prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Develop Capabilities:Malware
|
It has developed custom malware for use in their operations.
|
Develop Capabilities:Malware
|
It has used unique malware for information theft and exfiltration.
|
Develop Capabilities:Malware
|
It has built malware, such as DCSrv and PyDCrypt, for targeting victims' machines.
|
Develop Capabilities:Malware
|
For Operation Dream Job, It developed custom tools such as Sumarta, DBLL Dropper, Torisma, and DRATzarus for their operations.
|
Develop Capabilities:Malware
|
For Operation Ghost, It used new strains of malware including FatDuke, MiniDuke, RegDuke, and PolyglotDuke.
|
Develop Capabilities:Malware
|
For Operation Sharpshooter, the threat actors used the Rising Sun modular backdoor.
|
Develop Capabilities:Malware
|
During Operation Wocao, threat actors developed their own custom webshells to upload to compromised servers.
|
Develop Capabilities:Malware
|
It has developed malware for its operations, including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer.
|
Develop Capabilities:Malware
|
For the SolarWinds Compromise, It used numerous pieces of malware that were likely developed for or by the group, including SUNBURST, SUNSPOT, Raindrop, and TEARDROP.
|
Develop Capabilities:Malware
|
It has developed custom malware such as Hildegard.
|
Develop Capabilities:Malware
|
It has developed its own unique malware for use in operations.
|
Develop Capabilities:Code Signing Certificates
|
During Operation Dream Job, It digitally signed their malware and the dbxcli utility.
|
Develop Capabilities:Code Signing Certificates
|
It has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware.
|
Develop Capabilities:Code Signing Certificates
|
It has created self-signed certificates to sign malicious installers.
|
Develop Capabilities:Digital Certificates
|
It has created self-signed digital certificates to enable mutual TLS authentication for malware.
|
Develop Capabilities:Digital Certificates
|
For C0011, It established SSL certificates on the typo-squatted domains the group registered.
|
Develop Capabilities:Digital Certificates
|
It has created self-signed digital certificates for use in HTTPS C2 traffic.
|
Establish Accounts
|
It has created and cultivated profile pages in Microsoft TechNet. To make profile pages appear more legitimate, It has created biographical sections and posted in forum threads.
|
Establish Accounts
|
It has created KeyBase accounts to communicate with ransomware victims.
|
Establish Accounts:Social Media Accounts
|
It has set up Facebook pages in tandem with fake websites.
|
Establish Accounts:Social Media Accounts
|
It has created fake LinkedIn profiles that included profile photos, details, and connections.
|
Establish Accounts:Social Media Accounts
|
It has established a network of fictitious social media accounts, including on Facebook and LinkedIn, to establish relationships with victims, often posing as an attractive woman.
|
Establish Accounts:Social Media Accounts
|
It has established social media profiles to mimic employees of targeted companies.
|
Establish Accounts:Social Media Accounts
|
It has used a Twitter account to communicate with ransomware victims.
|
Establish Accounts:Social Media Accounts
|
It has established fraudulent LinkedIn accounts impersonating HR department employees to target potential victims with fake job offers.
|
Establish Accounts:Social Media Accounts
|
It has created social media accounts to monitor news and security trends as well as potential targets.
|
Establish Accounts:Social Media Accounts
|
It has created new Twitter accounts to conduct social engineering against potential victims.
|
Establish Accounts:Social Media Accounts
|
It has created new social media accounts for targeting efforts.
|
Establish Accounts:Social Media Accounts
|
It has created fake LinkedIn and other social media accounts to contact targets and convince them--through messages and voice communications--to open malicious links.
|
Establish Accounts:Social Media Accounts
|
For Operation Dream Job, It created fake LinkedIn accounts for their targeting efforts.
|
Establish Accounts:Social Media Accounts
|
For Operation Ghost, It registered Twitter accounts to host C2 nodes.
|
Establish Accounts:Social Media Accounts
|
It has established social media accounts to disseminate victim internal-only documents and other sensitive data.
