text
stringlengths
104
2.24k
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may compromise accounts with services that can be used during targeting.### Assistant: T1586: Compromise Accounts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Waterbear has the ability to decrypt its RC4 encrypted payload for execution.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SpicyOmelette can download malicious files from threat actor controlled AWS URL's.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Magic Hound has registered fraudulent domains such as "mail-newyorker.com" and "news12.com.recover-session-service.site" to target specific victims with phishing attacks.### Assistant: T1583: Acquire Infrastructure
### Human:Find the techniques and ID from MITRE ATT&CK framework.,IcedID has used ZwQueueApcThread to inject itself into remote processes.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BLUELIGHT can collect the local time on a compromised host.### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,VBShower has the ability to download VBS files to the target computer.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,RTM can obtain information about security software on the victim.### Assistant: T1518: Software Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,When scheduled exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as Exfiltration Over C2 Channel or Exfiltration Over Alternative Protocol.### Assistant: T1029: Scheduled Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PUNCHBUGGY has saved information to a random temp file before exfil.### Assistant: T1074: Data Staged
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT39 has used tools capable of stealing contents of the clipboard.### Assistant: T1115: Clipboard Data
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on the system.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign HTML files.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Janicab captured screenshots and sent them out to a C2 server.### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,MURKYTOP has the capability to retrieve information about users on remote hosts.### Assistant: T1087: Account Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT38 has used Hermes ransomware to encrypt files with AES256.### Assistant: T1486: Data Encrypted for Impact
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT38 has collected browser bookmark information to learn more about compromised hosts, obtain personal information about users, and acquire details about internal network resources.### Assistant: T1217: Browser Bookmark Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ursnif has used Registry modifications as part of its installation routine.### Assistant: T1112: Modify Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Personas may exist on a single site or across multiple sites .### Assistant: T1586: Compromise Accounts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OSX/Shlayer executes a .command script from a hidden directory in a mounted DMG.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,WHOIS data is stored by regional Internet registries responsible for allocating and assigning Internet resources such as domain names.### Assistant: T1596: Search Open Technical Databases
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Encoded Payload Decoded Payload MD5 Size Import Hash Exported Function Version aa3f303c3319b14b4829fe2faa5999c1 322164 182ee99b4f0803628c30411b1faa9992 l7MF25T96n45qOGWX 5.3.2 126067d634d94c45084cbe1d9873d895 330804 5f45532f947501cf024d84c36e3a19a1 hJvTJcdAU3mNkuvGGq7L 5.4.1 fce54b4886cac5c61eda1e7605483ca3 345812 c1942a0ca397b627019dace26eca78d8 WcuH 5.4.1 Table 2: Static characteristics of UPPERCUT Another new feature in the latest UPPERCUT sample is that the malware sends an error code in the Cookie header if it fails to receive the HTTP response from the command and control (C2) server### Assistant: T1132: Data Encoding
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives.### Assistant: T1485: Data Destruction
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Gold Dragon checks the running processes on the victim’s machine.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,On embedded devices, downgrading the version typically only requires replacing the operating system file in storage.### Assistant: T1601: Modify System Image
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Internal spearphishing is multi-staged attack where an email account is owned either by controlling the user's device with previously installed malware or by compromising the account credentials of the user.### Assistant: T1534: Internal Spearphishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Attor has manipulated the time of last access to files and registry keys after they have been created or modified.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TeamTNT has searched for unsecured SSH keys.### Assistant: T1552: Unsecured Credentials
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Cardinal RAT sets HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load to point to its executable.### Assistant: T1112: Modify Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT37's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Depending on the implementation, adversaries may use infrastructure that makes it difficult to physically tie back to them as well as utilize infrastructure that can be rapidly provisioned, modified, and shut down.### Assistant: T1583: Acquire Infrastructure
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries can use stolen session cookies to authenticate to web applications and services.### Assistant: T1550: Use Alternate Authentication Material
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Valak has the ability to modify the Registry key HKCU\Software\ApplicationContainer\Appsw64 to store information regarding the C2 server and downloads.### Assistant: T1112: Modify Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may inject malicious code into processes via the /proc filesystem in order to evade process-based defenses as well as possibly elevate privileges.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ZIRCONIUM has used multi-stage packers for exploit code.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,REvil can mark its binary code for deletion after reboot.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Examples of existing defenses that can be impeded include encryption, via Weaken Encryption, authentication, via Network Device Authentication, and perimeter defenses, via Network Boundary Bridging.### Assistant: T1601: Modify System Image
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Its purpose is to load Msadoz<n>.dll in order to decrypt and execute it in memory### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GreyEnergy encrypts communications using AES256.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OSX/Shlayer can download payloads, and extract bytes from files.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,RainyDay can decrypt its payload via a XOR key.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Some archival libraries are preinstalled on systems, such as bzip2 on macOS and Linux, and zip on Windows.### Assistant: T1560: Archive Collected Data
### Human:Find the techniques and ID from MITRE ATT&CK framework.,HighShell v5.0 explorer tab allows actor to navigate the file system The HighShell v7.1 variant from the data dump contains similar functionality to its predecessors and continued the tabular approach but expanded even further by splitting out the main functionality across multiple tabs, specifically “Command”, “Explorer”, “Upload”, “Download”, “Sql Server” and “Change Time”### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network### Assistant: T1011: Exfiltration Over Other Network Medium
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Peppy can identify specific files for exfiltration.### Assistant: T1083: File and Directory Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, or direct access to the target information.### Assistant: T1213: Data from Information Repositories
