text1
stringlengths
7
2.5k
labels
stringlengths
9
100
RedLeaves is launched through use of DLL search order hijacking to load a malicious dll.
['T1574.001']
Threat Group-3390 has performed DLL search order hijacking to execute their payload.
['T1574.001']
Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to "%SYSTEMROOT%" ("C:\WINDOWS\ntshrui.dll").
['T1574.001']
WastedLocker has performed DLL hijacking before execution.
['T1574.001']
Whitefly has used search order hijacking to run the loader Vcrodat.
['T1574.001']
A Patchwork .dll that contains BADNEWS is loaded and executed using DLL side-loading.
['T1574.002']
A gh0st RAT variant has used DLL side-loading.
['T1574.002']
APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.
['T1574.002']
APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools.
['T1574.002']
APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder).
['T1574.002']
APT41 used legitimate executables to perform DLL side-loading of their malware.
['T1574.002']
BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable.
['T1574.002']
BRONZE BUTLER has used legitimate applications to side-load malicious DLLs.
['T1574.002']
BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories.
['T1574.002']
Clambling can store a file named `mpsvc.dll`, which opens a malicious `mpsvc.mui` file, in the same folder as the legitimate Microsoft executable `MsMpEng.exe` to gain execution.
['T1574.002']
Denis exploits a security vulnerability to load a fake DLL and execute its code.
['T1574.002']
During Operation CuckooBees, the threat actors used the legitimate Windows services `IKEEXT` and `PrintNotify` to side-load malicious DLLs.
['T1574.002']
During the T9000 installation process, it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware.
['T1574.002']
Earth Lusca has placed a malicious payload in `%WINDIR%\SYSTEM32\oci.dll` so it would be sideloaded by the MSDTC service.
['T1574.002']
Ecipekac can abuse the legitimate application policytool.exe to load a malicious DLL.
['T1574.002']
Egregor has used DLL side-loading to execute its payload.
['T1574.002']
FinFisher uses DLL side-loading to load malicious programs.
['T1574.002']
Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky, Microsoft, and Google.
['T1574.002']
HTTPBrowser has used DLL side-loading.
['T1574.002']
Higaisa’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the "OINFO12.OCX" dynamic link library.
['T1574.002']
HyperBro has used a legitimate application to sideload a DLL to decrypt, decompress, and run a payload.
['T1574.002']
Javali can use DLL side-loading to load malicious DLLs into legitimate executables.
['T1574.002']
Kerrdown can use DLL side-loading to load malicious DLLs.
['T1574.002']
LookBack side loads its communications module as a DLL into the "libcurl.dll" loader.
['T1574.002']
Metamorfo has side-loaded its malicious DLL file.
['T1574.002']
MuddyWater maintains persistence on victim networks through side-loading dlls to trick legitimate programs into running malware.
['T1574.002']
Mustang Panda has used a legitimately signed executable to execute a malicious payload within a DLL file.
['T1574.002']
Nebulae can use DLL side-loading to gain execution.
['T1574.002']
Pandora can use DLL side-loading to execute malicious payloads.
['T1574.002']
PowGoop can side-load `Goopdate.dll` into `GoogleUpdate.exe`.
['T1574.002']
RCSession can be installed via DLL side-loading.
['T1574.002']
RainyDay can use side-loading to run malicious executables.
['T1574.002']
Sakula uses DLL side-loading, typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files.
['T1574.002']
SideCopy has used a malicious loader DLL file to execute the `credwiz.exe` process and side-load the malicious payload `Duser.dll`.
['T1574.002']
Sidewinder has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe.
['T1574.002']
SysUpdate can load DLLs through vulnerable legitimate executables.
['T1574.002']
Threat Group-3390 has used DLL side-loading, including by using legitimate Kaspersky antivirus variants in which the DLL acts as a stub loader that loads and executes the shell code.
['T1574.002']
Tropic Trooper has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools.
['T1574.002']
Waterbear has used DLL side loading to import and load a malicious DLL loader.
['T1574.002']
Wingbird side loads a malicious file, sspisrv.dll, in part of a spoofed lssas.exe service.
['T1574.002']
ZeroT has used DLL side-loading to load malicious payloads.
['T1574.002']
menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT.
['T1574.002']
APT41 has configured payloads to load via LD_PRELOAD.
['T1574.006']
XCSSET adds malicious file paths to the "DYLD_FRAMEWORK_PATH" and "DYLD_LIBRARY_PATH" environment variables to execute malicious code.
['T1574.006']
Empire contains modules that can discover and exploit search order hijacking vulnerabilities.
