text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Kwampirs collects a list of active and listening connections by using the command "netstat -nao" as well as a list of available network mappings with "net use".
['T1049']
Lazarus Group has used "net use" to identify and establish a network connection with a remote host.
['T1049']
Lucifer can identify the IP and port numbers for all remote connections from the compromised host.
['T1049']
Machete uses the "netsh wlan show networks mode=bssid" and "netsh wlan show interfaces" commands to list all nearby WiFi networks and connected interfaces.
['T1049']
Magic Hound has used quser.exe to identify existing RDP connections.
['T1049']
Maze has used the "WNetOpenEnumW", "WNetEnumResourceW”, “WNetCloseEnum” and “WNetAddConnection2W” functions to enumerate the network resources on the infected machine.
['T1049']
NETWIRE can capture session logon details from a compromised host.
['T1049']
OilRig has used "netstat -an" on a victim to get a listing of network connections.
['T1049']
Okrum was seen using NetSess to discover NetBIOS sessions.
['T1049']
PlugX has a module for enumerating TCP and UDP network connections and associated processes using the "netstat" command.
['T1049']
Poseidon Group obtains and saves information about victim network interfaces and addresses.
['T1049']
PoshC2 contains an implementation of netstat to enumerate TCP and UDP connections.
['T1049']
Pupy has a built-in utility command for "netstat", can do net session through PowerView, and has an interactive shell which can be used to discover additional information.
['T1049']
PyDCrypt has used netsh to find RPC connections on remote machines.
['T1049']
QakBot can use "netstat" to enumerate current network connections.
['T1049']
RATANKBA uses "netstat -ano" to search for specific IP address ranges.
['T1049']
Ramsay can use "netstat" to enumerate network connections.
['T1049']
RedLeaves can enumerate drives and Remote Desktop sessions.
['T1049']
SHOTPUT uses netstat to list TCP connection status.
['T1049']
SLOTHFULMEDIA can enumerate open ports on a victim machine.
['T1049']
Sandworm Team had gathered user, IP address, and server data related to RDP sessions on a compromised host. It has also accessed network diagram files useful for understanding how a host's network was configured.
['T1049']
ShimRatReporter used the Windows function "GetExtendedUdpTable" to detect connected UDP endpoints.
['T1049']
Sibot has retrieved a GUID associated with a present LAN connection on a compromised machine.
['T1049']
Sliver can collect network connection information.
['T1049']
Sykipot may use "netstat -ano" to display active network connections.
['T1049']
TeamTNT has run "netstat -anp" to search for rival malware connections. TeamTNT has also used `libprocesshider` to modify "/etc/ld.so.preload".
['T1049']
The discovery modules used with Duqu can collect information on network connections.
['T1049']
Threat Group-3390 has used `net use` and `netstat` to conduct internal discovery of systems. The group has also used `quser.exe` to identify existing RDP sessions on a victim.
['T1049']
Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts.
['T1049']
USBferry can use "netstat" and "nbtstat" to detect active network connections.
['T1049']
Volgmer can gather information about TCP connection state.
['T1049']
Waterbear can use API hooks on `GetExtendedTcpTable` to retrieve a table containing a list of TCP endpoints available to the application.
['T1049']
Zebrocy uses "netstat -aon" to gather network connection information.
['T1049']
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: "netstat -ano >> %temp%\download"
['T1049']
menuPass has used "net use" to conduct connectivity checks to machines.
['T1049']
netstat can be used to enumerate local network connections, including active TCP connections and other network statistics.
['T1049']
Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.
['T1052.001']
Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.
['T1052.001']
Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.
['T1052.001']
SPACESHIP copies staged data to removable drives when they are inserted into the system.
['T1052.001']
USBStealer exfiltrates collected files via removable media from air-gapped victims.
['T1052.001']
Dragonfly has used a scheduled task to execute a malicious file.
['T1053']
Earth Lusca used the command "schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR “[file path]” /ru system" for persistence.
['T1053']
BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement.
['T1053.002']
CrackMapExec can set a scheduled task on the target system to execute commands remotely using at.
['T1053.002']
at can be used to schedule a task on a system to be executed at a specific date or time.
['T1053.002']
Anchor can install itself as a cron job.
