text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Drovorub can use TCP to communicate between its agent and client modules. | ['T1095'] |
FIN6 has used Metasploit Bind and Reverse TCP stagers. | ['T1095'] |
FunnyDream can communicate with C2 over TCP and UDP. | ['T1095'] |
Gelsemium has the ability to use TCP and UDP in C2 communications. | ['T1095'] |
HAFNIUM has used TCP for C2. | ['T1095'] |
If NETEAGLE does not detect a proxy configured on the infected machine, it will send beacons via UDP/6000. Also, after retrieving a C2 IP address and Port Number, NETEAGLE will initiate a TCP connection to this socket. The ensuing connection is a plaintext C2 channel in which commands are specified by DWORDs. | ['T1095'] |
LookBack uses a custom binary protocol over sockets for C2 communications. | ['T1095'] |
MacMa has used a custom JSON-based protocol for its C&C communications. | ['T1095'] |
Metamorfo has used raw TCP for C2. | ['T1095'] |
Mis-Type network traffic can communicate over a raw socket. | ['T1095'] |
MoonWind completes network communication via raw sockets. | ['T1095'] |
Mythic supports WebSocket and TCP-based C2 profiles. | ['T1095'] |
NETWIRE can use TCP in C2 communications. | ['T1095'] |
Nebulae can use TCP in C2 communications. | ['T1095'] |
PLATINUM has used the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel for command and control. | ['T1095'] |
Pay2Key has sent its public key to the C2 server over TCP. | ['T1095'] |
PingPull variants have the ability to communicate with C2 servers using ICMP or TCP. | ['T1095'] |
QuasarRAT can use TCP for C2 communication. | ['T1095'] |
RCSession has the ability to use TCP and UDP in C2 communications. | ['T1095'] |
RainyDay can use TCP in C2 communications. | ['T1095'] |
Remsec is capable of using ICMP, TCP, and UDP for C2. | ['T1095'] |
SDBbot has the ability to communicate with C2 with TCP over port 443. | ['T1095'] |
SombRAT has the ability to use TCP sockets to send data and ICMP to ping the C2 server. | ['T1095'] |
Some Reaver variants use raw TCP for C2. | ['T1095'] |
Some variants of FakeM use SSL to communicate with C2 servers. | ['T1095'] |
TSCookie can use ICMP to receive information on the destination server. | ['T1095'] |
Taidoor can use TCP for C2 communications. | ['T1095'] |
WINDSHIELD C2 traffic can communicate via TCP raw sockets. | ['T1095'] |
Winnti for Linux has used ICMP, custom TCP, and UDP in outbound communications. | ['T1095'] |
Winnti for Windows can communicate using custom TCP. | ['T1095'] |
gh0st RAT has used an encrypted protocol within TCP segments to communicate with the C2. | ['T1095'] |
APT3 has been known to add created accounts to local admin groups to maintain elevated access. | ['T1098'] |
Kimsuky has added accounts to specific groups with "net localgroup". | ['T1098'] |
Lazarus Group malware WhiskeyDelta-Two contains a function that attempts to rename the administrator’s account. | ['T1098'] |
Magic Hound granted compromised email accounts read access to the email boxes of additional targeted accounts. The group then was able to authenticate to the intended victim's OWA (Outlook Web Access) portal and read hundreds of email communications for information on Middle East organizations. | ['T1098', 'T1098.002'] |
Sandworm Team used the "sp_addlinkedsrvlogin" command in MS-SQL to create a link between a created account and other servers in the network. | ['T1098'] |
The Mimikatz credential dumper has been extended to include Skeleton Key domain controller authentication bypass functionality. The "LSADUMP::ChangeNTLM" and "LSADUMP::SetNTLM" modules can also manipulate the password hash of an account without knowing the clear text value. | ['T1098'] |
APT29 has added credentials to OAuth Applications and Service Principals. | ['T1098.001'] |
UNC2452 added credentials to OAuth Applications and Service Principals. | ['T1098.001'] |
APT28 has used a Powershell cmdlet to grant the "ApplicationImpersonation" role to a compromised account. | ['T1098.002'] |
APT29 added their own devices as allowed IDs for active sync using "Set-CASMailbox", allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals. | ['T1098.002'] |
UNC2452 added their own devices as allowed IDs for active sync using "Set-CASMailbox", allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals. | ['T1098.002'] |
APT29 has granted `company administrator` privileges to a newly created service principal. | ['T1098.003'] |
Bundlore creates a new key pair with "ssh-keygen" and drops the newly created user key in "authorized_keys" to enable remote login. | ['T1098.004'] |
Earth Lusca has dropped an SSH-authorized key in the `/root/.ssh` folder in order to access a compromised server with SSH. | ['T1098.004'] |
Skidmap has the ability to add the public key of its handlers to the "authorized_keys" file to maintain persistence on an infected host. | ['T1098.004'] |
TeamTNT has added RSA keys in "authorized_keys". | ['T1098.004'] |
XCSSET will create an ssh key if necessary with the "ssh-keygen -t rsa -f $HOME/.ssh/id_rsa -P" command. XCSSET will upload a private key file to the server to remotely access the host without a password. | ['T1098.004'] |
AADInternals can register a device to Azure AD. | ['T1098.005'] |
