text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Chaes has collected the username and UID from the infected machine.
['T1033']
Chimera has used the "quser" command to show currently logged on users.
['T1033']
Chrommme can retrieve the username from a targeted system.
['T1033']
Clambling can identify the username on a compromised host.
['T1033']
Crimson can identify the user on a targeted system.
['T1033']
DRATzarus can obtain a list of users from an infected machine.
['T1033']
DarkComet gathers the username from the victim’s machine.
['T1033']
Diavol can collect the username from a compromised host.
['T1033']
DnsSystem can use the Windows user name to create a unique identification for infected users and systems.
['T1033']
DownPaper collects the victim username and sends it to the C2 server.
['T1033']
Dragonfly 2.0 used the command "query user" on victim hosts.
['T1033']
Dragonfly used the command "query user" on victim hosts.
['T1033']
During Frankenstein, the threat actors used Empire to enumerate hosts and gather username, machine name, and administrative permissions information.
['T1033']
During Night Dragon, threat actors used password cracking and pass-the-hash tools to discover usernames and passwords.
['T1033']
During Operation CuckooBees, the threat actors used the `query user` and `whoami` commands as part of their advanced reconnaissance.
['T1033']
During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system.
['T1033']
Dyre has the ability to identify the users on a compromised host.
['T1033']
EVILNUM can obtain the username from the victim's machine.
['T1033']
Earth Lusca collected information on user accounts via the "whoami" command.
['T1033']
Egregor has used tools to gather information about users.
['T1033']
Empire can enumerate the username on targeted hosts.
['T1033']
Epic collects the user name from the victim’s machine.
['T1033']
FELIXROOT collects the username from the victim’s machine.
['T1033']
FIN10 has used Meterpreter to enumerate users on remote systems.
['T1033']
Felismus collects the current username and sends it to the C2 server.
['T1033']
Flagpro has been used to run the "whoami" command on the system.
['T1033']
FlawedAmmyy enumerates the current user during the initial infection.
['T1033']
FunnyDream has the ability to gather user information from the targeted system using `whoami/upn&whoami/fqdn&whoami/logonid&whoami/all`.
['T1033']
GALLIUM used "whoami" and "query user" to obtain information about the victim user.
['T1033']
Gelsemium has the ability to distinguish between a standard user and an administrator on a compromised host.
['T1033']
Get2 has the ability to identify the current username of an infected host.
['T1033']
Gold Dragon collects the endpoint victim's username and uses it as a basis for downloading additional components from the C2 server.
['T1033']
GravityRAT collects the victim username along with other account information (account type, description, full name, SID and status).
['T1033']
HAWKBALL can collect the user name of the system.
['T1033']
HotCroissant has the ability to collect the username on the infected host.
['T1033']
KONNI can collect the username from the victim’s machine.
['T1033']
Ke3chang has used implants capable of collecting the signed-in username.
['T1033']
Koadic can identify logged in users across the domain and views user sessions.
['T1033']
Kwampirs collects registered owner details by using the commands "systeminfo" and "net config workstation".
['T1033']
Linux Rabbit opens a socket on port 22 and if it receives a response it attempts to obtain the machine's hostname and Top-Level Domain.
['T1033']
LiteDuke can enumerate the account name on a targeted system.
['T1033']
Lizar can collect the username from the system.
['T1033']
MacMa can collect the username from the compromised machine.
['T1033']
MarkiRAT can retrieve the victim’s username.
['T1033']
Micropsia collects the username from the victim’s machine.
['T1033']
Milan can identify users registered to a targeted machine.
['T1033']
MirageFox can gather the username from the victim’s machine.
['T1033']
Mis-Type runs tests to determine the privilege level of the compromised user.
['T1033']
More_eggs has the capability to gather the username from the victim's machine.
['T1033']
Mosquito runs "whoami" on the victim’s machine.
['T1033']
NBTscan can list active users on the system.
['T1033']
NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel.
['T1033']
NOKKI can collect the username from the victim’s machine.
['T1033']
NanHaiShu collects the username from the victim.
['T1033']
Neoichor can collect the user name from a victim's machine.
['T1033']
ObliqueRAT can check for blocklisted usernames on infected endpoints.
['T1033']
Octopus can collect the username from the victim’s machine.
['T1033']
OilRig has run "whoami" on a victim.
['T1033']
Okrum can collect the victim username.
['T1033']
Operation Wocao has enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system.
['T1033']
POWERSTATS has the ability to identify the username on the compromised host.
['T1033']
POWRUNER may collect information about the currently logged in user by running "whoami" on a victim.
['T1033']
Patchwork collected the victim username and whether it was running as admin, then sent the information to its C2 server.
['T1033']
PoetRAT sent username, computer name, and the previously generated UUID in reply to a "who" command from C2.
['T1033']
PowerShower has the ability to identify the current user on the infected host.
['T1033']
PyDCrypt has probed victim machines with "whoami" and has collected the username from the machine.
['T1033']
QUADAGENT gathers the victim username.
['T1033']
QakBot can identify the user name on a compromised system.
['T1033']
QuasarRAT can enumerate the username and account type.
['T1033']
RATANKBA runs the "whoami" and "query user" commands.
['T1033']
RCSession can gather system owner information, including user and administrator privileges.
['T1033']
RGDoor executes the "whoami" on the victim’s machine.
['T1033']
ROKRAT can collect the username from a compromised host.
['T1033']
RTM can obtain the victim username and permissions.
['T1033']
RedLeaves can obtain information about the logged on user both locally and for Remote Desktop sessions.
['T1033']
Remsec can obtain information about the current user.
['T1033']
Revenge RAT gathers the username from the system.
['T1033']
Rifdoor has the ability to identify the username on the compromised host.
['T1033']
Rising Sun can detect the username of the infected host.
['T1033']
SDBbot has the ability to identify the user on a compromised host.
['T1033']
SLOTHFULMEDIA has collected the username from a victim machine.
['T1033']
SMOKEDHAM has used "whoami" commands to identify system owners.
['T1033']
STARWHALE can gather the username from an infected host.
['T1033']
SUNBURST collected the username from a compromised host.
['T1033']
ServHelper will attempt to enumerate the username of the victim.
['T1033']
SideTwist can collect the username on a targeted system.
['T1033']
Small Sieve can obtain the id of a logged in user.
['T1033']
SodaMaster can identify the username on a compromised host.
['T1033']
SombRAT can execute "getinfo" to identify the username on a compromised host.
['T1033']
Squirrelwaffle can collect the user name from a compromised host.
['T1033']
SslMM sends the logged-on username to its hard-coded C2.
['T1033']
Stealth Falcon malware gathers the registered user and primary owner name via WMI.
['T1033']
StrifeWater can collect the user name from the victim's machine.
['T1033']
SynAck gathers user names from infected hosts.
['T1033']
T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM.
['T1033']
The OsInfo function in Komplex collects the current running username.
['T1033']
TrickBot can identify the user and groups the user belongs to on a compromised host.
['T1033']
Trojan.Karagany can gather information about the user on a compromised host.
['T1033']
UPPERCUT has the capability to collect the current logged on user’s username from a machine.
['T1033']
Valak can gather information regarding the user.
['T1033']