text1
stringlengths
7
2.5k
labels
stringlengths
9
100
APT29 has compromised domains to use for C2.
['T1584.001']
Kimsuky has compromised legitimate sites and used them to distribute malware.
['T1584.001']
Lazarus Group has compromised legitimate domains, including those hosted in the US and Italy, for C2.
['T1584.001']
Magic Hound has used compromised domains to host links targeted to specific phishing victims.
['T1584.001']
SideCopy has compromised domains for some of their infrastructure, including for C2 and staging malware.
['T1584.001']
Transparent Tribe has compromised domains for use in targeted malicious campaigns.
['T1584.001']
UNC2452 has compromised domains to use for C2.
['T1584.001']
APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads.
['T1584.004']
Dragonfly has compromised legitimate websites to host C2 and malware modules.
['T1584.004']
During Night Dragon, threat actors compromised web servers to use for C2.
['T1584.004']
Earth Lusca has used compromised web servers as part of their operational infrastructure.
['T1584.004']
Indrik Spider has served fake updates via legitimate websites that have been compromised.
['T1584.004']
Turla has used compromised servers as infrastructure.
['T1584.004']
Sandworm Team has used a large-scale botnet to target Small Office/Home Office (SOHO) network devices.
['T1584.005']
Turla has frequently used compromised WordPress sites for C2 infrastructure.
['T1584.006']
APT32 has set up Facebook pages in tandem with fake websites.
['T1585.001']
Fox Kitten has used a Twitter account to communicate with ransomware victims.
['T1585.001']
HEXANE has established fraudulent LinkedIn accounts impersonating HR department employees to target potential victims with fake job offers.
['T1585.001']
Kimsuky has created social media accounts to monitor news and security trends as well as potential targets.
['T1585.001']
Lazarus Group has created new LinkedIn and Twitter accounts to conduct social engineering against potential victims.
['T1585.001']
APT1 has created email accounts for later use in social engineering, phishing, and when registering domains.
['T1585.002']
EXOTIC LILY has created e-mail accounts to spoof targeted organizations.
['T1585.002']
For FunnyDream, the threat actors likely established an identified email account to register a variety of domains that were used during the campaign.
['T1585.002']
HEXANE has established email accounts for use in domain registration including for ProtonMail addresses.
['T1585.002']
Kimsuky has created email accounts for phishing operations.
['T1585.002']
Leviathan has created new email accounts for targeting efforts.
['T1585.002']
Magic Hound has established email accounts using fake personas for spearphishing operations.
['T1585.002']
Mustang Panda has leveraged the legitimate email marketing service SMTP2Go for phishing campaigns.
['T1585.002']
Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations.
['T1585.002']
Leviathan has compromised social media accounts to conduct social engineering attacks.
['T1586.001']
APT28 has used compromised email accounts to send credential phishing emails.
['T1586.002']
HEXANE has used compromised accounts to send spearphishing emails.
['T1586.002']
IndigoZebra has compromised legitimate email accounts to use in their spearphishing operations.
['T1586.002']
Kimsuky has compromised email accounts to send spearphishing e-mails.
['T1586.002']
Leviathan has compromised email accounts to conduct social engineering attacks.
['T1586.002']
Kimsuky created and used a mailing toolkit to use in spearphishing attacks.
['T1587']
APT29 has leveraged numerous pieces of malware that appear to be unique to APT29 and were likely developed for or by the group.
['T1587.001']
Aoqin Dragon has used custom malware, including Mongall and Heyoka Backdoor, in their operations.
['T1587.001']
Cleaver has created customized tools and payloads for functions including ARP poisoning, encryption, credential dumping, ASP.NET shells, web backdoors, process enumeration, WMI querying, HTTP and SMB communications, network interface sniffing, and keystroke logging.
['T1587.001']
During Operation Wocao, threat actors developed their own custom webshells to upload to compromised servers.
['T1587.001']
FIN7 has developed malware for use in operations, including the creation of infected removable media.
['T1587.001']
For CostaRicto, the threat actors used custom malware, including PS1, CostaBricks, and SombRAT.
['T1587.001']
For Operation Sharpshooter, the threat actors used the Rising Sun modular backdoor.
['T1587.001']
Ke3chang has developed custom malware that allowed them to maintain persistence on victim networks.
['T1587.001']
Moses Staff has built malware, such as DCSrv and PyDCrypt, for targeting victims' machines.
['T1587.001']
Night Dragon used privately developed and customized remote access tools.
['T1587.001']
Sandworm Team has developed malware for its operations, including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer.
['T1587.001']
TeamTNT has developed custom malware such as Hildegard.
['T1587.001']
Turla has developed its own unique malware for use in operations.
