text1
stringlengths
7
2.5k
labels
stringlengths
9
100
OilRig has run "hostname" and "systeminfo" on a victim.
['T1082']
Okrum can collect computer name, locale information, and information about the OS and architecture.
['T1082']
Orz can gather the victim OS version and whether it is 64 or 32 bit.
['T1082']
POWERSTATS can retrieve OS name/architecture and computer/domain name information from compromised hosts.
['T1082']
PUNCHBUGGY can gather system information such as computer names.
['T1082']
Pasam creates a backdoor through which remote attackers can retrieve information such as hostname and free disk space.
['T1082']
Patchwork collected the victim computer name, OS version, and architecture type and sent the information to its C2 server. Patchwork also enumerated all available drives on the victim's machine.
['T1082']
Penquin can report the file system type and disk space of a compromised host to C2.
['T1082']
PipeMon can collect and send OS version and computer name as a part of its C2 beacon.
['T1082']
PoetRAT has the ability to gather information about the compromised host.
['T1082']
Pony has collected the Service Pack, language, and region information to send to the C2.
['T1082']
PoshC2 contains modules, such as "Get-ComputerInfo", for enumerating common system information.
['T1082']
PowerShower has collected system information on the infected host.
['T1082']
Proxysvc collects the OS version, country name, MAC address, computer name, physical memory statistics, and volume information for all drives on the system.
['T1082']
QakBot can collect system information including the OS version and domain on a compromised host.
['T1082']
QuasarRAT can gather system information from the victim’s machine including the OS type.
['T1082']
RATANKBA gathers information about the OS architecture, OS name, and OS version/Service pack.
['T1082']
REvil can identify the username, machine name, system language, keyboard layout, OS version, and system drive information on a compromised host.
['T1082']
ROKRAT can gather the hostname and the OS version to ensure it doesn’t run on a Windows XP or Windows Server 2003 systems.
['T1082']
RTM can obtain the computer name, OS version, and default language identifier.
['T1082']
Ramsay can detect system information--including disk names, total space, and remaining space--to create a hardware profile GUID which acts as a system identifier for operators.
['T1082']
Reaver collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information.
['T1082']
RedLeaves can gather extended system information including the hostname, OS version number, platform, memory information, time elapsed since system startup, and CPU information.
['T1082']
Remsec can obtain the OS version information, computer name, processor architecture, machine role, and OS edition.
['T1082']
Revenge RAT collects the CPU information, OS information, and system language.
['T1082']
Rifdoor has the ability to identify the Windows version on the compromised host.
['T1082']
Rising Sun can detect the computer name, operating system, and drive information, including drive type, total number of bytes on disk, total number of free bytes on disk, and name of a specified volume.
['T1082']
Rocke has used uname -m to collect the name and information about the infected system's kernel.
['T1082']
RogueRobin gathers BIOS versions and manufacturers, the number of CPU cores, the total physical memory, and the computer name.
['T1082']
RunningRAT gathers the OS version, logical drives information, processor information, and volume information.
['T1082']
Ryuk has called "GetLogicalDrives" to emumerate all mounted drives, and "GetDriveTypeW" to determine the drive type.
['T1082']
SDBbot has the ability to identify the OS version, OS bit information and computer name.
['T1082']
SHARPSTATS has the ability to identify the IP address, machine name, and OS of the compromised host.
['T1082']
SILENTTRINITY can collect information related to a compromised host, including OS version and a list of drives.
['T1082']
SLOWDRIFT collects and sends system information to its C2.
['T1082']
SMOKEDHAM has used the "systeminfo" command on a compromised host.
['T1082']
SOUNDBITE is capable of gathering system information.
['T1082']
STARWHALE can gather the computer name of an infected host.
['T1082']
SUNBURST collected hostname, OS version, and device uptime.
['T1082']
SYSCON has the ability to use Systeminfo to identify system information.
['T1082']
Saint Bot can identify the OS version, CPU, and other details from a victim's machine.
['T1082']
Sandworm Team used a backdoor to enumerate information about the infected system's operating system.
['T1082']
ServHelper will attempt to enumerate Windows version and system architecture.
['T1082']
Several Lazarus Group malware families collect information on the type and version of the victim OS, as well as the victim computer name and CPU information. A Destover-like variant used by Lazarus Group also collects disk space information and sends it to its C2 server.
['T1082']
ShadowPad has discovered system information including memory status, CPU frequency, OS versions, and volume serial numbers.
