text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Neoichor can check for Internet connectivity by contacting bing[.]com with the request format `bing[.]com?id=<GetTickCount>`. | ['T1016.001'] |
QakBot can measure the download speed on a targeted host. | ['T1016.001'] |
QuietSieve can check C2 connectivity with a `ping` to 8.8.8.8 (Google public DNS). | ['T1016.001'] |
Rising Sun can test a connection to a specified network IP address over a specified port number. | ['T1016.001'] |
SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection. | ['T1016.001'] |
Turla has used "tracert" to check internet connectivity. | ['T1016.001'] |
UNC2452 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through. | ['T1016.001'] |
APT29 has used AdFind to enumerate remote systems. | ['T1018'] |
APT3 has a tool that can detect the existence of remote systems. | ['T1018'] |
APT32 has enumerated DC servers using the command "net group "Domain Controllers" /domain". The group has also used the "ping" command. | ['T1018'] |
APT39 has used NBTscan and custom tools to discover remote systems. | ['T1018'] |
AdFind has the ability to query Active Directory for computers. | ['T1018'] |
BRONZE BUTLER typically use "ping" and Net to enumerate systems. | ['T1018'] |
Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments. | ['T1018'] |
BitPaymer can use "net view" to discover remote systems. | ['T1018'] |
BloodHound can enumerate and collect the properties of domain computers, including domain controllers. | ['T1018'] |
Carbon uses the "net view" command. | ['T1018'] |
Chimera has utilized various scans and queries to find domain controllers and remote services in the target environment. | ['T1018'] |
Cobalt Strike uses the native Windows Network Enumeration APIs to interrogate and discover targets in a Windows Active Directory network. | ['T1018'] |
Commands such as "net view" can be used in Net to gather information about available remote systems. | ['T1018'] |
Comnie runs the "net view" command | ['T1018'] |
Conti has the ability to discover hosts on a target network. | ['T1018'] |
DRATzarus can search for other machines connected to compromised host and attempt to map the network. | ['T1018'] |
Diavol can use the ARP table to find remote hosts to scan. | ['T1018'] |
During C0015, the threat actors used the commands `net view /all /domain` and `ping` to discover remote systems. They also used PowerView's PowerShell Invoke-ShareFinder script for file share enumeration. | ['T1018'] |
During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks. | ['T1018'] |
During Operation CuckooBees, the threat actors used the `net view` and `ping` commands as part of their advanced reconnaissance. | ['T1018'] |
Earth Lusca used the command "powershell “Get-EventLog -LogName security -Newest 500 | where {$_.EventID -eq 4624} | format-list -
property * | findstr “Address””" to find the network information of successfully logged-in accounts to discovery addresses of other machines. Earth Lusca has also used multiple scanning tools to discover other machines within the same compromised network. | ['T1018'] |
Epic uses the "net view" command on the victim’s machine. | ['T1018'] |
FIN5 has used the open source tool Essential NetTools to map the network and build a list of targets. | ['T1018'] |
FIN6 used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS. | ['T1018', 'T1046'] |
FIN8 has used dsquery and other Active Directory utilities to enumerate hosts; they have also used "nltest.exe /dclist" to retrieve a list of domain controllers. | ['T1018'] |
Flagpro has been used to execute "net view" on a targeted system. | ['T1018'] |
Fox Kitten has used Angry IP Scanner to detect remote systems. | ['T1018'] |
GALLIUM used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as "ping" to identify remote systems. | ['T1018'] |
HEXANE has used `net view` to enumerate domain machines. | ['T1018'] |
Indrik Spider has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database. | ['T1018'] |
Industroyer can enumerate remote computers in the compromised network. | ['T1018'] |
Ke3chang has used network scanning and enumeration tools, including Ping. | ['T1018'] |
Kwampirs collects a list of available servers with the command "net view". | ['T1018'] |
MURKYTOP has the capability to identify remote hosts on connected networks. | ['T1018'] |
NBTscan can list NetBIOS computer names. | ['T1018'] |
Naikon has used a netbios scanner for remote machine identification. | ['T1018'] |
Nltest may be used to enumerate remote domain controllers using options such as "/dclist" and "/dsgetdc". | ['T1018'] |
OSInfo performs a connection test to discover remote systems in the network | ['T1018'] |
Olympic Destroyer uses Windows Management Instrumentation to enumerate all systems in the network. | ['T1018'] |
Operation Wocao can use the "ping" command to discover remote systems. | ['T1018'] |
Ping can be used to identify remote systems within a network. | ['T1018'] |
PoetRAT used Nmap for remote system discovery. | ['T1018'] |
QakBot can identify remote systems through the "net view" command. | ['T1018'] |
