text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
has targeted victims with spearphishing emails containing malicious Microsoft Word documents. | ['T1598.002'] |
has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion. | ['T1027.005'] |
has the ability to create a reverse shell. | ['T1059'] |
has the ability to discover and manipulate Windows services. | ['T1007'] |
has the ability to download and execute additional files. | ['T1105'] |
has the ability to download files. | ['T1105'] |
has the ability to enumerate drive types. | ['T1083'] |
has the ability to enumerate processes. | ['T1057'] |
has the ability to enumerate system information. | ['T1082'] |
has the ability to execute shell commands. | ['T1059'] |
has the ability to identify any anti-virus installed on the infected system. | ['T1518.001'] |
has the ability to initiate keylogging and screen captures. | ['T1113'] |
has the ability to list processes on the system. | ['T1057'] |
has the ability to modify the Registry. | ['T1112'] |
has the ability to obtain screenshots of the compromised system. | ['T1113'] |
has the ability to remove Registry entries that it created during execution. | ['T1070'] |
has the ability to scan for security tools such as firewalls and antivirus tools. | ['T1518.001'] |
has the ability to search for a given filename on a victim. | ['T1083'] |
has the ability to upload and download files from its C2 server. | ['T1105'] |
has the capability to access the webcam on the victim’s machine. | ['T1125'] |
has the capability to add its own account to the victim's machine. | ['T1136'] |
has the capability to capture audio from a victim machine. | ['T1123'] |
has the capability to capture keystrokes. | ['T1056'] |
has the capability to capture screenshots. | ['T1113'] |
has the capability to capture video from a victim machine. | ['T1125'] |
has the capability to communicate over a backup channel via plus.google.com. | ['T1008'] |
has the capability to create a remote shell. | ['T1059'] |
has the capability to create a remote shell and execute specified commands. | ['T1059'] |
has the capability to create a reverse shell. | ['T1059'] |
has the capability to create a reverse shell on victims. | ['T1059'] |
has the capability to delete files off the victim’s machine. | ['T1070.004'] |
has the capability to delete local files. | ['T1070.004'] |
has the capability to discover processes. | ['T1057'] |
has the capability to download a file to the victim from the C2 server. | ['T1105'] |
has the capability to download files. | ['T1105'] |
has the capability to download files from the C2 server. | ['T1105'] |
has the capability to enumerate files. | ['T1083'] |
has the capability to execute the command ipconfig /all. | ['T1016'] |
has the capability to execute the command net start to interact with services. | ['T1007'] |
has the capability to execute ver, systeminfo, and gpresult commands. | ['T1082'] |
has the capability to gather the IP address from the victim's machine. | ['T1016'] |
has the capability to gather the system’s hostname and OS version. | ['T1082'] |
has the capability to gather the username from the victim's machine. | ['T1033'] |
has the capability to gather the victim's current directory. | ['T1083'] |
has the capability to gather the victim's proxy information. | ['T1016'] |
has the capability to identify remote hosts on connected networks. | ['T1018'] |
has the capability to log keystrokes from the victim’s machine. | ['T1056'] |
has the capability to obtain a listing of running processes (including loaded modules). | ['T1057'] |
has the capability to obtain file and directory listings. | ['T1083'] |
has the capability to open a remote shell and run basic commands. | ['T1059'] |
has the capability to retrieve information about groups. | ['T1069'] |
has the capability to retrieve information about shares on remote hosts. | ['T1135'] |
has the capability to retrieve information about the OS. | ['T1082'] |
has the capability to retrieve information about users on remote hosts. | ['T1087'] |
has the capability to scan for open ports on hosts in a connected network. | ['T1046'] |
has the capability to schedule remote AT jobs. | ['T1053.005'] |
has the capability to take screenshots of the victim’s machine. | ['T1113'] |
has the capability to use rm -rf to remove folders and files from the victim's machine. | ['T1070.004'] |
has transferred files using the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel. | ['T1105'] |
has tunneled RDP backdoors over port 443. | ['T1043'] |
has updated and modified its malware, resulting in different hash values that evade detection. | ['T1027.005'] |
has used , a RAT that uses HTTP to communicate. | ['T1071'] |
has used a Batch file to automate frequently executed post compromise cleanup activities. | ['T1064'] |
has used a batch script that adds a Registry Run key to establish malware persistence. | ['T1547.001'] |
has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors. | ['T1140'] |
has used a global service provider's IP as a proxy for C2 traffic from a victim. | ['T1090'] |
has used a keylogging tool called KEYPUNCH. | ['T1056'] |
has used a keylogging tool that records keystrokes in encrypted files. | ['T1056'] |
has used a Metasploit PowerShell module to download and execute shellcode and to set up a local listener. | ['T1059.001'] |
has used a Metasploit PowerShell module to download and execute shellcode and to set up a local listener. has also used scripting to iterate through a list of compromised PoS systems, copy data to a log file, and remove the original data files. | ['T1064'] |
has used an audio capturing utility known as SOUNDWAVE that captures microphone input. | ['T1123'] |
has used Android backdoors capable of enumerating specific files on the infected devices. | ['T1083'] |
has used Android backdoors capable of exfiltrating specific files directly from the infected devices. | ['T1005'] |
has used and to register a scheduled task to execute malware during lateral movement. | ['T1053.005'] |
has used an RSS feed on Livejournal to update a list of encrypted C2 server names. | ['T1102'] |
has used AOL Instant Messenger for C2. | ['T1102'] |
has used appcmd.exe to disable logging on a victim server. | ['T1562.001'] |
has used application shim databases for persistence. | ['T1546.011'] |
has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process. | ['T1547.001'] |
has used a scheduled task for persistence. | ['T1053.005'] |
has used a script (atexec.py) to execute a command on a target machine via Task Scheduler. | ['T1053.005'] |
has used a tool known as RemoteExec (similar to ) to remotely execute batch scripts and binaries. | ['T1569.002'] |
has used a tool that can obtain info about local and global group users, power users, and administrators. | ['T1087'] |
has used a tool to capture screenshots. | ['T1113'] |
has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument "dig." The group has also used a tools to dump passwords from browsers. | ['T1003'] |
has used automated collection. | ['T1119'] |
has used a variant of NanoCore RAT that communicates with its C2 server over port 6666. | ['T1571'] |
has used batch scripting to automate execution of commands. | ['T1064'] |
has used batch scripts and scheduled tasks to delete critical system files. | ['T1070.004'] |
has used batch scripts in its malware to install persistence mechanisms. | ['T1064'] |
has used bitsadmin.exe to download additional tools. | ['T1197'] |
has used brute force techniques to obtain credentials. | ['T1110'] |
has used C:\Windows\Debug and C:\Perflogs as staging directories. | ['T1074'] |
has used cmd.exe to execute commmands. | ['T1059'] |
has used CMSTP.exe and a malicious INF to execute its payload. | ['T1218.003'] |
has used code-signing certificates on its malware that are either forged due to weak keys or stolen. | ['T1553.002'] |
has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload. | ['T1546.015'] |
has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}). | ['T1546.015'] |
has used compromised credentials to access other systems on a victim network. | ['T1078'] |
has used compromised WordPress blogs as C2 servers. | ['T1102'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.