text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment. | ['T1021.001'] |
Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client. | ['T1021.001'] |
QuasarRAT has a module for performing remote desktop access. | ['T1021.001'] |
ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel. | ['T1021.001'] |
Silence has used RDP for lateral movement. | ['T1021.001'] |
Stolen Pencil utilized RDP for direct remote point-and-click access. | ['T1021.001'] |
TEMP.Veles utilized RDP throughout an operation. | ['T1021.001'] |
The APT1 group is known to have used RDP during operations. | ['T1021.001'] |
Wizard Spider has used RDP for lateral movement. | ['T1021.001'] |
jRAT can support RDP control. | ['T1021.001'] |
menuPass has used RDP connections to move across the victim network. | ['T1021.001'] |
APT3 will copy files over to Windows Admin Shares (like ADMIN$) as part of lateral movement. | ['T1021.002'] |
APT41 has transferred implant files using Windows Admin Shares. | ['T1021.002'] |
Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. | ['T1021.002', 'T1053.005', 'T1078'] |
Anchor can support windows execution via SMB shares. | ['T1021.002'] |
BlackEnergy has run a plug-in on a victim to spread through the local network by using PsExec and accessing admin shares. | ['T1021.002'] |
Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB. | ['T1021.002'] |
Chimera has used Windows admin shares to move laterally. | ['T1021.002'] |
Cobalt Strike can use Window admin shares (C$ and ADMIN$) for lateral movement. | ['T1021.002'] |
Conficker variants spread through NetBIOS share propagation. | ['T1021.002'] |
Conti can spread via SMB and encrypts files on different hosts, potentially compromising an entire network. | ['T1021.002'] |
Deep Panda uses net.exe to connect to network shares using "net use" commands with compromised credentials. | ['T1021.002'] |
Diavol can spread throughout a network via SMB prior to encryption. | ['T1021.002'] |
FIN8 has attempted to map to C$ on enumerated hosts to test the scope of their current credentials/context. | ['T1021.002'] |
HermeticWizard can use a list of hardcoded credentials to to authenticate via NTLMSSP to the SMB shares on remote systems. | ['T1021.002'] |
Lateral movement can be done with Net through "net use" commands to connect to the on remote systems. | ['T1021.002'] |
Lazarus Group malware SierraAlfa accesses the "ADMIN$" share via SMB to conduct lateral movement. | ['T1021.002'] |
Moses Staff has used batch scripts that can enable SMB on a compromised host. | ['T1021.002'] |
Net Crawler uses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement. | ['T1021.002'] |
Olympic Destroyer uses PsExec to interact with the "ADMIN$" network share to execute commands on remote systems. | ['T1021.002'] |
Operation Wocao has used Impacket's smbexec.py as well as accessing the C$ and IPC$ shares to move laterally. | ['T1021.002'] |
Orangeworm has copied its backdoor across open network shares, including ADMIN$, C$WINDOWS, D$WINDOWS, and E$WINDOWS. | ['T1021.002'] |
PsExec, a tool that has been used by adversaries, writes programs to the "ADMIN$" network share to execute commands on remote systems. | ['T1021.002'] |
Sandworm Team has run "net use" to connect to network shares. | ['T1021.002'] |
Shamoon accesses network share(s), enables share access to the target device, copies an executable payload to the target system, and uses a Scheduled Task/Job to execute the malware. | ['T1021.002'] |
Stuxnet propagates to available network shares. | ['T1021.002'] |
The Regin malware platform can use Windows admin shares to move laterally. | ['T1021.002'] |
Threat Group-1314 actors mapped network drives using "net use". | ['T1021.002'] |
Turla used "net use" commands to connect to lateral systems within a network. | ['T1021.002'] |
Wizard Spider has used SMB to drop Cobalt Strike Beacon on a domain controller for lateral movement. | ['T1021.002'] |
Zox has the ability to use SMB for communication. | ['T1021.002'] |
zwShell has been copied over network shares to move laterally. | ['T1021.002'] |
Cobalt Strike can deliver "beacon" payloads for lateral movement by leveraging remote COM execution. | ['T1021.003'] |
Cobalt Strike can deliver Beacon payloads for lateral movement by leveraging remote COM execution. | ['T1021.003'] |
SILENTTRINITY can use `System` namespace methods to execute lateral movement using DCOM. | ['T1021.003'] |
APT39 used secure shell (SSH) to move laterally among their targets. | ['T1021.004'] |
BlackTech has used Putty for remote access. | ['T1021.004'] |
Cobalt Strike can SSH to a remote service. | ['T1021.004'] |
Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection. | ['T1021.004'] |
FIN7 has used SSH to move laterally through victim environments. | ['T1021.004'] |
GCMAN uses Putty for lateral movement. | ['T1021.004'] |
Kinsing has used SSH for lateral movement. | ['T1021.004'] |
Lazarus Group used SSH and the PuTTy PSCP utility to gain access to a restricted segment of a compromised network. | ['T1021.004'] |
