text1
stringlengths
7
2.5k
labels
stringlengths
9
100
SLOTHFULMEDIA has deleted itself and the 'index.dat' file on a compromised machine to remove recent Internet history from the system.
['T1070.004']
SQLRat has used been observed deleting scripts once used.
['T1070.004']
Saint Bot can run a batch script named `del.bat` to remove any Saint Bot payload-linked files from a compromise system if anti-analysis or locale checks fail.
['T1070.004']
SamSam has been seen deleting its own files and payloads to make analysis of the attack more difficult.
['T1070.004']
Sandworm Team has used backdoors that can delete files used in an attack from an infected system.
['T1070.004']
SeaDuke can securely delete files, including deleting itself from the victim.
['T1070.004']
Seasalt has a command to delete a specified file.
['T1070.004']
ServHelper has a module to delete itself from the infected machine.
['T1070.004']
Shark can delete files downloaded to the compromised host.
['T1070.004']
ShimRat can uninstall itself from compromised hosts, as well create and modify directories, delete, move, copy, and rename files.
['T1070.004']
Silence has deleted artifacts, including scheduled tasks, communicates files from the C2 and other logs.
['T1070.004']
SombRAT has the ability to run "cancel" or "closeanddeletestorage" to remove all files from storage and delete the storage temp file on a compromised host.
['T1070.004']
Some Sakula samples use cmd.exe to delete temporary files.
['T1070.004']
SpeakUp deletes files to remove evidence on the machine.
['T1070.004']
StoneDrill has been observed deleting the temporary files once they fulfill their task.
['T1070.004']
StrifeWater can self delete to cover its tracks.
['T1070.004']
Stuxnet uses an RPC server that contains a routine for file deletion and also removes itself from the system through a DLL export by deleting specific files.
['T1070.004']
SysUpdate can delete its configuration file from the targeted system.
['T1070.004']
TAINTEDSCRIBE can delete files from a compromised host.
['T1070.004']
TDTESS creates then deletes log files during installation of itself as a service.
['T1070.004']
TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.
['T1070.004']
Taidoor can use "DeleteFileA" to remove files from infected hosts.
['T1070.004']
TeamTNT has used a payload that removes itself after running. TeamTNT also has deleted locally staged files for collecting credentials or scan results for local IP addresses after exfiltrating them.
['T1070.004']
The BRONZE BUTLER uploader or malware the uploader uses "command" to delete the RAR archives after they have been exfiltrated.
['T1070.004']
The JHUHUGIT dropper can delete itself from the victim. Another JHUHUGIT variant has the capability to delete specified files.
['T1070.004']
The Komplex trojan supports file deletion.
['T1070.004']
Threat Group-3390 has deleted existing logs and exfiltrated file archives from a victim.
['T1070.004']
Trojan.Karagany has used plugins with a self-delete capability.
['T1070.004']
Tropic Trooper has deleted dropper files on an infected system using command scripts.
['T1070.004']
UNC2452 routinely removed their tools, including custom backdoors, once remote access was achieved.
['T1070.004']
Ursnif has deleted data staged in tmp files after exfiltration.
['T1070.004']
VBShower has attempted to complicate forensic analysis by deleting all the files contained in "%APPDATA%\..\Local\Temporary Internet Files\Content.Word" and "%APPDATA%\..\Local Settings\Temporary Internet Files\Content.Word\".
['T1070.004']
VERMIN can delete files on the victim’s machine.
['T1070.004']
Volgmer can delete files and itself after infection to avoid analysis.
['T1070.004']
Wingbird deletes its payload along with the payload's parent process after it finishes copying files.
['T1070.004']
Winnti for Windows can delete the DLLs for its various components from a compromised host.
['T1070.004']
Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use.
['T1070.004']
XAgentOSX contains the deletFileFromPath function to delete a specified file using the NSFileManager:removeFileAtPath method.
['T1070.004']
Zebrocy has a command to delete files and directories.
['T1070.004']
Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track.
['T1070.004']
ZxShell can delete files from the system.
['T1070.004']
ccf32 can delete files and folders from compromised machines.
['T1070.004']
cmd can be used to delete files from the file system.
['T1070.004']
gh0st RAT has the capability to to delete files.
['T1070.004']
pngdowner deletes content from C2 communications that was saved to the user's temporary directory.
['T1070.004']
zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots.
['T1070.004']
InvisiMole can disconnect previously connected remote drives.
['T1070.005']
RobbinHood disconnects all network shares from the computer with the command "net use * /DELETE /Y".
['T1070.005']
The "net use \\system\share /delete" command can be used in Net to remove an established connection to a network share.
