text1
stringlengths
7
2.5k
labels
stringlengths
9
100
FlawedAmmyy leverages WMI to enumerate anti-virus on the victim.
['T1047']
Frankenstein has used WMI queries to check if various security applications were running, as well as the operating system version.
['T1047']
FunnyDream can use WMI to open a Windows command shell on a remote machine.
['T1047']
GALLIUM used WMI for execution to assist in lateral movement as well as for installing tools across multiple assets.
['T1047']
Gamaredon Group has used WMI to execute scripts used for discovery.
['T1047']
GravityRAT collects various information via WMI requests, including CPU information in the Win32_Processor entry (Processor ID, Name, Manufacturer and the clock speed).
['T1047']
HALFBAKED can use WMI queries to gather system information.
['T1047']
HELLOKITTY can use WMI to delete volume shadow copies.
['T1047']
HOPLIGHT has used WMI to recompile the Managed Object Format (MOF) files in the WMI repository.
['T1047']
HermeticWizard can use WMI to create a new process on a remote machine via `C:\windows\system32\cmd.exe /c start C:\windows\system32\\regsvr32.exe /s /iC:\windows\<filename>.dll`.
['T1047']
IcedID has used WMI to execute binaries.
['T1047']
Impacket's wmiexec module can be used to execute commands through WMI.
['T1047']
Koadic can use WMI to execute commands.
['T1047']
Lazarus Group has used WMIC for discovery as well as to execute payloads for persistence and lateral movement.
['T1047']
Lucifer can use WMI to log into remote machines for propagation.
['T1047']
Magic Hound has used a tool to run `cmd /c wmic computersystem get domain` for discovery.
['T1047']
Maze has used WMI to attempt to delete the shadow volumes on a machine, and to connect a virtual machine to the network domain of the victim organization's network.
['T1047']
Meteor can use `wmic.exe` as part of its effort to delete shadow copies.
['T1047']
Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI.
['T1047', 'T1518.001']
Mosquito's installer uses WMI to search for antivirus display names.
['T1047']
MuddyWater has used malware that leveraged WMI for execution and querying host information.
['T1047']
Naikon has used WMIC.exe for lateral movement.
['T1047']
Netwalker can use WMI to delete Shadow Volumes.
['T1047']
NotPetya can use "wmic" to help propagate itself across a network.
['T1047']
Octopus has used wmic.exe for local discovery information.
['T1047']
OilRig has used WMI for execution.
['T1047']
OopsIE uses WMI to perform discovery techniques.
['T1047']
POWERSTATS can use WMI queries to retrieve data from compromised hosts.
['T1047']
POWRUNER may use WMI when collecting information about a victim.
['T1047']
ProLock can use WMIC to execute scripts on targeted hosts.
['T1047']
PyDCrypt has attempted to execute with WMIC.
['T1047']
RATANKBA uses WMI to perform process monitoring.
['T1047']
REvil can use WMI to monitor for and kill specific processes listed in its configuration file.
['T1047']
Remexi executes received commands with wmic.exe (for WMI commands).
['T1047']
RogueRobin uses various WMI queries to check if the sample is running in a sandbox.
['T1047']
SILENTTRINITY can use WMI for lateral movement.
['T1047']
SUNBURST used the WMI query "Select * From Win32_SystemDriver" to retrieve a driver listing.
['T1047']
Sandworm Team has used VBScript to run WMI queries.
['T1047']
SharpStage can use WMI for execution.
['T1047']
Stuxnet used WMI with an "explorer.exe" token to execute on a remote share.
['T1047']
SysUpdate can use WMI for execution on a compromised host.
['T1047']
UNC2452 used WMI for the remote execution of files for lateral movement.
['T1047']
Ursnif droppers have used WMI classes to execute PowerShell commands.
['T1047']
Valak can use "wmic process call create" in a scheduled task to launch plugins and for execution.
['T1047']
WannaCry utilizes "wmic" to delete shadow copies.
['T1047']
Windshift has used WMI to collect information about target machines.
['T1047']
Wizard Spider has used WMI and LDAP queries for network discovery and to move laterally.
