text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
InnaputRAT enumerates directories and obtains file attributes on a system. | ['T1083'] |
InvisiMole can list information about files in a directory and recently opened or used documents. InvisiMole can also search for specific files by supplied file mask. | ['T1083'] |
Ixeshe can list file and directory information. | ['T1083'] |
JPIN can enumerate drives and their types. It can also change file permissions using cacls.exe. | ['T1083'] |
KEYMARBLE has a command to search for files on the victim’s machine. | ['T1083'] |
Kasidet has the ability to search for a given filename on a victim. | ['T1083'] |
Ke3chang uses command-line interaction to search files and directories. | ['T1083'] |
KeyBoy has a command to launch a file browser or explorer on the system. | ['T1083'] |
KillDisk has used the "FindNextFile" command as part of its file deletion process. | ['T1083'] |
Koadic can obtain a list of directories. | ['T1083'] |
Kwampirs collects a list of files and directories in C:\ with the command "dir /s /a c:\ >> "C:\windows\TEMP\[RANDOM].tmp"". | ['T1083'] |
Leafminer used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files. | ['T1083'] |
Linfo creates a backdoor through which remote attackers can list contents of drives and search for files. | ['T1083'] |
MESSAGETAP checks for the existence of two configuration files (keyword_parm.txt and parm.txt) and attempts to read the files every 30 seconds. | ['T1083'] |
MacMa can search for a specific file on the compromised computer and can enumerate files in Desktop, Downloads, and Documents folders. | ['T1083'] |
Machete produces file listings in order to search for files to be exfiltrated. | ['T1083'] |
Magic Hound malware can list a victim's logical drives and the type, as well the total/free space of the fixed devices. Other malware can list a directory's contents. | ['T1083'] |
MarkiRAT can look for files carrying specific extensions such as: .rtf, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pps, .ppsx, .txt, .gpg, .pkr, .kdbx, .key, and .jpb. | ['T1083'] |
MegaCortex can parse the available drives and directories to determine which files to encrypt. | ['T1083'] |
Micropsia can perform a recursive directory listing for all volume drives available on the victim's machine and can also fetch specific files by their paths. | ['T1083'] |
MiniDuke can enumerate local drives. | ['T1083'] |
Misdat is capable of running commands to obtain a list of files and directories, as well as enumerating logical drives. | ['T1083'] |
MobileOrder has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history. | ['T1083'] |
MoonWind has a command to return a directory listing for a specified directory. | ['T1083'] |
NETEAGLE allows adversaries to enumerate and modify the infected host's file system. It supports searching for directories, creating directories, listing directory contents, reading and writing to files, retrieving file attributes, and retrieving volume information. | ['T1083'] |
NETWIRE has the ability to search for files on the compromised host. | ['T1083'] |
Nebulae can list files and directories on a compromised host. | ['T1083'] |
NotPetya searches for files ending with dozens of different file extensions prior to encryption. | ['T1083'] |
ObliqueRAT has the ability to recursively enumerate files on an infected endpoint. | ['T1083'] |
OceanSalt can extract drive information from the endpoint and search files on the system. | ['T1083'] |
Octopus can collect information on the Windows directory and searches for compressed RAR files on the host. | ['T1083'] |
Okrum has used DriveLetterView to enumerate drive information. | ['T1083'] |
Operation Wocao has gathered a recursive directory listing to find files and directories of interest. | ['T1083'] |
Orz can gather victim drive information. | ['T1083'] |
OutSteel can search for specific file extensions, including zipped files. | ['T1083'] |
POORAIM can conduct file browsing. | ['T1083'] |
POWRUNER may enumerate user directories on a victim. | ['T1083'] |
Pasam creates a backdoor through which remote attackers can retrieve lists of files. | ['T1083'] |
Penquin can use the command code "do_vslist" to send file names, size, and status to C2. | ['T1083'] |
Peppy can identify specific files for exfiltration. | ['T1083'] |
PingPull can enumerate storage volumes and folder contents of a compromised host. | ['T1083'] |
Pisloader has commands to list drives on the victim machine and to list file information for a given directory. | ['T1083'] |
PlugX has a module to enumerate drives and find files recursively. | ['T1083'] |
PoetRAT has the ability to list files upon receiving the "ls" command from C2. | ['T1083'] |
PowerDuke has commands to get the current directory name as well as the size of a file. It also has commands to obtain information about logical drives, drive type, and free space. | ['T1083'] |
Psylo has commands to enumerate all storage devices and to find all files that start with a particular string. | ['T1083'] |
Pteranodon identifies files matching certain file extension and copies them to subdirectories it created. | ['T1083'] |
Pupy can walk through directories and recursively search for strings in files. | ['T1083'] |
QakBot can identify whether it has been run previously on a host by checking for a specified folder. | ['T1083'] |
QuietSieve can search files on the target host by extension, including doc, docx, xls, rtf, odt, txt, jpg, pdf, rar, zip, and 7z. | ['T1083'] |
RARSTONE obtains installer properties from Uninstall Registry Key entries to obtain information about installed applications and how to uninstall certain applications. | ['T1083'] |
