text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Lizar can retrieve network information from a compromised host.
['T1016']
Lokibot has the ability to discover the domain name of the infected host.
['T1016']
LoudMiner used a script to gather the IP address of the infected machine before sending to the C2.
['T1016']
Lucifer can collect the IP address of a compromised host.
['T1016']
MacMa can collect IP addresses from a compromised host.
['T1016']
Machete collects the MAC address of the target computer and other network configuration information.
['T1016']
Magic Hound malware gathers the victim's local IP address, MAC address, and external IP address.
['T1016']
Milan can run `C:\Windows\system32\cmd.exe /c cmd /c ipconfig /all 2>&1` to discover network settings.
['T1016']
Mis-Type may create a file containing the results of the command "cmd.exe /c ipconfig /all".
['T1016']
MoonWind obtains the victim IP address.
['T1016']
More_eggs has the capability to gather the IP address from the victim's machine.
['T1016']
Mosquito uses the "ipconfig" command.
['T1016']
NETWIRE can collect the IP address of a compromised host.
['T1016']
NOKKI can gather information on the victim IP address.
['T1016']
Naid collects the domain name from a compromised host.
['T1016']
Naikon uses commands such as "netsh interface show" to discover network interface settings.
['T1016']
NanHaiShu can gather information about the victim proxy server.
['T1016']
Neoichor can gather the IP address from an infected host.
['T1016']
OSInfo discovers the current domain information.
['T1016']
OSX_OCEANLOTUS.D can collect the network interface MAC address on the infected host.
['T1016']
OceanSalt can collect the victim’s IP address.
['T1016']
OilRig has run "ipconfig /all" on a victim.
['T1016']
Okrum can collect network information, including the host IP address, DNS, and proxy information.
['T1016']
Olympic Destroyer uses API calls to enumerate the infected system's ARP table.
['T1016']
Operation Wocao has discovered the local network configuration with ipconfig.
['T1016']
Orz can gather victim proxy information.
['T1016']
POWERSTATS can retrieve IP, network adapter configuration information, and domain from compromised hosts.
['T1016']
POWRUNER may collect network configuration data by running "ipconfig /all" on a victim.
['T1016']
Pay2Key can identify the IP and MAC addresses of the compromised host.
['T1016']
PcShare can obtain the proxy settings of a compromised machine using `InternetQueryOptionA` and its IP address by running `nslookup myip.opendns.comresolver1.opendns.com\r\n`.
['T1016']
Penquin can report the IP of the compromised host to attacker controlled infrastructure.
['T1016']
PingPull can retrieve the IP address of a compromised host.
['T1016']
PipeMon can collect and send the local IP address, RDP information, and the network adapter physical address as a part of its C2 beacon.
['T1016']
PoshC2 can enumerate network adapter information.
['T1016']
Proxysvc collects the network adapter information and domain/username information based on current remote sessions.
['T1016']
Pysa can perform network reconnaissance using the Advanced IP Scanner tool.
['T1016']
QUADAGENT gathers the current domain the victim system belongs to.
['T1016']
QakBot can use "net config workstation", "arp -a", and "ipconfig /all" to gather network configuration information.
['T1016']
RATANKBA gathers the victim’s IP address via the "ipconfig -all" command.
['T1016']
Ramsay can use ipconfig and Arp to collect network configuration information, including routing information and ARP tables.
['T1016']
Reaver collects the victim's IP address.
['T1016']
RedLeaves can obtain information about network parameters.
['T1016']
Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache.
['T1016']
Revenge RAT collects the IP address and MAC address from the system.
['T1016']
Rifdoor has the ability to identify the IP address of the compromised host.
['T1016']
Rising Sun can detect network adapter and IP address information.
['T1016']
RogueRobin gathers the IP address and domain from the victim’s machine.
['T1016']
Ryuk has called "GetIpNetTable" in attempt to identify all mounted drives and hosts that have Address Resolution Protocol (ARP) entries.
['T1016']
S-Type has used `ipconfig /all` on a compromised host.
