text1
stringlengths
7
2.5k
labels
stringlengths
9
100
contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries, paths, and configs.
['T1543.003']
contains a collection of Privesc-PowerUp modules that can query Registry keys for potential opportunities.
['T1012']
contains a command to collect and exfiltrate emails from Outlook.
['T1114']
contains a command to collect information about anti-virus software on the victim.
['T1518.001']
contains a command to collect the victim MAC address and LAN IP.
['T1016']
contains a command to collect the victim PC name and operating system.
['T1082']
contains a command to download and execute a file from a remotely hosted URL using WinINet HTTP requests.
['T1105']
contains a command to perform screen captures.
['T1113']
contains a command to retrieve files from its C2 server.
['T1105']
contains a copy of the OpenSSL library to encrypt C2 traffic.
['T1573']
contains a custom version of the RC4 algorithm that includes a programming error.
['T1573']
contains a keylogger component.
['T1056']
contains a keylogger module.
['T1056']
contains a keylogger module that collects keystrokes and the titles of foreground windows.
['T1056']
contains a module that captures screenshots of the victim's desktop.
['T1113']
contains a module that collects documents with certain extensions from removable media or fixed drives connected via USB.
['T1025']
contains a module to steal credentials from Web browsers on the victim machine.
['T1003']
contains base64-encoded strings.
['T1027']
contains code to clear event logs.
['T1070']
contains code to delete files from the victim’s machine.
['T1070.004']
contains code to open and copy data from the clipboard.
['T1115']
contains commands to list files and directories, as well as search for files matching certain extensions from a defined list.
['T1083']
contains functionality to collect information from the clipboard.
['T1115']
contains junk code in its binary, likely to confuse malware analysts.
['T1027.001']
contains junk code in its functions in an effort to confuse disassembly programs.
['T1027.001']
contains keylogger functionality.
['T1056']
contains keylogging functionality that will monitor for active application windows and write them to the log, it can handle special characters, and it will buffer by default 50 characters before sending them out over the C2 infrastructure.
['T1056']
contains keylogging functionality to steal passwords.
['T1056']
contains many methods for bypassing Windows User Account Control on multiple versions of the operating system.
['T1548.002']
contains modules to infect USB sticks and spread laterally to other Windows systems the stick is plugged into using autorun functionality.
['T1091']
contains screen capture functionality.
['T1113']
contains the execFile function to execute a specified file on the system using the NSTask:launch method.
['T1106']
contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.
['T1071']
contains the getFirefoxPassword function to attempt to locate Firefox passwords.
['T1552.001']
contains the getInfoOSX function to return the OS X version as well as the current user.
['T1033']
contains the getInstalledAPP function to run ls -la /Applications to gather what applications are installed.
['T1082']
contains the readFiles function to return a detailed listing (sometimes recursive) of a specified directory.
['T1083']
contains the showBackupIosFolder function to check for IOS device backups by running ls -la ~/Library/Application\ Support/MobileSync/Backup/.
['T1120']
contains the takeScreenShot (along with startTakeScreenShot and stopTakeScreenShot) functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods.
['T1113']
contains UAC bypass code for both 32- and 64-bit systems.
['T1548.002']
contains unused machine instructions in a likely attempt to hinder analysis.
['T1027.001']
copied all targeted files to a directory called index that was eventually uploaded to the C&C server.
['T1074']
copied and installed tools for operations once in the victim environment.
['T1105']
copies a file over to the remote system before execution.
['T1105']
copies an executable payload to the target system by using and then scheduling an unnamed task to execute the malware.
['T1053.005']
copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory.
['T1074']
copies files from removable drives to C:\system.
['T1074']
copies itself into the public folder of Network Attached Storage (NAS) devices and infects new victims who open the file.
['T1080']
copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed (e.g. notron.exe).
['T1036']
copies itself to disk and creates an associated run key Registry entry to establish.
['T1547.001']
copies itself to the Startup folder to establish persistence.
['T1547.001']
copies staged data to removable drives when they are inserted into the system.