RATANKBA runs the "net view /domain" and "net view" commands. | ['T1018'] |
ROADTools can enumerate Azure AD systems and devices. | ['T1018'] |
SHOTPUT has a command to list all servers in the domain, as well as one to locate domain controllers on a domain. | ['T1018'] |
SILENTTRINITY can enumerate and collect the properties of domain computers. | ['T1018'] |
Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about computers listed in AD. | ['T1018'] |
Silence has used Nmap to scan the corporate network, build a network topology, and identify vulnerable hosts. | ['T1018'] |
SpicyOmelette can identify payment systems, payment gateways, and ATM systems in compromised environments. | ['T1018'] |
Sykipot may use "net view /domain" to display hostnames of available systems on a network. | ['T1018'] |
TRITON’s TsLow python module pings controllers over the TriStation protocol. | ['T1018'] |
The TAINTEDSCRIBE command and execution module can perform target system enumeration. | ['T1018'] |
Threat Group-3390 has used the "net view" command. | ['T1018'] |
TrickBot can enumerate computers and network devices. | ['T1018'] |
Turla surveys a system upon check-in to discover remote systems on a local network using the "net view" and "net view /DOMAIN" commands. Turla has also used "net group "Domain Computers" /domain", "net group "Domain Controllers" /domain", and "net group "Exchange Servers" /domain" to enumerate domain computers, including the organization's DC and Exchange Server. | ['T1018'] |
WannaCry scans its local network segment for remote systems to try to exploit and copy itself to. | ['T1018'] |
Wizard Spider has used networkdll for network discovery and psfin specifically for financial and point of sale indicators. Wizard Spider has also used AdFind and "nltest/dclist" to enumerate domain computers, including the domain controller. | ['T1018'] |
menuPass uses scripts to enumerate IP ranges on the victim network. menuPass has also issued the command "net view /domain" to a PlugX implant to gather information about remote systems on the network. | ['T1018'] |
njRAT can identify remote hosts on connected networks. | ['T1018'] |
CosmicDuke exfiltrates collected files automatically over FTP to remote servers. | ['T1020'] |
Crutch has automatically exfiltrated stolen files to Dropbox. | ['T1020'] |
Doki has used a script that gathers information from a hardcoded list of IP addresses and uploads to an Ngrok URL. | ['T1020'] |
During Frankenstein, the threat actors collected information via Empire, which was automatically sent back to the adversary's C2. | ['T1020'] |
Ebury can automatically exfiltrate gathered SSH credentials. | ['T1020'] |
Empire has the ability to automatically send collected data back to the threat actors' C2. | ['T1020'] |
Frankenstein has collected information via Empire, which is automatically sent the data back to the adversary's C2. | ['T1020', 'T1041'] |
LightNeuron can be configured to automatically exfiltrate files under a specified directory. | ['T1020'] |
OutSteel can automatically upload collected files to its C2 server. | ['T1020'] |
Peppy has the ability to automatically exfiltrate files and keylogs. | ['T1020'] |
Rover automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. Rover also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe. | ['T1020'] |
ShimRatReporter sent collected system and network information compiled into a report to an adversary-controlled C2. | ['T1020'] |
Sidewinder has configured tools to automatically send collected files to attacker controlled servers. | ['T1020'] |
StrongPity can automatically exfiltrate collected documents to the C2 server. | ['T1020'] |
TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2. | ['T1020'] |
MacMa can manage remote screen sessions. | ['T1021'] |
APT29 has used RDP sessions from public-facing systems to internal servers. | ['T1021.001'] |
APT41 used RDP for lateral movement. | ['T1021.001'] |
Axiom has used RDP during operations. | ['T1021.001'] |
Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts. | ['T1021.001'] |
Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions. | ['T1021.001'] |
Chimera has used RDP to access targeted systems. | ['T1021.001'] |
Cobalt Group has used Remote Desktop Protocol to conduct lateral movement. | ['T1021.001'] |
DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard. | ['T1021.001'] |
Dragonfly 2.0 moved laterally via RDP. | ['T1021.001'] |
Dragonfly has moved laterally via RDP. | ['T1021.001'] |
FIN6 used RDP to move laterally in victim networks. | ['T1021.001'] |
FIN7 has used RDP to move laterally in victim environments. | ['T1021.001'] |
FIN8 has used RDP for lateral movement. | ['T1021.001'] |
Fox Kitten has used RDP to log in and move laterally in the target environment. | ['T1021.001'] |
Kimsuky has used RDP for direct remote point-and-click access. | ['T1021.001'] |
Leviathan has targeted RDP credentials and used it to move through the victim environment. | ['T1021.001'] |
Magic Hound has used Remote Desktop Services on targeted systems. | ['T1021.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.