['T1574.008']
Empire contains modules that can discover and exploit unquoted path vulnerabilities.
['T1574.009']
One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.
['T1574.010']
Lazarus Group has abused the "KernelCallbackTable" to hijack process control flow and execute shellcode.
['T1574.013']
LAPSUS$ has created new virtual machines within the target's cloud environment after leveraging credential access to cloud assets.
['T1578.002']
LAPSUS$ has deleted the target's systems and resources in the cloud to trigger the organization's incident and crisis response process.
['T1578.003']
APT1 has registered hundreds of domains for use in operations.
['T1583.001']
APT28 registered domains imitating NATO, OSCE security websites, Caucasus information resources, and other organizations.
['T1583.001']
APT29 has acquired C2 domains, sometimes through resellers.
['T1583.001']
APT32 has set up and operated websites to gather information and deliver malware.
['T1583.001']
Dragonfly has registered domains for targeting intended victims.
['T1583.001']
Earth Lusca has registered domains, intended to look like legitimate target domains, that have been used in watering hole attacks.
['T1583.001']
FIN7 has registered look-alike domains for use in phishing campaigns.
['T1583.001']
Ferocious Kitten has acquired domains imitating legitimate sites.
['T1583.001']
For CostaRicto, the threat actors established domains, some of which appeared to spoof legitimate domains.
['T1583.001']
For Operation Dust Storm, the threat actors established domains as part of their operational infrastructure.
['T1583.001']
For Operation Spalax, the threat actors registered hundreds of domains using Duck DNS and DNS Exit.
['T1583.001']
Gamaredon Group has registered multiple domains to facilitate payload staging and C2.
['T1583.001']
HEXANE has registered and operated domains for campaigns, often using a security or web technology theme or impersonating the targeted organization.
['T1583.001']
IndigoZebra has established domains, some of which were designed to look like official government domains, for their operations.
['T1583.001']
Lazarus Group has acquired domains related to their campaigns to act as distribution points and C2 channels.
['T1583.001']
Leviathan has established domains that impersonate legitimate entities to use for targeting efforts.
['T1583.001']
Magic Hound has registered fraudulent domains such as "mail-newyorker.com" and "news12.com.recover-session-service.site" to target specific victims with phishing attacks.
['T1583.001']
Mustang Panda have acquired C2 domains prior to operations.
['T1583.001']
Silent Librarian has acquired domains to establish credential harvesting pages, often spoofing the target organization and using free top level domains .TK, .ML, .GA, .CF, and .GQ.
['T1583.001']
TA505 has registered domains to impersonate services such as Dropbox to distribute malware.
['T1583.001']
TeamTNT has obtained domains to host their payloads.
['T1583.001']
UNC2452 has acquired C2 domains through resellers.
['T1583.001']
menuPass has registered malicious domains for use in intrusion campaigns.
['T1583.001']
Axiom has acquired dynamic DNS services for use in the targeting of intended victims.
['T1583.002']
HEXANE has set up custom DNS servers to send commands to compromised hosts via TXT records.
['T1583.002']
Axiom has used VPS hosting providers in targeting of intended victims.
['T1583.003']
Dragonfly has acquired VPS infrastructure for use in malicious campaigns.
['T1583.003']
HAFNIUM has operated from leased virtual private servers (VPS) in the United States.
['T1583.003']
Earth Lusca has acquired multiple servers for some of their operations, using each server for a different role.
['T1583.004']
For Operation Honeybee, at least one identified persona was used to register for a free account for a control server.
['T1583.004']
Lazarus Group has acquired servers to host their malicious tools.
['T1583.004']
Sandworm Team has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations.
['T1583.004']
APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure.
['T1583.006']
APT28 has used newly-created Blogspot pages for credential harvesting operations.
['T1583.006']
APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware, such as HAMMERTOSS.
['T1583.006']
Earth Lusca has established GitHub accounts to host their malware.
['T1583.006']
For Operation Sharpshooter, the threat actors used Dropbox to host lure documents and their first-stage downloader.
['T1583.006']
HAFNIUM has acquired web services for use in C2 and exfiltration.
['T1583.006']
IndigoZebra created Dropbox accounts for their operations.
['T1583.006']
LazyScripter has established GitHub accounts to host its toolsets.
['T1583.006']
Magic Hound has acquired Amazon S3 buckets to use in C2.
['T1583.006']
POLONIUM has created and used legitimate Microsoft OneDrive accounts for their operations.
['T1583.006']
Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration.
['T1583.006']
ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails.
['T1583.006']
APT1 hijacked FQDNs associated with legitimate websites hosted by hop points.
['T1584.001']