text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Chaes has collected the username and UID from the infected machine. | ['T1033'] |
Chimera has used the "quser" command to show currently logged on users. | ['T1033'] |
Chrommme can retrieve the username from a targeted system. | ['T1033'] |
Clambling can identify the username on a compromised host. | ['T1033'] |
Crimson can identify the user on a targeted system. | ['T1033'] |
DRATzarus can obtain a list of users from an infected machine. | ['T1033'] |
DarkComet gathers the username from the victim’s machine. | ['T1033'] |
Diavol can collect the username from a compromised host. | ['T1033'] |
DnsSystem can use the Windows user name to create a unique identification for infected users and systems. | ['T1033'] |
DownPaper collects the victim username and sends it to the C2 server. | ['T1033'] |
Dragonfly 2.0 used the command "query user" on victim hosts. | ['T1033'] |
Dragonfly used the command "query user" on victim hosts. | ['T1033'] |
During Frankenstein, the threat actors used Empire to enumerate hosts and gather username, machine name, and administrative permissions information. | ['T1033'] |
During Night Dragon, threat actors used password cracking and pass-the-hash tools to discover usernames and passwords. | ['T1033'] |
During Operation CuckooBees, the threat actors used the `query user` and `whoami` commands as part of their advanced reconnaissance. | ['T1033'] |
During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system. | ['T1033'] |
Dyre has the ability to identify the users on a compromised host. | ['T1033'] |
EVILNUM can obtain the username from the victim's machine. | ['T1033'] |
Earth Lusca collected information on user accounts via the "whoami" command. | ['T1033'] |
Egregor has used tools to gather information about users. | ['T1033'] |
Empire can enumerate the username on targeted hosts. | ['T1033'] |
Epic collects the user name from the victim’s machine. | ['T1033'] |
FELIXROOT collects the username from the victim’s machine. | ['T1033'] |
FIN10 has used Meterpreter to enumerate users on remote systems. | ['T1033'] |
Felismus collects the current username and sends it to the C2 server. | ['T1033'] |
Flagpro has been used to run the "whoami" command on the system. | ['T1033'] |
FlawedAmmyy enumerates the current user during the initial infection. | ['T1033'] |
FunnyDream has the ability to gather user information from the targeted system using `whoami/upn&whoami/fqdn&whoami/logonid&whoami/all`. | ['T1033'] |
GALLIUM used "whoami" and "query user" to obtain information about the victim user. | ['T1033'] |
Gelsemium has the ability to distinguish between a standard user and an administrator on a compromised host. | ['T1033'] |
Get2 has the ability to identify the current username of an infected host. | ['T1033'] |
Gold Dragon collects the endpoint victim's username and uses it as a basis for downloading additional components from the C2 server. | ['T1033'] |
GravityRAT collects the victim username along with other account information (account type, description, full name, SID and status). | ['T1033'] |
HAWKBALL can collect the user name of the system. | ['T1033'] |
HotCroissant has the ability to collect the username on the infected host. | ['T1033'] |
KONNI can collect the username from the victim’s machine. | ['T1033'] |
Ke3chang has used implants capable of collecting the signed-in username. | ['T1033'] |
Koadic can identify logged in users across the domain and views user sessions. | ['T1033'] |
Kwampirs collects registered owner details by using the commands "systeminfo" and "net config workstation". | ['T1033'] |
Linux Rabbit opens a socket on port 22 and if it receives a response it attempts to obtain the machine's hostname and Top-Level Domain. | ['T1033'] |
LiteDuke can enumerate the account name on a targeted system. | ['T1033'] |
Lizar can collect the username from the system. | ['T1033'] |
MacMa can collect the username from the compromised machine. | ['T1033'] |
MarkiRAT can retrieve the victim’s username. | ['T1033'] |
Micropsia collects the username from the victim’s machine. | ['T1033'] |
Milan can identify users registered to a targeted machine. | ['T1033'] |
MirageFox can gather the username from the victim’s machine. | ['T1033'] |
