text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
collects data from the clipboard. | ['T1115'] |
collects data from the local victim system. | ['T1005'] |
collects data stored in the clipboard. | ['T1115'] |
collects endpoint information using the systeminfo command. | ['T1082'] |
collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server. | ['T1005'] |
collects general system enumeration data about the infected machine and checks the OS version. | ['T1082'] |
collects hard drive content and system configuration information. | ['T1082'] |
collects information about available drives, default browser, desktop file list, My Documents, Internet history, program files, and root of available drives. It also searches for ICS-related software files. | ['T1083'] |
collects information about running processes. | ['T1057'] |
collects information about running processes from victims. | ['T1057'] |
collects information about the OS and computer name. | ['T1082'] |
collects information from the victim, including installed drivers, programs previously executed by users, programs and services configured to automatically run at startup, files and folders present in any user's home folder, files and folders present in any user's My Documents, programs installed to the Program Files folder, and recently accessed files, folders, and programs. | ['T1083'] |
collects information on network settings and Internet proxy settings from the victim. | ['T1016'] |
collects information on running processes and environment variables from the victim. | ['T1057'] |
collects its process identifier (PID) on the victim. | ['T1057'] |
collects Keychain storage data and copies those passwords/tokens to a file. | ['T1555.001'] |
collects keystrokes from the victim machine. | ['T1056'] |
collects keystrokes from the victim’s machine. | ['T1056'] |
collects local files and information from the victim’s local machine. | ['T1005'] |
collects MAC address and local IP address information from the victim. | ['T1016'] |
collects network adapter and interface information by using the commands ipconfig /all, arp -a and route print. It also collects the system's MAC address with getmac and domain configuration with net config workstation. | ['T1016'] |
collects OS version information such as registered owner details, manufacturer details, processor type, available storage, installed patches, hostname, version info, system date, and other system information by using the commands systeminfo, net config workstation, hostname, ver, set, and date /t. | ['T1082'] |
collects password policy information with the command net accounts. | ['T1201'] |
collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information. | ['T1082'] |
collects the account name of the logged-in user and sends it to the C2. | ['T1033'] |
collects the computer name, OS versioning information, and OS install date and sends the information to the C2. | ['T1082'] |
collects the computer name, the BIOS model, and execution path. | ['T1082'] |
collects the computer name and host name on the compromised system. | ['T1082'] |
collects the computer name and serial number for the storage volume C:\. | ['T1082'] |
collects the current username and sends it to the C2 server. | ['T1033'] |
collects the current username from the victim. | ['T1033'] |
collects the domain name from a compromised host. | ['T1016'] |
collects the endpoint victim's username and uses it as a basis for downloading additional components from the C2 server. | ['T1033'] |
collects the group name of the logged-in user and sends it to the C2. | ['T1069'] |
collects the hostname of the victim machine. | ['T1082'] |
collects the keychains on the system. | ['T1555.001'] |
collects the local IP address of the victim and sends it to the C2. | ['T1016'] |
collects the MAC address, computer name, and CPU information. | ['T1082'] |
collects the network adapter’s IP and MAC address as well as IP addresses of the network adapter’s default gateway, primary/secondary WINS, DHCP, and DNS servers, and saves them into a log file. | ['T1016'] |
collects the OS name, machine name, and architecture information. | ['T1082'] |
collects the OS version, country name, MAC address, computer name, physical memory statistics, and volume information for all drives on the system. | ['T1082'] |
collects the OS version and computer name. | ['T1082'] |
collects the system information, including hostname and OS version, and sends it to the C2 server. | ['T1082'] |
collects the system name, OS version including service pack, and system install date and sends the information to the C2 server. | ['T1082'] |
collects the username from the victim’s machine. | ['T1033'] |
collects the users of the system. | ['T1087'] |
collects the victim's IP address. | ['T1016'] |
collects the victim's username. | ['T1033'] |
