text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Lizar can retrieve network information from a compromised host. | ['T1016'] |
Lokibot has the ability to discover the domain name of the infected host. | ['T1016'] |
LoudMiner used a script to gather the IP address of the infected machine before sending to the C2. | ['T1016'] |
Lucifer can collect the IP address of a compromised host. | ['T1016'] |
MacMa can collect IP addresses from a compromised host. | ['T1016'] |
Machete collects the MAC address of the target computer and other network configuration information. | ['T1016'] |
Magic Hound malware gathers the victim's local IP address, MAC address, and external IP address. | ['T1016'] |
Milan can run `C:\Windows\system32\cmd.exe /c cmd /c ipconfig /all 2>&1` to discover network settings. | ['T1016'] |
Mis-Type may create a file containing the results of the command "cmd.exe /c ipconfig /all". | ['T1016'] |
MoonWind obtains the victim IP address. | ['T1016'] |
More_eggs has the capability to gather the IP address from the victim's machine. | ['T1016'] |
Mosquito uses the "ipconfig" command. | ['T1016'] |
NETWIRE can collect the IP address of a compromised host. | ['T1016'] |
NOKKI can gather information on the victim IP address. | ['T1016'] |
Naid collects the domain name from a compromised host. | ['T1016'] |
Naikon uses commands such as "netsh interface show" to discover network interface settings. | ['T1016'] |
NanHaiShu can gather information about the victim proxy server. | ['T1016'] |
Neoichor can gather the IP address from an infected host. | ['T1016'] |
OSInfo discovers the current domain information. | ['T1016'] |
OSX_OCEANLOTUS.D can collect the network interface MAC address on the infected host. | ['T1016'] |
OceanSalt can collect the victim’s IP address. | ['T1016'] |
OilRig has run "ipconfig /all" on a victim. | ['T1016'] |
Okrum can collect network information, including the host IP address, DNS, and proxy information. | ['T1016'] |
Olympic Destroyer uses API calls to enumerate the infected system's ARP table. | ['T1016'] |
Operation Wocao has discovered the local network configuration with ipconfig. | ['T1016'] |
Orz can gather victim proxy information. | ['T1016'] |
POWERSTATS can retrieve IP, network adapter configuration information, and domain from compromised hosts. | ['T1016'] |
POWRUNER may collect network configuration data by running "ipconfig /all" on a victim. | ['T1016'] |
Pay2Key can identify the IP and MAC addresses of the compromised host. | ['T1016'] |
PcShare can obtain the proxy settings of a compromised machine using `InternetQueryOptionA` and its IP address by running `nslookup myip.opendns.comresolver1.opendns.com\r\n`. | ['T1016'] |
Penquin can report the IP of the compromised host to attacker controlled infrastructure. | ['T1016'] |
PingPull can retrieve the IP address of a compromised host. | ['T1016'] |
PipeMon can collect and send the local IP address, RDP information, and the network adapter physical address as a part of its C2 beacon. | ['T1016'] |
PoshC2 can enumerate network adapter information. | ['T1016'] |
Proxysvc collects the network adapter information and domain/username information based on current remote sessions. | ['T1016'] |
Pysa can perform network reconnaissance using the Advanced IP Scanner tool. | ['T1016'] |
QUADAGENT gathers the current domain the victim system belongs to. | ['T1016'] |
QakBot can use "net config workstation", "arp -a", and "ipconfig /all" to gather network configuration information. | ['T1016'] |
RATANKBA gathers the victim’s IP address via the "ipconfig -all" command. | ['T1016'] |
Ramsay can use ipconfig and Arp to collect network configuration information, including routing information and ARP tables. | ['T1016'] |
Reaver collects the victim's IP address. | ['T1016'] |
RedLeaves can obtain information about network parameters. | ['T1016'] |
Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache. | ['T1016'] |
Revenge RAT collects the IP address and MAC address from the system. | ['T1016'] |
Rifdoor has the ability to identify the IP address of the compromised host. | ['T1016'] |
Rising Sun can detect network adapter and IP address information. | ['T1016'] |
RogueRobin gathers the IP address and domain from the victim’s machine. | ['T1016'] |
Ryuk has called "GetIpNetTable" in attempt to identify all mounted drives and hosts that have Address Resolution Protocol (ARP) entries. | ['T1016'] |
S-Type has used `ipconfig /all` on a compromised host. | ['T1016'] |
SDBbot has the ability to determine the domain name and whether a proxy is configured on a compromised host. | ['T1016'] |
