text1
stringlengths
7
2.5k
labels
stringlengths
9
100
OSX/Shlayer can download payloads, and extract bytes from files. OSX/Shlayer uses the "curl -fsL "$url" >$tmp_path" command to download malicious payloads into a temporary directory.
['T1105']
OSX_OCEANLOTUS.D has a command to download and execute a file on the victim’s machine.
['T1105']
OilRig can download remote files onto victims.
['T1105']
Operation Wocao can download additional files to the infected system.
['T1105']
Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload.
['T1105', 'T1569.002']
Orz can download files onto the victim.
['T1105']
OutSteel can download files from its C2 server.
['T1105']
P.A.S. Webshell can upload and download files to and from compromised hosts.
['T1105']
P8RAT can download additional payloads to a target system.
['T1105']
PLAINTEE has downloaded and executed additional plugins.
['T1105']
PLATINUM has transferred files using the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel.
['T1105']
POSHSPY downloads and executes additional PowerShell code and Windows binaries.
['T1105']
POWERSOURCE has been observed being used to download TEXTMATE and the Cobalt Strike Beacon payload onto victims.
['T1105']
POWERSTATS can retrieve and execute additional PowerShell payloads from the C2 server.
['T1105']
POWRUNER can download or upload files from its C2 server.
['T1105']
Pasam creates a backdoor through which remote attackers can upload files.
['T1105']
Penquin can execute the command code "do_download" to retrieve remote files from C2.
['T1105']
Peppy can download and execute remote files.
['T1105']
PipeMon can install additional modules via C2 commands.
['T1105']
Pisloader has a command to upload a file to the victim machine.
['T1105']
PlugX has a module to download and execute files on the compromised machine.
['T1105']
PoisonIvy creates a backdoor through which remote attackers can upload files.
['T1105']
PolyglotDuke can retrieve payloads from the C2 server.
['T1105']
Pony can download additional files onto the infected system.
['T1105']
PowerDuke has a command to download a file.
['T1105']
PowerLess can download additional payloads to a compromised host.
['T1105']
PowerPunch can download payloads from adversary infrastructure.
['T1105']
Psylo has a command to download a file to the system from its C2 server.
['T1105']
Pupy can upload and download to/from a victim machine.
['T1105']
QakBot has the ability to download additional components and malware.
['T1105']
QuietSieve can download and execute payloads on a target host.
['T1105']
RATANKBA uploads and downloads information.
['T1105']
RCSession has the ability to drop additional files to an infected machine.
['T1105']
RDAT can download files via DNS.
['T1105']
REvil can download a copy of itself from an attacker controlled IP address to the victim machine.
['T1105']
RGDoor uploads and downloads files to and from the victim’s machine.
['T1105']
ROKRAT can retrieve additional malicious payloads from its C2 server.
['T1105']
RTM can download additional files.
['T1105']
RainyDay can download files to a compromised host.
['T1105']
Rancor has downloaded additional malware, including by using certutil.
['T1105']
RedLeaves is capable of downloading a file from a specified URL.
['T1105']
RegDuke can download files from C2.
['T1105']
Remcos can upload and download files to and from the victim’s machine.
['T1105']
RemoteUtilities can upload and download files to and from a target machine.
['T1105']
Revenge RAT has the ability to upload and download files.
['T1105']
RogueRobin can save a new file to the system from the C2 server.
['T1105']
S-Type can download additional files onto a compromised host.
['T1105']
SDBbot has the ability to download a DLL from C2 to a compromised host.
['T1105']
SHUTTERSPEED can download and execute an arbitary executable.
['T1105']
SILENTTRINITY can load additional files and tools, including Mimikatz.
['T1105']
SLOTHFULMEDIA has downloaded files onto a victim machine.
['T1105']
SLOWDRIFT downloads additional payloads.
['T1105']
SMOKEDHAM has used Powershell to download UltraVNC and Ngrok from third-party file sharing sites.
['T1105']
SUNBURST delivered different payloads, including TEARDROP in at least one instance.
['T1105']
Saint Bot can download additional files onto a compromised host.
['T1105']
Sakula has the capability to download files.
['T1105']
SeaDuke is capable of uploading and downloading files.
['T1105']
Seasalt has a command to download additional files.
['T1105']
ServHelper may download additional files to execute.
['T1105']
Seth-Locker has the ability to download and execute files on a compromised host.
['T1105']
Shamoon can download an executable to run on the victim.
['T1105']
Shark can download additional files from its C2 via HTTP or DNS.
['T1105']
SharpStage has the ability to download and execute additional payloads via a DropBox API.
['T1105']
Sharpshooter downloaded additional payloads after a target was infected with a first-stage downloader.
['T1105']
ShimRat can download additional files.
['T1105']
ShimRatReporter had the ability to download additional payloads.
['T1105']
Sibot can download and execute a payload onto a compromised system.
['T1105']
SideCopy has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads.
['T1105']
SideTwist has the ability to download additional files.
['T1105']
Sidewinder has used LNK files to download remote files to the victim's network.
['T1105']
Silence has downloaded additional modules and malware to victim’s machines.
['T1105']
Skidmap has the ability to download files on an infected host.
['T1105']
Sliver can upload files from the C2 server to the victim machine using the "upload" command.
['T1105']
Small Sieve has the ability to download files.
['T1105']
SodaMaster has the ability to download additional payloads from C2 to the targeted system.
['T1105']
SpeakUp downloads and executes additional files from a remote server.
['T1105']
SpicyOmelette can download malicious files from threat actor controlled AWS URL's.
['T1105']
Squirrelwaffle has downloaded and executed additional encoded payloads.
['T1105']
StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine.
['T1105']
StrifeWater can download updates and auxiliary modules.
['T1105']
StrongPity can download files to specified targets.
['T1105']
SysUpdate has the ability to download files to a compromised host.
['T1105']
TA505 has downloaded additional malware to execute on victim systems.
['T1105']
TA551 has retrieved DLLs and installer binaries for malware execution from C2.
['T1105']
TAINTEDSCRIBE can download additional modules from its C2 server.
['T1105']
TSCookie has the ability to upload and download files to and from the infected host.
['T1105']
TURNEDUP is capable of downloading additional files.
['T1105']
TYPEFRAME can upload and download files to the victim’s machine.
['T1105']
Taidoor has downloaded additional files onto a compromised host.
['T1105']
TeamTNT has the "curl" and "wget" commands as well as batch scripts to download new tools.
['T1105']
The Ritsol backdoor trojan used by Elderwood can download files onto a compromised host from a remote location.
['T1105']
The Winnti for Windows dropper can place malicious payloads on targeted systems.
['T1105']
ThiefQuest can download and execute payloads in-memory or from disk.
['T1105']
Threat Group-3390 has downloaded additional malware and tools, including through the use of `certutil`, onto a compromised host .
['T1105']
ThreatNeedle can download additional tools to enable lateral movement.
['T1105']
TinyTurla has the ability to act as a second-stage dropper used to infect the system with additional malware.
['T1105']
Tomiris can download files and execute them on a victim's system.
['T1105']
Tonto Team has downloaded malicious DLLs which served as a ShadowPad loader.
['T1105']
TrickBot downloads several additional files and saves them to the victim's machine.
['T1105']
Trojan.Karagany can upload, download, and execute files on the victim.
['T1105']