REvil has the ability to identify specific files and directories that are not to be encrypted. | ['T1083'] |
ROKRAT has the ability to gather a list of files and directories on the infected system. | ['T1083'] |
RainyDay can use a file exfiltration tool to collect recently changed files with specific extensions. | ['T1083'] |
Ramsay can collect directory and file lists. | ['T1083'] |
Rclone can list files and directories with the `ls`, `lsd`, and `lsl` commands. | ['T1083'] |
Remexi searches for files on the system. | ['T1083'] |
RemoteUtilities can enumerate files and directories on a target machine. | ['T1083'] |
Remsec is capable of listing contents of folders on the victim. Remsec also searches for custom network encryption software on victims. | ['T1083'] |
Rising Sun can enumerate information about files from the infected system, including file size, attributes, creation time, last access time, and write time. Rising Sun can enumerate the compilation timestamp of Windows executable files. | ['T1083'] |
Rover automatically searches for files on local drives based on a predefined list of file extensions. | ['T1083'] |
SDBbot has the ability to get directory listings or drive information on a compromised host. | ['T1083'] |
SHOTPUT has a command to obtain a directory listing. | ['T1083'] |
SILENTTRINITY has several modules, such as `ls.py`, `pwd.py`, and `recentFiles.py`, to enumerate directories and files. | ['T1083'] |
SLOTHFULMEDIA can enumerate files and directories. | ['T1083'] |
SPACESHIP identifies files and directories for collection by searching for specific file extensions or file modification time. | ['T1083'] |
SUGARDUMP can search for and collect data from specific Chrome, Opera, Microsoft Edge, and Firefox files, including any folders that have the string `Profile` in its name. | ['T1083'] |
SUNSPOT enumerated the Orion software Visual Studio solution directory path. | ['T1083'] |
Sandworm Team has enumerated files on a compromised host. | ['T1083'] |
Seasalt has the capability to identify the drive type on a victim. | ['T1083'] |
Several Lazarus Group has conducted word searches on compromised machines to identify specific documents of interest. Lazarus Group malware can use a common function to identify target files by their extension, and some also enumerate files and directories, including a Destover-like variant that lists files and gathers information for all drives. | ['T1083'] |
Shamoon attempts to access the "ADMIN$", "C$\Windows", "D$\Windows", and "E$\Windows" shares on the victim with its current privileges. | ['T1083'] |
ShimRat can list directories. | ['T1083'] |
Sidewinder has used malware to collect information on files and directories. | ['T1083'] |
Siloscape searches for the Kubernetes config file and other related files using a regular expression. | ['T1083'] |
Skidmap has checked for the existence of specific files including "/usr/sbin/setenforce" and " /etc/selinux/config". It also has the ability to monitor the cryptocurrency miner file and process. | ['T1083'] |
Sliver can enumerate files on a target system. | ['T1083'] |
Smoke Loader recursively searches through directories for files. | ['T1083'] |
SombRAT can execute "enum" to enumerate files in storage on a compromised system. | ['T1083'] |
Sowbug identified and extracted all Word documents on a server by using a command containing * .doc and *.docx. The actors also searched for documents based on a specific date range and attempted to identify all installed software on a victim. | ['T1083'] |
StreamEx has the ability to enumerate drive types. | ['T1083'] |
StrifeWater can enumerate files on a compromised host. | ['T1083'] |
StrongPity can parse the hard drive on a compromised host to identify specific file extensions. | ['T1083'] |
Stuxnet uses a driver to scan for specific filesystem driver objects. | ['T1083'] |
SynAck checks its directory location in an attempt to avoid launching in a sandbox. | ['T1083', 'T1497.001'] |
SysUpdate can search files on a compromised host. | ['T1083'] |
TAINTEDSCRIBE can use "DirectoryList" to enumerate files in a specified directory. | ['T1083'] |
TINYTYPHON searches through the drive containing the OS, then all drive letters C through to Z, for documents matching certain extensions. | ['T1083'] |
TSCookie has the ability to discover drive information on the infected host. | ['T1083'] |
Taidoor can search for specific files. | ['T1083'] |
TajMahal has the ability to index files from drives, user profiles, and removable drives. | ['T1083'] |
TeamTNT has used a script that checks `/proc/*/environ` for environment variables related to AWS. | ['T1083'] |
The IceApple Directory Lister module can list information about files and directories including creation time, last write time, name, and size. | ['T1083'] |
TrickBot searches the system for all of the following file extensions: .avi, .mov, .mkv, .mpeg, .mpeg4, .mp4, .mp3, .wav, .ogg, .jpeg, .jpg, .png, .bmp, .gif, .tiff, .ico, .xlsx, and .zip. It can also obtain browsing history, cookies, and plug-in information. | ['T1083'] |
Tropic Trooper has monitored files' modified time. | ['T1083'] |
Turian can search for specific files and list directories. | ['T1083'] |
Turla surveys a system upon check-in to discover files in specific locations on the hard disk %TEMP% directory, the current user's desktop, the Program Files directory, and Recent. Turla RPC backdoors have also searched for files matching the "lPH*.dll" pattern. | ['T1083'] |
UNC2452 obtained information about the configured Exchange virtual directory using "Get-WebServicesVirtualDirectory". | ['T1083'] |
USBferry can detect the victim's file or folder list. | ['T1083'] |
Volgmer can list directories on a victim. | ['T1083'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.