text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Kwampirs collects a list of active and listening connections by using the command "netstat -nao" as well as a list of available network mappings with "net use". | ['T1049'] |
Lazarus Group has used "net use" to identify and establish a network connection with a remote host. | ['T1049'] |
Lucifer can identify the IP and port numbers for all remote connections from the compromised host. | ['T1049'] |
Machete uses the "netsh wlan show networks mode=bssid" and "netsh wlan show interfaces" commands to list all nearby WiFi networks and connected interfaces. | ['T1049'] |
Magic Hound has used quser.exe to identify existing RDP connections. | ['T1049'] |
Maze has used the "WNetOpenEnumW", "WNetEnumResourceW”, “WNetCloseEnum” and “WNetAddConnection2W” functions to enumerate the network resources on the infected machine. | ['T1049'] |
NETWIRE can capture session logon details from a compromised host. | ['T1049'] |
OilRig has used "netstat -an" on a victim to get a listing of network connections. | ['T1049'] |
Okrum was seen using NetSess to discover NetBIOS sessions. | ['T1049'] |
PlugX has a module for enumerating TCP and UDP network connections and associated processes using the "netstat" command. | ['T1049'] |
Poseidon Group obtains and saves information about victim network interfaces and addresses. | ['T1049'] |
PoshC2 contains an implementation of netstat to enumerate TCP and UDP connections. | ['T1049'] |
Pupy has a built-in utility command for "netstat", can do net session through PowerView, and has an interactive shell which can be used to discover additional information. | ['T1049'] |
PyDCrypt has used netsh to find RPC connections on remote machines. | ['T1049'] |
QakBot can use "netstat" to enumerate current network connections. | ['T1049'] |
RATANKBA uses "netstat -ano" to search for specific IP address ranges. | ['T1049'] |
Ramsay can use "netstat" to enumerate network connections. | ['T1049'] |
RedLeaves can enumerate drives and Remote Desktop sessions. | ['T1049'] |
SHOTPUT uses netstat to list TCP connection status. | ['T1049'] |
SLOTHFULMEDIA can enumerate open ports on a victim machine. | ['T1049'] |
Sandworm Team had gathered user, IP address, and server data related to RDP sessions on a compromised host. It has also accessed network diagram files useful for understanding how a host's network was configured. | ['T1049'] |
ShimRatReporter used the Windows function "GetExtendedUdpTable" to detect connected UDP endpoints. | ['T1049'] |
Sibot has retrieved a GUID associated with a present LAN connection on a compromised machine. | ['T1049'] |
Sliver can collect network connection information. | ['T1049'] |
Sykipot may use "netstat -ano" to display active network connections. | ['T1049'] |
TeamTNT has run "netstat -anp" to search for rival malware connections. TeamTNT has also used `libprocesshider` to modify "/etc/ld.so.preload". | ['T1049'] |
The discovery modules used with Duqu can collect information on network connections. | ['T1049'] |
Threat Group-3390 has used `net use` and `netstat` to conduct internal discovery of systems. The group has also used `quser.exe` to identify existing RDP sessions on a victim. | ['T1049'] |
Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts. | ['T1049'] |
USBferry can use "netstat" and "nbtstat" to detect active network connections. | ['T1049'] |
Volgmer can gather information about TCP connection state. | ['T1049'] |
Waterbear can use API hooks on `GetExtendedTcpTable` to retrieve a table containing a list of TCP endpoints available to the application. | ['T1049'] |
Zebrocy uses "netstat -aon" to gather network connection information. | ['T1049'] |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: "netstat -ano >> %temp%\download" | ['T1049'] |
menuPass has used "net use" to conduct connectivity checks to machines. | ['T1049'] |
netstat can be used to enumerate local network connections, including active TCP connections and other network statistics. | ['T1049'] |
Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs. | ['T1052.001'] |
Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks. | ['T1052.001'] |
Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device. | ['T1052.001'] |
SPACESHIP copies staged data to removable drives when they are inserted into the system. | ['T1052.001'] |
USBStealer exfiltrates collected files via removable media from air-gapped victims. | ['T1052.001'] |
Dragonfly has used a scheduled task to execute a malicious file. | ['T1053'] |
Earth Lusca used the command "schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR “[file path]” /ru system" for persistence. | ['T1053'] |
BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement. | ['T1053.002'] |
CrackMapExec can set a scheduled task on the target system to execute commands remotely using at. | ['T1053.002'] |
at can be used to schedule a task on a system to be executed at a specific date or time. | ['T1053.002'] |
