text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
FlawedAmmyy leverages WMI to enumerate anti-virus on the victim. | ['T1047'] |
Frankenstein has used WMI queries to check if various security applications were running, as well as the operating system version. | ['T1047'] |
FunnyDream can use WMI to open a Windows command shell on a remote machine. | ['T1047'] |
GALLIUM used WMI for execution to assist in lateral movement as well as for installing tools across multiple assets. | ['T1047'] |
Gamaredon Group has used WMI to execute scripts used for discovery. | ['T1047'] |
GravityRAT collects various information via WMI requests, including CPU information in the Win32_Processor entry (Processor ID, Name, Manufacturer and the clock speed). | ['T1047'] |
HALFBAKED can use WMI queries to gather system information. | ['T1047'] |
HELLOKITTY can use WMI to delete volume shadow copies. | ['T1047'] |
HOPLIGHT has used WMI to recompile the Managed Object Format (MOF) files in the WMI repository. | ['T1047'] |
HermeticWizard can use WMI to create a new process on a remote machine via `C:\windows\system32\cmd.exe /c start C:\windows\system32\\regsvr32.exe /s /iC:\windows\<filename>.dll`. | ['T1047'] |
IcedID has used WMI to execute binaries. | ['T1047'] |
Impacket's wmiexec module can be used to execute commands through WMI. | ['T1047'] |
Koadic can use WMI to execute commands. | ['T1047'] |
Lazarus Group has used WMIC for discovery as well as to execute payloads for persistence and lateral movement. | ['T1047'] |
Lucifer can use WMI to log into remote machines for propagation. | ['T1047'] |
Magic Hound has used a tool to run `cmd /c wmic computersystem get domain` for discovery. | ['T1047'] |
Maze has used WMI to attempt to delete the shadow volumes on a machine, and to connect a virtual machine to the network domain of the victim organization's network. | ['T1047'] |
Meteor can use `wmic.exe` as part of its effort to delete shadow copies. | ['T1047'] |
Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI. | ['T1047', 'T1518.001'] |
Mosquito's installer uses WMI to search for antivirus display names. | ['T1047'] |
MuddyWater has used malware that leveraged WMI for execution and querying host information. | ['T1047'] |
Naikon has used WMIC.exe for lateral movement. | ['T1047'] |
Netwalker can use WMI to delete Shadow Volumes. | ['T1047'] |
NotPetya can use "wmic" to help propagate itself across a network. | ['T1047'] |
Octopus has used wmic.exe for local discovery information. | ['T1047'] |
OilRig has used WMI for execution. | ['T1047'] |
OopsIE uses WMI to perform discovery techniques. | ['T1047'] |
POWERSTATS can use WMI queries to retrieve data from compromised hosts. | ['T1047'] |
POWRUNER may use WMI when collecting information about a victim. | ['T1047'] |
ProLock can use WMIC to execute scripts on targeted hosts. | ['T1047'] |
PyDCrypt has attempted to execute with WMIC. | ['T1047'] |
RATANKBA uses WMI to perform process monitoring. | ['T1047'] |
REvil can use WMI to monitor for and kill specific processes listed in its configuration file. | ['T1047'] |
Remexi executes received commands with wmic.exe (for WMI commands). | ['T1047'] |
RogueRobin uses various WMI queries to check if the sample is running in a sandbox. | ['T1047'] |
SILENTTRINITY can use WMI for lateral movement. | ['T1047'] |
SUNBURST used the WMI query "Select * From Win32_SystemDriver" to retrieve a driver listing. | ['T1047'] |
Sandworm Team has used VBScript to run WMI queries. | ['T1047'] |
SharpStage can use WMI for execution. | ['T1047'] |
Stuxnet used WMI with an "explorer.exe" token to execute on a remote share. | ['T1047'] |
SysUpdate can use WMI for execution on a compromised host. | ['T1047'] |
UNC2452 used WMI for the remote execution of files for lateral movement. | ['T1047'] |
Ursnif droppers have used WMI classes to execute PowerShell commands. | ['T1047'] |
Valak can use "wmic process call create" in a scheduled task to launch plugins and for execution. | ['T1047'] |
WannaCry utilizes "wmic" to delete shadow copies. | ['T1047'] |
Windshift has used WMI to collect information about target machines. | ['T1047'] |
Wizard Spider has used WMI and LDAP queries for network discovery and to move laterally. | ['T1047'] |
jRAT uses WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details. | ['T1047'] |
Bundlore uses the "curl -s -L -o" command to exfiltrate archived data to a URL. | ['T1048'] |
FrameworkPOS can use DNS tunneling for exfiltration of credit card data. | ['T1048'] |
