text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Cadelspy has the ability to discover information about the compromised host.
['T1082']
Cannon can gather system information from the victim’s machine such as the OS version, machine name, and drive information.
['T1082']
Carberp has collected the operating system version from the infected system.
['T1082']
Cardinal RAT can collect the hostname, Microsoft Windows version, and processor architecture from a victim machine.
['T1082']
ChChes collects the victim hostname, window resolution, and Microsoft Windows version.
['T1082']
Chaes has collected system information, including the machine name and OS version.
['T1082']
CharmPower can enumerate the OS version and computer name on a targeted system.
['T1082']
Chimera has used `fsutil fsinfo drives`, `systeminfo`, and `vssadmin list shadows` for system information including shadow volumes and drive information.
['T1082']
Chrommme has the ability to list drives and obtain the computer name of a compromised host.
['T1082']
Clambling can discover the hostname, computer name, and Windows version of a targeted machine.
['T1082']
Comnie collects the hostname of the victim machine.
['T1082']
Confucius has used a file stealer that can examine system drives, including those other than the C drive.
['T1082']
CrackMapExec can enumerate the system drives and associated system name.
['T1082']
Crimson contains a command to collect the victim PC name, disk drive information, and operating system.
['T1082']
Cuba can enumerate local drives, disk type, and disk free space.
['T1082']
Cyclops Blink has the ability to query device information.
['T1082']
DarkComet can collect the computer name, RAM used, and operating system version from the victim’s machine.
['T1082']
DarkWatchman can collect the OS version, system architecture, uptime, and computer name.
['T1082']
Denis collects OS information and the computer name from the victim’s machine.
['T1082']
Derusbi gathers the name of the local host, version of GNU Compiler Collection (GCC), and the system information about the CPU, machine, and operating system.
['T1082']
Diavol can collect the computer name and OS version from the system.
['T1082']
DownPaper collects the victim host name and serial number, and then sends the information to the C2 server.
['T1082']
DropBook has checked for the presence of Arabic language in the infected machine's settings.
['T1082', 'T1614.001']
Dtrack can collect the victim's computer name, hostname and adapter information to create a unique identifier.
['T1082']
During FunnyDream, the threat actors used Systeminfo to collect information on targeted hosts.
['T1082']
During Operation CuckooBees, the threat actors used the `systeminfo` command to gather details about a compromised system.
['T1082']
During Operation Wocao, threat actors discovered the local disks attached to the system and their hardware information including manufacturer and model, as well as the OS versions of systems connected to a targeted network.
['T1082']
DustySky extracts basic information about the operating system.
['T1082']
EVILNUM can obtain the computer name from the victim's system.
['T1082']
Egregor can perform a language check of the infected system and can query the CPU information (cupid).
['T1082']
Elise executes "systeminfo" after initial communication is made to the remote server.
['T1082']
Emissary has the capability to execute ver and systeminfo commands.
['T1082']
Empire can enumerate host system information like OS, architecture, domain name, applied patches, and more.
['T1082']
EnvyScout can determine whether the ISO payload was received by a Windows or iOS device.
['T1082']
Epic collects the OS version, hardware information, computer name, available system memory status, disk space information, and system and user language settings.
['T1082']
Explosive has collected the computer name from the infected host.
['T1082']
FALLCHILL can collect operating system (OS) version information, processor information, system name, and information about installed disks from the victim.
['T1082']
FELIXROOT collects the victim’s computer name, processor architecture, OS version, volume serial number, and system type.
['T1082']
Ferocious can use "GET.WORKSPACE" in Microsoft Excel to determine the OS version of the compromised host.
['T1082']
Final1stspy obtains victim Microsoft Windows version information and CPU architecture.
['T1082']
GRIFFON has used a reconnaissance module that can be used to retrieve information about a victim's computer, including the resolution of the workstation .
['T1082']
Gelsemium can determine the operating system and whether a targeted machine has a 32 or 64 bit architecture.
['T1082']
Gold Dragon collects endpoint information using the "systeminfo" command.
['T1082']
GravityRAT collects the MAC address, computer name, and CPU information.
['T1082']
Green Lambert can use `uname` to identify the operating system name, version, and processor type.
['T1082']
GrimAgent can collect the OS, and build version on a compromised host.
['T1082']
HAWKBALL can collect the OS version, architecture information, and computer name.
['T1082']
HELLOKITTY can enumerate logical drives on a target system.
['T1082']
HEXANE has collected the hostname of a compromised machine.