Anchor can install itself as a cron job. | ['T1053.003'] |
Exaramel for Linux uses crontab for persistence if it does not have root privileges. | ['T1053.003'] |
Janicab used a cron job for persistence on Mac devices. | ['T1053.003'] |
Kinsing has used crontab to download and run shell scripts every minute to ensure persistence. | ['T1053.003'] |
Penquin can use Cron to create periodic and pre-scheduled background jobs. | ['T1053.003'] |
Rocke installed a cron job that downloaded and executed files from the C2. | ['T1053.003'] |
Skidmap has installed itself via crontab. | ['T1053.003'] |
SpeakUp uses cron tasks to ensure persistence. | ['T1053.003'] |
The GoldMax Linux variant has used a crontab entry with a "@reboot" line to gain persistence. | ['T1053.003'] |
A Patchwork file stealer can run a TaskScheduler DLL to add persistence. | ['T1053.005'] |
APT-C-36 has used a macro function to set scheduled tasks, disguised as those used by Google. | ['T1053.005'] |
APT32 has used scheduled tasks to persist on victim systems. | ['T1053.005'] |
APT33 has created a scheduled task to execute a .vbe file multiple times a day. | ['T1053.005'] |
APT37 has created scheduled tasks to run malicious scripts on a compromised host. | ['T1053.005'] |
APT39 has created scheduled tasks for persistence. | ['T1053.005'] |
APT41 used a compromised account to create a scheduled task on a system. | ['T1053.005'] |
Anchor can create a scheduled task for persistence. | ['T1053.005'] |
AppleJeus has created a scheduled SYSTEM task that runs when a user logs in. | ['T1053.005'] |
Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon. | ['T1053.005'] |
BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute. | ['T1053.005'] |
BITTER has used scheduled tasks for persistence and execution. | ['T1053.005'] |
BONDUPDATER persists using a scheduled task that executes every minute. | ['T1053.005'] |
BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement. | ['T1053.005'] |
BabyShark has used scheduled tasks to maintain persistence. | ['T1053.005'] |
BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host. | ['T1053.005'] |
Blue Mockingbird has used Windows Scheduled Tasks to establish persistence on local and remote hosts. | ['T1053.005'] |
Carbon creates several tasks for later execution to continue persistence on the victim’s machine. | ['T1053.005'] |
Cobalt Group has created Windows tasks to establish persistence. | ['T1053.005'] |
ComRAT has used a scheduled task to launch its PowerShell loader. | ['T1053.005'] |
Confucius has created scheduled tasks to maintain persistence on a compromised host. | ['T1053.005'] |
CostaRicto has used scheduled tasks to download backdoor tools. | ['T1053.005'] |
Crutch has the ability to persist using scheduled tasks. | ['T1053.005'] |
Dragonfly 2.0 used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files. | ['T1053.005'] |
Dragonfly has used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files. | ['T1053.005'] |
During Frankenstein, the threat actors established persistence through a scheduled task using the command: `/Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR`, named "WinUpdate" | ['T1053.005'] |
During Operation Wocao, threat actors used scheduled tasks to execute malicious PowerShell code on remote systems. | ['T1053.005'] |
Empire has modules to interact with the Windows task scheduler. | ['T1053.005'] |
EvilBunny has executed commands via scheduled tasks. | ['T1053.005'] |
FIN10 has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire. | ['T1053.005'] |
FIN6 has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS. | ['T1053.005'] |
FIN7 malware has created scheduled tasks to establish persistence. | ['T1053.005'] |
FIN8 has used scheduled tasks to maintain RDP backdoors. | ['T1053.005'] |
Fox Kitten has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary. | ['T1053.005'] |
Frankenstein has established persistence through a scheduled task using the command: " /Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR ", named "WinUpdate". | ['T1053.005'] |
GALLIUM established persistence for PoisonIvy by created a scheduled task. | ['T1053.005'] |
GRIFFON has used "sctasks" for persistence. | ['T1053.005'] |
Gamaredon Group has created scheduled tasks to launch executables after a designated number of minutes have passed. | ['T1053.005'] |
Gazer can establish persistence by creating a scheduled task. | ['T1053.005'] |
GoldMax has used scheduled tasks to maintain persistence. | ['T1053.005'] |
Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour. | ['T1053.005'] |
GravityRAT creates a scheduled task to ensure it is re-executed everyday. | ['T1053.005'] |
GrimAgent has the ability to set persistence using the Task Scheduler. | ['T1053.005'] |
HEXANE has used a scheduled task to establish persistence for a keylogger. | ['T1053.005'] |
Helminth has used a scheduled task for persistence. | ['T1053.005'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.