collects the victim IP address, MAC address, as well as the victim account domain name. | ['T1016'] |
collects the victim LAN IP address and sends it to the C2 server. | ['T1016'] |
collects the victim’s computer name, processor architecture, OS version, and volume serial number. | ['T1082'] |
collects the victim’s username and whether that user is an admin. | ['T1033'] |
collects the volumes mapped on the system, and also steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf. | ['T1083'] |
collects user files from the compromised host based on predefined file extensions. | ['T1005'] |
collects various information via WMI requests, including CPU information in the Win32_Processor entry (Processor ID, Name, Manufacturer and the clock speed). | ['T1047'] |
command and control occurs via HTTPS over port 443. | ['T1043', 'T1071'] |
Commands such as net group and net localgroup can be used in to gather information about and manipulate groups. | ['T1069'] |
Commands such as net view can be used in to gather information about available remote systems. | ['T1018'] |
Commands under net user can be used in to gather information about and manipulate user accounts. | ['T1087'] |
commonly created Web shells on victims' publicly accessible email and web servers, which they used to maintain access to a victim network and download additional malicious files. | ['T1505.003'] |
communicates over common ports such as TCP 80, 443, and 25. | ['T1043'] |
communicates over HTTP for C2. | ['T1071'] |
communicates over HTTP or HTTPS for C2. | ['T1071'] |
communicates over ports 80, 443, 53, and 8080 via raw sockets instead of the protocols usually associated with the ports. | ['T1043'] |
communicates to its C2 server over HTTP. | ['T1071'] |
communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header. | ['T1071'] |
communicates to the C2 server by retrieving a Google Doc. | ['T1102'] |
communicates using HTTPS and uses a custom encryption cipher to encrypt the HTTPS message body. | ['T1573'] |
communicates via DNS for C2. | ['T1071'] |
communicates via ICMP for C2. | ['T1095'] |
communicates with its C2 server over HTTP. | ['T1071'] |
communicates with its C2 server over HTTPS. | ['T1071'] |
communicates with its C2 server over TCP port 3728. | ['T1571'] |
communicates with its C2 servers over HTTP. | ['T1071'] |
communicates with its C2 servers through a TCP socket. | ['T1095'] |
completes network communication via raw sockets. | ['T1095'] |
compressed data with zlib prior to sending it over C2. | ['T1560'] |
compresses collected files with both the GZipStream class and a simple character replacement scheme before sending them to its C2 server. | ['T1560'] |
compresses output data generated by command execution with a custom implementation of the Lempel–Ziv–Welch (LZW) algorithm. | ['T1560'] |
compromised legitimate organizations' websites to create watering holes to compromise victims. | ['T1189'] |
compromised McAfee ePO to move laterally by distributing malware as a software deployment task. | ['T1072'] |
compromised three Japanese websites using a Flash exploit to perform watering hole attacks. | ['T1189'] |
compromised user credentials and used valid accounts for operations. | ['T1078'] |
concatenates then decompresses multiple resources to load an embedded .Net Framework assembly. | ['T1140'] |
conducts brute force attacks against SSH services to gain initial access. | ['T1110'] |
conducts credential dumping on victims, with a focus on obtaining credentials belonging to domain and database servers. | ['T1003'] |
configured its payload to inject into the rundll32.exe. | ['T1218.011'] |
configures itself as a service. | ['T1543.003'] |
connects over 443 for C2. | ['T1043'] |
connects to a predefined domain on port 443 to exfil gathered information. | ['T1048'] |
connects to C2 infrastructure and establishes backdoors over a custom communications protocol. | ['T1095'] |
connects to external C2 infrastructure over the HTTP port. | ['T1043'] |
connects to port 80 of a C2 server using Wininet API. | ['T1071'] |
contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot. | ['T1053.005'] |
contains a cleanup module that removes traces of itself from the victim. | ['T1070.004'] |
contains a collection of CodeExecution modules that enable by injecting code (DLL, shellcode) or reflectively loading a Windows PE file into a process. | ['T1055'] |
contains a collection of Exfiltration modules that can access data from local files, volumes, and processes. | ['T1005'] |
contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences, Windows vault credential objects, or using . | ['T1003'] |
contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes. | ['T1574.001'] |
contains a collection of Privesc-PowerUp modules that can discover and exploit various path interception opportunities in services, processes, and variables. | ['T1034'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.