text1
stringlengths
7
2.5k
labels
stringlengths
9
100
TRITON was run as trilog.exe, a Py2EXE compiled python script that accepts a single IP address as a flag.
['T1059.006']
Turian has the ability to use Python to spawn a Unix shell.
['T1059.006']
Turla has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads.
['T1059.006']
ZIRCONIUM has used Python-based implants to interact with compromised hosts.
['T1059.006']
APT32 has used JavaScript for drive-by downloads and C2 communications.
['T1059.007']
AppleSeed has the ability to use JavaScript to execute PowerShell.
['T1059.007']
Astaroth uses JavaScript to perform its core functionalities.
['T1059.007']
Bundlore can execute JavaScript by injecting it into the victim's browser.
['T1059.007']
Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process.
['T1059.007']
Cobalt Group has executed JavaScript scriptlets on the victim's machine.
['T1059.007']
During C0015, the threat actors used a malicious HTA file that contained a mix of encoded HTML and JavaScript/VBScript code.
['T1059.007']
During Operation Dust Storm, the threat actors used JavaScript code.
['T1059.007']
Earth Lusca has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations.
['T1059.007']
Ember Bear has used JavaScript to execute malicious code on a victim's machine.
['T1059.007']
EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver.
['T1059.007']
Evilnum has used malicious JavaScript files on the victim's machine.
['T1059.007']
FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.
['T1059.007']
Indrik Spider has used malicious JavaScript files for several components of their attack.
['T1059.007']
JSS Loader can download and execute JavaScript files.
['T1059.007']
KONNI has executed malicious JavaScript code.
['T1059.007']
LazyScripter has used JavaScript in its attacks.
['T1059.007']
Leafminer infected victims using JavaScript code.
['T1059.007']
Metamorfo includes payloads written in JavaScript.
['T1059.007']
Molerats used various implants, including those built with JS, on target machines.
['T1059.007']
MuddyWater has used JavaScript files to execute its POWERSTATS payload.
['T1059.007']
NanHaiShu executes additional Jscript code on the victim's machine.
['T1059.007']
POWERSTATS can use JavaScript code for execution.
['T1059.007']
Sidewinder has used JavaScript to drop and execute malware loaders.
['T1059.007']
Silence has used JS scripts.
['T1059.007']
SpicyOmelette has the ability to execute arbitrary JavaScript code on a compromised host.
['T1059.007']
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions.
['T1059.007']
The QakBot web inject module can inject Java Script into web banking pages visited by the victim.
['T1059.007']
Turla has used various JavaScript-based backdoors.
['T1059.007']
Valak can execute JavaScript containing configuration data for establishing persistence.
['T1059.007']
Xbash can execute malicious JavaScript payloads on the victim’s machine.
['T1059.007']
jRAT has been distributed as HTA files with JScript.
['T1059.007']
APT28 has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges.
['T1068']
APT29 has exploited CVE-2021-36934 to escalate privileges on a compromised host.
['T1068']
APT32 has used CVE-2016-7255 to escalate privileges.
['T1068']
Carberp has exploited multiple Windows vulnerabilities (CVE-2010-2743, CVE-2010-3338, CVE-2010-4398, CVE-2008-1084) and a .NET Runtime Optimization vulnerability for privilege escalation.
['T1068']
Empire can exploit vulnerabilities such as MS16-032 and MS16-135.
['T1068']
Hildegard has used the BOtB tool which exploits CVE-2019-5736.
['T1068']
InvisiMole has exploited CVE-2007-5633 vulnerability in the speedfan.sys driver to obtain kernel mode privileges.
['T1068']
JHUHUGIT has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges.
['T1068']
LAPSUS$ has exploited unpatched vulnerabilities on internally accessible servers including JIRA, GitLab, and Confluence for privilege escalation.
['T1068']
PLATINUM has leveraged a zero-day vulnerability to escalate privileges.
['T1068']
Pandora can use CVE-2017-15303 to bypass Windows Driver Signature Enforcement (DSE) protection and load its driver.
['T1068']
PoshC2 contains modules for local privilege escalation exploits such as CVE-2016-9192 and CVE-2016-0099.
['T1068']
Siloscape has leveraged a vulnerability in Windows containers to perform an Escape to Host.
['T1068']
Tonto Team has exploited CVE-2019-0803 and MS16-032 to escalate privileges.
['T1068']
Whitefly has used an open-source tool to exploit a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers.
['T1068']
Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges.
