text1
stringlengths
7
2.5k
labels
stringlengths
9
100
MacMa exfiltrates data from a supplied path over its C2 channel.
['T1041']
Machete's collected data is exfiltrated over the same channel used for C2.
['T1041']
MarkiRAT can exfiltrate locally stored data via its C2.
['T1041']
MechaFlounder has the ability to send the compromised user's account name and hostname within a URL to C2.
['T1041']
Metamorfo can send the data it collects to the C2 server.
['T1041']
Misdat has uploaded files and data to its C2 servers.
['T1041']
Mongall can upload files and information from a compromised host to its C2 server.
['T1041']
MuddyWater has used C2 infrastructure to receive exfiltrated data.
['T1041']
Octopus has uploaded stolen files and data from a victim's machine over its C2 channel.
['T1041']
OopsIE can upload files from the victim's machine to its C2 server.
['T1041']
Operation Wocao has used the Xserver backdoor to exfiltrate data.
['T1041']
OutSteel can upload files from a compromised host over its C2 channel.
['T1041']
PcShare can upload files and information from a compromised host to its C2 servers.
['T1041']
PoetRAT has exfiltrated data over the C2 channel.
['T1041']
Proxysvc performs data exfiltration over the control server channel using a custom protocol.
['T1041']
Psylo exfiltrates data to its C2 server over the same protocol as C2 communications.
['T1041']
Pteranodon exfiltrates screenshot files to its C2 server.
['T1041']
Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.
['T1041']
QakBot can send stolen information to C2 nodes including passwords, accounts, and emails.
['T1041']
Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.
['T1041']
S-Type has uploaded data and files from a compromised host to its C2 servers.
['T1041']
SDBbot has sent collected data from a compromised host to its C2 servers.
['T1041']
SILENTTRINITY can transfer files from an infected host to the C2 server.
['T1041']
SMOKEDHAM has exfiltrated data to its C2 server.
['T1041']
STARWHALE can exfiltrate collected data to its C2 servers.
['T1041']
Sandworm Team has sent system information to its C2 server using HTTP.
['T1041']
Shark has the ability to upload files from the compromised host over a DNS or HTTP C2 channel.
['T1041']
ShimRatReporter sent generated reports to the C2 via HTTP POST requests.
['T1041']
SideTwist has exfiltrated data over its C2 channel.
['T1041']
Sliver can exfiltrate files from the victim using the "download" command.
['T1041']
SombRAT has uploaded collected data and files from a compromised host to its C2 server.
['T1041']
StrifeWater can send data and files from a compromised host to its C2 server.
['T1041']
StrongPity can exfiltrate collected documents through C2 channels.
['T1041']
Stuxnet sends compromised victim information via HTTP.
['T1041']
TajMahal has the ability to send collected files over its C2.
['T1041']
Tomiris can upload files matching a hardcoded set of extensions, such as .doc, .docx, .pdf, and .rar, to its C2 server.
['T1041']
Torisma can send victim data to an actor-controlled C2 server.
['T1041']
TrickBot can send information about the compromised host and upload data to a hardcoded C2 server.
['T1041']
Ursnif has used HTTP POSTs to exfil gathered information.
['T1041']
Valak has the ability to exfiltrate data over the C2 channel.
['T1041']
XCSSET exfiltrates data stolen from a system over its C2 channel.
['T1041']
ZLib has sent data and files from a compromised host to its C2 servers.
['T1041']
njRAT has used HTTP to receive stolen information from the infected machine.
['T1041']
APT32 performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities.
['T1046']
APT34 has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.
['T1046']
APT39 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning.
['T1046']
Backdoor.Oldrea can use a network scanning module to identify ICS-related ports.
['T1046']
BlackEnergy has conducted port scans on a host.
['T1046']
BlackTech has used the SNScan tool to find other potential targets on victim networks.
['T1046']
China Chopper's server component can spider authentication portals.
['T1046']
Cobalt Group leveraged an open-source tool called SoftPerfect Network Scanner to perform network scanning.
['T1046']
Conficker scans for other machines to infect.
['T1046']
CostaRicto employed nmap and pscan to scan target environments.
