text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
TRITON was run as trilog.exe, a Py2EXE compiled python script that accepts a single IP address as a flag. | ['T1059.006'] |
Turian has the ability to use Python to spawn a Unix shell. | ['T1059.006'] |
Turla has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads. | ['T1059.006'] |
ZIRCONIUM has used Python-based implants to interact with compromised hosts. | ['T1059.006'] |
APT32 has used JavaScript for drive-by downloads and C2 communications. | ['T1059.007'] |
AppleSeed has the ability to use JavaScript to execute PowerShell. | ['T1059.007'] |
Astaroth uses JavaScript to perform its core functionalities. | ['T1059.007'] |
Bundlore can execute JavaScript by injecting it into the victim's browser. | ['T1059.007'] |
Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process. | ['T1059.007'] |
Cobalt Group has executed JavaScript scriptlets on the victim's machine. | ['T1059.007'] |
During C0015, the threat actors used a malicious HTA file that contained a mix of encoded HTML and JavaScript/VBScript code. | ['T1059.007'] |
During Operation Dust Storm, the threat actors used JavaScript code. | ['T1059.007'] |
Earth Lusca has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations. | ['T1059.007'] |
Ember Bear has used JavaScript to execute malicious code on a victim's machine. | ['T1059.007'] |
EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver. | ['T1059.007'] |
Evilnum has used malicious JavaScript files on the victim's machine. | ['T1059.007'] |
FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites. | ['T1059.007'] |
Indrik Spider has used malicious JavaScript files for several components of their attack. | ['T1059.007'] |
JSS Loader can download and execute JavaScript files. | ['T1059.007'] |
KONNI has executed malicious JavaScript code. | ['T1059.007'] |
LazyScripter has used JavaScript in its attacks. | ['T1059.007'] |
Leafminer infected victims using JavaScript code. | ['T1059.007'] |
Metamorfo includes payloads written in JavaScript. | ['T1059.007'] |
Molerats used various implants, including those built with JS, on target machines. | ['T1059.007'] |
MuddyWater has used JavaScript files to execute its POWERSTATS payload. | ['T1059.007'] |
NanHaiShu executes additional Jscript code on the victim's machine. | ['T1059.007'] |
POWERSTATS can use JavaScript code for execution. | ['T1059.007'] |
Sidewinder has used JavaScript to drop and execute malware loaders. | ['T1059.007'] |
Silence has used JS scripts. | ['T1059.007'] |
SpicyOmelette has the ability to execute arbitrary JavaScript code on a compromised host. | ['T1059.007'] |
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions. | ['T1059.007'] |
The QakBot web inject module can inject Java Script into web banking pages visited by the victim. | ['T1059.007'] |
Turla has used various JavaScript-based backdoors. | ['T1059.007'] |
Valak can execute JavaScript containing configuration data for establishing persistence. | ['T1059.007'] |
Xbash can execute malicious JavaScript payloads on the victim’s machine. | ['T1059.007'] |
jRAT has been distributed as HTA files with JScript. | ['T1059.007'] |
APT28 has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges. | ['T1068'] |
APT29 has exploited CVE-2021-36934 to escalate privileges on a compromised host. | ['T1068'] |
APT32 has used CVE-2016-7255 to escalate privileges. | ['T1068'] |
Carberp has exploited multiple Windows vulnerabilities (CVE-2010-2743, CVE-2010-3338, CVE-2010-4398, CVE-2008-1084) and a .NET Runtime Optimization vulnerability for privilege escalation. | ['T1068'] |
Empire can exploit vulnerabilities such as MS16-032 and MS16-135. | ['T1068'] |
Hildegard has used the BOtB tool which exploits CVE-2019-5736. | ['T1068'] |
InvisiMole has exploited CVE-2007-5633 vulnerability in the speedfan.sys driver to obtain kernel mode privileges. | ['T1068'] |
JHUHUGIT has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges. | ['T1068'] |
LAPSUS$ has exploited unpatched vulnerabilities on internally accessible servers including JIRA, GitLab, and Confluence for privilege escalation. | ['T1068'] |
PLATINUM has leveraged a zero-day vulnerability to escalate privileges. | ['T1068'] |
Pandora can use CVE-2017-15303 to bypass Windows Driver Signature Enforcement (DSE) protection and load its driver. | ['T1068'] |
PoshC2 contains modules for local privilege escalation exploits such as CVE-2016-9192 and CVE-2016-0099. | ['T1068'] |
Siloscape has leveraged a vulnerability in Windows containers to perform an Escape to Host. | ['T1068'] |
Tonto Team has exploited CVE-2019-0803 and MS16-032 to escalate privileges. | ['T1068'] |
Whitefly has used an open-source tool to exploit a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers. | ['T1068'] |
Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges. | ['T1068'] |
ZIRCONIUM has exploited CVE-2017-0005 for local privilege escalation. | ['T1068'] |
Zox has the ability to leverage local and remote exploits to escalate privileges. | ['T1068'] |