Leviathan used ssh for internal reconnaissance. | ['T1021.004'] |
TEMP.Veles has relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution. | ['T1021.004'] |
TeamTNT has used SSH to connect back to victim machines. TeamTNT has also used SSH to transfer tools and payloads onto victim hosts and execute them. | ['T1021.004'] |
menuPass has used Putty Secure Copy Client (PSCP) to transfer data. | ['T1021.004'] |
DanBot can use VNC for remote access to targeted systems. | ['T1021.005'] |
FIN7 has used TightVNC to control compromised hosts. | ['T1021.005'] |
Fox Kitten has installed TightVNC server and client on compromised servers and endpoints for lateral movement. | ['T1021.005'] |
GCMAN uses VNC for lateral movement. | ['T1021.005'] |
Gamaredon Group has used VNC tools, including UltraVNC, to remotely interact with compromised hosts. | ['T1021.005'] |
ZxShell supports functionality for VNC sessions. | ['T1021.005'] |
APT29 has used WinRM via PowerShell to execute command and payloads on remote hosts. | ['T1021.006'] |
SILENTTRINITY tracks `TrustedHosts` and can move laterally to these targets via WinRM. | ['T1021.006'] |
Threat Group-3390 has used WinRM to enable remote execution. | ['T1021.006'] |
UNC2452 has used WinRM via PowerShell to execute command and payloads on remote hosts. | ['T1021.006'] |
A Gamaredon Group file stealer has the capability to steal data from newly connected logical volumes on a system, including USB drives. | ['T1025'] |
An APT28 backdoor may collect the entire contents of an inserted USB device. | ['T1025'] |
AppleSeed can find and collect data from removable media devices. | ['T1025'] |
Aria-body has the ability to collect data from USB devices. | ['T1025'] |
BADNEWS copies files with certain extensions from USB devices to
a predefined directory. | ['T1025'] |
Explosive can scan all .exe files located in the USB drive. | ['T1025'] |
FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on removable media and copies them to a staging area. The default file types copied would include data copied to the drive by SPACESHIP. | ['T1025'] |
GravityRAT steals files based on an extension list if a USB drive is connected to the system. | ['T1025'] |
Machete had a module in its malware to find, encrypt, and upload files from fixed and removable drives. | ['T1025'] |
ObliqueRAT has the ability to extract data from removable devices connected to the endpoint. | ['T1025'] |
Once a removable media device is inserted back into the first victim, USBStealer collects data from it that was exfiltrated from a second victim. | ['T1025'] |
Prikormka contains a module that collects documents with certain extensions from removable media or fixed drives connected via USB. | ['T1025'] |
Ramsay can collect data from removable media and stage it for exfiltration. | ['T1025'] |
Remsec has a package that collects documents from any inserted USB sticks. | ['T1025'] |
TajMahal has the ability to steal written CD images and files of interest from previously connected removable drives when they become available again. | ['T1025'] |
The FunnyDream FilePakMonitor component has the ability to collect files from removable devices. | ['T1025'] |
Turla RPC backdoors can collect files from USB thumb drives. | ['T1025'] |
A JPIN uses a encrypted and compressed payload that is disguised as a bitmap within the resource section of the installer. | ['T1027'] |
A RedLeaves configuration file is encrypted with a simple XOR key, 0x53. | ['T1027'] |
A Threat Group-3390 tool can encrypt payloads using XOR. Threat Group-3390 malware is also obfuscated using Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression. | ['T1027'] |
A Volgmer variant is encoded using a simple XOR cipher. | ['T1027'] |
APT-C-36 has used ConfuserEx to obfuscate its variant of Imminent Monitor, compressed payload and RAT packages, and password protected encrypted email attachments to avoid detection. | ['T1027'] |
APT18 obfuscates strings in the payload. | ['T1027'] |
APT19 used Base64 to obfuscate commands and the payload. | ['T1027'] |
APT28 encrypted a .dll payload using RTL and a custom encryption algorithm. APT28 has also obfuscated payloads with base64, XOR, and RC4. | ['T1027'] |
APT29 has used encoded PowerShell commands. | ['T1027'] |
APT3 obfuscates files or information to help evade defensive measures. | ['T1027'] |
APT32 uses the Invoke-Obfuscation framework to obfuscate their PowerShell and also performs other code obfuscation. APT32 has also encoded payloads using Base64 and a framework called "Dont-Kill-My-Cat (DKMC). APT32 also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor. | ['T1027'] |
APT33 has used base64 to encode payloads. | ['T1027'] |
APT34 has used base64-encoded files that are dropped to victims. | ['T1027'] |
APT37 obfuscates strings and payloads. | ['T1027'] |
Action RAT's commands, strings, and domains can be Base64 encoded within the payload. | ['T1027'] |
Anchor has obfuscated code with stack strings and string encryption. | ['T1027'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.