text1
stringlengths
7
2.5k
labels
stringlengths
9
100
has used credential dumping tools.
['T1003']
has used credential dumping tools such as and Lazagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.
['T1003']
has used custom DNS Tunneling protocols for C2.
['T1095']
has used CVE-2014-6324 to escalate privileges.
['T1068']
has used CVE-2015-4902 to bypass security features.
['T1211']
has used Daniel Bohannon’s Invoke-Obfuscation framework. The group also used files with base64 encoded PowerShell commands.
['T1027']
has used DLL search order hijacking.
['T1574.001']
has used DLL side-loading.
['T1574.002']
has used DLL side-loading to load malicious payloads.
['T1574.002']
has used encoded PowerShell scripts uploaded to installations to download and install , as well as to evade defenses.
['T1064']
has used encoded PowerShell scripts uploaded to installations to download and install . also used PowerShell scripts to evade defenses.
['T1059.001']
has used exploits to increase their levels of rights and privileges.
['T1068']
has used filenames and Registry key names associated with Windows Defender.
['T1036']
has used Flash Player (CVE-2016-4117, CVE-2018-4878) and Word (CVE-2017-0199) exploits for execution.
['T1203']
has used for credential dumping, as well as Metasploit’s NTDSGRAB module to obtain a copy of the victim's Active Directory database.
['T1003']
has used fragmented strings, environment variables, standard input (stdin), and native character-replacement functionalities to obfuscate commands.
['T1027']
has used HTTP, HTTPS, and DNS for command and control.
['T1071']
has used HTTP for C2, including sending error codes in Cookie headers.
['T1071']
has used HTTP for C2.
['T1071']
has used HTTP requests for command and control.
['T1071']
has used in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has used certutil -decode to decode files on the victim’s machine when dropping .
['T1140']
has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks.
['T1071']
has used keyloggers that are also capable of dumping credentials.
['T1003']
has used keylogging tools.
['T1056']
has used legitimate access granted to Managed Service Providers in order to access victims of interest.
['T1199']
has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment.
['T1078', 'T1133']
has used macros in s as well as executed VBScripts on victim machines.
['T1064']
has used macros in Word documents that would download a second stage if executed.
['T1064']
has used malicious macros embedded inside Office documents to execute files.
['T1064']
has used Metasploit to perform reflective DLL injection in order to escalate privileges.
['T1055']
has used Meterpreter to enumerate users on remote systems.
['T1033']
has used Mshta.exe to execute its payload.
['T1218.005']
has used mshta.exe to execute VBScript to execute malicious code on victim systems.
['T1218.005']
has used multiple software exploits for common client software, like Microsoft Word and Adobe Reader, to gain code execution as part of.
['T1203']
has used multiple types of scripting for execution, including JavaScript, JavaScript Scriptlets in XML, and VBScript.
['T1064']
has used net.exe in a script with net accounts /domain to find the password policy of a domain.
['T1201']
has used net group /domain, net localgroup administrators, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to find group permission settings on a victim.
['T1069']
has used netstat -an on a victim to get a listing of network connections.
['T1049']
has used net time to check the local time on a target system.
['T1124']
has used net use to conduct internal discovery of systems. The group has also used quser.exe to identify existing RDP sessions on a victim.
['T1049']
has used network scanning and enumeration tools, including .
['T1018']
has used ping to identify other machines of interest.
['T1018']
has used port 8080 for C2.
['T1043']
has used port 80 for C2.
['T1043']
has used ports 53, 80, 443, and 8080 for C2.
['T1043']
has used ports 8060 and 8888 for C2.
['T1571']
has used powershell.exe to download and execute scripts.
['T1059.001']
has used PowerShell-based tools and shellcode loaders for execution.
['T1059.001']
has used PowerShell for execution.
['T1059.001']
has used PowerShell for execution and privilege escalation.
['T1059.001']
has used PowerShell for execution of a payload.
['T1059.001']
has used PowerShell on victim systems to download and run payloads after exploitation.
['T1064', 'T1059.001']
has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.
['T1059.001']
has used PowerShell scripts to download and execute programs in memory, without writing to disk.
['T1064', 'T1059.001']
has used process hollowing in iexplore.exe to load the implant.
['T1055.012']
has used Putty Secure Copy Client (PSCP) to transfer data.
['T1021']
has used Putty to access compromised systems.
['T1021']
has used RAR to compress collected data before.
['T1560']
has used RAR to stage and compress local folders.
['T1560']
has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic.
['T1573']
has used RC4 to encrypt C2 traffic.
['T1573']
has used RDP connections to move across the victim network.
['T1021.001']
has used RDP for.
['T1021.001']
has used RDP to move laterally to systems in the victim environment.
['T1021.001']
has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike.
['T1547.001']
has used reg query “HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default” on a victim to query the Registry.
['T1012']
has used regsvr32.exe to execute a server variant of in victim networks.
['T1218.010']
has used regsvr32 for execution.
['T1218.010']
has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.
['T1021.001']
has used Remote Desktop Protocol to conduct lateral movement.
['T1021.001']
has used scheduled tasks to persist on victim systems.
['T1053.005']
has used sc query on a victim to gather information about services.
['T1007']
has used several different keyloggers.
['T1056']
has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions.
['T1016']
has used shell and VBS scripts as well as embedded macros for execution.
['T1064']
has used shellcode to download Meterpreter after compromising a victim.
['T1105']
has used spearphishing via a link to get users to download and run their malware.
['T1204']
has used spearphishing with an attachment to deliver files with exploits to initial victims.
['T1598.002']
has used stolen certificates to sign its malware.
['T1553.002']
has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor. The group has also moved laterally using the Local Administrator account.
['T1078']
has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly.
['T1189']
has used TeamViewer to preserve remote access in case control using the Cobalt Strike module was lost.
['T1108']
has used Technet and Pastebin web pages for command and control.
['T1102']
has used the command-line interface.
['T1059']
has used the command-line interface for execution.
['T1059']
has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic.
['T1090.004']
has used the Microsoft administration tool csvde.exe to export Active Directory data.
['T1087']
has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key HKCU\Software\Microsoft\Office test\Special\Perf to execute code.
['T1137']
has used the open source tool Essential NetTools to map the network and build a list of targets.
['T1018']
has used the Plink utility to create SSH tunnels.
['T1573']
has used the Plink utility to tunnel RDP back to C2 infrastructure.
['T1573']
has used the RAT, which communicates over HTTP with a payload encrypted with RC4.
['T1573']
has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.
['T1546.008']
has used the Windows command shell to execute commands.
['T1059']
has used to locate PDF, Excel, and Word documents during. The group also searched a compromised DCCC computer for specific terms.
['T1083']
has used tools to compress data before exfilling it.
['T1560']
has used tools to take screenshots from victims.
['T1113']
has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware.
['T1120']
has used valid, compromised email accounts for defense evasion, including to send malicious emails to other victim organizations.
['T1078']
has used valid accounts shared between Managed Service Providers and clients to move between the two environments.
['T1078']