text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Gamaredon Group has registered domains to stage payloads.
['T1608.001']
HEXANE has staged malware on fraudulent websites set up to impersonate targeted organizations.
['T1608.001']
Kimsuky has used Blogspot to host malicious content such as beacons, file exfiltrators, and implants.
['T1608.001']
Lazarus Group has hosted malicious files on compromised as well as Lazarus Group-controlled servers.
['T1608.001']
LazyScripter has hosted open-source remote access Trojans used in its operations in GitHub.
['T1608.001']
SideCopy has used compromised domains to host its malicious payloads.
['T1608.001']
TA505 has staged malware on actor-controlled domains.
['T1608.001']
TeamTNT has uploaded backdoored Docker images to Docker Hub.
['T1608.001']
Threat Group-3390 has hosted malicious payloads on Dropbox.
['T1608.001']
For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system.
['T1608.002']
Lazarus Group has hosted custom and open-source tools on compromised as well as Lazarus Group-controlled servers.
['T1608.002']
Threat Group-3390 has staged tools, including gsecdump and WCE, on previously compromised websites.
['T1608.002']
Dragonfly has compromised websites to redirect traffic and to host exploit kits.
['T1608.004']
For C0010, the threat actors compromised the login page of a legitimate Israeli shipping company and likely established a watering hole that collected visitor information.
['T1608.004']
Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.
['T1608.004']
Transparent Tribe has set up websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.
['T1608.004']
Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites.
['T1608.005']
Hildegard was executed through the kubelet API run command and by executing commands on running containers.
['T1609']
Kinsing was executed with an Ubuntu container entry point that runs shell scripts.
['T1609']
Siloscape can send kubectl commands to victim clusters through an IRC channel and can run kubectl locally to spread once within a victim cluster.
['T1609']
Kinsing was run through a deployed Ubuntu container.
['T1610']
Peirates can deploy a pod that mounts its node’s root file system, then execute a command to create a reverse shell on the node.
['T1610']
TeamTNT has deployed different types of containers into victim environments to facilitate execution. TeamTNT has also transferred cryptocurrency mining software to Kubernetes clusters discovered within local IP address ranges.
['T1610']
Doki’s container was configured to bind the host root directory.
['T1611']
Hildegard has used the BOtB tool that can break out of containers.
['T1611']
Peirates can gain a reverse shell on a host node by mounting the Kubernetes hostPath.
['T1611']
TeamTNT has deployed privileged containers that mount the filesystem of victim machine.
['T1611']
Hildegard has used masscan to search for kubelets and the kubelet API for additional running containers.
['T1613']
TeamTNT has checked for running containers with "docker ps" and for specific container names with "docker inspect". TeamTNT has also searched for Kubernetes pods running in a local network.
['T1613']
Crimson can identify the geographical location of a victim host.
['T1614']
GrimAgent can identify the country code on a compromised host.
['T1614']
QuasarRAT can determine the country a victim host is located in.
['T1614']
SDBbot can collected the country code of a compromised machine.
['T1614']
Saint Bot has conducted system locale checks to see if the compromised host is in Russia, Ukraine, Belarus, Armenia, Kazakhstan, or Moldova.
['T1614']
Clop has checked the keyboard language using the GetKeyboardLayout() function to avoid installation on Russian-language or other Commonwealth of Independent States-language machines; it will also check the "GetTextCharset" function.
['T1614.001']
Flagpro can check whether the target system is using Japanese, Taiwanese, or English through detection of specific Windows Security and Internet Explorer dialog.
['T1614.001']
GrimAgent has used "Accept-Language" to identify hosts in the United Kingdom, United States, France, and Spain.
['T1614.001']
Ke3chang has used implants to collect the system language ID of a compromised machine.
['T1614.001']
Lazarus Group has deployed malware designed not to run on computers set to Korean, Japanese, or Chinese in Windows language preferences.
['T1614.001']
Maze has checked the language of the machine with function "GetUserDefaultUILanguage" and terminated execution if the language matches with an entry in the predefined list.
['T1614.001']
Misdat has attempted to detect if a compromised host had a Japanese keyboard via the Windows API call `GetKeyboardType`.
['T1614.001']
Neoichor can identify the system language on a compromised host.
['T1614.001']
Ryuk has been observed to query the registry key "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nls\Language" and the value "InstallLanguage". If the machine has the value 0x419 (Russian), 0x422 (Ukrainian), or 0x423 (Belarusian), it stops execution.
['T1614.001']
SharpStage has been used to target Arabic-speaking users and used code that checks if the compromised machine has the Arabic language installed.
['T1614.001']
Some versions of DEATHRANSOM have performed language ID and keyboard layout checks; if either of these matched Russian, Kazakh, Belarusian, Ukrainian or Tatar DEATHRANSOM would exit.
['T1614.001']
Spark has checked the results of the "GetKeyboardLayoutList" and the language name returned by "GetLocaleInfoA" to make sure they contain the word “Arabic” before executing.
['T1614.001']
XCSSET uses AppleScript to check the host's language and location with the command "user locale of (get system info)".
['T1614.001']
Zeus Panda queries the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects LANG_RUSSIAN, LANG_BELARUSIAN, LANG_KAZAK, or LANG_UKRAINIAN.
['T1614.001']
Emissary has the capability to execute "gpresult".
['T1615']
Empire includes various modules for enumerating Group Policy.
['T1615']
Turla surveys a system upon check-in to discover Group Policy details using the "gpresult" command.