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If the base image already resides in a local registry, the pull may be considered even less suspicious since the image is already in the environment.### Assistant: T1612: Build Image on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,AuditCred encrypts the configuration.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Links may also direct users to malicious applications designed to Steal Application Access Tokens, like OAuth tokens, in order to gain access to protected applications and information.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SodaMaster can check for the presence of the Registry key HKEY_CLASSES_ROOT\\Applications\\VMwareHostOpen.exe before proceeding to its main functionality.### Assistant: T1497: Virtualization/Sandbox Evasion
### Human:Find the techniques and ID from MITRE ATT&CK framework.,They have also dumped credentials from domain controllers.### Assistant: T1003: OS Credential Dumping
### Human:Find the techniques and ID from MITRE ATT&CK framework.,LoudMiner harvested system resources to mine cryptocurrency, using XMRig to mine Monero.### Assistant: T1496: Resource Hijacking
### Human:Find the techniques and ID from MITRE ATT&CK framework., /etc/passwd ### Assistant: T1087: Account Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT41 modified legitimate Windows services to install malware backdoors.### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Modifications to domain settings may include altering domain Group Policy Objects or changing trust settings for domains, including federation trusts.### Assistant: T1484: Domain Policy Modification
### Human:Find the techniques and ID from MITRE ATT&CK framework.,DDKONG uses Rundll32 to ensure only a single instance of itself is running at once.### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lazarus Group has developed several custom malware for use in operations.### Assistant: T1587: Develop Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Gathering this information may reveal opportunities for other forms of reconnaissance or Search Open Websites/Domains, establishing operational resources or Compromise Accounts, and/or initial access .### Assistant: T1591: Gather Victim Org Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,LightNeuron can be configured to automatically exfiltrate files under a specified directory.### Assistant: T1020: Automated Exfiltration
### Human:Find the techniques and ID from MITRE ATT&CK framework.,LTD. Stuxnet used a digitally signed driver with a compromised Realtek certificate.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Machete collects the MAC address of the target computer and other network configuration information.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,As of macOS Sierra, the sudoers file has tty_tickets enabled by default.### Assistant: T1548: Abuse Elevation Control Mechanism
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Use of multiple stages may obfuscate the command and control channel to make detection more difficult.### Assistant: T1104: Multi-Stage Channels
### Human:Find the techniques and ID from MITRE ATT&CK framework.,down_new has the ability to gather information on installed applications.### Assistant: T1518: Software Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Rather than developing their own exploits, an adversary may find/modify exploits from online or purchase them from exploit vendors.### Assistant: T1588: Obtain Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Taidoor has relied upon a victim to click on a malicious email attachment.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lazarus Group malware IndiaIndia obtains and sends to its C2 server information about the first network interface card’s configuration, including IP address, gateways, subnet mask, DHCP information, and whether WINS is available.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Any user or administrator within the organization can create rules to automatically forward all received messages to another recipient, forward emails to different locations based on the sender, and more.### Assistant: T1114: Email Collection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PoetRAT has called cmd through a Word document macro.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Additional information In the advanced stages of this research, we were able not only to observe additional files and tools from the attackers’ arsenal but also some OPSEC mistakes made by the attackers### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,NOKKI has downloaded a remote module for execution.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Other malware has obtained the OS version, UUID, and computer/host name to send to the C2 server.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may leverage this functionality to create or modify system processes in order to escalate privileges. . Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root.### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Proton kills security tools like Wireshark that are running.### Assistant: T1562: Impair Defenses
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Crutch has conducted C2 communications with a Dropbox account using the HTTP API.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This action is repeated until the dwell time value is bigger or equal to the dwell time value for the standby mode### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Elise enumerates processes via the tasklist command.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Malicious files will be transmitted directly as attachments or through links to download them.### Assistant: T1203: Exploitation for Client Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OilRig has used HTTP for C2.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Windows Transactional NTFS was introduced in Vista as a method to perform safe file operations.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,POWRUNER persists through a scheduled task that executes it every minute.### Assistant: T1053: Scheduled Task/Job
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This script relays commands and output between the controller and the system### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,StrongPity can add directories used by the malware to the Windows Defender exclusions list to prevent detection.### Assistant: T1562: Impair Defenses
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Unlike a previously reported variant, this version of BADNEWS no longer looks at USB drives for interesting files### Assistant: T1083: File and Directory Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Placing a program within a startup folder will also cause that program to execute when a user logs in.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BadPatch stores collected data in log files before exfiltration.### Assistant: T1074: Data Staged
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GrimAgent can use an AES key to encrypt C2 communications.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Bankshot collects files from the local system.### Assistant: T1005: Data from Local System
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT28 has collected files from network shared drives.### Assistant: T1039: Data from Network Shared Drive
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ChinaChopper web shell### Assistant: T1505: Server Software Component
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Pysa has the functionality to delete shadow copies.### Assistant: T1490: Inhibit System Recovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lazarus Group has renamed the TAINTEDSCRIBE main executable to disguise itself as Microsoft's narrator.### Assistant: T1036: Masquerading
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Olympic Destroyer uses the API call ChangeServiceConfigW to disable all services on the affected system.### Assistant: T1489: Service Stop
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots.### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Carberp has removed various hooks before installing the trojan or bootkit to evade sandbox analysis or other analysis software.### Assistant: T1497: Virtualization/Sandbox Evasion
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Magic Hound granted compromised email accounts read access to the email boxes of additional targeted accounts.### Assistant: T1098: Account Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,By utilizing a web service, adversaries can make it difficult to physically tie back operations to them.### Assistant: T1583: Acquire Infrastructure
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may transfer tools or other files from an external system into a compromised environment.### Assistant: T1105: Ingress Tool Transfer