text1
stringlengths
7
2.5k
labels
stringlengths
9
100
runs its core DLL file using rundll32.exe.
['T1218.011']
runs tasklist to obtain running processes.
['T1057']
runs tests to determine the privilege level of the compromised user.
['T1033']
runs the command: net start >> %TEMP%\info.dat on a victim.
['T1007']
runs the command net user on a victim. also runs tests to determine the privilege level of the compromised user.
['T1087']
runs the ifconfig command to obtain the IP address from the victim’s machine.
['T1016']
runs the net view /domain and net view commands.
['T1018']
runs the net view command
['T1018']
runs the whoami and query user commands.
['T1033']
runs whoami on the victim’s machine.
['T1033']
samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32.
['T1546.015']
samples have been signed with a code-signing certificates.
['T1553.002']
samples have been signed with legitimate, compromised code signing certificates owned by software company AI Squared.
['T1553.002']
samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer.
['T1027.002']
samples were digitally signed with a certificate originally used by Hacking Team that was later leaked and subsequently revoked.
['T1553.002']
samples were timestomped by the authors by setting the PE timestamps to all zero values. also has a built-in command to modify file times.
['T1070.006']
saves each collected file with the automatically generated format {0:dd-MM-yyyy}.txt .
['T1119']
saves itself as a file named msdtc.exe, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service.
['T1036']
saves itself with a leading "." so that it's hidden from users by default.
['T1564.001']
scanned the “Program Files” directories for a directory with the string “Total Security” (the installation path of the “360 Total Security” antivirus tool).
['T1518.001']
scans processes on all victim systems in the environment and uses automated scripts to pull back the results.
['T1064', 'T1119']
scans the C-class subnet of the IPs on the victim's interfaces.
['T1018']
schedules the execution one of its modules by creating a new scheduler task.
['T1053.005']
scripts save memory dump data into a specific directory on hosts in the victim environment.
['T1074']
searches attached and mounted drives for file extensions and keywords that match a predefined list.
['T1083']
searches for certain Registry keys to be configured before executing the payload.
['T1012']
searches for files created within a certain timeframe and whose file extension matches a predefined list.
['T1083']
searches for files named logins.json to parse for credentials and also looks for credentials stored from browsers.
['T1552.001']
searches for files on attached removable drives based on a predefined list of file extensions every five seconds.
['T1025']
searches for files on local drives based on a predefined list of file extensions.
['T1005']
searches for interesting files (either a default or customized set of file extensions) on removable media and copies them to a staging area. The default file types copied would include data copied to the drive by .
['T1025']
searches for interesting files (either a default or customized set of file extensions) on the local system and removable media.
['T1083']
searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.
['T1114']
searches for network drives and removable media and duplicates itself onto them.
['T1105']
searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server.
['T1114']
searches removable storage devices for files with a pre-defined list of file extensions (e.g. * .doc, *.ppt, *.xls, *.docx, *.pptx, *.xlsx). Any matching files are encrypted and written to a local user directory.
['T1119']
searches the local system and gathers data.
['T1005']
searches the system for all of the following file extensions: .avi, .mov, .mkv, .mpeg, .mpeg4, .mp4, .mp3, .wav, .ogg, .jpeg, .jpg, .png, .bmp, .gif, .tiff, .ico, .xlsx, and .zip
['T1083']
searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).
['T1114']
searches victim drives for files matching certain extensions (“.skr”,“.pkr” or “.key”) or names.
['T1083']
SEKURLSA::Pth module can impersonate a user, with only a password hash, to execute arbitrary commands.
['T1550.002']
sends an OS version identifier in its beacons.
['T1082']
sends emails to victims with a malicious executable disguised as a document or spreadsheet displaying a fake icon.
['T1598.002']
sends images to users that are embedded with shellcode and obfuscates strings and payloads.
['T1027']
sends information to its hard-coded C2, including OS version, service pack information, processor speed, system name, and OS install date.
['T1082']
sent malicious attachments to victims over email, including an Excel spreadsheet containing macros to download Pupy.
['T1598.002']
sent shortened URL links over email to victims. The URLs linked to Word documents with malicious macros that execute PowerShells scripts to download Pupy.
['T1598.003']
sent spear phishing emails containing links to .hta files.
['T1598.003']
sent spearphishing emails containing malicious Microsoft Office attachments.
['T1598.002']
sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites.
['T1598.003']
service-based DLL implant can execute a downloaded file with parameters specified using CreateProcessAsUser.
['T1546.009']
service-based DLL implant traverses the FTP server’s directories looking for files with keyword matches for computer names or certain keywords.
['T1083']
sets a WH_CBT Windows hook to collect information on process creation.