APT29 registered devices in order to enable mailbox syncing via the "Set-CASMailbox" command. | ['T1098.005'] |
APT32 has used Dropbox, Amazon S3, and Google Drive to host malicious downloads. | ['T1102'] |
Bazar downloads have been hosted on Google Docs. | ['T1102'] |
BoomBox can download files from Dropbox using a hardcoded access token. | ['T1102'] |
Bumblebee has been downloaded to victim's machines from OneDrive. | ['T1102'] |
Chimera has used Google Cloud's appspot service to host C2 servers. | ['T1102'] |
Doki has used the dogechain.info API to generate a C2 address. | ['T1102'] |
During Operation Spalax, the threat actors used OneDrive and MediaFire to host payloads. | ['T1102'] |
EXOTIC LILY has used file-sharing services including WeTransfer, TransferNow, and OneDrive to deliver payloads. | ['T1102'] |
Ember Bear has used Discord's content delivery network (CDN) to deliver malware and malicious scripts to a compromised host. | ['T1102'] |
FIN6 has used Pastebin and Google Storage to host content for their operations. | ['T1102'] |
FIN8 has used "sslip.io", a free IP to domain mapping service that also makes SSL certificate generation easier for traffic encryption, as part of their command and control. | ['T1102'] |
Gamaredon Group has used GitHub repositories for downloaders which will be obtained by the group's .NET executable on the compromised system. | ['T1102'] |
Inception has incorporated at least five different cloud service providers into their C2 infrastructure including CloudMe. | ['T1102'] |
LazyScripter has used GitHub to host its payloads to operate spam campaigns. | ['T1102'] |
Mustang Panda has used DropBox URLs to deliver variants of PlugX. | ['T1102'] |
NETWIRE has used web services including Paste.ee to host payloads. | ['T1102'] |
SMOKEDHAM has used Google Drive and Dropbox to host files downloaded by victims via malicious links. | ['T1102'] |
SharpStage has used a legitimate web service for evading detection. | ['T1102'] |
TeamTNT has leveraged iplogger.org to send collected data back to C2. | ['T1102'] |
Turla has used legitimate web services including Pastebin, Dropbox, and GitHub for C2 communications. | ['T1102'] |
WhisperGate can download additional payloads hosted on a Discord channel. | ['T1102'] |
Astaroth can store C2 information on cloud hosting services such as AWS and CloudFlare and websites like YouTube and Facebook. | ['T1102.001'] |
BLACKCOFFEE uses Microsoft’s TechNet Web portal to obtain a dead drop resolver containing an encoded tag with the IP address of a command and control server. | ['T1102.001'] |
CharmPower can retrieve C2 domain information from actor-controlled S3 buckets. | ['T1102.001'] |
Javali can read C2 information from Google Documents and YouTube. | ['T1102.001'] |
Patchwork hides base64-encoded and encrypted C2 server locations in comments on legitimate websites. | ['T1102.001'] |
PlugX uses Pastebin to store C2 addresses. | ['T1102.001'] |
PolyglotDuke can use Twitter, Reddit, Imgur and other websites to get a C2 URL. | ['T1102.001'] |
RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. | ['T1102.001'] |
RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. RTM has also hidden Pony C2 server IP addresses within transactions on the Bitcoin and Namecoin blockchain. | ['T1102.001'] |
Some MiniDuke components use Twitter to initially obtain the address of a C2 server or as a backup if no hard-coded C2 server responds. | ['T1102.001'] |
Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list. | ['T1102.001'] |
A Turla JavaScript backdoor has used Google Apps Script as its C2 server. | ['T1102.002'] |
APT12 has used blogs and WordPress for C2 infrastructure. | ['T1102.002'] |
APT28 has used Google Drive for C2. | ['T1102.002'] |
APT29 has used social media platforms to hide communications to C2 servers. | ['T1102.002'] |
APT39 has communicated with C2 through files uploaded to and downloaded from DropBox. | ['T1102.002'] |
BLUELIGHT can use different cloud providers for its C2. | ['T1102.002'] |
BoxCaon has used DropBox for C2 communications. | ['T1102.002'] |
Carbanak has used a VBScript named "ggldr" that uses Google Apps Script, Sheets, and Forms services for C2. | ['T1102.002'] |
ComRAT has the ability to use the Gmail web UI to receive commands and exfiltrate information. | ['T1102.002'] |
Comnie uses blogs and third-party sites (GitHub, tumbler, and BlogSpot) to avoid DNS-based blocking of their communication to the command and control server. | ['T1102.002'] |
CreepyDrive can use OneDrive for C2. | ['T1102.002'] |
Crutch can use Dropbox to receive commands and upload stolen data. | ['T1102.002'] |
DOGCALL is capable of leveraging cloud storage APIs such as Cloud, Box, Dropbox, and Yandex for C2. | ['T1102.002'] |
Empire can use Dropbox and GitHub for C2. | ['T1102.002'] |
FIN7 used legitimate services like Google Docs, Google Scripts, and Pastebin for C2. | ['T1102.002'] |
Grandoreiro can utilize web services including Google sites to send and receive C2 data. | ['T1102.002'] |
HEXANE has used cloud services, including OneDrive, for C2. | ['T1102.002'] |
KARAE can use public cloud-based storage providers for command and control. | ['T1102.002'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.