['T1052']
created accounts disguised as legitimate backup and service accounts as well as an email administration account.
['T1036']
created a custom video recording capability that could be used to monitor operations in the victim's environment.
['T1125']
created a directory named "out" in the user's %AppData% folder and copied files to it.
['T1074']
created a shortcut in the Windows startup folder to launch a PowerShell script each time the user logs in to establish persistence.
['T1547.001']
created a that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory.
['T1218.010']
created new Windows services and added them to the startup directories for persistence.
['T1543.003']
creates a backdoor by making a connection using a HTTP POST.
['T1071']
creates a backdoor through which remote attackers can adjust token privileges.
['T1134']
creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.
['T1029']
creates a backdoor through which remote attackers can create a service.
['T1543.003']
creates a backdoor through which remote attackers can delete files.
['T1070.004']
creates a backdoor through which remote attackers can download files and additional malware components.
['T1105']
creates a backdoor through which remote attackers can download files onto a compromised host.
['T1105']
creates a backdoor through which remote attackers can download files onto compromised hosts.
['T1105']
creates a backdoor through which remote attackers can inject files into running processes.
['T1055']
creates a backdoor through which remote attackers can load and call DLL functions.
['T1129']
creates a backdoor through which remote attackers can monitor services.
['T1007']
creates a backdoor through which remote attackers can obtain data from local systems.
['T1005']
creates a backdoor through which remote attackers can retrieve a list of running processes.
['T1057']
creates a backdoor through which remote attackers can retrieve files.
['T1005']
creates a backdoor through which remote attackers can retrieve information such as hostname and free disk space.
['T1082']
creates a backdoor through which remote attackers can retrieve IP addresses of compromised machines.
['T1016']
creates a backdoor through which remote attackers can retrieve lists of files.
['T1083']
creates a backdoor through which remote attackers can retrieve lists of running processes.
['T1057']
creates a backdoor through which remote attackers can retrieve system information, such as CPU speed, from Registry keys.
['T1012']
creates a backdoor through which remote attackers can start a remote shell.
['T1059']
creates a directory, %USERPROFILE%\AppData\Local\SKC\, which is used to store collected log files.
['T1074']
creates a Launch Agent on macOS.
['T1543.001']
creates and uses a VBScript as part of its persistent execution.
['T1064']
creates a new service named “ntssrv” that attempts to appear legitimate; the service's display name is “Microsoft Network Realtime Inspection Service” and its description is “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.”
['T1036']
creates a new service named “ntssrv” to execute the payload.
['T1569.002', 'T1543.003']
creates a new service that loads a malicious driver when the system starts. When Duqu is active, the operating system believes that the driver is legitimate, as it has been signed with a valid private key.
['T1543.003']
creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators.
['T1056']
creates a new Windows service with the malicious executable for persistence.
['T1543.003']
creates a Registry key to ensure a file gets executed upon reboot in order to establish persistence.
['T1547.001']
creates a Registry Run key to establish persistence.
['T1547.001']
creates a Registry subkey that registers a new service.
['T1543.003', 'T1112']
creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. 's backdoor also enables remote attackers to modify and delete subkeys.
['T1112']
creates a scheduled task to establish by executing a malicious payload every subsequent minute.
['T1053.005']
creates a scheduled task to maintain persistence on the victim’s machine.
['T1053.005']
creates a scheduled task to run itself every three minutes.
['T1053.005']
creates a shortcut file and saves it in a Startup folder to establish persistence.
['T1547.009', 'T1547.001']
creates a suspended svchost process and injects its DLL into it.
['T1055']
creates a Windows service to establish persistence.
['T1543.003']
creates folders to store output from batch scripts prior to sending the information to its C2 server.
['T1074']
creates new services to establish persistence.
['T1543.003']
creates processes using the Windows API calls: CreateProcessA() and CreateProcessAsUserA().
['T1106']
creates Registry entries that store information about a created service and point to a malicious DLL dropped to disk.
['T1112']