|
Establish Accounts:Email Accounts
|
It has created email accounts for later use in social engineering, phishing, and when registering domains.
|
Establish Accounts:Email Accounts
|
It has created e-mail accounts to spoof targeted organizations.
|
Establish Accounts:Email Accounts
|
For FunnyDream, the threat actors likely established an identified email account to register a variety of domains that were used during the campaign.
|
Establish Accounts:Email Accounts
|
It has established email accounts for use in domain registration including for ProtonMail addresses.
|
Establish Accounts:Email Accounts
|
It has created email accounts to communicate with their ransomware victims, to include providing payment and decryption details.
|
Establish Accounts:Email Accounts
|
It has created email accounts for phishing operations.
|
Establish Accounts:Email Accounts
|
It has created new email accounts for spearphishing operations.
|
Establish Accounts:Email Accounts
|
It has created new email accounts for targeting efforts.
|
Establish Accounts:Email Accounts
|
It has established email accounts using fake personas for spearphishing operations.
|
Establish Accounts:Email Accounts
|
It has leveraged the legitimate email marketing service SMTP2Go for phishing campaigns.
|
Establish Accounts:Email Accounts
|
During Operation Dream Job, It created fake email accounts to correspond with fake LinkedIn personas; It also established email accounts to match those of the victim as part of their BEC attempt.
|
Establish Accounts:Email Accounts
|
For Operation Dust Storm, the threat actors established email addresses to register domains for their operations.
|
Establish Accounts:Email Accounts
|
During Operation Honeybee, attackers created email addresses to register for a free account for a control server used for the implants.
|
Establish Accounts:Email Accounts
|
For Operation Wocao, the threat actors registered email accounts to use during the campaign.
|
Establish Accounts:Email Accounts
|
It has created email accounts that mimic legitimate organizations for its spearphishing operations.
|
Establish Accounts:Email Accounts
|
It has established e-mail accounts to receive e-mails forwarded from compromised accounts.
|
Establish Accounts:Email Accounts
|
It has leveraged ProtonMail email addresses in ransom notes when delivering Ryuk ransomware.
|
Obtain Capabilities:Malware
|
It has used a variety of publicly-available remote access Trojans (RATs) for its operations.
|
Obtain Capabilities:Malware
|
It used publicly available malware for privilege escalation.
|
Obtain Capabilities:Malware
|
It has acquired and used njRAT in its operations.
|
Obtain Capabilities:Malware
|
It has obtained and used leaked malware, including DoublePulsar, EternalBlue, EternalRocks, and EternalSynergy, in its operations.
|
Obtain Capabilities:Malware
|
For C0015, the threat actors used Cobalt Strike and Conti ransomware.
|
Obtain Capabilities:Malware
|
It has acquired and used a variety of malware, including Cobalt Strike.
|
Obtain Capabilities:Malware
|
For FunnyDream, the threat actors used a new backdoor named FunnyDream.
|
Obtain Capabilities:Malware
|
It acquired and used the Redline password stealer in their operations.
|
Obtain Capabilities:Malware
|
It has used a variety of open-source remote access Trojans for its operations.
|
Obtain Capabilities:Malware
|
It has obtained and used malware such as Cobalt Strike.
|
Obtain Capabilities:Malware
|
It has used unique malware in their operations, including metaMain and Mafalda.
|
Obtain Capabilities:Malware
|
During Night Dragon, threat actors used Trojans from underground hacker websites.
|
Obtain Capabilities:Malware
|
For Operation Spalax, the threat actors obtained malware, including Remcos, njRAT, and AsyncRAT.
|
Obtain Capabilities:Malware
|
It has used multiple strains of malware available for purchase on criminal forums or in open-source repositories.
|
Obtain Capabilities:Malware
|
It has used malware such as Azorult and Cobalt Strike in their operations.
|
Obtain Capabilities:Malware
|
It has used malware obtained after compromising other threat actors, such as It.
|
Obtain Capabilities:Tool
|
It obtained the Heyoka open source exfiltration tool and subsequently modified it for their operations.
