text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.
['T1119']
ccf32 can be used to automatically collect files from a compromised host.
['T1119']
ADVSTORESHELL can list connected devices.
['T1120']
APT28 uses a module to receive a notification every time a USB mass storage device is inserted into a victim.
['T1120']
APT37 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices.
['T1120']
Attor has a plugin that collects information about inserted storage devices, modems, and phone devices.
['T1120']
BADNEWS checks for new hard drives on the victim, such as USB devices, by listening for the WM_DEVICECHANGE window message.
['T1120']
BackdoorDiplomacy has used an executable to detect removable media, such as USB flash drives.
['T1120']
Bandook can detect USB devices.
['T1120']
BlackEnergy can gather very specific information about attached USB devices, to include device instance ID and drive geometry.
['T1120']
Cadelspy has the ability to steal information about printers and the documents sent to printers.
['T1120']
Crimson has the ability to discover pluggable/removable drives to extract files from.
['T1120']
Crutch can monitor for removable drives being plugged into the compromised machine.
['T1120']
During Operation Wocao, threat actors discovered removable disks attached to a system.
['T1120']
DustySky can detect connected USB devices.
['T1120']
Equation has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware.
['T1120']
Ferocious can run "GET.WORKSPACE" in Microsoft Excel to check if a mouse is present.
['T1120']
FlawedAmmyy will attempt to detect if a usable smart card is current inserted into a card reader.
['T1120']
Mongall can identify removable media attached to compromised hosts.
['T1120']
MoonWind obtains the number of removable drives from the victim.
['T1120']
ObliqueRAT can discover pluggable/removable drives to extract files from.
['T1120']
OilRig has used tools to identify if a mouse is connected to a targeted system.
['T1120']
Operation Wocao has discovered removable disks attached to a system.
['T1120']
QakBot can identify peripheral devices on targeted systems.
['T1120']
QuietSieve can identify and search removable drives for specific file name extensions.
['T1120']
RTM can obtain a list of smart card readers attached to the victim.
['T1120']
Ragnar Locker may attempt to connect to removable drives and mapped network drives.
['T1120']
Ramsay can scan for removable media which may contain documents for collection.
['T1120']
Stuxnet enumerates removable drives for infection.
['T1120']
T9000 searches through connected drives for removable storage devices.
['T1120']
TajMahal has the ability to identify connected Apple devices.
['T1120']
TeamTNT has searched for attached VGA devices using lspci.
['T1120']
Turla has used "fsutil fsinfo drives" to list connected drives.
['T1120']
USBStealer monitors victims for insertion of removable drives. When dropped onto a second victim, it also enumerates drives connected to the system.
['T1120']
USBferry can check for connected USB devices.
['T1120']
WannaCry contains a thread that will attempt to scan for new attached drives every few seconds. If one is identified, it will encrypt the files on the attached device.
['T1120']
WastedLocker can enumerate removable drives prior to the encryption process.
['T1120']
XAgentOSX contains the showBackupIosFolder function to check for IOS device backups by running "ls -la ~/Library/Application\ Support/MobileSync/Backup/".
['T1120']
Zebrocy enumerates information about connected storage devices.
['T1120']
jRAT can map UPnP ports.
['T1120']
APT37 has used an audio capturing utility known as SOUNDWAVE that captures microphone input.
['T1123']
Attor's has a plugin that is capable of recording audio using available input sound devices.
['T1123']
Cadelspy has the ability to record audio from the compromised host.
['T1123']
Cobian RAT has a feature to perform voice recording on the victim’s machine.
['T1123']
Crimson can perform audio surveillance using microphones.
['T1123']
DOGCALL can capture microphone data from the victim's machine.
['T1123']
DarkComet can listen in to victims' conversations through the system’s microphone.
['T1123']
EvilGrab has the capability to capture audio from a victim machine.
['T1123']
Flame can record audio using any existing hardware recording devices.
['T1123']
InvisiMole can record sound using input audio devices.
['T1123']
Janicab captured audio and sent it out to a C2 server.
['T1123']
MacMa has the ability to record audio.
['T1123']
MacSpy can record the sounds from microphones on a computer.
['T1123']
Machete captures audio from the computer’s microphone.
['T1123']
NanoCore can capture audio feeds from the system.
['T1123']
Pupy can record sound with the microphone.
['T1123']
ROKRAT has an audio capture and eavesdropping module.
['T1123']
Remcos can capture data from the system’s microphone.
['T1123']
Revenge RAT has a plugin for microphone interception.
['T1123']
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to "%APPDATA%\Intel\Skype".
['T1123', 'T1125']
TajMahal has the ability to capture VoiceIP application audio on an infected host.
['T1123']
VERMIN can perform audio capture.
['T1123']
jRAT can capture microphone recordings.
['T1123']
AppleSeed can pull a timestamp from the victim's machine.
['T1124']
As part of the data reconnaissance phase, Proxysvc grabs the system time to send back to the control server.
['T1124']
Astaroth collects the timestamp from the infected machine.
['T1124']
BRONZE BUTLER has used "net time" to check the local time on a target system.
['T1124']
BendyBear has the ability to determine local time on a compromised host.
['T1124']
Bisonal can check the system time set on the infected host.
['T1124']
Carbon uses the command "net time \\127.0.0.1" to get information the system’s time.
['T1124']
Chimera has used "time /t" and "net time \\ip/hostname" for system time discovery.
['T1124']
Clambling can determine the current time.
['T1124']
ComRAT has checked the victim system's date and time to perform tasks during business hours (9 to 5, Monday to Friday).
['T1124']
Conficker uses the current UTC victim system date for domain generation and connects to time servers to determine the current date.
['T1124']
DCSrv can compare the current time on an infected host with a configuration value to determine when to start the encryption process.
['T1124']
DRATzarus can use the `GetTickCount` and `GetSystemTimeAsFileTime` API calls to inspect system time.
['T1124']
DarkWatchman can collect the time zone information from the system.
['T1124']
Darkhotel malware can obtain system time from a compromised host.
['T1124']
During C0015, the threat actors used the command `net view /all time` to gather the local time of a compromised network.
['T1124']
During Operation CuckooBees, the threat actors used the `net time` command as part of their advanced reconnaissance.
['T1124']
Egregor contains functionality to query the local/system time.
['T1124']
Epic uses the "net time" command to get the system time from the machine and collect the current date and time zone information.
['T1124']
FunnyDream can check system time to help determine when changes were made to specified files.
['T1124']
GRIFFON has used a reconnaissance module that can be used to retrieve the date and time of the system.
['T1124']
GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server.
['T1124']
Grandoreiro can determine the time on the victim machine via IPinfo.
['T1124']
GravityRAT can obtain the date and time of a system.
['T1124']
Green Lambert can collect the date and time from a compromised host.
['T1124']
HOPLIGHT has been observed collecting system time from victim machines.
['T1124']
Higaisa used a function to gather the current time.
['T1124']
Metamorfo uses JavaScript to get the system time.
['T1124']
NOKKI can collect the current timestamp of the victim's machine.
['T1124']
Okrum can obtain the date and time of the compromised system.
['T1124']
PipeMon can send time zone information from a compromised host to C2.
['T1124']
PowerDuke has commands to get the time the machine was built, the time, and the time zone.
['T1124']
QakBot can identify the system time on a targeted host.
['T1124']
SILENTTRINITY can collect start time information from a compromised host.
['T1124']
SombRAT can execute "getinfo" to discover the current time on a compromised host.
['T1124']
StoneDrill can obtain the current date and time of the victim machine.
['T1124']
StrifeWater can collect the time zone from the victim's machine.
['T1124']