['T1053.003']
Exaramel for Linux uses crontab for persistence if it does not have root privileges.
['T1053.003']
Janicab used a cron job for persistence on Mac devices.
['T1053.003']
Kinsing has used crontab to download and run shell scripts every minute to ensure persistence.
['T1053.003']
Penquin can use Cron to create periodic and pre-scheduled background jobs.
['T1053.003']
Rocke installed a cron job that downloaded and executed files from the C2.
['T1053.003']
Skidmap has installed itself via crontab.
['T1053.003']
SpeakUp uses cron tasks to ensure persistence.
['T1053.003']
The GoldMax Linux variant has used a crontab entry with a "@reboot" line to gain persistence.
['T1053.003']
A Patchwork file stealer can run a TaskScheduler DLL to add persistence.
['T1053.005']
APT-C-36 has used a macro function to set scheduled tasks, disguised as those used by Google.
['T1053.005']
APT32 has used scheduled tasks to persist on victim systems.
['T1053.005']
APT33 has created a scheduled task to execute a .vbe file multiple times a day.
['T1053.005']
APT37 has created scheduled tasks to run malicious scripts on a compromised host.
['T1053.005']
APT39 has created scheduled tasks for persistence.
['T1053.005']
APT41 used a compromised account to create a scheduled task on a system.
['T1053.005']
Anchor can create a scheduled task for persistence.
['T1053.005']
AppleJeus has created a scheduled SYSTEM task that runs when a user logs in.
['T1053.005']
Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon.
['T1053.005']
BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute.
['T1053.005']
BITTER has used scheduled tasks for persistence and execution.
['T1053.005']
BONDUPDATER persists using a scheduled task that executes every minute.
['T1053.005']
BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement.
['T1053.005']
BabyShark has used scheduled tasks to maintain persistence.
['T1053.005']
BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.
['T1053.005']
Blue Mockingbird has used Windows Scheduled Tasks to establish persistence on local and remote hosts.
['T1053.005']
Carbon creates several tasks for later execution to continue persistence on the victim’s machine.
['T1053.005']
Cobalt Group has created Windows tasks to establish persistence.
['T1053.005']
ComRAT has used a scheduled task to launch its PowerShell loader.
['T1053.005']
Confucius has created scheduled tasks to maintain persistence on a compromised host.
['T1053.005']
CostaRicto has used scheduled tasks to download backdoor tools.
['T1053.005']
Crutch has the ability to persist using scheduled tasks.
['T1053.005']
Dragonfly 2.0 used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files.
['T1053.005']
Dragonfly has used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files.
['T1053.005']
During Frankenstein, the threat actors established persistence through a scheduled task using the command: `/Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR`, named "WinUpdate"
['T1053.005']
During Operation Wocao, threat actors used scheduled tasks to execute malicious PowerShell code on remote systems.
['T1053.005']
Empire has modules to interact with the Windows task scheduler.
['T1053.005']
EvilBunny has executed commands via scheduled tasks.
['T1053.005']
FIN10 has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire.
['T1053.005']
FIN6 has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS.
['T1053.005']
FIN7 malware has created scheduled tasks to establish persistence.
['T1053.005']
FIN8 has used scheduled tasks to maintain RDP backdoors.
['T1053.005']
Fox Kitten has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary.
['T1053.005']
Frankenstein has established persistence through a scheduled task using the command: " /Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR ", named "WinUpdate".
['T1053.005']
GALLIUM established persistence for PoisonIvy by created a scheduled task.
['T1053.005']
GRIFFON has used "sctasks" for persistence.
['T1053.005']
Gamaredon Group has created scheduled tasks to launch executables after a designated number of minutes have passed.
['T1053.005']
Gazer can establish persistence by creating a scheduled task.
['T1053.005']
GoldMax has used scheduled tasks to maintain persistence.
['T1053.005']
Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour.
['T1053.005']
GravityRAT creates a scheduled task to ensure it is re-executed everyday.
['T1053.005']
GrimAgent has the ability to set persistence using the Task Scheduler.
['T1053.005']
HEXANE has used a scheduled task to establish persistence for a keylogger.
['T1053.005']
Helminth has used a scheduled task for persistence.
['T1053.005']