text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Squirrelwaffle has been packed with a custom packer to hide payloads.
['T1027.002']
TA505 has used UPX to obscure malicious code.
['T1027.002']
The White Company has obfuscated their payloads through packing.
['T1027.002']
Threat Group-3390 has packed malware and tools.
['T1027.002']
Tomiris has been packed with UPX.
['T1027.002']
Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer.
['T1027.002']
Versions of Babuk have been packed.
['T1027.002']
Zebrocy's Delphi variant was packed with UPX.
['T1027.002']
ABK can extract a malicious Portable Executable (PE) from a photo.
['T1027.003']
APT37 uses steganography to send images to users that are embedded with shellcode.
['T1027.003']
Andariel has hidden malicious executables within PNG files.
['T1027.003']
Avenger can extract backdoor malware from downloaded images.
['T1027.003']
BBK can extract a malicious Portable Executable (PE) from a photo.
['T1027.003']
BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads.
['T1027.003']
Bandook has used .PNG images within a zip file to build the executable.
['T1027.003']
Diavol has obfuscated its main code routines within bitmap images as part of its anti-analysis techniques.
['T1027.003']
Earth Lusca has used steganography to hide shellcode in a BMP image file.
['T1027.003']
For Operation Spalax, the threat actors used packers that read pixel data from images contained in PE files' resource sections and build the next layer of execution from the data.
['T1027.003']
IcedID has embedded binaries within RC4 encrypted .png files.
['T1027.003']
Invoke-PSImage can be used to embed a PowerShell script within the pixels of a PNG file.
['T1027.003']
Leviathan has used steganography to hide stolen data inside other files stored on Github.
['T1027.003']
LiteDuke has used image files to hide its loader component.
['T1027.003']
MuddyWater has stored obfuscated JavaScript code in an image file named temp.jpg.
['T1027.003']
ObliqueRAT can hide its payload in BMP images hosted on compromised websites.
['T1027.003']
ProLock can use .jpg and .bmp files to store its payload.
['T1027.003']
RDAT can also embed data within a BMP image prior to exfiltration.
['T1027.003']
Raindrop used steganography to locate the start of its encoded payload within legitimate 7-Zip code.
['T1027.003']
Ramsay has PE data embedded within JPEG files contained within Word documents.
['T1027.003']
RegDuke can hide data in images, including use of the Least Significant Bit (LSB).
['T1027.003']
build_downer can extract malware from a downloaded JPEG.
['T1027.003']
Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.
['T1027.004']
DarkWatchman has used the "csc.exe" tool to compile a C# executable.
['T1027.004']
Gamaredon Group has compiled the source code for a downloader directly on the infected system using the built-in "Microsoft.CSharp.CSharpCodeProvider" class.
['T1027.004']
Rocke has compiled malware, delivered to victims as .c files, with the GNU Compiler Collection (GCC).
['T1027.004']
njRAT has used AutoIt to compile the payload and main script into a single executable after delivery.
['T1027.004']
APT3 has been known to remove indicators of compromise from tools.
['T1027.005']
Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection.
['T1027.005']
Cobalt Strike includes a capability to modify the "beacon" payload to eliminate known signatures or unpacking methods.
['T1027.005']
Deep Panda has updated and modified its malware, resulting in different hash values that evade detection.
['T1027.005']
During Operation Wocao, threat actors edited variable names within the Impacket suite to avoid automated detection.
['T1027.005']
GALLIUM ensured each payload had a unique hash, including by using different types of packers.
['T1027.005']
InvisiMole has undergone regular technical improvements in an attempt to evade detection.
['T1027.005']
OilRig has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion.
['T1027.005']
Penquin can remove strings from binaries.
['T1027.005']
PowerSploit's "Find-AVSignature" AntivirusBypass module can be used to locate single byte anti-virus signatures.
['T1027.005']
QakBot can make small changes to itself in order to change its checksum and hash value.
['T1027.005']
SUNBURST source code used generic variable names and pre-obfuscated strings, and was likely sanitized of developer comments before being added to SUNSPOT.
['T1027.005']
TEMP.Veles has modified files based on the open-source project cryptcat in an apparent attempt to decrease AV detection rates.
['T1027.005']
The author of GravityRAT submitted samples to VirusTotal for testing, showing that the author modified the code to try to hide the DDE object in a different part of the document.