['T1587.001']
UNC2452 developed SUNSPOT, SUNBURST, TEARDROP, and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library.
['T1587.001']
PROMETHIUM has created self-signed certificates to sign malicious installers.
['T1587.002']
Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware.
['T1587.002']
APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.
['T1587.003']
For C0011, Transparent Tribe established SSL certificates on the typo-squatted domains the group registered.
['T1587.003']
PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.
['T1587.003']
APT1 used publicly available malware for privilege escalation.
['T1588.001']
During Night Dragon, threat actors used Trojans from underground hacker websites.
['T1588.001']
For C0015, the threat actors used Cobalt Strike and Conti ransomware.
['T1588.001']
For FunnyDream, the threat actors used a new backdoor named FunnyDream.
['T1588.001']
For Operation Spalax, the threat actors obtained malware, including Remcos, njRAT, and AsyncRAT.
['T1588.001']
LAPSUS$ acquired and used the Redline password stealer in their operations.
['T1588.001']
LazyScripter has used a variety of open-source remote access Trojans for its operations.
['T1588.001']
TA505 has used malware such as Azorult and Cobalt Strike in their operations.
['T1588.001']
Turla has used malware obtained after compromising other threat actors, such as OilRig.
['T1588.001']
APT-C-36 obtained and used a modified variant of Imminent Monitor.
['T1588.002']
APT1 has used various open-source tools for privilege escalation purposes.
['T1588.002']
APT19 has obtained and used publicly-available tools like Empire.
['T1588.002']
APT28 has obtained and used open-source tools like Koadic, Mimikatz, and Responder.
['T1588.002']
APT29 has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and Cobalt Strike.
['T1588.002']
APT32 has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub.
['T1588.002']
APT33 has obtained and leveraged publicly-available tools for early intrusion activities.
['T1588.002']
APT38 has obtained and used open-source tools such as Mimikatz.
['T1588.002']
Aoqin Dragon obtained the Heyoka open source exfiltration tool and subsequently modified it for their operations.
['T1588.002']
BITTER has obtained tools such as PuTTY for use in their operations.
['T1588.002']
BRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.
['T1588.002']
BackdoorDiplomacy has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement.
['T1588.002']
BlackTech has obtained and used tools such as Putty, SNScan, and PsExec for its operations.
['T1588.002']
Carbanak has obtained and used open-source tools such as PsExec and Mimikatz.
['T1588.002']
Cobalt Group has obtained and used a variety of tools including Mimikatz, PsExec, Cobalt Strike, and SDelete.
['T1588.002']
CopyKittens has used Metasploit, Empire, and AirVPN for post-exploitation activities.
['T1588.002']
CostaRicto has obtained open source tools to use in their operations.
['T1588.002']
DarkHydrus has obtained and used tools such as Mimikatz, Empire, and Cobalt Strike.
['T1588.002']
Dragonfly has obtained and used tools such as Mimikatz, CrackMapExec, and PsExec.
['T1588.002']
During CostaRicto, the threat actors obtained open source tools to use in their operations.
['T1588.002']
Earth Lusca has acquired and used a variety of open source tools.
['T1588.002']
Ember Bear has obtained and used open source scripts from GitHub.
['T1588.002']
FIN10 has relied on publicly-available software to gain footholds and establish persistence in victim environments.
['T1588.002']
FIN5 has obtained and used a customized version of PsExec, as well as use other tools such as pwdump, SDelete, and Windows Credential Editor.
['T1588.002']
FIN6 has obtained and used tools such as Mimikatz, Cobalt Strike, and AdFind.
['T1588.002']
Ferocious Kitten has obtained open source tools for its operations, including JsonCPP and Psiphon.
['T1588.002']
For C0015, the threat actors obtained a variety of tools, including AdFind, AnyDesk, and Process Hacker.
['T1588.002']
For Frankenstein, the threat actors obtained and used Empire.
['T1588.002']
For FunnyDream, the threat actors used a modified version of the open source PcShare remote administration tool.
['T1588.002']
For Operation Spalax, the threat actors obtained packers such as CyaX.
['T1588.002']
For Operation Wocao, the threat actors obtained a variety of open source tools, including JexBoss, KeeThief, and BloodHound.
['T1588.002']
Frankenstein has obtained and used Empire to deploy agents.
['T1588.002']
GALLIUM has used a variety of widely-available tools, which in some cases they modified to add functionality and/or subvert antimalware solutions.
['T1588.002']
Gorgon Group has obtained and used tools such as QuasarRAT and Remcos.
['T1588.002']
Kimsuky has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec.
['T1588.002']
LAPSUS$ has obtained tools such as AD Explorer inspection software for their operations.
['T1588.002']