text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Neoichor can check for Internet connectivity by contacting bing[.]com with the request format `bing[.]com?id=<GetTickCount>`.
['T1016.001']
QakBot can measure the download speed on a targeted host.
['T1016.001']
QuietSieve can check C2 connectivity with a `ping` to 8.8.8.8 (Google public DNS).
['T1016.001']
Rising Sun can test a connection to a specified network IP address over a specified port number.
['T1016.001']
SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.
['T1016.001']
Turla has used "tracert" to check internet connectivity.
['T1016.001']
UNC2452 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.
['T1016.001']
APT29 has used AdFind to enumerate remote systems.
['T1018']
APT3 has a tool that can detect the existence of remote systems.
['T1018']
APT32 has enumerated DC servers using the command "net group "Domain Controllers" /domain". The group has also used the "ping" command.
['T1018']
APT39 has used NBTscan and custom tools to discover remote systems.
['T1018']
AdFind has the ability to query Active Directory for computers.
['T1018']
BRONZE BUTLER typically use "ping" and Net to enumerate systems.
['T1018']
Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments.
['T1018']
BitPaymer can use "net view" to discover remote systems.
['T1018']
BloodHound can enumerate and collect the properties of domain computers, including domain controllers.
['T1018']
Carbon uses the "net view" command.
['T1018']
Chimera has utilized various scans and queries to find domain controllers and remote services in the target environment.
['T1018']
Cobalt Strike uses the native Windows Network Enumeration APIs to interrogate and discover targets in a Windows Active Directory network.
['T1018']
Commands such as "net view" can be used in Net to gather information about available remote systems.
['T1018']
Comnie runs the "net view" command
['T1018']
Conti has the ability to discover hosts on a target network.
['T1018']
DRATzarus can search for other machines connected to compromised host and attempt to map the network.
['T1018']
Diavol can use the ARP table to find remote hosts to scan.
['T1018']
During C0015, the threat actors used the commands `net view /all /domain` and `ping` to discover remote systems. They also used PowerView's PowerShell Invoke-ShareFinder script for file share enumeration.
['T1018']
During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks.
['T1018']
During Operation CuckooBees, the threat actors used the `net view` and `ping` commands as part of their advanced reconnaissance.
['T1018']
Earth Lusca used the command "powershell “Get-EventLog -LogName security -Newest 500 | where {$_.EventID -eq 4624} | format-list - property * | findstr “Address””" to find the network information of successfully logged-in accounts to discovery addresses of other machines. Earth Lusca has also used multiple scanning tools to discover other machines within the same compromised network.
['T1018']
Epic uses the "net view" command on the victim’s machine.
['T1018']
FIN5 has used the open source tool Essential NetTools to map the network and build a list of targets.
['T1018']
FIN6 used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.
['T1018', 'T1046']
FIN8 has used dsquery and other Active Directory utilities to enumerate hosts; they have also used "nltest.exe /dclist" to retrieve a list of domain controllers.
['T1018']
Flagpro has been used to execute "net view" on a targeted system.
['T1018']
Fox Kitten has used Angry IP Scanner to detect remote systems.
['T1018']
GALLIUM used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as "ping" to identify remote systems.
['T1018']
HEXANE has used `net view` to enumerate domain machines.
['T1018']
Indrik Spider has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database.
['T1018']
Industroyer can enumerate remote computers in the compromised network.
['T1018']
Ke3chang has used network scanning and enumeration tools, including Ping.
['T1018']
Kwampirs collects a list of available servers with the command "net view".
['T1018']
MURKYTOP has the capability to identify remote hosts on connected networks.
['T1018']
NBTscan can list NetBIOS computer names.
['T1018']
Naikon has used a netbios scanner for remote machine identification.
['T1018']
Nltest may be used to enumerate remote domain controllers using options such as "/dclist" and "/dsgetdc".
['T1018']
OSInfo performs a connection test to discover remote systems in the network
['T1018']
Olympic Destroyer uses Windows Management Instrumentation to enumerate all systems in the network.
['T1018']
Operation Wocao can use the "ping" command to discover remote systems.
['T1018']
Ping can be used to identify remote systems within a network.
['T1018']
PoetRAT used Nmap for remote system discovery.
['T1018']
QakBot can identify remote systems through the "net view" command.
['T1018']
RATANKBA runs the "net view /domain" and "net view" commands.
