text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
OSX/Shlayer can download payloads, and extract bytes from files. OSX/Shlayer uses the "curl -fsL "$url" >$tmp_path" command to download malicious payloads into a temporary directory. | ['T1105'] |
OSX_OCEANLOTUS.D has a command to download and execute a file on the victim’s machine. | ['T1105'] |
OilRig can download remote files onto victims. | ['T1105'] |
Operation Wocao can download additional files to the infected system. | ['T1105'] |
Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload. | ['T1105', 'T1569.002'] |
Orz can download files onto the victim. | ['T1105'] |
OutSteel can download files from its C2 server. | ['T1105'] |
P.A.S. Webshell can upload and download files to and from compromised hosts. | ['T1105'] |
P8RAT can download additional payloads to a target system. | ['T1105'] |
PLAINTEE has downloaded and executed additional plugins. | ['T1105'] |
PLATINUM has transferred files using the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel. | ['T1105'] |
POSHSPY downloads and executes additional PowerShell code and Windows binaries. | ['T1105'] |
POWERSOURCE has been observed being used to download TEXTMATE and the Cobalt Strike Beacon payload onto victims. | ['T1105'] |
POWERSTATS can retrieve and execute additional PowerShell payloads from the C2 server. | ['T1105'] |
POWRUNER can download or upload files from its C2 server. | ['T1105'] |
Pasam creates a backdoor through which remote attackers can upload files. | ['T1105'] |
Penquin can execute the command code "do_download" to retrieve remote files from C2. | ['T1105'] |
Peppy can download and execute remote files. | ['T1105'] |
PipeMon can install additional modules via C2 commands. | ['T1105'] |
Pisloader has a command to upload a file to the victim machine. | ['T1105'] |
PlugX has a module to download and execute files on the compromised machine. | ['T1105'] |
PoisonIvy creates a backdoor through which remote attackers can upload files. | ['T1105'] |
PolyglotDuke can retrieve payloads from the C2 server. | ['T1105'] |
Pony can download additional files onto the infected system. | ['T1105'] |
PowerDuke has a command to download a file. | ['T1105'] |
PowerLess can download additional payloads to a compromised host. | ['T1105'] |
PowerPunch can download payloads from adversary infrastructure. | ['T1105'] |
Psylo has a command to download a file to the system from its C2 server. | ['T1105'] |
Pupy can upload and download to/from a victim machine. | ['T1105'] |
QakBot has the ability to download additional components and malware. | ['T1105'] |
QuietSieve can download and execute payloads on a target host. | ['T1105'] |
RATANKBA uploads and downloads information. | ['T1105'] |
RCSession has the ability to drop additional files to an infected machine. | ['T1105'] |
RDAT can download files via DNS. | ['T1105'] |
REvil can download a copy of itself from an attacker controlled IP address to the victim machine. | ['T1105'] |
RGDoor uploads and downloads files to and from the victim’s machine. | ['T1105'] |
ROKRAT can retrieve additional malicious payloads from its C2 server. | ['T1105'] |
RTM can download additional files. | ['T1105'] |
RainyDay can download files to a compromised host. | ['T1105'] |
Rancor has downloaded additional malware, including by using certutil. | ['T1105'] |
RedLeaves is capable of downloading a file from a specified URL. | ['T1105'] |
RegDuke can download files from C2. | ['T1105'] |
Remcos can upload and download files to and from the victim’s machine. | ['T1105'] |
RemoteUtilities can upload and download files to and from a target machine. | ['T1105'] |
Revenge RAT has the ability to upload and download files. | ['T1105'] |
RogueRobin can save a new file to the system from the C2 server. | ['T1105'] |
S-Type can download additional files onto a compromised host. | ['T1105'] |
SDBbot has the ability to download a DLL from C2 to a compromised host. | ['T1105'] |
SHUTTERSPEED can download and execute an arbitary executable. | ['T1105'] |
SILENTTRINITY can load additional files and tools, including Mimikatz. | ['T1105'] |
SLOTHFULMEDIA has downloaded files onto a victim machine. | ['T1105'] |
SLOWDRIFT downloads additional payloads. | ['T1105'] |