|
Obtain Capabilities:Tool
|
It obtained and used a modified variant of Imminent Monitor.
|
Obtain Capabilities:Tool
|
It has used various open-source tools for privilege escalation purposes.
|
Obtain Capabilities:Tool
|
It has obtained and used publicly-available tools like Empire.
|
Obtain Capabilities:Tool
|
It has obtained and used open-source tools like Koadic, Mimikatz, and Responder.
|
Obtain Capabilities:Tool
|
It has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and Cobalt Strike.
|
Obtain Capabilities:Tool
|
It has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub.
|
Obtain Capabilities:Tool
|
It has obtained and leveraged publicly-available tools for early intrusion activities.
|
Obtain Capabilities:Tool
|
It has obtained and used open-source tools such as Mimikatz.
|
Obtain Capabilities:Tool
|
It has modified and used customized versions of publicly-available tools like PLINK and Mimikatz.
|
Obtain Capabilities:Tool
|
It has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor.
|
Obtain Capabilities:Tool
|
It has acquired and used Cobalt Strike in its operations.
|
Obtain Capabilities:Tool
|
It has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement.
|
Obtain Capabilities:Tool
|
It has obtained tools such as PuTTY for use in their operations.
|
Obtain Capabilities:Tool
|
It has obtained and used tools such as Putty, SNScan, and PsExec for its operations.
|
Obtain Capabilities:Tool
|
It has obtained and used tools such as Mimikatz.
|
Obtain Capabilities:Tool
|
It has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.
|
Obtain Capabilities:Tool
|
For C0010, UNC3890 actors obtained multiple publicly-available tools, including METASPLOIT, UNICORN, and NorthStar C2.
|
Obtain Capabilities:Tool
|
For C0015, the threat actors obtained a variety of tools, including AdFind, AnyDesk, and Process Hacker.
|
Obtain Capabilities:Tool
|
For C0017, It obtained publicly available tools such as YSoSerial.NET, ConfuserEx, and BadPotato.
|
Obtain Capabilities:Tool
|
For C0018, the threat actors acquired a variety of open source tools, including Mimikatz, Sliver, SoftPerfect Network Scanner, AnyDesk, and PDQ Deploy.
|
Obtain Capabilities:Tool
|
For C0021, the threat actors used Cobalt Strike configured with a modified variation of the publicly available Pandora Malleable C2 Profile.
|
Obtain Capabilities:Tool
|
During C0027, It obtained and used multiple tools including the LINpeas privilege escalation utility, aws_consoler, rsocx reverse proxy, Level RMM tool, and RustScan port scanner.
|
Obtain Capabilities:Tool
|
It has obtained and used open-source tools such as PsExec and Mimikatz.
|
Obtain Capabilities:Tool
|
It has obtained and used tools such as BloodHound, Cobalt Strike, Mimikatz, and PsExec.
|
Obtain Capabilities:Tool
|
It has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz.
|
Obtain Capabilities:Tool
|
It has obtained and used a variety of tools including Mimikatz, PsExec, Cobalt Strike, and SDelete.
|
Obtain Capabilities:Tool
|
It has used Metasploit, Empire, and AirVPN for post-exploitation activities.
|
Obtain Capabilities:Tool
|
During CostaRicto, the threat actors obtained open source tools to use in their operations.
|
Obtain Capabilities:Tool
|
It has obtained and used tools such as Mimikatz, Empire, and Cobalt Strike.
|
Obtain Capabilities:Tool
|
It has obtained and used tools such as Impacket, Winexe, and PsExec.
|
Obtain Capabilities:Tool
|
It has obtained and used tools such as Mimikatz, CrackMapExec, and PsExec.
|
Obtain Capabilities:Tool
|
It has acquired and used a variety of open source tools.
|
Obtain Capabilities:Tool
|
It has obtained and used open source scripts from GitHub.
|
Obtain Capabilities:Tool
|
It has obtained open source tools for its operations, including JsonCPP and Psiphon.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.