['T1016']
SDBbot has the ability to determine the domain name and whether a proxy is configured on a compromised host.
['T1016']
SHARPSTATS has the ability to identify the domain of the compromised host.
['T1016']
STARWHALE has the ability to collect the IP address of an infected host.
['T1016']
Sandworm Team checks for connectivity to other resources in the network.
['T1016']
ShadowPad has collected the domain name of the victim system.
['T1016']
Shamoon obtains the target's IP address and local network segment.
['T1016']
Sibot checked if the compromised system is configured to use proxies.
['T1016']
SideCopy has identified the IP address of a compromised host.
['T1016']
SideTwist has the ability to collect the domain name on a compromised host.
['T1016']
Sidewinder has used malware to collect information on network interfaces, including the MAC address.
['T1016']
Small Sieve can obtain the IP address of a victim host.
['T1016']
SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via "ipconfig.exe /all".
['T1016']
SpeakUp uses the "ifconfig -a" command.
['T1016']
SpicyOmelette can identify the IP of a compromised system.
['T1016']
Squirrelwaffle has collected the victim’s external IP address.
['T1016']
Stealth Falcon malware gathers the Address Resolution Protocol (ARP) table from the victim.
['T1016']
Stuxnet collects the IP address of a compromised system.
['T1016']
Sys10 collects the local IP address of the victim and sends it to the C2.
['T1016']
T9000 gathers and beacons the MAC and IP addresses during installation.
['T1016']
TSCookie has the ability to identify the IP of the infected host.
['T1016']
Taidoor has collected the MAC address of a compromised host; it can also use "GetAdaptersInfo" to identify network adapters.
['T1016']
TajMahal has the ability to identify the MAC address on an infected host.
['T1016']
TeamTNT has enumerated the host machine’s IP address.
['T1016']
The IceApple ifconfig module can iterate over all network interfaces on the host and retrieve the name, description, MAC address, DNS suffix, DNS servers, gateways, IPv4 addresses, and subnet masks.
['T1016']
Threat Group-3390 actors use NBTscan to discover vulnerable systems.
['T1016']
Torisma can collect the local MAC address using `GetAdaptersInfo` as well as the system's IP address.
['T1016']
Trojan.Karagany can gather information on the network configuration of a compromised host.
['T1016']
UPPERCUT has the capability to gather the victim's proxy information.
['T1016']
USBferry can detect the infected machine's network topology using "ipconfig" and "arp".
['T1016']
Unknown Logger can obtain information about the victim's IP address.
['T1016']
VERMIN gathers the local IP address.
['T1016']
Valak has the ability to identify the domain and the MAC and IP addresses of an infected machine.
['T1016']
Volgmer can gather the IP address from the victim's machine.
['T1016']
WannaCry will attempt to determine the local network segment it is a part of.
['T1016']
WellMail can identify the IP address of the victim system.
['T1016']
Wizard Spider has used "ipconfig" to identify the network configuration of a victim machine.
['T1016']
ZIRCONIUM has used a tool to enumerate proxy settings in the target environment.
['T1016']
Zebrocy runs the "ipconfig /all" command.
['T1016']
ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server.
['T1016']
admin@338 actors used the following command after exploiting a machine with LOWBALL malware to acquire information about local networks: "ipconfig /all >> %temp%\download"
['T1016']
ifconfig can be used to display adapter configuration on Unix systems, including information for TCP/IP, DNS, and DHCP.
['T1016']
ipconfig can be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP.
['T1016']
jRAT can gather victim internal and external IPs.
['T1016']
nbtstat can be used to discover local NetBIOS domain names.
['T1016']
route can be used to discover routing configuration information.
['T1016']
xCaon has used the GetAdaptersInfo() API call to get the victim's MAC address.
['T1016']
yty runs "ipconfig /all" and collects the domain name.
['T1016']
zwShell can obtain the victim IP address.
['T1016']
During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity.
['T1016.001']
GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.
['T1016.001']
HEXANE has used tools including BITSAdmin to test internet connectivity from compromised hosts.
['T1016.001']