text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz. | ['T1119'] |
ccf32 can be used to automatically collect files from a compromised host. | ['T1119'] |
ADVSTORESHELL can list connected devices. | ['T1120'] |
APT28 uses a module to receive a notification every time a USB mass storage device is inserted into a victim. | ['T1120'] |
APT37 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices. | ['T1120'] |
Attor has a plugin that collects information about inserted storage devices, modems, and phone devices. | ['T1120'] |
BADNEWS checks for new hard drives on the victim, such as USB devices, by listening for the WM_DEVICECHANGE window message. | ['T1120'] |
BackdoorDiplomacy has used an executable to detect removable media, such as USB flash drives. | ['T1120'] |
Bandook can detect USB devices. | ['T1120'] |
BlackEnergy can gather very specific information about attached USB devices, to include device instance ID and drive geometry. | ['T1120'] |
Cadelspy has the ability to steal information about printers and the documents sent to printers. | ['T1120'] |
Crimson has the ability to discover pluggable/removable drives to extract files from. | ['T1120'] |
Crutch can monitor for removable drives being plugged into the compromised machine. | ['T1120'] |
During Operation Wocao, threat actors discovered removable disks attached to a system. | ['T1120'] |
DustySky can detect connected USB devices. | ['T1120'] |
Equation has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware. | ['T1120'] |
Ferocious can run "GET.WORKSPACE" in Microsoft Excel to check if a mouse is present. | ['T1120'] |
FlawedAmmyy will attempt to detect if a usable smart card is current inserted into a card reader. | ['T1120'] |
Mongall can identify removable media attached to compromised hosts. | ['T1120'] |
MoonWind obtains the number of removable drives from the victim. | ['T1120'] |
ObliqueRAT can discover pluggable/removable drives to extract files from. | ['T1120'] |
OilRig has used tools to identify if a mouse is connected to a targeted system. | ['T1120'] |
Operation Wocao has discovered removable disks attached to a system. | ['T1120'] |
QakBot can identify peripheral devices on targeted systems. | ['T1120'] |
QuietSieve can identify and search removable drives for specific file name extensions. | ['T1120'] |
RTM can obtain a list of smart card readers attached to the victim. | ['T1120'] |
Ragnar Locker may attempt to connect to removable drives and mapped network drives. | ['T1120'] |
Ramsay can scan for removable media which may contain documents for collection. | ['T1120'] |
Stuxnet enumerates removable drives for infection. | ['T1120'] |
T9000 searches through connected drives for removable storage devices. | ['T1120'] |
TajMahal has the ability to identify connected Apple devices. | ['T1120'] |
TeamTNT has searched for attached VGA devices using lspci. | ['T1120'] |
Turla has used "fsutil fsinfo drives" to list connected drives. | ['T1120'] |
USBStealer monitors victims for insertion of removable drives. When dropped onto a second victim, it also enumerates drives connected to the system. | ['T1120'] |
USBferry can check for connected USB devices. | ['T1120'] |
WannaCry contains a thread that will attempt to scan for new attached drives every few seconds. If one is identified, it will encrypt the files on the attached device. | ['T1120'] |
WastedLocker can enumerate removable drives prior to the encryption process. | ['T1120'] |
XAgentOSX contains the showBackupIosFolder function to check for IOS device backups by running "ls -la ~/Library/Application\ Support/MobileSync/Backup/". | ['T1120'] |
Zebrocy enumerates information about connected storage devices. | ['T1120'] |
jRAT can map UPnP ports. | ['T1120'] |
APT37 has used an audio capturing utility known as SOUNDWAVE that captures microphone input. | ['T1123'] |
Attor's has a plugin that is capable of recording audio using available input sound devices. | ['T1123'] |
Cadelspy has the ability to record audio from the compromised host. | ['T1123'] |
Cobian RAT has a feature to perform voice recording on the victim’s machine. | ['T1123'] |
Crimson can perform audio surveillance using microphones. | ['T1123'] |
DOGCALL can capture microphone data from the victim's machine. | ['T1123'] |
DarkComet can listen in to victims' conversations through the system’s microphone. | ['T1123'] |
EvilGrab has the capability to capture audio from a victim machine. | ['T1123'] |
Flame can record audio using any existing hardware recording devices. | ['T1123'] |