['T1046']
During CostaRicto, the threat actors employed nmap and pscan to scan target environments.
['T1046']
During Operation Wocao, threat actors scanned for open ports and used nbtscan to find NETBIOS nameservers.
['T1046']
HDoor scans to identify open ports on the victim.
['T1046']
HermeticWizard has the ability to scan ports on a compromised network.
['T1046']
Industroyer uses a custom port scanner to map out a network.
['T1046']
InvisiMole can scan the network for open ports and vulnerable instances of RDP and SMB protocols.
['T1046']
Koadic can scan for open TCP ports on the target network.
['T1046']
Lucifer can scan for open ports including TCP ports 135 and 1433.
['T1046']
NBTscan can be used to scan IP networks.
['T1046']
OilRig has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.
['T1046']
Operation Wocao has scanned for open ports and used nbtscan to find NETBIOS nameservers.
['T1046']
Peirates can initiate a port scan against a given IP address.
['T1046']
PoshC2 can perform port scans from an infected host.
['T1046']
Pupy has a built-in module for port scanning.
['T1046']
Pysa can perform network reconnaissance using the Advanced Port Scanner tool.
['T1046']
Rocke conducted scanning for exposed TCP port 7001 as well as SSH and Redis servers.
['T1046']
SILENTTRINITY can scan for open ports on a compromised machine.
['T1046']
SpeakUp checks for availability of specific ports on servers.
['T1046']
Suckfly the victim's internal network for hosts with ports 8080, 5900, and 40 open.
['T1046']
TeamTNT has used masscan to search for open Docker API ports and Kubernetes clusters. TeamTNT has also used malware that utilizes zmap and zgrab to search for vulnerable services in cloud environments.
['T1046']
ZxShell can launch port scans.
['T1046']
menuPass has used tcping.exe, similar to Ping, to probe port status on systems of interest.
['T1046']
A BlackEnergy 2 plug-in uses WMI to gather victim host details.
['T1047']
A Threat Group-3390 tool can use WMI to execute a binary.
['T1047']
APT29 used WMI to steal credentials and execute backdoors at a future time. They have also used WMI for the remote execution of files for lateral movement.
['T1047']
APT32 used WMI to deploy their tools on remote machines and to gather information about the Outlook process.
['T1047']
APT41 used WMI in several ways, including for execution of commands via WMIEXEC as well as for persistence via PowerSploit.
['T1047']
Agent Tesla has used wmi queries to gather information from the system.
['T1047']
Astaroth uses WMIC to execute payloads.
['T1047']
Blue Mockingbird has used wmic.exe to set environment variables.
['T1047']
Bumblebee can use WMI to gather system information and to spawn processes for code injection.
['T1047']
CharmPower can use `wmic` to gather information from a system.
['T1047']
Chimera has used WMIC to execute remote commands.
['T1047']
CrackMapExec can execute remote commands using Windows Management Instrumentation.
['T1047']
DarkWatchman can use WMI to execute commands.
['T1047']
During C0015, the threat actors used `wmic` and `rundll32` to load Cobalt Strike onto a target host.
['T1047']
During Frankenstein, the threat actors used WMI queries to check if various security applications were running as well as to determine the operating system version.
['T1047']
EKANS can use Windows Mangement Instrumentation (WMI) calls to execute operations.
['T1047']
EVILNUM has used the Windows Management Instrumentation (WMI) tool to enumerate infected machines.
['T1047']
Earth Lusca used a VBA script to execute WMI.
['T1047']
Emotet has used WMI to execute powershell.exe.
['T1047']
Empire can use WMI to deliver a payload to a remote host.
['T1047']
EvilBunny has used WMI to gather information about the system.
['T1047']
FELIXROOT uses WMI to query the Windows Registry.
['T1047']
FIN6 has used WMI to automate the remote execution of PowerShell scripts.
['T1047']
FIN7 has used WMI to install malware on targeted systems.
['T1047']
FIN8's malicious spearphishing payloads use WMI to launch malware and spawn cmd.exe execution. FIN8 has also used WMIC for lateral movement as well as during and post compromise cleanup activities.
['T1047']