Mis-Type runs tests to determine the privilege level of the compromised user. | ['T1033'] |
More_eggs has the capability to gather the username from the victim's machine. | ['T1033'] |
Mosquito runs "whoami" on the victim’s machine. | ['T1033'] |
NBTscan can list active users on the system. | ['T1033'] |
NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel. | ['T1033'] |
NOKKI can collect the username from the victim’s machine. | ['T1033'] |
NanHaiShu collects the username from the victim. | ['T1033'] |
Neoichor can collect the user name from a victim's machine. | ['T1033'] |
ObliqueRAT can check for blocklisted usernames on infected endpoints. | ['T1033'] |
Octopus can collect the username from the victim’s machine. | ['T1033'] |
OilRig has run "whoami" on a victim. | ['T1033'] |
Okrum can collect the victim username. | ['T1033'] |
Operation Wocao has enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system. | ['T1033'] |
POWERSTATS has the ability to identify the username on the compromised host. | ['T1033'] |
POWRUNER may collect information about the currently logged in user by running "whoami" on a victim. | ['T1033'] |
Patchwork collected the victim username and whether it was running as admin, then sent the information to its C2 server. | ['T1033'] |
PoetRAT sent username, computer name, and the previously generated UUID in reply to a "who" command from C2. | ['T1033'] |
PowerShower has the ability to identify the current user on the infected host. | ['T1033'] |
PyDCrypt has probed victim machines with "whoami" and has collected the username from the machine. | ['T1033'] |
QUADAGENT gathers the victim username. | ['T1033'] |
QakBot can identify the user name on a compromised system. | ['T1033'] |
QuasarRAT can enumerate the username and account type. | ['T1033'] |
RATANKBA runs the "whoami" and "query user" commands. | ['T1033'] |
RCSession can gather system owner information, including user and administrator privileges. | ['T1033'] |
RGDoor executes the "whoami" on the victim’s machine. | ['T1033'] |
ROKRAT can collect the username from a compromised host. | ['T1033'] |
RTM can obtain the victim username and permissions. | ['T1033'] |
RedLeaves can obtain information about the logged on user both locally and for Remote Desktop sessions. | ['T1033'] |
Remsec can obtain information about the current user. | ['T1033'] |
Revenge RAT gathers the username from the system. | ['T1033'] |
Rifdoor has the ability to identify the username on the compromised host. | ['T1033'] |
Rising Sun can detect the username of the infected host. | ['T1033'] |
SDBbot has the ability to identify the user on a compromised host. | ['T1033'] |
SLOTHFULMEDIA has collected the username from a victim machine. | ['T1033'] |
SMOKEDHAM has used "whoami" commands to identify system owners. | ['T1033'] |
STARWHALE can gather the username from an infected host. | ['T1033'] |
SUNBURST collected the username from a compromised host. | ['T1033'] |
ServHelper will attempt to enumerate the username of the victim. | ['T1033'] |
SideTwist can collect the username on a targeted system. | ['T1033'] |
Small Sieve can obtain the id of a logged in user. | ['T1033'] |
SodaMaster can identify the username on a compromised host. | ['T1033'] |
SombRAT can execute "getinfo" to identify the username on a compromised host. | ['T1033'] |
Squirrelwaffle can collect the user name from a compromised host. | ['T1033'] |
SslMM sends the logged-on username to its hard-coded C2. | ['T1033'] |
Stealth Falcon malware gathers the registered user and primary owner name via WMI. | ['T1033'] |
StrifeWater can collect the user name from the victim's machine. | ['T1033'] |
SynAck gathers user names from infected hosts. | ['T1033'] |
T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM. | ['T1033'] |
The OsInfo function in Komplex collects the current running username. | ['T1033'] |
TrickBot can identify the user and groups the user belongs to on a compromised host. | ['T1033'] |
Trojan.Karagany can gather information about the user on a compromised host. | ['T1033'] |
UPPERCUT has the capability to collect the current logged on user’s username from a machine. | ['T1033'] |
Valak can gather information regarding the user. | ['T1033'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.