['T1057']
sets a WH_CBT Windows hook to search for and capture files on the victim.
['T1083']
sets the timestamps of its dropper files to the last-access and last-write timestamps of a standard Windows library chosen on the system.
['T1070.006']
Several backdoors achieved persistence by adding a Run key.
['T1547.001']
Several malware families are capable of downloading and executing binaries from its C2 server.
['T1105']
Several malware families collect information on the type and version of the victim OS, as well as the victim computer name and CPU information. A Destover-like variant used by also collects disk space information and sends it to its C2 server.
['T1082']
Several malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another malware sample XORs C2 traffic. malware also uses a unique form of communication encryption known as FakeTLS that mimics TLS but uses a different encryption method, evading SSL man-in-the-middle decryption attacks.
['T1573']
Several malware families use timestomping, including modifying the last write timestamp of a specified Registry key to a random date, as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files.
['T1070.006']
Several malware samples use a common function to identify target files by their extension. malware families can also enumerate files and directories, including a Destover-like variant that lists files and gathers information for all drives.
['T1083']
Several tools encode data with base64 when posting it to a C2 server.
['T1132']
shellcode decrypts and decompresses its RC4-encrypted payload.
['T1140']
side loads a malicious file, sspisrv.dll, in part of a spoofed lssas.exe service.
['T1574.002']
Some malware uses a list of ordered port numbers to choose a port for C2 traffic, which includes commonly used ports such as 443, 53, 80, 25, and 8080.
['T1043']
Some malware uses a list of ordered port numbers to choose a port for C2 traffic, which includes uncommonly used ports such as 995, 1816, 465, 1521, 3306, and many others.
['T1571']
Some malware uses multiple channels for C2, such as RomeoWhiskey-Two, which consists of a RAT channel that parses data in datagram form and a Proxy channel that forms virtual point-to-point sessions.
['T1026']
Some resources in are encrypted with a simple XOR operation or encoded with Base64.
['T1027']
Some samples contain a publicly available Web browser password recovery tool.
['T1003']
Some samples have a module to extract email from Microsoft Exchange servers using compromised credentials.
['T1078', 'T1114']
Some samples have a module to use pass the ticket with Kerberos for authentication.
['T1550.003']
Some samples install themselves as services for persistence by calling WinExec with the net start argument.
['T1543.003']
Some samples use a custom encryption method for C2 traffic using AES, base64 encoding, and multiple keys.
['T1573']
Some samples use AES to encrypt C2 traffic.
['T1573']
Some samples use cmd.exe to delete temporary files.
['T1070.004']
Some samples were signed with a stolen digital certificate.
['T1553.002']
Some strings in are obfuscated with XOR x56.
['T1027']
Some variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command.
['T1071']
Some variants of achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.
['T1546.015']
Some variants of use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows "AppInit_DLLs"="pserver32.dll"
['T1546.010']
Some variants of use SSL to communicate with C2 servers.
['T1071']
Some variants use HTTP for C2.
['T1071']
Some variants use ports 8080 and 8000 for C2.
['T1043']
Some variants use raw TCP for C2.
['T1095']
Some variants use SSL to encrypt C2 communications.
['T1573']
Some versions have an embedded DLL known as MockDll that uses and regsvr32 to execute another payload.
['T1218.010']
Some versions have an embedded DLL known as MockDll that uses process hollowing and to execute another payload.
['T1055.012']
Some versions of have used the hard-coded string “this is the encrypt key” for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address.
['T1573']
spawns a new copy of c:\windows\syswow64\explorer.exe and then replaces the executable code in memory with malware.
['T1055.012']
spearphished victims via Facebook and Whatsapp.
['T1566.003']
spear phishing campaigns have included malicious Word documents with DDE execution.
['T1559.002']
specifically looks for Domain Admins, Power Users, and the Administrators groups within the domain and locally
['T1069']
splits data into chunks up to 23 bytes and sends the data in DNS queries to its C2 server.
['T1030']
stages command output and collected data in files before exfiltration.
['T1074']
stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin.
['T1074']
steals credentials from compromised hosts. 's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by include ones associated with The Bat!, Yahoo!, Mail.ru, Passport.Net, Google Talk, Netscape Navigator, Mozilla Firefox, Mozilla Thunderbird, Internet Explorer, Microsoft Outlook, WinInet Credential Cache, and Lightweight Directory Access Protocol (LDAP).
['T1003']
steals credentials from its victims.
['T1003']
steals credentials stored in Web browsers by querying the sqlite database and leveraging the Windows Vault mechanism.
['T1003']
steals data stored in the clipboard.
['T1115']
steals files based on an extension list if a USB drive is connected to the system.
['T1025']