure. | ['T1573'] |
has used the RAT, which communicates over HTTP with a payload encrypted with RC4. | ['T1573'] |
has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions. | ['T1546.008'] |
has used the Windows command shell to execute commands. | ['T1059'] |
has used to locate PDF, Excel, and Word documents during. The group also searched a compromised DCCC computer for specific terms. | ['T1083'] |
has used tools to compress data before exfilling it. | ['T1560'] |
has used tools to take screenshots from victims. | ['T1113'] |
has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware. | ['T1120'] |
has used valid, compromised email accounts for defense evasion, including to send malicious emails to other victim organizations. | ['T1078'] |
has used valid accounts shared between Managed Service Providers and clients to move between the two environments. | ['T1078'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.