['T1070.005']
Threat Group-3390 has detached network shares after exfiltrating files, likely to evade detection.
['T1070.005']
3PARA RAT has a command to set certain attributes such as creation/modification timestamps on files.
['T1070.006']
APT29 modified timestamps of backdoors to match legitimate Windows files.
['T1070.006']
APT32 has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, APT32 has used a random value to modify the timestamp of the file storing the clientID.
['T1070.006']
APT38 has modified data timestamps to mimic files that are in the same folder on a compromised host.
['T1070.006']
After creating a new service for persistence, TDTESS sets the file creation time for the service to the creation time of the victim's legitimate svchost.exe file.
['T1070.006']
Attor has manipulated the time of last access to files and registry keys after they have been created or modified.
['T1070.006']
BLINDINGCAN has modified file and directory timestamps.
['T1070.006']
Bankshot modifies the time of a file as specified by the control server.
['T1070.006']
BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool.
['T1070.006']
China Chopper's server component can change the timestamp of files.
['T1070.006']
Cobalt Strike can timestomp any files or payloads placed on a target machine to help them blend in.
['T1070.006']
Cobalt Strike will timestomp any files or payloads placed on a target machine to help them blend in.
['T1070.006']
Cyclops Blink has the ability to use the Linux API function `utime` to change the timestamps of modified firmware update images.
['T1070.006']
EVILNUM has changed the creation date of files.
['T1070.006']
Elise performs timestomping of a CAB file it creates.
['T1070.006']
Empire can timestomp any files or payloads placed on a target machine to help them blend in.
['T1070.006']
FALLCHILL can modify file or directory timestamps.
['T1070.006']
For early Gazer versions, the compilation timestamp was faked.
['T1070.006']
Gelsemium has the ability to perform timestomping of files on targeted systems.
['T1070.006']
InvisiMole samples were timestomped by the authors by setting the PE timestamps to all zero values. InvisiMole also has a built-in command to modify file times.
['T1070.006']
Kimsuky has manipulated timestamps for creation or compilation dates to defeat anti-forensics.
['T1070.006']
Kobalos can modify timestamps of replaced files, such as "ssh" with the added credential stealer or "sshd" used to deploy Kobalos.
['T1070.006']
MacMa has the capability to create and modify file timestamps.
['T1070.006']
Many Misdat samples were programmed using Borland Delphi, which will mangle the default PE compile timestamp of a file.
['T1070.006']
OSX_OCEANLOTUS.D can use the "touch -t" command to change timestamps.
['T1070.006']
OwaAuth has a command to timestop a file or directory.
['T1070.006']
POSHSPY modifies timestamps of all downloaded executables to match a randomly selected file created prior to 2013.
['T1070.006']
PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file.
['T1070.006']
Psylo has a command to conduct timestomping by setting a specified file’s timestamps to match those of a system file in the System32 directory.
['T1070.006']
Rocke has changed the time stamp of certain files.
['T1070.006']
SEASHARPEE can timestomp files on victims using a Web shell.
['T1070.006']
Several Lazarus Group malware families use timestomping, including modifying the last write timestamp of a specified Registry key to a random date, as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files.
['T1070.006']
Stuxnet extracts and writes driver files that match the times of other legitimate files.
['T1070.006']
TAINTEDSCRIBE can change the timestamp of specified filenames.
['T1070.006']
TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools.
['T1070.006']
The Derusbi malware supports timestomping.
['T1070.006']
UNC2452 modified timestamps of backdoors to match legitimate Windows files.
['T1070.006']
Winnti for Windows can set the timestamps for its worker and service components to match that of cmd.exe.
['T1070.006']
APT29 removed evidence of email export requests using "Remove-MailboxExportRequest".
['T1070.008']
MCMD has the ability to remove set Registry Keys, including those used for persistence.
['T1070.009']
RTM has the ability to remove Registry entries that it created for persistence.
['T1070.009']
SUNBURST removed IFEO registry values to clean up traces of persistence.
['T1070.009']
njRAT is capable of manipulating and deleting registry keys, including those used for persistence.
['T1070.009']
APT34 malware often uses HTTP and DNS for C2. The group has also used the Plink utility and other tools to create tunnels to C2 servers.
['T1071']
Adversaries can also use NETEAGLE to establish an RDP connection with a controller over TCP/7519.
['T1071']
Cobalt Strike conducts peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.
['T1071']
Dragonfly has used SMB for C2.
['T1071']
Duqu uses a custom command and control protocol that communicates over commonly used ports, and is frequently encapsulated by application layer protocols.
['T1071', 'T1572']
Exaramel uses HTTPS for C2 communications.
['T1071']
Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.
['T1071']