text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
SUNBURST used DNS for C2 traffic designed to mimic normal SolarWinds API communications. | ['T1071.004'] |
ShadowPad has used DNS tunneling for C2 communications. | ['T1071.004'] |
Shark can use DNS in C2 communications. | ['T1071.004'] |
Sliver can support C2 communications over DNS. | ['T1071.004'] |
SombRAT can communicate over DNS with the C2 server. | ['T1071.004'] |
TEXTMATE uses DNS TXT records for C2. | ['T1071.004'] |
Variants of Kevin can communicate over DNS through queries to the server for constructed domain names with embedded information. | ['T1071.004'] |
APT32 compromised McAfee ePO to move laterally by distributing malware as a software deployment task. | ['T1072'] |
Threat Group-1314 actors used a victim's endpoint management platform, Altiris, for lateral movement. | ['T1072'] |
Kevin can create directories to store logs and other collected data. | ['T1074'] |
Kobalos can write captured SSH connection credentials to a file under the "/var/run" directory with a ".pid" extension for exfiltration. | ['T1074'] |
Shark has stored information in folders named `U1` and `U2` prior to exfiltration. | ['T1074'] |
stages collected data in a text file. | ['T1074', 'T1074'] |
ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory. | ['T1074.001'] |
APT28 has stored captured credential information in a file named pi.log. | ['T1074.001'] |
APT39 has utilized tools to aggregate data prior to exfiltration. | ['T1074.001'] |
AppleSeed can stage files in a central location prior to exfiltration. | ['T1074.001'] |
Astaroth collects data in a plaintext file named r1.log before exfiltration. | ['T1074.001'] |
Attor has staged collected data in a central upload directory prior to exfiltration. | ['T1074.001'] |
AuTo Stealer can store collected data from an infected host to a file named `Hostname_UserName.txt` prior to exfiltration. | ['T1074.001'] |
BADNEWS copies documents under 15MB found on the victim system to is the user's "%temp%\SMB\" folder. It also copies files from USB devices to a predefined directory. | ['T1074.001'] |
BackdoorDiplomacy has copied files of interest to the main drive's recycle bin. | ['T1074.001'] |
BadPatch stores collected data in log files before exfiltration. | ['T1074.001'] |
BoxCaon has created a working folder for collected files that it sends to the C2 server. | ['T1074.001'] |
Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration. | ['T1074.001', 'T1564.001'] |
Carbon creates a base directory that contains the files and folders that are collected. | ['T1074.001'] |
Chimera has staged stolen data locally on compromised hosts. | ['T1074.001'] |
Data captured by RawPOS is placed in a temporary file under a directory named "memdump". | ['T1074.001'] |
Dragonfly 2.0 created a directory named "out" in the user's %AppData% folder and copied files to it. | ['T1074.001'] |
Dragonfly has created a directory named "out" in the user's %AppData% folder and copied files to it. | ['T1074.001'] |
During Operation Honeybee, stolen data was copied into a text file using the format `From <COMPUTER-NAME> (<Month>-<Day> <Hour>-<Minute>-<Second>).txt` prior to compression, encoding, and exfiltration. | ['T1074.001'] |
During Operation Wocao, threat actors staged archived files in a temporary directory prior to exfiltration. | ['T1074.001'] |
DustySky created folders in temp directories to host collected files before exfiltration. | ['T1074.001'] |
Dyre has the ability to create files in a TEMP folder to act as a database to store information. | ['T1074.001'] |
Elise creates a file in "AppData\Local\Microsoft\Windows\Explorer" and stores all harvested data in that file. | ['T1074.001'] |
Exaramel for Windows specifies a path to store files scheduled for exfiltration. | ['T1074.001'] |
FLASHFLOOD stages data it copies from the local system or removable drives in the "%WINDIR%\$NtUninstallKB885884$\" directory. | ['T1074.001'] |
FrameworkPOS can identifiy payment card track data on the victim and copy it to a local file in a subdirectory of C:\Windows\. | ['T1074.001'] |
FunnyDream can stage collected information including screen captures and logged keystrokes locally. | ['T1074.001'] |
GALLIUM compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration. | ['T1074.001'] |
Gold Dragon stores information gathered from the endpoint in a file named 1.hwp. | ['T1074.001'] |
Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server. | ['T1074.001'] |
Honeybee adds collected files to a temp.zip file saved in the %temp% folder, then base64 encodes it and uploads it to control server. | ['T1074.001', 'T1560'] |
Indrik Spider has stored collected date in a .tmp file. | ['T1074.001'] |
InvisiMole determines a working directory where it stores all the gathered data about the compromised machine. | ['T1074.001'] |
Kazuar stages command output and collected data in files before exfiltration. | ['T1074.001'] |
Kimsuky has staged collected data files under "C:\Program Files\Common Files\System\Ole DB\". | ['T1074.001'] |
Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory, then compressed, encrypted, and uploaded to a C2 server. | ['T1074.001'] |
