text1
stringlengths
7
2.5k
labels
stringlengths
9
100
ZxxZ has been disguised as a Windows security update service.
['T1036.004']
build_downer has added itself to the Registry Run key as "NVIDIA" to appear legitimate.
['T1036.004']
A Winnti for Windows implant file was named ASPNET_FILTER.DLL, mimicking the legitimate ASP.NET ISAPI filter DLL with the same name.
['T1036.005']
APT28 has changed extensions on files containing exfiltrated data to make them appear benign, and renamed a web shell instance to appear as a legitimate OWA page.
['T1036.005']
APT29 renamed software and DLL's with legitimate names to appear benign.
['T1036.005']
APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe.
['T1036.005']
AppleSeed has the ability to rename its payload to ESTCommon.dll to masquerade as a DLL belonging to ESTsecurity.
['T1036.005']
BADNEWS attempts to hide its payloads using legitimate filenames.
['T1036.005']
BLINDINGCAN has attempted to hide its payload by using legitimate file names such as "iconcache.db".
['T1036.005']
BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems.
['T1036.005']
BackdoorDiplomacy has dropped implants in folders named for legitimate software.
['T1036.005']
Bad Rabbit has masqueraded as a Flash Player installer through the executable file "install_flash_player.exe".
['T1036.005']
Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file.
['T1036.005']
Bumblebee has named component DLLs "RapportGP.dll" to match those used by the security company Trusteer.
['T1036.005']
Bundlore has disguised a malicious .app file as a Flash Player update.
['T1036.005']
Carbanak has named malware "svchost.exe," which is the name of the Windows shared service host program.
['T1036.005']
Carberp has masqueraded as Windows system file names, as well as "chkntfs.exe" and "syscron.exe".
['T1036.005']
ChChes copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed (e.g. notron.exe).
['T1036.005']
Chaes has used an unsigned, crafted DLL module named "hha.dll" that was designed to look like a legitimate 32-bit Windows DLL.
['T1036.005']
Cuba has been disguised as legitimate 360 Total Security Antivirus and OpenVPN programs.
['T1036.005']
DRATzarus has been named `Flash.exe`, and its dropper has been named `IExplorer`.
['T1036.005']
DanBot files have been named `UltraVNC.exe` and `WINVNC.exe` to appear as legitimate VNC tools.
['T1036.005']
Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool.
['T1036.005']
During Operation CuckooBees, the threat actors renamed a malicious executable to `rundll32.exe` to allow it to blend in with other Windows system files.
['T1036.005']
During Operation Honeybee, the threat actors used a legitimate Windows executable and secure directory for their payloads to bypass UAC.
['T1036.005']
During Operation Sharpshooter, threat actors installed Rising Sun in the Startup folder and disguised it as `mssync.exe`.
['T1036.005']
During Operation Wocao, the threat actors renamed some tools and executables to appear as legitimate programs.
['T1036.005']
Earth Lusca used the command `move [file path] c:\windows\system32\spool\prtprocs\x64\spool.dll` to move and register a malicious DLL name as a Windows print processor, which eventually was loaded by the Print Spooler service.
['T1036.005']
FIN7 has attempted to run Darkside ransomware with the filename sleep.exe.
['T1036.005']
Felismus has masqueraded as legitimate Adobe Content Management System files.
['T1036.005']
Ferocious Kitten has named malicious files "update.exe" and loaded them into the compromise host's “Public” folder.
['T1036.005']
FinFisher renames one of its .dll files to uxtheme.dll in an apparent attempt to masquerade as a legitimate file.
['T1036.005']
FoggyWeb can be disguised as a Visual Studio file such as `Windows.Data.TimeZones.zh-PH.pri` to evade detection. Also, FoggyWeb's loader can mimic a genuine `dll` file that carries out the same import functions as the legitimate Windows `version.dll` file.
['T1036.005']
Fox Kitten has named binaries and configuration files svhost and dllhost respectively to appear legitimate.
['T1036.005']
Fysbis has masqueraded as trusted software rsyncd and dbus-inotifier.