InvisiMole can record sound using input audio devices. | ['T1123'] |
Janicab captured audio and sent it out to a C2 server. | ['T1123'] |
MacMa has the ability to record audio. | ['T1123'] |
MacSpy can record the sounds from microphones on a computer. | ['T1123'] |
Machete captures audio from the computer’s microphone. | ['T1123'] |
NanoCore can capture audio feeds from the system. | ['T1123'] |
Pupy can record sound with the microphone. | ['T1123'] |
ROKRAT has an audio capture and eavesdropping module. | ['T1123'] |
Remcos can capture data from the system’s microphone. | ['T1123'] |
Revenge RAT has a plugin for microphone interception. | ['T1123'] |
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to "%APPDATA%\Intel\Skype". | ['T1123', 'T1125'] |
TajMahal has the ability to capture VoiceIP application audio on an infected host. | ['T1123'] |
VERMIN can perform audio capture. | ['T1123'] |
jRAT can capture microphone recordings. | ['T1123'] |
AppleSeed can pull a timestamp from the victim's machine. | ['T1124'] |
As part of the data reconnaissance phase, Proxysvc grabs the system time to send back to the control server. | ['T1124'] |
Astaroth collects the timestamp from the infected machine. | ['T1124'] |
BRONZE BUTLER has used "net time" to check the local time on a target system. | ['T1124'] |
BendyBear has the ability to determine local time on a compromised host. | ['T1124'] |
Bisonal can check the system time set on the infected host. | ['T1124'] |
Carbon uses the command "net time \\127.0.0.1" to get information the system’s time. | ['T1124'] |
Chimera has used "time /t" and "net time \\ip/hostname" for system time discovery. | ['T1124'] |
Clambling can determine the current time. | ['T1124'] |
ComRAT has checked the victim system's date and time to perform tasks during business hours (9 to 5, Monday to Friday). | ['T1124'] |
Conficker uses the current UTC victim system date for domain generation and connects to time servers to determine the current date. | ['T1124'] |
DCSrv can compare the current time on an infected host with a configuration value to determine when to start the encryption process. | ['T1124'] |
DRATzarus can use the `GetTickCount` and `GetSystemTimeAsFileTime` API calls to inspect system time. | ['T1124'] |
DarkWatchman can collect the time zone information from the system. | ['T1124'] |
Darkhotel malware can obtain system time from a compromised host. | ['T1124'] |
During C0015, the threat actors used the command `net view /all time` to gather the local time of a compromised network. | ['T1124'] |
During Operation CuckooBees, the threat actors used the `net time` command as part of their advanced reconnaissance. | ['T1124'] |
Egregor contains functionality to query the local/system time. | ['T1124'] |
Epic uses the "net time" command to get the system time from the machine and collect the current date and time zone information. | ['T1124'] |
FunnyDream can check system time to help determine when changes were made to specified files. | ['T1124'] |
GRIFFON has used a reconnaissance module that can be used to retrieve the date and time of the system. | ['T1124'] |
GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server. | ['T1124'] |
Grandoreiro can determine the time on the victim machine via IPinfo. | ['T1124'] |
GravityRAT can obtain the date and time of a system. | ['T1124'] |
Green Lambert can collect the date and time from a compromised host. | ['T1124'] |
HOPLIGHT has been observed collecting system time from victim machines. | ['T1124'] |
Higaisa used a function to gather the current time. | ['T1124'] |
Metamorfo uses JavaScript to get the system time. | ['T1124'] |
NOKKI can collect the current timestamp of the victim's machine. | ['T1124'] |
Okrum can obtain the date and time of the compromised system. | ['T1124'] |
PipeMon can send time zone information from a compromised host to C2. | ['T1124'] |
PowerDuke has commands to get the time the machine was built, the time, and the time zone. | ['T1124'] |
QakBot can identify the system time on a targeted host. | ['T1124'] |
SILENTTRINITY can collect start time information from a compromised host. | ['T1124'] |
SombRAT can execute "getinfo" to discover the current time on a compromised host. | ['T1124'] |
StoneDrill can obtain the current date and time of the victim machine. | ['T1124'] |
StrifeWater can collect the time zone from the victim's machine. | ['T1124'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.