text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Ramsay can collect Microsoft Word documents from the target's file system, as well as ".txt", ".doc", and ".xls" files from the Internet Explorer cache. | ['T1005'] |
RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data. | ['T1005'] |
SDBbot has the ability to access the file system on a compromised host. | ['T1005'] |
SLOTHFULMEDIA has uploaded files and information from victim machines. | ['T1005'] |
STARWHALE can collect data from an infected local host. | ['T1005'] |
SUNBURST collected information from a compromised host. | ['T1005'] |
Saint Bot can collect files and information from a compromised host. | ['T1005'] |
Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts. | ['T1005'] |
Shark can upload files to its C2. | ['T1005'] |
ShimRat has the capability to upload collected files to a C2. | ['T1005'] |
SideTwist has the ability to upload files from a compromised host. | ['T1005'] |
SombRAT has collected data and files from a compromised host. | ['T1005'] |
Stealth Falcon malware gathers data from the local victim system. | ['T1005'] |
StrifeWater can collect data from a compromised host. | ['T1005'] |
Taidoor can upload data and files from a victim's machine. | ['T1005'] |
TajMahal has the ability to steal documents from the local system including the print spooler queue. | ['T1005'] |
Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories. | ['T1005', 'T1119'] |
Tomiris has the ability to collect recent files matching a hardcoded list of extensions prior to exfiltration. | ['T1005'] |
Ursnif has collected files from victim machines, including certificates and cookies. | ['T1005'] |
WellMail can exfiltrate files from the victim machine. | ['T1005'] |
WellMess can send files from the victim machine to C2. | ['T1005'] |
Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors. | ['T1005'] |
XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders. | ['T1005'] |
Zox has the ability to upload files from a targeted system. | ['T1005'] |
ZxShell can transfer files from a compromised host. | ['T1005'] |
ZxxZ can collect data from a compromised host. | ['T1005'] |
ccf32 can collect files from a compromised host. | ['T1005'] |
creates a backdoor through which remote attackers can steal system information. | ['T1005', 'T1005'] |
esentutl can be used to collect data from local file systems. | ['T1005'] |
menuPass has collected various files from the compromised computers. | ['T1005'] |
njRAT can collect data from a local system. | ['T1005'] |
xCaon has uploaded files from victims' machines. | ['T1005'] |
yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server. | ['T1005'] |
After compromising a victim, Poseidon Group discovers all running services. | ['T1007'] |
Aquatic Panda has attempted to discover services for third party EDR products. | ['T1007'] |
BBSRAT can query service configuration information. | ['T1007'] |
BRONZE BUTLER has used TROJ_GETVERSION to discover system services. | ['T1007'] |
Babuk can enumerate all services running on a compromised host. | ['T1007'] |
BitPaymer can enumerate existing Windows services on the host that are configured to run as LocalSystem. | ['T1007'] |
Caterpillar WebShell can obtain a list of the services from a system. | ['T1007'] |
Chimera has used "net start" and "net use" for system service discovery. | ['T1007'] |
Cobalt Strike can enumerate services on compromised hosts. | ['T1007'] |
Comnie runs the command: "net start >> %TEMP%\info.dat" on a victim. | ['T1007'] |
Cuba can query service status using "QueryServiceStatusEx" function. | ['T1007'] |
During Operation CuckooBees, the threat actors used the `net start` command as part of their initial reconnaissance. | ['T1007'] |
During Operation Wocao, threat actors used the `tasklist` command to search for one of its backdoors. | ['T1007'] |
Earth Lusca has used Tasklist to obtain information from a compromised host. | ['T1007', 'T1057'] |
Emissary has the capability to execute the command "net start" to interact with services. | ['T1007'] |
GravityRAT has a feature to list the available services on the system. | ['T1007'] |
GreyEnergy enumerates all Windows services. | ['T1007'] |
Heyoka Backdoor can check if it is running as a service on a compromised host. | ['T1007'] |
HotCroissant has the ability to retrieve a list of services on the infected host. | ['T1007'] |