['T1068']
ZIRCONIUM has exploited CVE-2017-0005 for local privilege escalation.
['T1068']
Zox has the ability to leverage local and remote exploits to escalate privileges.
['T1068']
APT29 used the "Get-ManagementRoleAssignment" PowerShell cmdlet to enumerate Exchange management role assignments through an Exchange Management Shell.
['T1069']
APT3 has a tool that can enumerate the permissions associated with Windows groups.
['T1069']
IcedID has the ability to identify Workgroup membership.
['T1069']
MURKYTOP has the capability to retrieve information about groups.
['T1069']
PUNCHBUGGY can gather domain and workgroup information.
['T1069']
TA505 has used TinyMet to enumerate members of privileged groups. TA505 has also run "net group /domain".
['T1069']
UNC2452 used the "Get-ManagementRoleAssignment" PowerShell cmdlet to enumerate Exchange management role assignments through an Exchange Management Shell.
['T1069']
Chimera has used "net localgroup administrators" to identify accounts with local administrative rights.
['T1069.001']
Cobalt Strike can use "net localgroup" to list local groups on a system.
['T1069.001']
Commands such as "net group" and "net localgroup" can be used in Net to gather information about and manipulate groups.
['T1069.001']
During C0015, the threat actors used the command `net localgroup "adminstrator" ` to identify accounts with local administrator rights.
['T1069.001']
During Operation CuckooBees, the threat actors used the `net group` command as part of their advanced reconnaissance.
['T1069.001']
During Operation Wocao, threat actors used the command `net localgroup administrators` to list all administrators part of a local group.
['T1069.001']
Emissary has the capability to execute the command "net localgroup administrators".
['T1069.001']
Epic gathers information on local group names.
['T1069.001']
Flagpro has been used to execute the "net localgroup administrators" command on a targeted system.
['T1069.001']
Helminth has checked the local administrators group.
['T1069.001']
JPIN can obtain the permissions of the victim user.
['T1069.001']
Kazuar gathers information about local groups and members.
['T1069.001']
Kwampirs collects a list of users belonging to the local users and administrators groups with the commands "net localgroup administrators" and "net localgroup users".
['T1069.001']
OSInfo has enumerated the local administrators group.
['T1069.001']
OilRig has used "net localgroup administrators" to find local administrators on compromised systems.
['T1069.001']
POWRUNER may collect local group information by running "net localgroup administrators" or a series of other commands on a victim.
['T1069.001']
PoshC2 contains modules, such as "Get-LocAdm" for enumerating permission groups.
['T1069.001']
QakBot can use "net localgroup" to enable discovery of local groups.
['T1069.001']
Tonto Team has used the "ShowLocalGroupDetails" command to identify administrator, user, and guest accounts on a compromised host.
['T1069.001']
Turla has used "net localgroup" and "net localgroup Administrators" to enumerate group information, including members of the local administrators group.
['T1069.001']
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: "net localgroup administrator >> %temp%\download"
['T1069.001']
APT29 has used AdFind to enumerate domain groups.
['T1069.002']
AdFind can enumerate domain groups.
['T1069.002']
BloodHound can collect information about domain groups and members.
['T1069.002']
Cobalt Strike can identify targets by querying account groups on a domain contoller.
['T1069.002']
Commands such as "net group /domain" can be used in Net to gather information about and manipulate groups.
['T1069.002']
CrackMapExec can gather the user accounts within domain groups.
['T1069.002']
Dragonfly 2.0 used batch scripts to enumerate administrators and users in the domain.
['T1069.002']
During C0015, the threat actors use the command `net group "domain admins" /dom` to enumerate domain groups.
['T1069.002']
Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands "net group Exchange Trusted Subsystem /domain" and "net group domain admins /domain".
['T1069.002']
Inception has used specific malware modules to gather domain membership.
['T1069.002']
Ke3chang performs discovery of permission groups "net group /domain".
['T1069.002']
Kwampirs collects a list of domain groups with the command "net localgroup /domain".
['T1069.002']
LAPSUS$ has used the AD Explorer tool to enumerate groups on a victim's network.
['T1069.002']
OSInfo specifically looks for Domain Admins and power users within the domain.
['T1069.002']
REvil can identify the domain membership of a compromised host.
['T1069.002']
SoreFang can enumerate domain groups by executing "net.exe group /domain".
['T1069.002']
Turla has used "net group "Domain Admins" /domain" to identify domain administrators.
['T1069.002']
WellMess can identify domain group membership for the current user.
['T1069.002']