text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Wizard Spider has used "AdFind.exe" to collect information about Active Directory groups and accounts. | ['T1069.002'] |
dsquery can be used to gather information on permission groups within a domain. | ['T1069.002'] |
AADInternals can enumerate Azure AD groups. | ['T1069.003'] |
ROADTools can enumerate Azure AD groups. | ['T1069.003'] |
APT29 temporarily replaced legitimate utilities with their own, executed their payload, and then restored the original file. | ['T1070'] |
APT29 used SDelete to remove artifacts from victims. | ['T1070'] |
Bankshot deletes all artifacts associated with the malware from the infected machine. | ['T1070'] |
Bazar's loader can delete scheduled tasks created by a previous instance of the malware. | ['T1070', 'T1070.009'] |
BlackEnergy has removed the watermark associated with enabling the "TESTSIGNING" boot configuration option by removing the relevant strings in the "user32.dll.mui" of the system. | ['T1070'] |
Donut can erase file references to payloads in-memory after being reflectively loaded and executed. | ['T1070'] |
Dragonfly deleted system, security, terminal services, remote services, and audit logs from a victim. | ['T1070'] |
EVILNUM has a function called "DeleteLeftovers" to remove certain artifacts of the attack. | ['T1070'] |
Flagpro can close specific Windows Security and Internet Explorer dialog boxes to mask external connections. | ['T1070'] |
Goopy has the ability to delete emails used for C2 once the content has been copied. | ['T1070', 'T1070.008'] |
GrimAgent can delete previously created tasks on a compromised host. | ['T1070', 'T1070.009'] |
HermeticWiper can disable pop-up information about folders and desktop items and delete Registry keys to hide malicious services. | ['T1070'] |
KOCTOPUS can delete created registry keys as part of its cleanup procedure. | ['T1070'] |
Lazarus Group has restored malicious KernelCallbackTable code to its original state after the process execution flow has been hijacked. | ['T1070'] |
Maze has used the “Wow64RevertWow64FsRedirection” function following attempts to delete the shadow volumes, in order to leave the system in the same state as it was prior to redirection. | ['T1070'] |
Metamorfo has a command to delete a Registry key it uses, "\Software\Microsoft\Internet Explorer\notes". | ['T1070'] |
Misdat is capable of deleting Registry keys used for persistence. | ['T1070', 'T1070.009'] |
Neoichor can clear the browser history on a compromised host by changing the `ClearBrowsingHistoryOnExit` value to 1 in the `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Privacy` Registry key. | ['T1070'] |
Orz can overwrite Registry settings to reduce its visibility on the victim. | ['T1070'] |
Pillowmint can uninstall the malicious service from an infected machine. | ['T1070', 'T1070.009'] |
RTM has the ability to remove Registry entries that it created during execution. | ['T1070'] |
Rising Sun can clear a memory blog in the process by overwriting it with junk bytes. | ['T1070'] |
S-Type has deleted accounts it has created. | ['T1070'] |
SDBbot has the ability to clean up and remove data structures from a compromised host. | ['T1070'] |
SILENTTRINITY can remove artifacts from the compromised host, including created Registry keys. | ['T1070'] |
ShadowPad has deleted arbitrary Registry values. | ['T1070'] |
Sibot will delete an associated registry key if a certain server response is received. | ['T1070'] |
UNC2452 removed evidence of email export requests using "Remove-MailboxExportRequest". They temporarily replaced legitimate utilities with their own, executed their payload, and then restored the original file. | ['T1070'] |
njRAT is capable of manipulating and deleting registry keys. | ['T1070'] |
APT28 has cleared event logs, including by using the commands "wevtutil cl System" and "wevtutil cl Security". | ['T1070.001'] |
APT32 has cleared select event log entries. | ['T1070.001'] |
APT38 clears Window Event logs and Sysmon logs from the system. | ['T1070.001'] |
APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events. | ['T1070.001'] |
Dragonfly 2.0 cleared Windows event logs and other logs produced by tools they used, including system, security, terminal services, remote services, and audit logs. The actors also deleted specific Registry keys. | ['T1070.001'] |
Dragonfly has cleared Windows event logs and other logs produced by tools they used, including system, security, terminal services, remote services, and audit logs. The actors also deleted specific Registry keys. | ['T1070.001'] |
During Operation Wocao, the threat actors deleted all Windows system and security event logs using `/Q /c wevtutil cl system` and `/Q /c wevtutil cl security`. | ['T1070.001'] |
FIN5 has cleared event logs from victims. | ['T1070.001'] |
FIN8 has cleared logs during post compromise cleanup activities. | ['T1070.001'] |
FinFisher clears the system event logs using " OpenEventLog/ClearEventLog APIs ". | ['T1070.001'] |