Leviathan has used C:\Windows\Debug and C:\Perflogs as staging directories. | ['T1074.001'] |
LightNeuron can store email data in files and directories specified in its configuration, such as "C:\Windows\ServiceProfiles\NetworkService\appdata\Local\Temp\". | ['T1074.001'] |
MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system. | ['T1074.001'] |
Machete created their own directories to drop files into. | ['T1074.001'] |
Machete stores files and logs in a folder on the local drive. | ['T1074.001'] |
Mis-Type has temporarily stored collected information to the files `“%AppData%\{Unique Identifier}\HOSTRURKLSR”` and `“%AppData%\{Unique Identifier}\NEWERSSEMP”`. | ['T1074.001'] |
MoonWind saves information from its keylogging routine as a .zip file in the present working directory. | ['T1074.001'] |
NETWIRE has the ability to write collected data to a file created in the "./LOGS" directory. | ['T1074.001'] |
NOKKI can collect data from the victim and stage it in "LOCALAPPDATA%\MicroSoft Updatea\uplog.tmp". | ['T1074.001'] |
ObliqueRAT can copy specific files, webcam captures, and screenshots to local directories. | ['T1074.001'] |
Octopus has stored collected information in the Application Data directory on a compromised host. | ['T1074.001'] |
OopsIE stages the output from command execution and collected files in specific folders before exfiltration. | ['T1074.001'] |
Operation Wocao has staged archived files in a temporary directory prior to exfiltration. | ['T1074.001'] |
PUNCHTRACK aggregates collected data in a tmp file. | ['T1074.001'] |
Patchwork copied all targeted files to a directory called index that was eventually uploaded to the C&C server. | ['T1074.001'] |
PoisonIvy stages collected data in a text file. | ['T1074.001'] |
PowerLess can stage stolen browser data in `C:\\Windows\\Temp\\cup.tmp` and keylogger data in `C:\\Windows\\Temp\\Report.06E17A5A-7325-4325-8E5D-E172EBA7FC5BK`. | ['T1074.001'] |
Prikormka creates a directory, "%USERPROFILE%\AppData\Local\SKC\", which is used to store collected log files. | ['T1074.001'] |
Rover copies files from removable drives to "C:\system". | ['T1074.001'] |
SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile. | ['T1074.001'] |
STARWHALE has stored collected data in a file called `stari.txt`. | ['T1074.001'] |
SUGARDUMP has stored collected data under `%<malware_execution_folder>%\\CrashLog.txt`. | ['T1074.001'] |
Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration. | ['T1074.001'] |
SombRAT can store harvested data in a custom database under the %TEMP% directory. | ['T1074.001'] |
TeamTNT has aggregated collected credentials in text files before exfiltrating. | ['T1074.001'] |
Threat Group-3390 has locally staged encrypted archives for later exfiltration efforts. | ['T1074.001'] |
Turian can store copied files in a specific directory prior to exfiltration. | ['T1074.001'] |
USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration. | ['T1074.001'] |
Ursnif has used tmp files to stage gathered information. | ['T1074.001'] |
Zebrocy stores all collected information in a single file before exfiltration. | ['T1074.001'] |
ccf32 can temporarily store files in a hidden directory on the local host. | ['T1074.001'] |
APT28 has staged archives of collected data on a target's Outlook Web Access (OWA) server. | ['T1074.002'] |
Chimera has staged stolen data on designated servers in the target environment. | ['T1074.002'] |
During Night Dragon, threat actors copied files to company web servers and subsequently downloaded them. | ['T1074.002'] |
FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration. | ['T1074.002'] |
FIN8 aggregates staged data from a network into a single location. | ['T1074.002'] |
Leviathan has staged data remotely prior to exfiltration. | ['T1074.002'] |
Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration. | ['T1074.002'] |
UNC2452 staged data and files in password-protected archives on a victim's OWA server. | ['T1074.002'] |
menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration. | ['T1074.002'] |
APT18 actors leverage legitimate credentials to log into external remote services. | ['T1078', 'T1133'] |
APT28 has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder. | ['T1078'] |
APT29 used different compromised credentials for remote access and to move laterally. | ['T1078'] |
APT34 has used valid administrator credentials to assist in lateral movement. | ['T1078'] |
Carbanak actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. | ['T1078'] |
Chimera has used a valid account to maintain persistence via scheduled task. | ['T1078'] |
Dragonfly 2.0 compromised user credentials and used valid accounts for operations. | ['T1078'] |
Dtrack used hard-coded credentials to gain access to a network share. | ['T1078'] |
During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems. | ['T1078', 'T1133'] |
FIN10 has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor. | ['T1078'] |
FIN4 has used legitimate credentials to hijack email communications. | ['T1078'] |
FIN5 has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment. | ['T1078'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.