['T1036.005']
Gamaredon Group has used legitimate process names to hide malware including "svchosst".
['T1036.005']
Gelsemium has named malicious binaries `serv.exe`, `winprint.dll`, and `chrome_elf.dll` and has set its persistence in the Registry with the key value "Chrome Update" to appear legitimate.
['T1036.005']
GoldenSpy's setup file installs initial executables under the folder "%WinDir%\System32\PluginManager".
['T1036.005']
Goopy has impersonated the legitimate goopdate.dll, which was dropped on the target system with a legitimate GoogleUpdate.exe.
['T1036.005']
Grandoreiro has named malicious browser extensions and update files to appear legitimate.
['T1036.005']
Green Lambert has been disguised as a Growl help file.
['T1036.005']
HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL.
['T1036.005']
HermeticWiper has used the name `postgressql.exe` to mask a malicious payload.
['T1036.005']
HermeticWizard has been named `exec_32.dll` to mimic a legitimate MS Outlook .dll.
['T1036.005']
IceApple .NET assemblies have used `App_Web_` in their file names to appear legitimate.
['T1036.005']
If installing itself as a service fails, Elise instead writes itself as a file named svchost.exe saved in %APPDATA%\Microsoft\Network.
['T1036.005']
Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors.
['T1036.005']
InnaputRAT variants have attempted to appear legitimate by using the file names SafeApp.exe and NeutralApp.exe.
['T1036.005']
InvisiMole has disguised its droppers as legitimate software or documents, matching their original names and locations, and saved its files as mpr.dll in the Windows folder.
['T1036.005']
KGH_SPY has masqueraded as a legitimate Windows tool.
['T1036.005']
KONNI has created a shortcut called "Anti virus service.lnk" in an apparent attempt to masquerade as a legitimate file.
['T1036.005']
Ke3chang has dropped their malware into legitimate installed software paths including: `C:\ProgramFiles\Realtek\Audio\HDA\AERTSr.exe`, `C:\Program Files (x86)\Foxit Software\Foxit Reader\FoxitRdr64.exe`, `C:\Program Files (x86)\Adobe\Flash Player\AddIns\airappinstaller\airappinstall.exe`, and `C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd64.exe`.
['T1036.005']
Kimsuky has renamed malware to legitimate names such as "ESTCommon.dll" or "patch.dll".
['T1036.005']
Lazarus Group has renamed malicious code to disguise it as Microsoft's narrator and other legitimate files.
['T1036.005']
LookBack has a C2 proxy tool that masquerades as "GUP.exe", which is software used by Notepad++.
['T1036.005']
MCMD has been named Readme.txt to appear legitimate.
['T1036.005']
Machete renamed payloads to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python executables.
['T1036.005']
Machete's Machete MSI installer has masqueraded as a legitimate Adobe Acrobat Reader installer.
['T1036.005']
MarkiRAT can masquerade as "update.exe" and "svehost.exe"; it has also mimicked legitimate Telegram and Chrome files.
['T1036.005']
MechaFlounder has been downloaded as a file named lsass.exe, which matches the legitimate Windows file.
['T1036.005']
Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer and has masqueraded payloads as OneDrive, WhatsApp, or Spotify, for example.
['T1036.005']
Misdat saves itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.
['T1036.005']
MuddyWater has disguised malicious executables and used filenames and Registry key names associated with Windows Defender.
['T1036.005']
Mustang Panda has used names like `adobeupdate.dat` and `PotPlayerDB.dat` to disguise PlugX, and a file named `OneDrive.exe` to load a Cobalt Strike payload.
['T1036.005']
Naikon has disguised malicious programs as Google Chrome, Adobe, and VMware executables.
['T1036.005']
Nebulae uses functions named "StartUserModeBrowserInjection" and "StopUserModeBrowserInjection" indicating that it's trying to imitate chrome_frame_helper.dll.