SHARPSTATS has the ability to identify the domain of the compromised host. | ['T1016'] |
STARWHALE has the ability to collect the IP address of an infected host. | ['T1016'] |
Sandworm Team checks for connectivity to other resources in the network. | ['T1016'] |
ShadowPad has collected the domain name of the victim system. | ['T1016'] |
Shamoon obtains the target's IP address and local network segment. | ['T1016'] |
Sibot checked if the compromised system is configured to use proxies. | ['T1016'] |
SideCopy has identified the IP address of a compromised host. | ['T1016'] |
SideTwist has the ability to collect the domain name on a compromised host. | ['T1016'] |
Sidewinder has used malware to collect information on network interfaces, including the MAC address. | ['T1016'] |
Small Sieve can obtain the IP address of a victim host. | ['T1016'] |
SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via "ipconfig.exe /all". | ['T1016'] |
SpeakUp uses the "ifconfig -a" command. | ['T1016'] |
SpicyOmelette can identify the IP of a compromised system. | ['T1016'] |
Squirrelwaffle has collected the victim’s external IP address. | ['T1016'] |
Stealth Falcon malware gathers the Address Resolution Protocol (ARP) table from the victim. | ['T1016'] |
Stuxnet collects the IP address of a compromised system. | ['T1016'] |
Sys10 collects the local IP address of the victim and sends it to the C2. | ['T1016'] |
T9000 gathers and beacons the MAC and IP addresses during installation. | ['T1016'] |
TSCookie has the ability to identify the IP of the infected host. | ['T1016'] |
Taidoor has collected the MAC address of a compromised host; it can also use "GetAdaptersInfo" to identify network adapters. | ['T1016'] |
TajMahal has the ability to identify the MAC address on an infected host. | ['T1016'] |
TeamTNT has enumerated the host machine’s IP address. | ['T1016'] |
The IceApple ifconfig module can iterate over all network interfaces on the host and retrieve the name, description, MAC address, DNS suffix, DNS servers, gateways, IPv4 addresses, and subnet masks. | ['T1016'] |
Threat Group-3390 actors use NBTscan to discover vulnerable systems. | ['T1016'] |
Torisma can collect the local MAC address using `GetAdaptersInfo` as well as the system's IP address. | ['T1016'] |
Trojan.Karagany can gather information on the network configuration of a compromised host. | ['T1016'] |
UPPERCUT has the capability to gather the victim's proxy information. | ['T1016'] |
USBferry can detect the infected machine's network topology using "ipconfig" and "arp". | ['T1016'] |
Unknown Logger can obtain information about the victim's IP address. | ['T1016'] |
VERMIN gathers the local IP address. | ['T1016'] |
Valak has the ability to identify the domain and the MAC and IP addresses of an infected machine. | ['T1016'] |
Volgmer can gather the IP address from the victim's machine. | ['T1016'] |
WannaCry will attempt to determine the local network segment it is a part of. | ['T1016'] |
WellMail can identify the IP address of the victim system. | ['T1016'] |
Wizard Spider has used "ipconfig" to identify the network configuration of a victim machine. | ['T1016'] |
ZIRCONIUM has used a tool to enumerate proxy settings in the target environment. | ['T1016'] |
Zebrocy runs the "ipconfig /all" command. | ['T1016'] |
ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server. | ['T1016'] |
admin@338 actors used the following command after exploiting a machine with LOWBALL malware to acquire information about local networks: "ipconfig /all >> %temp%\download" | ['T1016'] |
ifconfig can be used to display adapter configuration on Unix systems, including information for TCP/IP, DNS, and DHCP. | ['T1016'] |
ipconfig can be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP. | ['T1016'] |
jRAT can gather victim internal and external IPs. | ['T1016'] |
nbtstat can be used to discover local NetBIOS domain names. | ['T1016'] |
route can be used to discover routing configuration information. | ['T1016'] |
xCaon has used the GetAdaptersInfo() API call to get the victim's MAC address. | ['T1016'] |
yty runs "ipconfig /all" and collects the domain name. | ['T1016'] |
zwShell can obtain the victim IP address. | ['T1016'] |
During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity. | ['T1016.001'] |
GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through. | ['T1016.001'] |
HEXANE has used tools including BITSAdmin to test internet connectivity from compromised hosts. | ['T1016.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.