['T1082']
HermeticWiper can determine the OS version, bitness, and enumerate physical drives on a targeted host.
['T1082']
Heyoka Backdoor can enumerate drives on a compromised host.
['T1082']
Higaisa collected the system volume serial number, GUID, and computer name.
['T1082']
Hildegard has collected the host's OS, CPU, and memory information.
['T1082']
HotCroissant has the ability to determine if the current user is an administrator, Windows product name, processor name, screen resolution, and physical RAM of the infected host.
['T1082']
Hydraq creates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed.
['T1082']
IcedID has the ability to identify the computer name and OS version on a compromised host.
['T1082']
Inception has used a reconnaissance module to gather information about the operating system and hardware on the infected host.
['T1082']
Industroyer collects the victim machine’s Windows GUID.
['T1082']
InnaputRAT gathers volume drive information and system information.
['T1082']
Ixeshe collects the computer name of the victim's system during the initial infection.
['T1082']
JPIN can obtain system information such as OS version and disk space.
['T1082']
KARAE can collect system information.
['T1082']
KGH_SPY can collect drive information from a compromised host.
['T1082']
KOMPROGO is capable of retrieving information about the infected system.
['T1082']
KONNI can gather the OS version, architecture information, connected drives, hostname, RAM size, and disk space information from the victim’s machine and has used "cmd /c systeminfo" command to get a snapshot of the current system state of the target machine.
['T1082']
Kasidet has the ability to obtain a victim's system name and operating system version.
['T1082']
Kazuar gathers information on the system and local drives.
['T1082']
Ke3chang performs operating system information discovery using "systeminfo" and has used implants to identify the system language and computer name.
['T1082']
Kessel has collected the system architecture, OS version, and MAC address information.
['T1082']
Kevin can enumerate the OS version and hostname of a targeted machine.
['T1082']
KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.
['T1082']
KillDisk retrieves the hard disk name by calling the "CreateFileA to \\.\PHYSICALDRIVE0" API.
['T1082']
Kimsuky has enumerated drives, OS type, OS version, and other information using a script or the "systeminfo" command.
['T1082']
Koadic can obtain the OS version and build, computer name, and processor architecture from a compromised host.
['T1082']
Kobalos can record the hostname and kernel version of the target machine.
['T1082']
Kwampirs collects OS version information such as registered owner details, manufacturer details, processor type, available storage, installed patches, hostname, version info, system date, and other system information by using the commands "systeminfo", "net config workstation", "hostname", "ver", "set", and "date /t".
['T1082']
Linfo creates a backdoor through which remote attackers can retrieve system information.
['T1082']
LitePower has the ability to list local drives and enumerate the OS architecture.
['T1082']
Lizar can collect the computer name from the machine,.
['T1082']
Lokibot has the ability to discover the computer name and Windows product name/version.
['T1082']
LoudMiner has monitored CPU usage.
['T1082']
MacMa can collect information about a compromised computer, including: Hardware UUID, Mac serial number, macOS version, and disk sizes.
['T1082']
Magic Hound malware has used a PowerShell command to check the victim system architecture to determine if it is an x64 machine. Other malware has obtained the OS version, UUID, and computer/host name to send to the C2 server.
['T1082']
MarkiRAT can obtain the computer name from a compromised host.
['T1082']
Metamorfo has collected the hostname and operating system version from the compromised host.
['T1082']
Meteor has the ability to discover the hostname of a compromised host.
['T1082']
Milan can enumerate the targeted machine's name and GUID.
['T1082']
MiniDuke can gather the hostname on a compromised machine.
['T1082']
MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.
['T1082']
Mongall can identify drives on compromised hosts and retrieve the hostname via `gethostbyname`.
['T1082']
MoonWind can obtain the victim hostname, Windows version, RAM amount, number of drives, and screen resolution.
['T1082']
More_eggs has the capability to gather the OS version and computer name.
['T1082']
MuddyWater has used malware that can collect the victim’s OS version and machine name.
['T1082']
Mustang Panda has gathered system information using "systeminfo".
['T1082']
NETWIRE can discover and collect victim system information.
['T1082']
Naid collects a unique identifier (UID) from a compromised host.
['T1082']
Nebulae can discover logical drive information including the drive type, free space, and volume information.
['T1082']
Netwalker can determine the system architecture it is running on to choose which version of the DLL to use.
['T1082']
OSInfo discovers information about the infected machine.
['T1082']
OceanSalt can collect the computer name from the system.
['T1082']