['T1018']
ROADTools can enumerate Azure AD systems and devices.
['T1018']
SHOTPUT has a command to list all servers in the domain, as well as one to locate domain controllers on a domain.
['T1018']
SILENTTRINITY can enumerate and collect the properties of domain computers.
['T1018']
Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about computers listed in AD.
['T1018']
Silence has used Nmap to scan the corporate network, build a network topology, and identify vulnerable hosts.
['T1018']
SpicyOmelette can identify payment systems, payment gateways, and ATM systems in compromised environments.
['T1018']
Sykipot may use "net view /domain" to display hostnames of available systems on a network.
['T1018']
TRITON’s TsLow python module pings controllers over the TriStation protocol.
['T1018']
The TAINTEDSCRIBE command and execution module can perform target system enumeration.
['T1018']
Threat Group-3390 has used the "net view" command.
['T1018']
TrickBot can enumerate computers and network devices.
['T1018']
Turla surveys a system upon check-in to discover remote systems on a local network using the "net view" and "net view /DOMAIN" commands. Turla has also used "net group "Domain Computers" /domain", "net group "Domain Controllers" /domain", and "net group "Exchange Servers" /domain" to enumerate domain computers, including the organization's DC and Exchange Server.
['T1018']
WannaCry scans its local network segment for remote systems to try to exploit and copy itself to.
['T1018']
Wizard Spider has used networkdll for network discovery and psfin specifically for financial and point of sale indicators. Wizard Spider has also used AdFind and "nltest/dclist" to enumerate domain computers, including the domain controller.
['T1018']
menuPass uses scripts to enumerate IP ranges on the victim network. menuPass has also issued the command "net view /domain" to a PlugX implant to gather information about remote systems on the network.
['T1018']
njRAT can identify remote hosts on connected networks.
['T1018']
CosmicDuke exfiltrates collected files automatically over FTP to remote servers.
['T1020']
Crutch has automatically exfiltrated stolen files to Dropbox.
['T1020']
Doki has used a script that gathers information from a hardcoded list of IP addresses and uploads to an Ngrok URL.
['T1020']
During Frankenstein, the threat actors collected information via Empire, which was automatically sent back to the adversary's C2.
['T1020']
Ebury can automatically exfiltrate gathered SSH credentials.
['T1020']
Empire has the ability to automatically send collected data back to the threat actors' C2.
['T1020']
Frankenstein has collected information via Empire, which is automatically sent the data back to the adversary's C2.
['T1020', 'T1041']
LightNeuron can be configured to automatically exfiltrate files under a specified directory.
['T1020']
OutSteel can automatically upload collected files to its C2 server.
['T1020']
Peppy has the ability to automatically exfiltrate files and keylogs.
['T1020']
Rover automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. Rover also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.
['T1020']
ShimRatReporter sent collected system and network information compiled into a report to an adversary-controlled C2.
['T1020']
Sidewinder has configured tools to automatically send collected files to attacker controlled servers.
['T1020']
StrongPity can automatically exfiltrate collected documents to the C2 server.
['T1020']
TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.
['T1020']
MacMa can manage remote screen sessions.
['T1021']
APT29 has used RDP sessions from public-facing systems to internal servers.
['T1021.001']
APT41 used RDP for lateral movement.
['T1021.001']
Axiom has used RDP during operations.
['T1021.001']
Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.
['T1021.001']
Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions.
['T1021.001']
Chimera has used RDP to access targeted systems.
['T1021.001']
Cobalt Group has used Remote Desktop Protocol to conduct lateral movement.
['T1021.001']
DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard.
['T1021.001']
Dragonfly 2.0 moved laterally via RDP.
['T1021.001']
Dragonfly has moved laterally via RDP.
['T1021.001']
FIN6 used RDP to move laterally in victim networks.
['T1021.001']
FIN7 has used RDP to move laterally in victim environments.
['T1021.001']
FIN8 has used RDP for lateral movement.
['T1021.001']
Fox Kitten has used RDP to log in and move laterally in the target environment.
['T1021.001']
Kimsuky has used RDP for direct remote point-and-click access.
['T1021.001']
Leviathan has targeted RDP credentials and used it to move through the victim environment.
['T1021.001']
Magic Hound has used Remote Desktop Services on targeted systems.
['T1021.001']