Hydraq connects to a predefined domain on port 443 to exfil gathered information. | ['T1048'] |
Kobalos can exfiltrate credentials over the network via UDP. | ['T1048'] |
PoetRAT has used a .NET tool named dog.exe to exiltrate information over an e-mail account. | ['T1048'] |
APT28 has exfiltrated archives of collected data previously staged on a target's OWA server via HTTPS. | ['T1048.002'] |
APT29 has exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers. | ['T1048.002'] |
UNC2452 exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers. | ['T1048.002'] |
APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets. | ['T1048.003'] |
Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP. | ['T1048.003'] |
BITSAdmin can be used to create BITS Jobs to upload files from a compromised host. | ['T1048.003'] |
CORALDECK has exfiltrated data in HTTP POST headers. | ['T1048.003'] |
Carbon uses HTTP to send data to the C2 server. | ['T1048.003'] |
CharmPower can send victim data via FTP with credentials hardcoded in the script. | ['T1048.003'] |
Cherry Picker exfiltrates files over FTP. | ['T1048.003'] |
CookieMiner has used the "curl --upload-file" command to exfiltrate data over HTTP. | ['T1048.003'] |
CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers. | ['T1048.003'] |
Dok exfiltrates logs of its execution stored in the "/tmp" folder over FTP using the "curl" command. | ['T1048.003'] |
FIN8 has used FTP to exfiltrate collected data. | ['T1048.003'] |
Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS. | ['T1048.003'] |
Lazarus Group malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims. | ['T1048.003'] |
PoetRAT has used ftp for exfiltration. | ['T1048.003'] |
Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel. | ['T1048.003'] |
Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command. | ['T1048.003'] |
Thrip has used WinSCP to exfiltrate data from a targeted organization over FTP. | ['T1048.003'] |
WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl. | ['T1048.003'] |
Wizard Spider has exfiltrated victim information using FTP. | ['T1048.003'] |
ccf32 can upload collected data and files to an FTP server. | ['T1048.003'] |
ftp may be used to exfiltrate data separate from the main command and control protocol. | ['T1048.003'] |
APT32 used the "netstat -anpo tcp" command to display TCP connections on the victim's machine. | ['T1049'] |
APT38 installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system. | ['T1049'] |
Andariel has used the "netstat -naop tcp" command to display TCP connections on a victim's machine. | ['T1049'] |
Aria-body has the ability to gather TCP and UDP table status listings. | ['T1049'] |
Babuk can use “WNetOpenEnumW” and “WNetEnumResourceW” to enumerate files in network resources for encryption. | ['T1049'] |
BackdoorDiplomacy has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports. | ['T1049'] |
BlackEnergy has gathered information about local network connections using netstat. | ['T1049'] |
Carbon uses the "netstat -r" and "netstat -an" commands. | ['T1049'] |
Chimera has used "netstat -ano | findstr EST" to discover network connections. | ['T1049'] |
Cobalt Strike can produce a sessions report from compromised hosts. | ['T1049'] |
Commands such as "net use" and "net session" can be used in Net to gather information about network connections from a particular host. | ['T1049'] |
Comnie executes the "netstat -ano" command. | ['T1049'] |
Conti can enumerate routine network connections from a compromised host. | ['T1049'] |
Cuba can use the function "GetIpNetTable" to recover the last connections to the victim's machine. | ['T1049'] |
Dtrack can collect network and active connection information. | ['T1049'] |
During FunnyDream, the threat actors used netstat to discover network connections on remote systems. | ['T1049'] |
During Operation Wocao, threat actors collected a list of open connections on the infected system using `netstat` and checks whether it has an internet connection. | ['T1049'] |
Egregor can enumerate all connected drives. | ['T1049'] |
Empire can enumerate the current network connections of a host. | ['T1049'] |
Epic uses the "net use", "net session", and "netstat" commands to gather information on network connections. | ['T1049'] |
GravityRAT uses the "netstat" command to find open ports on the victim’s machine. | ['T1049'] |
KONNI has used "net session" on the victim's machine. | ['T1049'] |
Ke3chang performs local network connection discovery using "netstat". | ['T1049'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.