text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
WINDSHIELD can gather the victim user name. | ['T1033'] |
WINERACK can gather information on the victim username. | ['T1033'] |
WellMail can identify the current username on the victim system. | ['T1033'] |
WinMM uses NetUser-GetInfo to identify that it is running under an “Admin” account on the local system. | ['T1033'] |
Wizard Spider has used "whoami" to identify the local user and their privileges. | ['T1033'] |
XAgentOSX contains the getInfoOSX function to return the OS X version as well as the current user. | ['T1033'] |
ZIRCONIUM has used a tool to capture the username on a compromised host in order to register it with C2. | ['T1033'] |
Zebrocy gets the username from the system. | ['T1033'] |
ZxxZ can collect the username from a compromised host. | ['T1033'] |
njRAT enumerates the current user during the initial infection. | ['T1033'] |
zwShell can obtain the name of the logged-in user on the victim. | ['T1033'] |
APT28 has renamed the WinRAR utility to avoid detection. | ['T1036'] |
AppleSeed can disguise JavaScript files as PDFs. | ['T1036'] |
Bisonal dropped a decoy payload with a .jpg extension that contained a malicious Visual Basic script. | ['T1036'] |
BoomBox has the ability to mask malicious data strings as PDF files. | ['T1036'] |
Dragonfly 2.0 created accounts disguised as legitimate backup and service accounts as well as an email administration account. | ['T1036'] |
Dragonfly has created accounts disguised as legitimate backup and service accounts as well as an email administration account. | ['T1036'] |
EnvyScout has used folder icons for malicious files to lure victims into opening them. | ['T1036'] |
Flagpro can download malicious files with a .tmp extension and append them with .exe prior to execution. | ['T1036'] |
For Operation Dust Storm, the threat actors disguised some executables as JPG files. | ['T1036'] |
Kimsuky has disguised its C2 addresses as the websites of shopping malls, governments, universities, and others. | ['T1036'] |
Lazarus Group has disguised malicious template files as JPEG files to avoid detection. | ['T1036'] |
LazyScripter has used several different security software icons to disguise executables. | ['T1036'] |
Milan has used an executable named `companycatalogue` to appear benign. | ['T1036'] |
Mustang Panda has used an additional filename extension to hide the true file type. | ['T1036', 'T1036.007'] |
NativeZone has, upon execution, displayed a message box that appears to be related to a Ukrainian electronic document management system. | ['T1036'] |
Nomadic Octopus attempted to make Octopus appear as a Telegram Messenger with a Russian interface. | ['T1036'] |
NotPetya drops PsExec with the filename dllhost.dat. | ['T1036'] |
PLATINUM has renamed rar.exe to avoid detection. | ['T1036'] |
PowGoop has disguised a PowerShell script as a .dat file (goopdate.dat). | ['T1036'] |
QuasarRAT has dropped binaries as files named microsoft_network.exe and crome.exe. | ['T1036'] |
RCSession has used a file named English.rtf to appear benign on victim hosts. | ['T1036'] |
Raindrop was built to include a modified version of 7-Zip source code (including associated export names) and Far Manager source code. | ['T1036'] |
Ryuk can create .dll files that actually contain a Rich Text File format document. | ['T1036'] |
Saint Bot has renamed malicious binaries as `wallpaper.mp4` and `slideshow.mp4` to avoid detection. | ['T1036'] |
SombRAT can use a legitimate process name to hide itself. | ['T1036'] |
The QakBot payload has been disguised as a PNG file. | ['T1036'] |
TrailBlazer has used filenames that match the name of the compromised system in attempt to avoid detection. | ['T1036'] |
UNC2452 set the hostnames of its C2 infrastructure to match legitimate hostnames in the victim environment. They also primarily used IP addresses originating from the same country as the victim for their VPN infrastructure. | ['T1036'] |
WhisperGate has been disguised as a JPG extension to avoid detection as a malicious PE file. | ['T1036'] |
XCSSET builds a malicious application bundle to resemble Safari through using the Safari icon and "Info.plist". | ['T1036'] |
menuPass has used esentutl to change file extensions to their true type that were masquerading as .txt files. | ['T1036'] |
APT37 has signed its malware with an invalid digital certificates listed as “Tencent Technology (Shenzhen) Company Limited.” | ['T1036.001'] |
BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate. | ['T1036.001'] |
Gelsemium has used unverified signatures on malicious DLLs. | ['T1036.001'] |
PcShare has used an invalid certificate in attempt to appear legitimate. | ['T1036.001'] |
WindTail has been incompletely signed with revoked certificates. | ['T1036.001'] |
Windshift has used revoked certificates to sign malware. | ['T1036.001'] |
BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments. | ['T1036.002'] |
Ferocious Kitten has used right-to-left override to reverse executables’ names to make them appear to have different file extensions, rather than their real ones. | ['T1036.002'] |
Ke3chang has used the right-to-left override character in spearphishing attachment names to trick targets into executing .scr and .exe files. | ['T1036.002'] |
Scarlet Mimic has used the left-to-right override character in self-extracting RAR archive spearphishing attachment file names. | ['T1036.002'] |
APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection. | ['T1036.003'] |
