text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Valak has the ability to take screenshots on a compromised host.
['T1113']
XAgentOSX contains the takeScreenShot (along with startTakeScreenShot and stopTakeScreenShot) functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods.
['T1113']
XCSSET saves a screen capture of the victim's system with a numbered filename and ".jpg" extension. Screen captures are taken at specified intervals based on the system.
['T1113']
ZLib has the ability to obtain screenshots of the compromised system.
['T1113']
ZxShell can capture screenshots.
['T1113']
jRAT has the capability to take screenshots of the victim’s machine.
['T1113']
njRAT can capture screenshots of the victim’s machines.
['T1113']
yty collects screenshots of the victim machine.
['T1113']
Magic Hound has compromised email credentials in order to steal sensitive data.
['T1114']
Silent Librarian has exfiltrated entire mailboxes from compromised accounts.
['T1114']
APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.
['T1114.001']
Carbanak searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server.
['T1114.001']
Chimera has harvested data from victim's e-mail including through execution of "wmic /node:<ip> process call create "cmd /c copy c:\Users\<username>\<path>\backup.pst c:\windows\temp\backup.pst" copy "i:\<path>\<username>\My Documents\<filename>.pst" copy".
['T1114.001']
CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.
['T1114.001']
Crimson contains a command to collect and exfiltrate emails from Outlook.
['T1114.001']
Emotet has been observed leveraging a module that scrapes email data from Outlook.
['T1114.001']
Empire has the ability to collect emails on a target system.
['T1114.001']
Magic Hound has collected .PST archives.
['T1114.001']
Pupy can interact with a victim’s Outlook session and look through folders and emails.
['T1114.001']
QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns.
['T1114.001']
Smoke Loader searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).
['T1114.001']
APT28 has collected emails from victim Microsoft Exchange servers.
['T1114.002']
APT29 collected emails from specific individuals, such as executives and IT staff, using "New-MailboxExportRequest" followed by "Get-MailboxExportRequest".
['T1114.002']
Chimera has harvested data from remote mailboxes including through execution of "\\<hostname>\c$\Users\<username>\AppData\Local\Microsoft\Outlook*.ost".
['T1114.002']
Dragonfly 2.0 accessed email accounts using Outlook Web Access.
['T1114.002']
FIN4 has accessed and hijacked online email communications using stolen credentials.
['T1114.002']
HAFNIUM has used web shells to export mailbox data.
['T1114.002']
Ke3chang has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.
['T1114.002']
Kimsuky has used tools such as the MailFetch mail crawler to collect victim emails (excluding spam) from online services via IMAP.
['T1114.002']
Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.
['T1114.002']
LightNeuron collects Exchange emails matching rules specified in its configuration.
['T1114.002']
Magic Hound has exported emails from compromised Exchange servers.
['T1114.002']
MailSniper can be used for searching through email in Exchange and Office 365 environments.
['T1114.002']
UNC2452 collected emails from specific individuals, such as executives and IT staff, using "New-MailboxExportRequest" followed by "Get-MailboxExportRequest".
['T1114.002']
Valak can collect sensitive mailing information from Exchange servers, including credentials and the domain certificate of an enterprise.
['T1114.002']
Kimsuky has set auto-forward rules on victim's e-mail accounts.
['T1114.003']
LAPSUS$ has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account.
['T1114.003']
Silent Librarian has set up auto forwarding rules on compromised e-mail accounts.
['T1114.003']
A JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image.
['T1115']
APT38 used a Trojan called KEYLIME to collect data from the clipboard.
['T1115']
APT39 has used tools capable of stealing contents of the clipboard.
['T1115']
Agent Tesla can steal data from the victim’s clipboard.
['T1115']
Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs.
['T1115']
Cadelspy has the ability to steal data from the clipboard.
['T1115']
Catchamas steals data stored in the clipboard.
['T1115']
Clambling has the ability to capture and store clipboard data.
['T1115']
CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds.
['T1115']
DarkComet can steal data from the clipboard.
['T1115']
Empire can harvest clipboard data on both Windows and macOS systems.
['T1115']
Explosive has a function to use the OpenClipboard wrapper.
['T1115']
FlawedAmmyy can collect clipboard data.
['T1115']
KONNI had a feature to steal data from the clipboard.
['T1115']
MacSpy can steal clipboard contents.
['T1115']
Machete hijacks the clipboard data by creating an overlapped window that listens to keyboard events.
['T1115']
MarkiRAT can capture clipboard content.