['T1027.005']
Waterbear can scramble functions not to be executed again with random values.
['T1027.005']
APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.
['T1027.006']
EnvyScout contains JavaScript code that can extract an encoded blob from its HTML body and write it to disk.
['T1027.006']
Bazar can hash then resolve API calls at runtime.
['T1027.007']
Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.
['T1027.007']
Pteranodon can use a dynamic Windows hashing algorithm to map API components.
['T1027.007']
macOS.OSAMiner has used run-only Applescripts, a compiled and stripped version of AppleScript, to remove human readable indicators to evade detection.
['T1027.008']
Invoke-PSImage can be used to embed payload data within a new image file.
['T1027.009']
macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.
['T1027.009']
ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes.
['T1029']
Chrommme can set itself to sleep before requesting a new command from C2.
['T1029']
Cobalt Strike can set its Beacon payload to reach out to the C2 server on an arbitrary and random interval.
['T1029']
Flagpro has the ability to wait for a specified time interval between communicating with and executing commands from C2.
['T1029']
Higaisa sent the victim computer identifier in a User-Agent string back to the C2 server every 10 minutes.
['T1029']
LightNeuron can be configured to exfiltrate data during nighttime or working hours.
['T1029']
Machete sends stolen data to the C2 server every 10 minutes.
['T1029']
POWERSTATS can sleep for a given number of seconds.
['T1029']
ShadowPad has sent data back to C2 every 8 hours.
['T1029']
jRAT can be configured to reconnect at certain intervals.
['T1029']
APT28 has split archived exfiltration files into chunks smaller than 1MB.
['T1030']
AppleSeed has divided files if the size is 0x1000000 bytes or more.
['T1030']
Cobalt Strike will break large data sets into smaller chunks for exfiltration.
['T1030']
During C0015, the threat actors limited Rclone's bandwidth setting during exfiltration.
['T1030']
Helminth splits data into chunks up to 23 bytes and sends the data in DNS queries to its C2 server.
['T1030']
Kessel can split the data to be exilftrated into chunks that will fit in subdomains of DNS queries.
['T1030']
Kevin can exfiltrate data to the C2 server in 27-character chunks.
['T1030']
Mythic supports custom chunk sizes used to upload/download files.
['T1030']
OopsIE exfiltrates command output and collected files to its C2 server in 1500-byte blocks.
['T1030']
POSHSPY uploads data in 2048-byte chunks.
['T1030']
The Rclone "chunker" overlay supports splitting large files in smaller chunks during upload to circumvent size limits.
['T1030']
A Gamaredon Group file stealer can gather the victim's username to send to a C2 server.
['T1033']
A Linux version of Derusbi checks if the victim user ID is anything other than zero (normally used for root), and the malware will not execute if it does not have root privileges. Derusbi also gathers the username of the victim.
['T1033']
A module in Prikormka collects information from the victim about the current user name.
['T1033']
APT32 collected the victim's username and executed the "whoami" command on the victim's machine. APT32 executed shellcode to collect the username on the victim's machine.
['T1033']
APT39 used Remexi to collect usernames from the system.
['T1033']
APT41 used the WMIEXEC utility to execute "whoami" commands on remote machines.
['T1033']
Action RAT has the ability to collect the username from an infected host.
['T1033']
Agent.btz obtains the victim username and saves it to a file.
['T1033']
Amadey has collected the user name from a compromised host using `GetUserNameA`.
['T1033']
An APT3 downloader uses the Windows command ""cmd.exe" /C whoami" to verify that it is running with the elevated privileges of “System.”
['T1033']
Aria-body has the ability to identify the username on a compromised host.
['T1033']
AuTo Stealer has the ability to collect the username from an infected host.
['T1033']
Azorult can collect the username from the victim’s machine.
['T1033']
BabyShark has executed the "whoami" command.
['T1033']
Backdoor.Oldrea collects the current username from the victim.
['T1033']
Bazar can identify the username of the infected user.
['T1033']
BloodHound can collect information on user sessions.
['T1033']
Bonadan has discovered the username of the user running the backdoor.
['T1033']
BoomBox can enumerate the username on a compromised host.
['T1033']
Cardinal RAT can collect the username from a victim machine.
['T1033']
Caterpillar WebShell can obtain a list of user accounts from a victim's machine.
['T1033']