APT29 used the "Get-ManagementRoleAssignment" PowerShell cmdlet to enumerate Exchange management role assignments through an Exchange Management Shell. | ['T1069'] |
APT3 has a tool that can enumerate the permissions associated with Windows groups. | ['T1069'] |
IcedID has the ability to identify Workgroup membership. | ['T1069'] |
MURKYTOP has the capability to retrieve information about groups. | ['T1069'] |
PUNCHBUGGY can gather domain and workgroup information. | ['T1069'] |
TA505 has used TinyMet to enumerate members of privileged groups. TA505 has also run "net group /domain". | ['T1069'] |
UNC2452 used the "Get-ManagementRoleAssignment" PowerShell cmdlet to enumerate Exchange management role assignments through an Exchange Management Shell. | ['T1069'] |
Chimera has used "net localgroup administrators" to identify accounts with local administrative rights. | ['T1069.001'] |
Cobalt Strike can use "net localgroup" to list local groups on a system. | ['T1069.001'] |
Commands such as "net group" and "net localgroup" can be used in Net to gather information about and manipulate groups. | ['T1069.001'] |
During C0015, the threat actors used the command `net localgroup "adminstrator" ` to identify accounts with local administrator rights. | ['T1069.001'] |
During Operation CuckooBees, the threat actors used the `net group` command as part of their advanced reconnaissance. | ['T1069.001'] |
During Operation Wocao, threat actors used the command `net localgroup administrators` to list all administrators part of a local group. | ['T1069.001'] |
Emissary has the capability to execute the command "net localgroup administrators". | ['T1069.001'] |
Epic gathers information on local group names. | ['T1069.001'] |
Flagpro has been used to execute the "net localgroup administrators" command on a targeted system. | ['T1069.001'] |
Helminth has checked the local administrators group. | ['T1069.001'] |
JPIN can obtain the permissions of the victim user. | ['T1069.001'] |
Kazuar gathers information about local groups and members. | ['T1069.001'] |
Kwampirs collects a list of users belonging to the local users and administrators groups with the commands "net localgroup administrators" and "net localgroup users". | ['T1069.001'] |
OSInfo has enumerated the local administrators group. | ['T1069.001'] |
OilRig has used "net localgroup administrators" to find local administrators on compromised systems. | ['T1069.001'] |
POWRUNER may collect local group information by running "net localgroup administrators" or a series of other commands on a victim. | ['T1069.001'] |
PoshC2 contains modules, such as "Get-LocAdm" for enumerating permission groups. | ['T1069.001'] |
QakBot can use "net localgroup" to enable discovery of local groups. | ['T1069.001'] |
Tonto Team has used the "ShowLocalGroupDetails" command to identify administrator, user, and guest accounts on a compromised host. | ['T1069.001'] |
Turla has used "net localgroup" and "net localgroup Administrators" to enumerate group information, including members of the local administrators group. | ['T1069.001'] |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: "net localgroup administrator >> %temp%\download" | ['T1069.001'] |
APT29 has used AdFind to enumerate domain groups. | ['T1069.002'] |
AdFind can enumerate domain groups. | ['T1069.002'] |
BloodHound can collect information about domain groups and members. | ['T1069.002'] |
Cobalt Strike can identify targets by querying account groups on a domain contoller. | ['T1069.002'] |
Commands such as "net group /domain" can be used in Net to gather information about and manipulate groups. | ['T1069.002'] |
CrackMapExec can gather the user accounts within domain groups. | ['T1069.002'] |
Dragonfly 2.0 used batch scripts to enumerate administrators and users in the domain. | ['T1069.002'] |
During C0015, the threat actors use the command `net group "domain admins" /dom` to enumerate domain groups. | ['T1069.002'] |
Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands "net group Exchange Trusted Subsystem /domain" and "net group domain admins /domain". | ['T1069.002'] |
Inception has used specific malware modules to gather domain membership. | ['T1069.002'] |
Ke3chang performs discovery of permission groups "net group /domain". | ['T1069.002'] |
Kwampirs collects a list of domain groups with the command "net localgroup /domain". | ['T1069.002'] |
LAPSUS$ has used the AD Explorer tool to enumerate groups on a victim's network. | ['T1069.002'] |
OSInfo specifically looks for Domain Admins and power users within the domain. | ['T1069.002'] |
REvil can identify the domain membership of a compromised host. | ['T1069.002'] |
SoreFang can enumerate domain groups by executing "net.exe group /domain". | ['T1069.002'] |
Turla has used "net group "Domain Admins" /domain" to identify domain administrators. | ['T1069.002'] |
WellMess can identify domain group membership for the current user. | ['T1069.002'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.