SMOKEDHAM has used Powershell to download UltraVNC and Ngrok from third-party file sharing sites. | ['T1105'] |
SUNBURST delivered different payloads, including TEARDROP in at least one instance. | ['T1105'] |
Saint Bot can download additional files onto a compromised host. | ['T1105'] |
Sakula has the capability to download files. | ['T1105'] |
SeaDuke is capable of uploading and downloading files. | ['T1105'] |
Seasalt has a command to download additional files. | ['T1105'] |
ServHelper may download additional files to execute. | ['T1105'] |
Seth-Locker has the ability to download and execute files on a compromised host. | ['T1105'] |
Shamoon can download an executable to run on the victim. | ['T1105'] |
Shark can download additional files from its C2 via HTTP or DNS. | ['T1105'] |
SharpStage has the ability to download and execute additional payloads via a DropBox API. | ['T1105'] |
Sharpshooter downloaded additional payloads after a target was infected with a first-stage downloader. | ['T1105'] |
ShimRat can download additional files. | ['T1105'] |
ShimRatReporter had the ability to download additional payloads. | ['T1105'] |
Sibot can download and execute a payload onto a compromised system. | ['T1105'] |
SideCopy has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads. | ['T1105'] |
SideTwist has the ability to download additional files. | ['T1105'] |
Sidewinder has used LNK files to download remote files to the victim's network. | ['T1105'] |
Silence has downloaded additional modules and malware to victim’s machines. | ['T1105'] |
Skidmap has the ability to download files on an infected host. | ['T1105'] |
Sliver can upload files from the C2 server to the victim machine using the "upload" command. | ['T1105'] |
Small Sieve has the ability to download files. | ['T1105'] |
SodaMaster has the ability to download additional payloads from C2 to the targeted system. | ['T1105'] |
SpeakUp downloads and executes additional files from a remote server. | ['T1105'] |
SpicyOmelette can download malicious files from threat actor controlled AWS URL's. | ['T1105'] |
Squirrelwaffle has downloaded and executed additional encoded payloads. | ['T1105'] |
StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine. | ['T1105'] |
StrifeWater can download updates and auxiliary modules. | ['T1105'] |
StrongPity can download files to specified targets. | ['T1105'] |
SysUpdate has the ability to download files to a compromised host. | ['T1105'] |
TA505 has downloaded additional malware to execute on victim systems. | ['T1105'] |
TA551 has retrieved DLLs and installer binaries for malware execution from C2. | ['T1105'] |
TAINTEDSCRIBE can download additional modules from its C2 server. | ['T1105'] |
TSCookie has the ability to upload and download files to and from the infected host. | ['T1105'] |
TURNEDUP is capable of downloading additional files. | ['T1105'] |
TYPEFRAME can upload and download files to the victim’s machine. | ['T1105'] |
Taidoor has downloaded additional files onto a compromised host. | ['T1105'] |
TeamTNT has the "curl" and "wget" commands as well as batch scripts to download new tools. | ['T1105'] |
The Ritsol backdoor trojan used by Elderwood can download files onto a compromised host from a remote location. | ['T1105'] |
The Winnti for Windows dropper can place malicious payloads on targeted systems. | ['T1105'] |
ThiefQuest can download and execute payloads in-memory or from disk. | ['T1105'] |
Threat Group-3390 has downloaded additional malware and tools, including through the use of `certutil`, onto a compromised host . | ['T1105'] |
ThreatNeedle can download additional tools to enable lateral movement. | ['T1105'] |
TinyTurla has the ability to act as a second-stage dropper used to infect the system with additional malware. | ['T1105'] |
Tomiris can download files and execute them on a victim's system. | ['T1105'] |
Tonto Team has downloaded malicious DLLs which served as a ShadowPad loader. | ['T1105'] |
TrickBot downloads several additional files and saves them to the victim's machine. | ['T1105'] |
Trojan.Karagany can upload, download, and execute files on the victim. | ['T1105'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.