text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Patchwork used Base64 to encode C2 traffic. | ['T1132.001'] |
PingPull can encode C2 traffic with Base64. | ['T1132.001'] |
PowerShower has the ability to encode C2 communications with base64 encoding. | ['T1132.001'] |
Prikormka encodes C2 traffic with Base64. | ['T1132.001'] |
QUADAGENT encodes C2 communications with base64. | ['T1132.001'] |
QakBot can Base64 encode system information sent to C2. | ['T1132.001'] |
RDAT can communicate with the C2 via base32-encoded subdomains. | ['T1132.001'] |
Ramsay has used base64 to encode its C2 traffic. | ['T1132.001'] |
Responses from the Pisloader C2 server are base32-encoded. | ['T1132.001'] |
RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel. | ['T1132.001'] |
SMOKEDHAM has encoded its C2 traffic with Base64. | ['T1132.001'] |
STARWHALE has the ability to hex-encode collected data from an infected host. | ['T1132.001'] |
Sandworm Team's BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server. | ['T1132.001'] |
SeaDuke C2 traffic is base64-encoded. | ['T1132.001'] |
Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server. | ['T1132.001'] |
SideTwist has used Base64 for encoded C2 traffic. | ['T1132.001'] |
Sliver can use standard encoding techniques like gzip and hex to ASCII to encode the C2 communication payload. | ['T1132.001'] |
Some Backdoor.Oldrea samples use standard Base64 + bzip2, and some use standard Base64 + reverse XOR + RSA-2048 to decrypt data received from C2 servers. | ['T1132.001'] |
Some Felismus samples use a custom method for C2 traffic that utilizes Base64. | ['T1132.001'] |
Squirrelwaffle has encoded its communications to C2 servers using Base64. | ['T1132.001'] |
Stuxnet transforms encrypted binary data into an ASCII string in order to use it as a URL parameter value. | ['T1132.001'] |
TA551 has used encoded ASCII text for initial C2 communications. | ['T1132.001'] |
TrickBot can Base64-encode C2 commands. | ['T1132.001'] |
Tropic Trooper has used base64 encoding to hide command strings delivered from the C2. | ['T1132.001'] |
Valak has returned C2 data as encoded ASCII. | ['T1132.001'] |
WellMess has used Base64 encoding to uniquely identify communication to and from the C2. | ['T1132.001'] |
Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests. | ['T1132.001'] |
down_new has the ability to base64 encode C2 communications. | ['T1132.001'] |
gh0st RAT has used Zlib to compress C2 communications data before encrypting it. | ['T1132.001'] |
njRAT uses Base64 encoding for C2 traffic. | ['T1132.001'] |
xCaon has used Base64 to encode its C2 traffic. | ['T1132.001'] |
Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed. | ['T1132.002'] |
InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests. | ['T1132.002'] |
Newer variants of BACKSPACE will encode C2 communications with a custom system. | ['T1132.002'] |
PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server. | ['T1132.002'] |
RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions. | ['T1132.002'] |
ShadowPad has encoded data as readable Latin characters. | ['T1132.002'] |
Small Sieve can use a custom hex byte swapping encoding scheme to obfuscate tasking traffic. | ['T1132.002'] |
APT28 has used Tor and a variety of commercial VPN services to route brute force authentication attempts. | ['T1133'] |
APT29 has used compromised identities to access networks via SSH, VPNs, and other remote access tools. | ['T1133'] |
APT34 uses remote services such as VPN, Citrix, or OWA to persist in an environment. | ['T1133'] |
APT41 compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service. | ['T1133'] |
Chimera has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services. | ['T1133'] |
Doki was executed through an open Docker daemon API port. | ['T1133'] |
Dragonfly 2.0 used VPNs and Outlook Web Access (OWA) to maintain access to victim networks. | ['T1133'] |
Dragonfly has used VPNs and Outlook Web Access (OWA) to maintain access to victim networks. | ['T1133'] |
Dragonfly used remote access services, including VPN and Outlook Web Access (OWA). | ['T1133'] |
During CostaRicto, the threat actors set up remote tunneling using an SSH tool to maintain access to a compromised environment. | ['T1133'] |
During Operation CuckooBees, the threat actors enabled WinRM over HTTP/HTTPS as a backup persistence mechanism using the following command: `cscript //nologo "C:\Windows\System32\winrm.vbs" set winrm/config/service@{EnableCompatibilityHttpsListener="true"}`. | ['T1133'] |
During Operation Wocao, threat actors used stolen credentials to connect to the victim's network via VPN. | ['T1133'] |
GALLIUM has used VPN services, including SoftEther VPN, to access and maintain persistence in victim environments. | ['T1133'] |
GOLD SOUTHFIELD has used publicly-accessible RDP and remote management and monitoring (RMM) servers to gain access to victim machines. | ['T1133'] |
Ke3chang has gained access through VPNs including with compromised accounts and stolen VPN certificates. | ['T1133'] |
Kimsuky has used RDP to establish persistence. | ['T1133'] |
LAPSUS$ has gained access to internet-facing systems and applications, including virtual private network (VPN), remote desktop protocol (RDP), and virtual desktop infrastructure (VDI) including Citrix. | ['T1133'] |
Leviathan has used external remote services such as virtual private networks (VPN) to gain initial access. | ['T1133'] |
