text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Ramsay can collect Microsoft Word documents from the target's file system, as well as ".txt", ".doc", and ".xls" files from the Internet Explorer cache.
['T1005']
RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.
['T1005']
SDBbot has the ability to access the file system on a compromised host.
['T1005']
SLOTHFULMEDIA has uploaded files and information from victim machines.
['T1005']
STARWHALE can collect data from an infected local host.
['T1005']
SUNBURST collected information from a compromised host.
['T1005']
Saint Bot can collect files and information from a compromised host.
['T1005']
Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.
['T1005']
Shark can upload files to its C2.
['T1005']
ShimRat has the capability to upload collected files to a C2.
['T1005']
SideTwist has the ability to upload files from a compromised host.
['T1005']
SombRAT has collected data and files from a compromised host.
['T1005']
Stealth Falcon malware gathers data from the local victim system.
['T1005']
StrifeWater can collect data from a compromised host.
['T1005']
Taidoor can upload data and files from a victim's machine.
['T1005']
TajMahal has the ability to steal documents from the local system including the print spooler queue.
['T1005']
Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.
['T1005', 'T1119']
Tomiris has the ability to collect recent files matching a hardcoded list of extensions prior to exfiltration.
['T1005']
Ursnif has collected files from victim machines, including certificates and cookies.
['T1005']
WellMail can exfiltrate files from the victim machine.
['T1005']
WellMess can send files from the victim machine to C2.
['T1005']
Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.
['T1005']
XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders.
['T1005']
Zox has the ability to upload files from a targeted system.
['T1005']
ZxShell can transfer files from a compromised host.
['T1005']
ZxxZ can collect data from a compromised host.
['T1005']
ccf32 can collect files from a compromised host.
['T1005']
creates a backdoor through which remote attackers can steal system information.
['T1005', 'T1005']
esentutl can be used to collect data from local file systems.
['T1005']
menuPass has collected various files from the compromised computers.
['T1005']
njRAT can collect data from a local system.
['T1005']
xCaon has uploaded files from victims' machines.
['T1005']
yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.
['T1005']
After compromising a victim, Poseidon Group discovers all running services.
['T1007']
Aquatic Panda has attempted to discover services for third party EDR products.
['T1007']
BBSRAT can query service configuration information.
['T1007']
BRONZE BUTLER has used TROJ_GETVERSION to discover system services.
['T1007']
Babuk can enumerate all services running on a compromised host.
['T1007']
BitPaymer can enumerate existing Windows services on the host that are configured to run as LocalSystem.
['T1007']
Caterpillar WebShell can obtain a list of the services from a system.
['T1007']
Chimera has used "net start" and "net use" for system service discovery.
['T1007']
Cobalt Strike can enumerate services on compromised hosts.
['T1007']
Comnie runs the command: "net start >> %TEMP%\info.dat" on a victim.
['T1007']
Cuba can query service status using "QueryServiceStatusEx" function.
['T1007']
During Operation CuckooBees, the threat actors used the `net start` command as part of their initial reconnaissance.
['T1007']
During Operation Wocao, threat actors used the `tasklist` command to search for one of its backdoors.
['T1007']
Earth Lusca has used Tasklist to obtain information from a compromised host.
['T1007', 'T1057']
Emissary has the capability to execute the command "net start" to interact with services.
['T1007']
GravityRAT has a feature to list the available services on the system.
['T1007']
GreyEnergy enumerates all Windows services.
['T1007']
Heyoka Backdoor can check if it is running as a service on a compromised host.
['T1007']
HotCroissant has the ability to retrieve a list of services on the infected host.
['T1007']
Hydraq creates a backdoor through which remote attackers can monitor services.
['T1007']
JPIN can list running services.
['T1007']
Ke3chang performs service discovery using "net start" commands.
['T1007']
Kimsuky has used an instrumentor script to gather the names of all services running on a victim's system.
['T1007']
Kwampirs collects a list of running services with the command "tasklist /svc".
['T1007']
LookBack can enumerate services on the victim machine.
['T1007']
OilRig has used "sc query" on a victim to gather information about services.
['T1007']
Operation Wocao has used the "tasklist" command to search for one of its backdoors.
['T1007']
RATANKBA uses "tasklist /svc" to display running tasks.
['T1007']
REvil can enumerate active services.
['T1007']
SILENTTRINITY can search for modifiable services that could be used for privilege escalation.
['T1007']
SLOTHFULMEDIA has the capability to enumerate services.
['T1007']
SynAck enumerates all running services.
['T1007']
The "net start" command can be used in Net to find information about Windows services.
['T1007']
TrickBot collects a list of install programs and services on the system’s machine.
['T1007']
Turla surveys a system upon check-in to discover running services and associated processes using the "tasklist /svc" command.
['T1007']
Ursnif has gathered information about running services.
['T1007']
Volgmer queries the system to identify existing services.
['T1007']
WINERACK can enumerate services.
['T1007']
ZLib has the ability to discover and manipulate Windows services.
['T1007']
ZxShell can check the services on the system.
['T1007']
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: "net start >> %temp%\download"
['T1007']
jRAT can list local services.
['T1007']
APT41 used the Steam community page as a fallback mechanism for C2.
['T1008']
Anchor can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers.
['T1008']
AppleSeed can use a second channel for C2 when the primary channel is in upload mode.
['T1008']
BISCUIT malware contains a secondary fallback command and control server that is contacted after the primary command and control server.
['T1008']
BlackEnergy has the capability to communicate over a backup channel via plus.google.com.
['T1008']
Bumblebee can use backup C2 servers if the primary server fails.
['T1008']
CHOPSTICK can switch to a new C2 channel if the current one is broken.
['T1008']
Carbanak’s Harpy backdoor malware can use DNS as a backup channel for C2 if HTTP fails.
['T1008']
Cardinal RAT can communicate over multiple C2 host and port combinations.
['T1008']
CharmPower can change its C2 channel once every 360 loops by retrieving a new domain from the actors’ S3 bucket.
['T1008']
Crutch has used a hardcoded GitHub repository as a fallback channel.
['T1008']
During Night Dragon, threat actors used company extranet servers as secondary C2 servers.
['T1008']
DustySky has two hard-coded domains for C2 servers; if the first does not respond, it will try the second.
['T1008']
Ebury has implemented a fallback mechanism to begin using a DGA when the attacker hasn't connected to the infected system for three days.
['T1008']
Exaramel for Linux can attempt to find a new C2 server if it receives an error.
['T1008']
FatDuke has used several C2 servers per targeted organization.
['T1008']
Gelsemium can use multiple domains and protocols in C2.
['T1008']
HOPLIGHT has multiple C2 channels in place in case one fails.
['T1008']
InvisiMole has been configured with several servers available for alternate C2 communications.
['T1008']
Kazuar can accept multiple URLs for C2 servers.
['T1008']
Kevin can assign hard-coded fallback domains for C2.
['T1008']
Kwampirs uses a large list of C2 servers that it cycles through until a successful connection is established.
['T1008']
Linfo creates a backdoor through which remote attackers can change C2 servers.
['T1008']
Machete has sent data over HTTP if FTP failed, and has also used a fallback server.
['T1008']
MiniDuke uses Google Search to identify C2 servers if its primary C2 method via Twitter is not working.
['T1008']