['T1082']
SideTwist can collect the computer name of a targeted system.
['T1082']
Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use.
['T1082']
SodaMaster can enumerate the host name and OS version on a target system.
['T1082']
SombRAT can execute "getinfo" to enumerate the computer name and OS version of a compromised system.
['T1082']
SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo.
['T1082']
Sowbug obtained OS version and hardware configuration from a victim.
['T1082']
Spark can collect the hostname, keyboard layout, and language from the system.
['T1082']
Squirrelwaffle has gathered victim computer information and configurations.
['T1082']
Stealth Falcon malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory.
['T1082']
StoneDrill has the capability to discover the system OS, Windows version, architecture and environment.
['T1082']
StreamEx has the ability to enumerate system information.
['T1082']
StrifeWater can collect the OS version, architecture, and machine name to create a unique token for the infected host.
['T1082']
StrongPity can identify the hard disk volume serial number on a compromised host.
['T1082']
SysUpdate can determine whether a system has a 32 bit or 64 bit architecture.
['T1082']
Systeminfo can be used to gather information about the operating system.
['T1082']
TeamTNT has searched for system version, architecture, disk partition, logical volume, and hostname information.
['T1082']
The IceApple Server Variable Dumper module iterates over all server variables present for the current request and returns them to the adversary.
['T1082']
The initial beacon packet for Mis-Type contains the operating system version and file system of the victim.
['T1082']
The initial beacon packet for Misdat contains the operating system version of the victim.
['T1082']
The initial beacon packet for S-Type contains the operating system version and file system of the victim.
['T1082']
ThreatNeedle can collect system profile information from a compromised host.
['T1082']
Trojan.Karagany can capture information regarding the victim's OS, security, and hardware configuration.
['T1082']
Tropic Trooper has detected a target system’s OS version and system volume information.
['T1082']
Tropic Trooper has detected a target system’s OS version.
['T1082']
Turla surveys a system upon check-in to discover operating system configuration details using the "systeminfo" and "set" commands.
['T1082']
UPPERCUT has the capability to gather the system’s hostname and OS version.
['T1082']
Ursnif has used Systeminfo to gather system information.
['T1082']
VERMIN collects the OS name, machine name, and architecture information.
['T1082']
Valak can determine the Windows version and computer name on a compromised host.
['T1082']
Volgmer can gather system information, the computer name, OS version, drive and serial information from the victim's machine.
['T1082']
WINDSHIELD can gather the victim computer name.
['T1082']
WINERACK can gather information about the host.
['T1082']
WellMess can identify the computer name of a compromised host.
['T1082']
WhisperGate has the ability to enumerate fixed logical drives on a targeted system.
['T1082']
WinMM collects the system name, OS version including service pack, and system install date and sends the information to the C2 server.
['T1082']
Windigo has used a script to detect which Linux distribution and version is currently installed on the system.
['T1082']
Windshift has used malware to identify the computer name of a compromised host.
['T1082']
Wingbird checks the victim OS version after executing to determine where to drop files based on whether the victim is 32-bit or 64-bit.
['T1082']
Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP.
['T1082']
XAgentOSX contains the getInstalledAPP function to run "ls -la /Applications" to gather what applications are installed.
['T1082']
XCSSET identifies the macOS version and uses "ioreg" to determine serial number.
['T1082']
YAHOYAH checks for the system’s Windows OS version and hostname.
['T1082']
ZIRCONIUM has used a tool to capture the processor architecture of a compromised host in order to register it with C2.
['T1082']
ZeroT gathers the victim's computer name, Windows version, and system language, and then sends it to its C2 server.
['T1082']
Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system.
['T1082']
Zox can enumerate attached drives.
['T1082']
ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory.
['T1082']
ZxxZ has collected the host name and operating system product name from a compromised machine.
['T1082']
admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: "ver >> %temp%\download" "systeminfo >> %temp%\download"
['T1082']
build_downer has the ability to send system volume information to C2.
['T1082']
cmd can be used to find information about the operating system.
['T1082']
down_new has the ability to identify the system volume information of a compromised host.
['T1082']
gh0st RAT has gathered system architecture, processor, OS configuration, and installed hardware information.
['T1082']
jRAT collects information about the OS (version, build type, install date) as well as system up-time upon receiving a connection from a backdoor.
['T1082']
njRAT enumerates the victim operating system and computer name during the initial infection.
['T1082']