['T1615']
Cobalt Strike's "execute-assembly" command can run a .NET executable within the memory of a sacrificial process by loading the CLR.
['T1620']
Cuba loaded the payload into memory using PowerShell.
['T1620']
Donut can generate code modules that enable in-memory execution of VBScript, JScript, EXE, DLL, and dotNET payloads.
['T1620']
FoggyWeb's loader has reflectively loaded .NET-based assembly/payloads into memory.
['T1620']
Gelsemium can use custom shellcode to map embedded DLLs into memory.
['T1620']
IceApple can use reflective code loading to load .NET assemblies into `MSExchangeOWAAppPool` on targeted Exchange servers.
['T1620']
Lazarus Group has changed memory protection permissions then overwritten in memory DLL function code with shellcode, which was later executed via KernelCallbackTable hijacking. Lazarus Group has also used shellcode within macros to decrypt and manually map DLLs into memory at runtime.
['T1620']
PowerSploit reflectively loads a Windows PE file into a process.
['T1620']
APT29 has used repeated MFA requests to gain access to victim accounts.
['T1621']
LAPSUS$ has spammed target users with MFA prompts in the hope that the legitimate user will grant necessary approval.
['T1621']
ROKRAT can check for debugging tools.
['T1622']
Saint Bot has used `is_debugger_present` as part of its environmental checks.
['T1622']
ThiefQuest uses a function named "is_debugging" to perform anti-debugging logic. The function invokes "sysctl" checking the returned value of "P_TRACED". ThiefQuest also calls "ptrace" with the "PTRACE_DENY_ATTACH" flag to prevent debugging.
['T1622']
XCSSET uses the "plutil" command to modify the "LSUIElement", "DFBundleDisplayName", and "CFBundleIdentifier" keys in the "/Contents/Info.plist" file to change how XCSSET is visible on the system.
['T1647']
AADInternals can create and export various authentication certificates, including those associated with Azure AD joined/registered devices.
['T1649']
APT29 has abused misconfigured AD CS certificate templates to impersonate admin users and create additional authentication certificates.
['T1649']
Mimikatz's `CRYPTO` module can create and export various types of authentication certificates.
['T1649']
creates a backdoor through which remote attackers can steal system information.
['T1005', 'T1005']
captures window titles.
['T1010', 'T1010']
hides any strings related to its own indicators of compromise.
['T1027', 'T1027']
creates a backdoor through which remote attackers can open a command-line interface.
['T1059', 'T1059']
stages collected data in a text file.
['T1074', 'T1074']
can download and execute a second-stage payload.
['T1105', 'T1105']
creates a backdoor through which remote attackers can upload files.
['T1105', 'T1105']
creates a Registry subkey that registers a new system device.
['T1112', 'T1112']
At installation, the MSI file drops three files and creates one hidden directory (UFile) into C:\ProgramData\Apple\Update\, likely as a ruse
['T1564.001', 'T1564.001']
If the user clicks on the link, he will be prompted to download a RAR file that contains the stage 1 malware/lure, which he will execute afterwards
['T1204.002', 'T1105']
For both the receiving of C2 commands and exfiltration, Remexi uses the Microsoft Background Intelligent Transfer Service (BITS) mechanism to communicate with the C2 over HTTP
['T1071.001', 'T1041', 'T1071', 'T1132']
The malware initiates its main function of capturing user keystrokes and sending them to the control server using standard Windows networking APIs
['T1056.001', 'T1056']
f) Hadoop YARN ResourceManager – Command Execution (exploit) g) CVE-2016-3088: Apache ActiveMQ Fileserver File Upload Remote Code Execution Vulnerability
['T1203', 'T1203', 'T1105']
The malware also contains an embedded .NET wrapper DLL for creating and managing scheduled tasks on Windows systems
['T1053.005', 'T1053', 'T1053.005']
"beacon" payload can collect information on process details.
['T1057']
"beacon" payload can receive C2 from one protocol and respond on another. This is typically a mixture of HTTP, HTTPS, and DNS traffic.
['T1026']
"beacon" payload is capable of capturing screen shots.
['T1113']
2 contains a "Destroy" plug-in that destroys data stored on victim hard drives by overwriting file contents.
['T1070.004']
A .dll file is digitally signed by a certificate from AirVPN.
['T1553.002']
A .dll that contains is loaded and executed using DLL side-loading.
['T1574.002']
A 2 plug-in uses WMI to gather victim host details.
['T1047']
A backdoor used by created a Tor hidden service to forward traffic from the Tor client to local ports 3389 (RDP), 139 (Netbios), and 445 (SMB) enabling full remote access from outside the network.
['T1090.003']
abuses NTFS transactions to launch and conceal malicious processes.
['T1055.013']
abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll.
['T1574.001']
accessed email accounts using Outlook Web Access.
['T1114']
accesses network share(s), enables share access to the target device, and copies an executable payload to the target system, and uses a to execute the malware.
['T1021.002']
accesses the HKLM\System\CurrentControlSet\Services\mssmbios\Data\SMBiosData Registry key to obtain the System manufacturer value to identify the machine type.
['T1012']
achieves persistence by adding a shortcut of itself to the startup path in the Registry.
['T1547.001']
achieves persistence by adding itself to the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.
['T1547.001']
achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
['T1547.001']
achieves persistence by creating a shortcut in the current user's Startup folder.
['T1547.009', 'T1547.001']
achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.
['T1547.009', 'T1547.001']