['T1047']
jRAT uses WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details.
['T1047']
Bundlore uses the "curl -s -L -o" command to exfiltrate archived data to a URL.
['T1048']
FrameworkPOS can use DNS tunneling for exfiltration of credit card data.
['T1048']
Hydraq connects to a predefined domain on port 443 to exfil gathered information.
['T1048']
Kobalos can exfiltrate credentials over the network via UDP.
['T1048']
PoetRAT has used a .NET tool named dog.exe to exiltrate information over an e-mail account.
['T1048']
APT28 has exfiltrated archives of collected data previously staged on a target's OWA server via HTTPS.
['T1048.002']
APT29 has exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.
['T1048.002']
UNC2452 exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.
['T1048.002']
APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets.
['T1048.003']
Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.
['T1048.003']
BITSAdmin can be used to create BITS Jobs to upload files from a compromised host.
['T1048.003']
CORALDECK has exfiltrated data in HTTP POST headers.
['T1048.003']
Carbon uses HTTP to send data to the C2 server.
['T1048.003']
CharmPower can send victim data via FTP with credentials hardcoded in the script.
['T1048.003']
Cherry Picker exfiltrates files over FTP.
['T1048.003']
CookieMiner has used the "curl --upload-file" command to exfiltrate data over HTTP.
['T1048.003']
CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.
['T1048.003']
Dok exfiltrates logs of its execution stored in the "/tmp" folder over FTP using the "curl" command.
['T1048.003']
FIN8 has used FTP to exfiltrate collected data.
['T1048.003']
Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS.
['T1048.003']
Lazarus Group malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims.
['T1048.003']
PoetRAT has used ftp for exfiltration.
['T1048.003']
Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel.
['T1048.003']
Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command.
['T1048.003']
Thrip has used WinSCP to exfiltrate data from a targeted organization over FTP.
['T1048.003']
WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.
['T1048.003']
Wizard Spider has exfiltrated victim information using FTP.
['T1048.003']
ccf32 can upload collected data and files to an FTP server.
['T1048.003']
ftp may be used to exfiltrate data separate from the main command and control protocol.
['T1048.003']
APT32 used the "netstat -anpo tcp" command to display TCP connections on the victim's machine.
['T1049']
APT38 installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system.
['T1049']
Andariel has used the "netstat -naop tcp" command to display TCP connections on a victim's machine.
['T1049']
Aria-body has the ability to gather TCP and UDP table status listings.
['T1049']
Babuk can use “WNetOpenEnumW” and “WNetEnumResourceW” to enumerate files in network resources for encryption.
['T1049']
BackdoorDiplomacy has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports.
['T1049']
BlackEnergy has gathered information about local network connections using netstat.
['T1049']
Carbon uses the "netstat -r" and "netstat -an" commands.
['T1049']
Chimera has used "netstat -ano | findstr EST" to discover network connections.
['T1049']
Cobalt Strike can produce a sessions report from compromised hosts.
['T1049']
Commands such as "net use" and "net session" can be used in Net to gather information about network connections from a particular host.
['T1049']
Comnie executes the "netstat -ano" command.
['T1049']
Conti can enumerate routine network connections from a compromised host.
['T1049']
Cuba can use the function "GetIpNetTable" to recover the last connections to the victim's machine.
['T1049']
Dtrack can collect network and active connection information.
['T1049']
During FunnyDream, the threat actors used netstat to discover network connections on remote systems.
['T1049']
During Operation Wocao, threat actors collected a list of open connections on the infected system using `netstat` and checks whether it has an internet connection.
['T1049']
Egregor can enumerate all connected drives.
['T1049']
Empire can enumerate the current network connections of a host.
['T1049']
Epic uses the "net use", "net session", and "netstat" commands to gather information on network connections.
['T1049']
GravityRAT uses the "netstat" command to find open ports on the victim’s machine.
['T1049']
KONNI has used "net session" on the victim's machine.
['T1049']
Ke3chang performs local network connection discovery using "netstat".
['T1049']