Kevin has renamed an image of `cmd.exe` with a random name followed by a `.tmpl` extension. | ['T1036.003'] |
Lazarus Group has renamed system utilities such as "wscript.exe" and "mshta.exe". | ['T1036.003'] |
The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file. | ['T1036.003'] |
A Lazarus Group custom backdoor implant included a custom PE loader named "Security Package" that was added into the lsass.exe process via registry key. | ['T1036.004'] |
APT-C-36 has disguised its scheduled tasks as those used by Google. | ['T1036.004'] |
APT29 named tasks "\Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager" in order to appear legitimate. | ['T1036.004'] |
APT41 has created services to appear as benign system tools. | ['T1036.004'] |
BITTER has disguised malware as a Windows Security update service. | ['T1036.004'] |
Bazar can create a task named to appear benign. | ['T1036.004'] |
CSPY Downloader has attempted to appear as a legitimate Windows service with a fake description claiming it is used to support packed applications. | ['T1036.004'] |
Carbanak has copied legitimate service names to use for malicious services. | ['T1036.004'] |
Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service. | ['T1036.004'] |
ComRAT has used a task name associated with Windows SQM Consolidator. | ['T1036.004'] |
Crutch has established persistence with a scheduled task impersonating the Outlook item finder. | ['T1036.004'] |
DCSrv has masqueraded its service as a legitimate svchost.exe process. | ['T1036.004'] |
Egregor has masqueraded the svchost.exe process to exfiltrate data. | ['T1036.004'] |
FIN6 has renamed the "psexec" service name to "mstdc" to masquerade as a legitimate Windows service. | ['T1036.004'] |
FIN7 has created a scheduled task named “AdobeFlashSync” to establish persistence. | ['T1036.004'] |
FunnyDream has used a service named `WSearch` for execution. | ['T1036.004'] |
Fysbis has masqueraded as the rsyncd and dbus-inotifier services. | ['T1036.004'] |
GoldMax has impersonated systems management software to avoid detection. | ['T1036.004'] |
Green Lambert has created a new executable named `Software Update Check` to appear legitimate. | ['T1036.004'] |
Heyoka Backdoor has been named `srvdll.dll` to appear as a legitimate service. | ['T1036.004'] |
Higaisa named a shellcode loader binary "svchast.exe" to spoof the legitimate "svchost.exe". | ['T1036.004'] |
Hildegard has disguised itself as a known Linux process. | ['T1036.004'] |
In one instance, menuPass added PlugX as a service with a display name of "Corel Writing Tools Utility." | ['T1036.004'] |
IronNetInjector has been disguised as a legitimate service using the name PythonUpdateSrvc. | ['T1036.004'] |
KillDisk registers as a service under the Plug-And-Play Support name. | ['T1036.004'] |
Kimsuky has disguised services to appear as benign software or related to operating system functions. | ['T1036.004'] |
Machete renamed task names to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python tasks. | ['T1036.004'] |
Naikon renamed a malicious service "taskmgr" to appear to be a legitimate version of Task Manager. | ['T1036.004'] |
Nebulae has created a service named "Windows Update Agent1" to appear legitimate. | ['T1036.004'] |
OSX_OCEANLOTUS.D has disguised its app bundle by adding special characters to the filename and using the icon for legitimate Word documents. | ['T1036.004'] |
Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager. | ['T1036.004'] |
POWERSTATS has created a scheduled task named "MicrosoftEdge" to establish persistence. | ['T1036.004'] |
PROMETHIUM has named services to appear legitimate. | ['T1036.004'] |
PingPull can mimic the names and descriptions of legitimate services such as `iphlpsvc`, `IP Helper`, and `Onedrive` to evade detection. | ['T1036.004'] |
SUGARDUMP's scheduled task has been named `MicrosoftInternetExplorerCrashRepoeterTaskMachineUA` or `MicrosoftEdgeCrashRepoeterTaskMachineUA`, depending on the Windows OS version. | ['T1036.004'] |
Seasalt has masqueraded as a service called "SaSaut" with a display name of "System Authorization Service" in an apparent attempt to masquerade as a legitimate service. | ['T1036.004'] |
Shamoon creates a new service named “ntssrv” that attempts to appear legitimate; the service's display name is “Microsoft Network Realtime Inspection Service” and its description is “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.” Newer versions create the "MaintenaceSrv" service, which misspells the word "maintenance." | ['T1036.004'] |
ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems. | ['T1036.004'] |
Tarrask creates a scheduled task called “WinUpdate” to re-establish any dropped C2 connections. | ['T1036.004'] |
The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV” in an apparent attempt to masquerade as a legitimate service. | ['T1036.004'] |
To establish persistence, Truvasys adds a Registry Run key with a value "TaskMgr" in an attempt to masquerade as the legitimate Windows Task Manager. | ['T1036.004'] |
UNC2452 named tasks "\Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager" in order to appear legitimate. | ['T1036.004'] |
Wizard Spider has used scheduled tasks to install TrickBot, using task names to appear legitimate such as WinDotNet, GoogleTask, or Sysnetsf. It has also used common document file names for other malware binaries. | ['T1036.004'] |
ZIRCONIUM has created a run key named "Dropbox Update Setup" to mask a persistence mechanism for a malicious binary. | ['T1036.004'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.