HermeticWizard has the ability to use `wevtutil cl system` to clear event logs. | ['T1070.001'] |
Hydraq creates a backdoor through which remote attackers can clear all system event logs. | ['T1070.001'] |
Indrik Spider has used Cobalt Strike to empty log files. | ['T1070.001'] |
KillDisk deletes Application, Security, Setup, and System Windows Event Logs. | ['T1070.001'] |
Lucifer can clear and remove event logs. | ['T1070.001'] |
Meteor can use Wevtutil to remove Security, System and Application Event Viewer logs. | ['T1070.001'] |
NotPetya uses "wevtutil" to clear the Windows event logs. | ['T1070.001'] |
Olympic Destroyer will attempt to clear the System and Security event logs using "wevtutil". | ['T1070.001'] |
Operation Wocao has deleted Windows Event Logs to hinder forensic investigation. | ['T1070.001'] |
Pupy has a module to clear event logs with PowerShell. | ['T1070.001'] |
RunningRAT contains code to clear event logs. | ['T1070.001'] |
The BlackEnergy component KillDisk is capable of deleting Windows Event Logs. | ['T1070.001'] |
ZxShell has a command to clear system event logs. | ['T1070.001'] |
MacMa can clear possible malware traces such as application logs. | ['T1070.002'] |
Proton removes logs from "/var/logs" and "/Library/logs". | ['T1070.002'] |
TeamTNT has removed system logs from "/var/log/syslog". | ['T1070.002'] |
APT41 attempted to remove evidence of some of its activity by deleting Bash histories. | ['T1070.003'] |
Hildegard has used history -c to clear script shell logs. | ['T1070.003'] |
Kobalos can remove all command history on compromised hosts. | ['T1070.003'] |
Lazarus Group has routinely deleted log files on a compromised router, including automatic log deletion through the use of the logrotate utility. | ['T1070.003'] |
Magic Hound has removed mailbox export requests from compromised Exchange servers. | ['T1070.003'] |
TeamTNT has cleared command history with "history -c". | ['T1070.003'] |
A menuPass macro deletes files after it has decoded and decompressed them. | ['T1070.004'] |
ADVSTORESHELL can delete files and directories. | ['T1070.004'] |
APT18 actors deleted tools and batch files from victim systems. | ['T1070.004'] |
APT28 has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner. | ['T1070.004'] |
APT29 routinely removed their tools, including custom backdoors, once remote access was achieved. APT29 has also used SDelete to remove artifacts from victims. | ['T1070.004'] |
APT3 has a tool that can delete files. | ['T1070.004'] |
APT32's macOS backdoor can receive a “delete” command. | ['T1070.004'] |
APT38 has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process. | ['T1070.004'] |
APT39 has used malware to delete files after they are deployed on a compromised host. | ['T1070.004'] |
After encrypting its own log files, the log encryption module in Prikormka deletes the original, unencrypted files from the host. | ['T1070.004'] |
Anchor can self delete its dropper after the malware is successfully deployed. | ['T1070.004'] |
AppleJeus has deleted the MSI file after installation. | ['T1070.004'] |
Aquatic Panda has deleted malicious executables from compromised machines. | ['T1070.004'] |
Aria-body has the ability to delete files and directories on compromised hosts. | ['T1070.004'] |
AuditCred can delete files from the system. | ['T1070.004'] |
Azorult can delete files from victim machines. | ['T1070.004'] |
BBSRAT can delete files and directories. | ['T1070.004'] |
BLINDINGCAN has deleted itself and associated artifacts from victim machines. | ['T1070.004'] |
BLUELIGHT can uninstall itself. | ['T1070.004'] |
BabyShark has cleaned up all files associated with the secondary payload execution. | ['T1070.004'] |
Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim. | ['T1070.004'] |
Bandook has a command to delete a file. | ['T1070.004'] |
Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system. | ['T1070.004'] |
Bumblebee can uninstall its loader through the use of a `Sdl` command. | ['T1070.004'] |
CARROTBAT has the ability to delete downloaded files from a compromised host. | ['T1070.004'] |
CSPY Downloader has the ability to self delete. | ['T1070.004'] |
Calisto has the capability to use "rm -rf" to remove folders and files from the victim's machine. | ['T1070.004'] |
Cardinal RAT can uninstall itself, including deleting its executable. | ['T1070.004'] |
CharmPower can delete created files from a compromised system. | ['T1070.004'] |
Chimera has performed file deletion to evade detection. | ['T1070.004'] |
Crimson has the ability to delete files from a compromised host. | ['T1070.004'] |
Cuba can use the command "cmd.exe /c del" to delete its artifacts from the system. | ['T1070.004'] |
DanBot can delete its configuration file after installation. | ['T1070.004'] |
DarkWatchman has been observed deleting its original launcher after installation. | ['T1070.004'] |
Dragonfly 2.0 deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots. | ['T1070.004'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.