text1
stringlengths
7
2.5k
labels
stringlengths
9
100
has targeted victims with spearphishing emails containing malicious Microsoft Word documents.
['T1598.002']
has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion.
['T1027.005']
has the ability to create a reverse shell.
['T1059']
has the ability to discover and manipulate Windows services.
['T1007']
has the ability to download and execute additional files.
['T1105']
has the ability to download files.
['T1105']
has the ability to enumerate drive types.
['T1083']
has the ability to enumerate processes.
['T1057']
has the ability to enumerate system information.
['T1082']
has the ability to execute shell commands.
['T1059']
has the ability to identify any anti-virus installed on the infected system.
['T1518.001']
has the ability to initiate keylogging and screen captures.
['T1113']
has the ability to list processes on the system.
['T1057']
has the ability to modify the Registry.
['T1112']
has the ability to obtain screenshots of the compromised system.
['T1113']
has the ability to remove Registry entries that it created during execution.
['T1070']
has the ability to scan for security tools such as firewalls and antivirus tools.
['T1518.001']
has the ability to search for a given filename on a victim.
['T1083']
has the ability to upload and download files from its C2 server.
['T1105']
has the capability to access the webcam on the victim’s machine.
['T1125']
has the capability to add its own account to the victim's machine.
['T1136']
has the capability to capture audio from a victim machine.
['T1123']
has the capability to capture keystrokes.
['T1056']
has the capability to capture screenshots.
['T1113']
has the capability to capture video from a victim machine.
['T1125']
has the capability to communicate over a backup channel via plus.google.com.
['T1008']
has the capability to create a remote shell.
['T1059']
has the capability to create a remote shell and execute specified commands.
['T1059']
has the capability to create a reverse shell.
['T1059']
has the capability to create a reverse shell on victims.
['T1059']
has the capability to delete files off the victim’s machine.
['T1070.004']
has the capability to delete local files.
['T1070.004']
has the capability to discover processes.
['T1057']
has the capability to download a file to the victim from the C2 server.
['T1105']
has the capability to download files.
['T1105']
has the capability to download files from the C2 server.
['T1105']
has the capability to enumerate files.
['T1083']
has the capability to execute the command ipconfig /all.
['T1016']
has the capability to execute the command net start to interact with services.
['T1007']
has the capability to execute ver, systeminfo, and gpresult commands.
['T1082']
has the capability to gather the IP address from the victim's machine.
['T1016']
has the capability to gather the system’s hostname and OS version.
['T1082']
has the capability to gather the username from the victim's machine.
['T1033']
has the capability to gather the victim's current directory.
['T1083']
has the capability to gather the victim's proxy information.
['T1016']
has the capability to identify remote hosts on connected networks.
['T1018']
has the capability to log keystrokes from the victim’s machine.
['T1056']
has the capability to obtain a listing of running processes (including loaded modules).
['T1057']
has the capability to obtain file and directory listings.
['T1083']
has the capability to open a remote shell and run basic commands.
['T1059']
has the capability to retrieve information about groups.
['T1069']
has the capability to retrieve information about shares on remote hosts.
['T1135']
has the capability to retrieve information about the OS.
['T1082']
has the capability to retrieve information about users on remote hosts.
['T1087']
has the capability to scan for open ports on hosts in a connected network.
['T1046']
has the capability to schedule remote AT jobs.
['T1053.005']
has the capability to take screenshots of the victim’s machine.
['T1113']
has the capability to use rm -rf to remove folders and files from the victim's machine.
['T1070.004']
has transferred files using the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel.
['T1105']
has tunneled RDP backdoors over port 443.
['T1043']
has updated and modified its malware, resulting in different hash values that evade detection.
['T1027.005']
has used , a RAT that uses HTTP to communicate.
['T1071']
has used a Batch file to automate frequently executed post compromise cleanup activities.
['T1064']
has used a batch script that adds a Registry Run key to establish malware persistence.
['T1547.001']
has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors.
['T1140']
has used a global service provider's IP as a proxy for C2 traffic from a victim.
['T1090']
has used a keylogging tool called KEYPUNCH.
['T1056']
has used a keylogging tool that records keystrokes in encrypted files.
['T1056']
has used a Metasploit PowerShell module to download and execute shellcode and to set up a local listener.
['T1059.001']
has used a Metasploit PowerShell module to download and execute shellcode and to set up a local listener. has also used scripting to iterate through a list of compromised PoS systems, copy data to a log file, and remove the original data files.
['T1064']
has used an audio capturing utility known as SOUNDWAVE that captures microphone input.
['T1123']
has used Android backdoors capable of enumerating specific files on the infected devices.
['T1083']
has used Android backdoors capable of exfiltrating specific files directly from the infected devices.
['T1005']
has used and to register a scheduled task to execute malware during lateral movement.
['T1053.005']
has used an RSS feed on Livejournal to update a list of encrypted C2 server names.
['T1102']
has used AOL Instant Messenger for C2.
['T1102']
has used appcmd.exe to disable logging on a victim server.
['T1562.001']
has used application shim databases for persistence.
['T1546.011']
has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process.
['T1547.001']
has used a scheduled task for persistence.
['T1053.005']
has used a script (atexec.py) to execute a command on a target machine via Task Scheduler.
['T1053.005']
has used a tool known as RemoteExec (similar to ) to remotely execute batch scripts and binaries.
['T1569.002']
has used a tool that can obtain info about local and global group users, power users, and administrators.
['T1087']
has used a tool to capture screenshots.
['T1113']
has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument "dig." The group has also used a tools to dump passwords from browsers.
['T1003']
has used automated collection.
['T1119']
has used a variant of NanoCore RAT that communicates with its C2 server over port 6666.
['T1571']
has used batch scripting to automate execution of commands.
['T1064']
has used batch scripts and scheduled tasks to delete critical system files.
['T1070.004']
has used batch scripts in its malware to install persistence mechanisms.
['T1064']
has used bitsadmin.exe to download additional tools.
['T1197']
has used brute force techniques to obtain credentials.
['T1110']
has used C:\Windows\Debug and C:\Perflogs as staging directories.
['T1074']
has used cmd.exe to execute commmands.
['T1059']
has used CMSTP.exe and a malicious INF to execute its payload.
['T1218.003']
has used code-signing certificates on its malware that are either forged due to weak keys or stolen.
['T1553.002']
has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload.
['T1546.015']
has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).
['T1546.015']
has used compromised credentials to access other systems on a victim network.
['T1078']
has used compromised WordPress blogs as C2 servers.
['T1102']