Linux Rabbit attempts to gain access to the server via SSH. | ['T1133'] |
OilRig uses remote services such as VPN, Citrix, or OWA to persist in an environment. | ['T1133'] |
Operation Wocao has used stolen credentials to connect to the victim's network via VPN. | ['T1133'] |
Sandworm Team has used Dropbear SSH with a hardcoded backdoor password to maintain persistence within the target network. Sandworm Team has also used VPN tunnels established in legitimate software company infrastructure to gain access to internal networks of that software company's users. | ['T1133'] |
TEMP.Veles has used a VPN to persist in the victim environment. | ['T1133'] |
TeamTNT has used open-source tools such as Weave Scope to target exposed Docker API ports and gain initial access to victim environments. TeamTNT has also targeted exposed kubelets for Kubernetes environments. | ['T1133'] |
Threat Group-3390 actors look for and use VPN profiles during an operation to access the network using external VPN services. Threat Group-3390 has also obtained OWA account credentials during intrusions that it subsequently used to attempt to regain access when evicted from a victim network. | ['T1133'] |
UNC2452 has used compromised identities to access VPNs and remote access tools. | ['T1133'] |
AppleSeed can gain system level privilege by passing "SeDebugPrivilege" to the "AdjustTokenPrivilege" API. | ['T1134'] |
Blue Mockingbird has used JuicyPotato to abuse the "SeImpersonate" token privilege to escalate from web application pool accounts to NT Authority\SYSTEM. | ['T1134'] |
Duqu examines running system processes for tokens that have specific system privileges. If it finds one, it will copy the token and store it for later use. Eventually it will start new processes with the stored token attached. It can also steal tokens to acquire administrative privileges. | ['T1134'] |
Empire can use PowerSploit's "Invoke-TokenManipulation" to manipulate access tokens. | ['T1134'] |
FIN6 has used has used Metasploit’s named-pipe impersonation technique to escalate privileges. | ['T1134'] |
Gelsemium can use token manipulation to bypass UAC on Windows7 systems. | ['T1134'] |
HermeticWiper can use `AdjustTokenPrivileges` to grant itself privileges for debugging with `SeDebugPrivilege`, creating backups with `SeBackupPrivilege`, loading drivers with `SeLoadDriverPrivilege`, and shutting down a local system with `SeShutdownPrivilege`. | ['T1134'] |
Hydraq creates a backdoor through which remote attackers can adjust token privileges. | ['T1134'] |
PowerSploit's "Invoke-TokenManipulation" Exfiltration module can be used to manipulate tokens. | ['T1134'] |
Ryuk has attempted to adjust its token privileges to have the "SeDebugPrivilege". | ['T1134'] |
SUNSPOT modified its security token to grants itself debugging privileges by adding "SeDebugPrivilege". | ['T1134'] |
Sliver has the ability to manipulate user tokens on targeted Windows systems. | ['T1134'] |
SslMM contains a feature to manipulate process privileges and tokens. | ['T1134'] |
APT28 has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation. | ['T1134.001'] |
BitPaymer can use the tokens of users to create processes on infected systems. | ['T1134.001'] |
Cobalt Strike can steal access tokens from exiting processes. | ['T1134.001'] |
FinFisher uses token manipulation with NtFilterToken as part of UAC bypass. | ['T1134.001'] |
Okrum can impersonate a logged-on user's security context using a call to the ImpersonateLoggedOnUser API. | ['T1134.001'] |
Pupy can obtain a list of SIDs and provide the option for selecting process tokens to impersonate. | ['T1134.001'] |
SILENTTRINITY can find a process owned by a specific user and impersonate the associated token. | ['T1134.001'] |
Shamoon can impersonate tokens using "LogonUser", "ImpersonateLoggedOnUser", and "ImpersonateNamedPipeClient". | ['T1134.001'] |
Siloscape impersonates the main thread of "CExecSvc.exe" by calling "NtImpersonateThread". | ['T1134.001'] |
Stuxnet attempts to impersonate an anonymous token to enumerate bindings in the service control manager. | ['T1134.001'] |
Tarrask leverages token theft to obtain `lsass.exe` security permissions. | ['T1134.001'] |
Aria-body has the ability to execute a process using "runas". | ['T1134.002'] |
Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges. | ['T1134.002'] |
Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user. | ['T1134.002'] |
KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user. | ['T1134.002'] |
Lazarus Group keylogger KiloAlfa obtains user tokens from interactive sessions to execute itself with API call "CreateProcessAsUserA" under that user's context. | ['T1134.002'] |
PipeMon can attempt to gain administrative privileges using token impersonation. | ['T1134.002'] |
PoshC2 can use Invoke-RunAs to make tokens. | ['T1134.002'] |
REvil can launch an instance of itself with administrative rights using runas. | ['T1134.002'] |
ZxShell has a command called RunAs, which creates a new process as another user or process context. | ['T1134.002'] |
Cobalt Strike can make tokens from known credentials. | ['T1134.003'] |
Cobalt Strike can spawn processes with alternate PPIDs. | ['T1134.004'] |
KONNI has used parent PID spoofing to spawn a new `cmd` process using `CreateProcessW` and a handle to `Taskmgr.exe`. | ['T1134.004'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.