['T1036.005']
OLDBAIT installs itself in "%ALLUSERPROFILE%\\Application Data\Microsoft\MediaPlayer\updatewindws.exe"; the directory name is missing a space and the file name is missing the letter "o."
['T1036.005']
OSX/Shlayer can masquerade as a Flash Player update.
['T1036.005']
Octopus has been disguised as legitimate programs, such as Java and Telegram Messenger.
['T1036.005']
One of Dtrack can hide in replicas of legitimate programs like OllyDbg, 7-Zip, and FileZilla.
['T1036.005']
OwaAuth uses the filename owaauth.dll, which is a legitimate file that normally resides in "%ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\Auth\"; the malicious file by the same name is saved in "%ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\bin\".
['T1036.005']
PUNCHBUGGY mimics filenames from %SYSTEM%\System32 to hide DLLs in %WINDIR% and/or %TEMP%.
['T1036.005']
Patchwork installed its payload in the startup programs folder as "Baidu Software Update." The group also adds its second stage payload to the startup programs as “Net Monitor." They have also dropped QuasarRAT binaries as files named microsoft_network.exe and crome.exe.
['T1036.005']
PcShare has been named `wuauclt.exe` to appear as the legitimate Windows Update AutoUpdate Client.
['T1036.005']
Penquin has mimicked the Cron binary to hide itself on compromised systems.
['T1036.005']
PlugX has been disguised as legitimate Adobe and PotPlayer files.
['T1036.005']
Poseidon Group tools attempt to spoof anti-virus processes as a means of self-defense.
['T1036.005']
Pysa has executed a malicious executable by naming it svchost.exe.
['T1036.005']
QUADAGENT used the PowerShell filenames "Office365DCOMCheck.ps1" and "SystemDiskClean.ps1".
['T1036.005']
RDAT has masqueraded as VMware.exe.
['T1036.005']
REvil can mimic the names of known executables.
['T1036.005']
Raindrop was installed under names that resembled legitimate Windows file and directory names.
['T1036.005']
RainyDay has used names to mimic legitimate software including "vmtoolsd.exe" to spoof Vmtools.
['T1036.005']
Rocke has used shell scripts which download mining executables and saves them with the filename "java".
['T1036.005']
Ryuk has constructed legitimate appearing installation folder paths by calling "GetWindowsDirectoryW" and then inserting a null byte at the fourth character of the path. For Windows Vista or higher, the path would appear as "C:\Users\Public".
['T1036.005']
S-Type may save itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.
['T1036.005']
SLOTHFULMEDIA has mimicked the names of known executables, such as mediaplayer.exe.
['T1036.005']
SUGARDUMP has been named `CrashReporter.exe` to appear as a legitimate Mozilla executable.
['T1036.005']
SUNBURST created VBScripts that were named after existing services or folders to blend into legitimate activities.
['T1036.005']
SUNSPOT was identified on disk with a filename of "taskhostsvc.exe" and it created an encrypted log file at "C:\Windows\Temp\vmware-vmdmp.log".
['T1036.005']
Saint Bot has been disguised as a legitimate executable, including as Windows SDK.
['T1036.005']
Sandworm Team has avoided detection by naming a malicious binary explorer.exe.
['T1036.005']
Shark binaries have been named `audioddg.pdb` and `Winlangdb.pdb` in order to appear legitimate.
['T1036.005']
ShimRatReporter spoofed itself as "AlphaZawgyl_font.exe", a specialized Unicode font.
['T1036.005']
Sidewinder has named malicious files "rekeywiz.exe" to match the name of a legitimate Windows executable.
['T1036.005']
Skidmap has created a fake "rm" binary to replace the legitimate Linux binary.
['T1036.005']
Sowbug named its tools to masquerade as Windows or Adobe Reader software, such as by using the file name adobecms.exe and the directory "CSIDL_APPDATA\microsoft\security".
['T1036.005']
StrongPity has been bundled with legitimate software installation files for disguise.
['T1036.005']
TEMP.Veles has renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.
['T1036.005']
TRITON disguised itself as the legitimate Triconex Trilog application.
['T1036.005']