text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Dragonfly has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.
['T1070.004']
Drovorub can delete specific files from a compromised host.
['T1070.004']
Dtrack can remove its persistence and delete itself.
['T1070.004']
During Operation Honeybee, the threat actors used batch files that reduced their fingerprint on a compromised system by deleting malware-related files.
['T1070.004']
During Operation Wocao, the threat actors consistently removed traces of their activity by first overwriting a file using `/c cd /d c:\windows\temp\ & copy \\<IP ADDRESS>\c$\windows\system32\devmgr.dll \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1 /y` and then deleting the overwritten file using `/c cd /d c:\windows\temp\ & del \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1`.
['T1070.004']
DustySky can delete files it creates from the infected system.
['T1070.004']
ECCENTRICBANDWAGON can delete log files generated from the malware stored at "C:\windows\temp\tmp0207".
['T1070.004']
EvilBunny has deleted the initial dropper after running through the environment checks.
['T1070.004']
Evilnum has deleted files used during infection.
['T1070.004']
Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file.
['T1070.004']
FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components.
['T1070.004']
FIN10 has used batch scripts and scheduled tasks to delete critical system files.
['T1070.004']
FIN5 uses SDelete to clean up the environment and attempt to prevent detection.
['T1070.004']
FIN6 has removed files from victim machines.
['T1070.004']
FIN8 has deleted tmp and prefetch files during post compromise cleanup activities.
['T1070.004']
FatDuke can secure delete its DLL.
['T1070.004']
Ferocious can delete files from a compromised host.
['T1070.004']
FlawedAmmyy can execute batch scripts to delete files.
['T1070.004']
FruitFly will delete files on the system.
['T1070.004']
Fysbis has the ability to delete files.
['T1070.004']
Gamaredon Group tools can delete files used during an operation.
['T1070.004']
Gazer has commands to delete files and persistence mechanisms from the victim.
['T1070.004']
Gelsemium can delete its dropper component from the targeted system.
['T1070.004']
Gold Dragon deletes one of its files, 2.hwp, from the endpoint after establishing persistence.
['T1070.004']
Green Lambert can delete the original executable after initial installation in addition to unused functions.
['T1070.004']
GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API.
['T1070.004']
GrimAgent can delete old binaries on a compromised host.
['T1070.004']
HALFBAKED can delete a specified file.
['T1070.004']
HAWKBALL has the ability to delete files.
['T1070.004']
Hancitor has deleted files using the VBA "kill" function.
['T1070.004']
HermeticWiper has the ability to overwrite its own file with random bites.
['T1070.004']
Hi-Zor deletes its RAT installer file as it executes its DLL payload file.
['T1070.004']
Hildegard has deleted scripts after execution.
['T1070.004']
HotCroissant has the ability to clean up installed files, delete files, and delete itself from the victim’s machine.
['T1070.004']
Hydraq creates a backdoor through which remote attackers can delete files.
['T1070.004']
HyperBro has the ability to delete a specified file.
['T1070.004']
IceApple can delete files and directories from targeted systems.
['T1070.004']
Imminent Monitor has deleted files related to its dynamic debugger feature.
['T1070.004']
InnaputRAT has a command to delete files.
['T1070.004']
InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers.
['T1070.004']
Ixeshe has a command to delete a file from the machine.
['T1070.004']
JPIN's installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running.
['T1070.004']
KONNI can delete files.
['T1070.004']
Kevin can delete files created on the victim's machine.
['T1070.004']
KillDisk has the ability to quit and delete itself.
['T1070.004']
Kimsuky has deleted the exfiltrated data on disk after transmission. Kimsuky has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk.
['T1070.004']
LightNeuron has a function to delete files.
['T1070.004']
Linfo creates a backdoor through which remote attackers can delete files.
['T1070.004']
LiteDuke can securely delete files by first writing random data to the file.
['T1070.004']
LockerGoga has been observed deleting its original launcher after execution.
['T1070.004']
LookBack removes itself after execution and can delete files on the system.
['T1070.004']
MURKYTOP has the capability to delete local files.
['T1070.004']
MacMa can delete itself from the compromised computer.
['T1070.004']
MacSpy deletes any temporary files it creates
['T1070.004']
Metamorfo has deleted itself from the system after execution.
['T1070.004']
Meteor will delete the folder containing malicious scripts if it detects the hostname as `PIS-APP`, `PIS-MOB`, `WSUSPROXY`, or `PIS-DB`.
['T1070.004']
Milan can delete files via `C:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 1 -w 3000 > Nul & rmdir /s /q`.
['T1070.004']
Misdat is capable of deleting the backdoor file.
['T1070.004']
MoonWind can delete itself or specified files.
['T1070.004']
Mosquito deletes files using DeleteFileW API call.
['T1070.004']
Mustang Panda will delete their tools and files, and kill processes after their objectives are reached.
['T1070.004']
NOKKI can delete files to cover tracks.
['T1070.004']
Nebulae has the ability to delete files and directories.
['T1070.004']
OSX_OCEANLOTUS.D has a command to delete a file from the system. OSX_OCEANLOTUS.D deletes the app bundle and dropper after execution.
['T1070.004']
OceanSalt can delete files from the system.
['T1070.004']
OilRig has deleted files associated with their payload after execution.
['T1070.004']
Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers.
['T1070.004']
Once a file is uploaded, Machete will delete it from the machine.
['T1070.004']
OutSteel can delete itself following the successful execution of a follow-on payload.
['T1070.004']
P.A.S. Webshell can delete scripts from a subdirectory of /tmp after they are run.
['T1070.004']
PLEAD has the ability to delete files on the compromised host.
['T1070.004']
PUNCHBUGGY can delete files written to disk.
['T1070.004']
Pasam creates a backdoor through which remote attackers can delete files.
['T1070.004']
Pay2Key can remove its log file from disk.
['T1070.004']
PcShare has deleted its files and components from a compromised host.
['T1070.004']
Penquin can delete downloaded executables after running them.
['T1070.004']
PoetRAT has the ability to overwrite scripts and delete itself if a sandbox environment is detected.
['T1070.004']
Pony has used scripts to delete itself after execution.
['T1070.004']
ProLock can remove files containing its payload after they are executed.
['T1070.004']
Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes.
['T1070.004']
PyDCrypt will remove all created artifacts such as dropped executables.
['T1070.004']
Pysa has deleted batch files after execution.
['T1070.004']
QUADAGENT has a command to delete its Registry key and scheduled task.
['T1070.004']
QakBot can delete folders and files including overwriting its executable with legitimate programs.
['T1070.004']
RCSession can remove files from a targeted system.
['T1070.004']
RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system.
['T1070.004']
RDFSNIFFER has the capability of deleting local files.
['T1070.004']
REvil can mark its binary code for deletion after reboot.
['T1070.004']
ROKRAT can request to delete files.
['T1070.004']
RTM can delete all files created during its execution.
['T1070.004']
RainyDay has the ability to uninstall itself by deleting its service and files.
['T1070.004']
Reaver deletes the original dropped file from the victim.
['T1070.004']
Recent versions of Cherry Picker delete files and registry keys created by the malware.
['T1070.004']
RedLeaves can delete specified files.
['T1070.004']
Rising Sun can delete files and artifacts it creates.
['T1070.004']
Rocke has deleted files on infected machines.
['T1070.004']
RunningRAT contains code to delete files from the victim’s machine.
['T1070.004']
S-Type has deleted files it has created on a compromised host.
['T1070.004']
SDBbot has the ability to delete files from a compromised host.
['T1070.004']
SILENTTRINITY can remove files from the compromised host.
['T1070.004']