['T1115']
Melcoz can monitor content saved to the clipboard.
['T1115']
Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.
['T1115']
Operation Wocao has collected clipboard data in plaintext.
['T1115']
ROKRAT can extract clipboard data from a compromised host.
['T1115']
Remcos steals and modifies data from the clipboard.
['T1115']
Remexi collects text from the clipboard.
['T1115']
The executable version of Helminth has a module to log clipboard contents.
['T1115']
TinyZBot contains functionality to collect information from the clipboard.
['T1115']
VERMIN collects data stored in the clipboard.
['T1115']
jRAT can capture clipboard data.
['T1115']
A Helminth VBScript receives a batch script to execute a set of commands in a command prompt.
['T1119']
APT1 used a batch script to perform a series of discovery techniques and saves it to a text file.
['T1119']
APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.
['T1119', 'T1560']
AppleSeed has automatically collected data from USB drives, keystrokes, and screen images before exfiltration.
['T1119']
Attor has automatically collected data about the compromised system.
['T1119']
BADNEWS monitors USB devices and copies files with certain extensions to a predefined directory.
['T1119']
Bankshot recursively generates a list of files within a directory and sends them back to the control server.
['T1119']
Confucius has used a file stealer to steal documents and images with the following extensions: txt, pdf, png, jpg, doc, xls, xlm, odp, ods, odt, rtf, ppt, xlsx, xlsm, docx, pptx, and jpeg.
['T1119']
During Frankenstein, the threat actors used Empire to automatically gather the username, domain name, machine name, and other system information.
['T1119']
During Operation Wocao, threat actors used a script to collect information about the infected system.
['T1119']
FIN6 has used a script to iterate through a list of compromised PoS systems, copy and remove data to a log file, and to bind to events from the submit payment button.
['T1119']
For all non-removable drives on a victim, USBStealer executes automated collection of certain files for later exfiltration.
['T1119']
Frankenstein has enumerated hosts via Empire, gathering the username, domain name, machine name, and other system information.
['T1119']
FunnyDream can monitor files for changes and automatically collect them.
['T1119']
Gamaredon Group has deployed scripts on compromised systems that automatically scan for interesting documents.
['T1119']
GoldFinder logged and stored information related to the route or hops a packet took from a compromised machine to a hardcoded C2 server, including the target C2 URL, HTTP response/status code, HTTP response headers and values, and data received from the C2 node.
['T1119']
InvisiMole can sort and collect specific documents as well as generate a list of all files on a newly inserted drive and store them in an encrypted file.
['T1119']
Ke3chang has performed frequent and scheduled data collection from victim networks.
['T1119']
MESSAGETAP checks two files, keyword_parm.txt and parm.txt, for instructions on how to target and save data parsed and extracted from SMS message data from the network traffic. If an SMS message contained either a phone number, IMSI number, or keyword that matched the predefined list, it is saved to a CSV file for later theft by the threat actor.
['T1119']
Metamorfo has automatically collected mouse clicks, continuous screenshots on the machine, and set timers to collect the contents of the clipboard and website browsing.
['T1119']
Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt).
['T1119']
Mustang Panda used custom batch scripts to collect files automatically from a targeted system.
['T1119']
OilRig has used automated collection.
['T1119']
OutSteel can automatically scan for and collect files with specific extensions.
['T1119']
Patchwork developed a file stealer to search C:\ and collect files with certain extensions. Patchwork also executed a script to enumerate all drives, store them as a list, and upload generated files to the C2 server.
['T1119']
PoetRAT used file system monitoring to track modification and enable automatic exfiltration.
['T1119']
PoshC2 contains a module for recursively parsing through files and directories to gather valid credit card numbers.
['T1119']
RTM monitors browsing activity and automatically captures screenshots if a victim browses to a URL matching one of a list of strings.
['T1119']
Ramsay can conduct an initial scan for Microsoft Word documents on the local system, removable media, and connected network drives, before tagging and collecting them. It can continue tagging documents to collect with follow up scans.
['T1119']
Sidewinder has used tools to automatically collect system and network configuration information.
['T1119']
StrongPity has a file searcher component that can automatically collect and archive files based on a predefined list of file extensions.
['T1119']
TajMahal has the ability to index and compress files into a send queue for exfiltration.
['T1119']
VERMIN saves each collected file with the automatically generated format {0:dd-MM-yyyy}.txt .
['T1119']
Valak can download a module to search for and build a report of harvested credential data.
['T1119']
WindTail can identify and add files that possess specific file extensions to an array for archiving.
['T1119']