Hydraq creates a backdoor through which remote attackers can monitor services. | ['T1007'] |
JPIN can list running services. | ['T1007'] |
Ke3chang performs service discovery using "net start" commands. | ['T1007'] |
Kimsuky has used an instrumentor script to gather the names of all services running on a victim's system. | ['T1007'] |
Kwampirs collects a list of running services with the command "tasklist /svc". | ['T1007'] |
LookBack can enumerate services on the victim machine. | ['T1007'] |
OilRig has used "sc query" on a victim to gather information about services. | ['T1007'] |
Operation Wocao has used the "tasklist" command to search for one of its backdoors. | ['T1007'] |
RATANKBA uses "tasklist /svc" to display running tasks. | ['T1007'] |
REvil can enumerate active services. | ['T1007'] |
SILENTTRINITY can search for modifiable services that could be used for privilege escalation. | ['T1007'] |
SLOTHFULMEDIA has the capability to enumerate services. | ['T1007'] |
SynAck enumerates all running services. | ['T1007'] |
The "net start" command can be used in Net to find information about Windows services. | ['T1007'] |
TrickBot collects a list of install programs and services on the system’s machine. | ['T1007'] |
Turla surveys a system upon check-in to discover running services and associated processes using the "tasklist /svc" command. | ['T1007'] |
Ursnif has gathered information about running services. | ['T1007'] |
Volgmer queries the system to identify existing services. | ['T1007'] |
WINERACK can enumerate services. | ['T1007'] |
ZLib has the ability to discover and manipulate Windows services. | ['T1007'] |
ZxShell can check the services on the system. | ['T1007'] |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: "net start >> %temp%\download" | ['T1007'] |
jRAT can list local services. | ['T1007'] |
APT41 used the Steam community page as a fallback mechanism for C2. | ['T1008'] |
Anchor can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers. | ['T1008'] |
AppleSeed can use a second channel for C2 when the primary channel is in upload mode. | ['T1008'] |
BISCUIT malware contains a secondary fallback command and control server that is contacted after the primary command and control server. | ['T1008'] |
BlackEnergy has the capability to communicate over a backup channel via plus.google.com. | ['T1008'] |
Bumblebee can use backup C2 servers if the primary server fails. | ['T1008'] |
CHOPSTICK can switch to a new C2 channel if the current one is broken. | ['T1008'] |
Carbanak’s Harpy backdoor malware can use DNS as a backup channel for C2 if HTTP fails. | ['T1008'] |
Cardinal RAT can communicate over multiple C2 host and port combinations. | ['T1008'] |
CharmPower can change its C2 channel once every 360 loops by retrieving a new domain from the actors’ S3 bucket. | ['T1008'] |
Crutch has used a hardcoded GitHub repository as a fallback channel. | ['T1008'] |
During Night Dragon, threat actors used company extranet servers as secondary C2 servers. | ['T1008'] |
DustySky has two hard-coded domains for C2 servers; if the first does not respond, it will try the second. | ['T1008'] |
Ebury has implemented a fallback mechanism to begin using a DGA when the attacker hasn't connected to the infected system for three days. | ['T1008'] |
Exaramel for Linux can attempt to find a new C2 server if it receives an error. | ['T1008'] |
FatDuke has used several C2 servers per targeted organization. | ['T1008'] |
Gelsemium can use multiple domains and protocols in C2. | ['T1008'] |
HOPLIGHT has multiple C2 channels in place in case one fails. | ['T1008'] |
InvisiMole has been configured with several servers available for alternate C2 communications. | ['T1008'] |
Kazuar can accept multiple URLs for C2 servers. | ['T1008'] |
Kevin can assign hard-coded fallback domains for C2. | ['T1008'] |
Kwampirs uses a large list of C2 servers that it cycles through until a successful connection is established. | ['T1008'] |
Linfo creates a backdoor through which remote attackers can change C2 servers. | ['T1008'] |
Machete has sent data over HTTP if FTP failed, and has also used a fallback server. | ['T1008'] |
MiniDuke uses Google Search to identify C2 servers if its primary C2 method via Twitter is not working. | ['T1008'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.