text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Stuxnet collects the time and date of a system when it is infected.
['T1124']
TAINTEDSCRIBE can execute "GetLocalTime" for time discovery.
['T1124']
Taidoor can use "GetLocalTime" and "GetSystemTime" to collect system time.
['T1124']
The White Company has checked the current date on the victim system.
['T1124']
Turla surveys a system upon check-in to discover the system time by using the "net time" command.
['T1124']
UPPERCUT has the capability to obtain the time zone information and current timestamp of the victim’s machine.
['T1124']
WindTail has the ability to generate the current date and time.
['T1124']
ZIRCONIUM has used a tool to capture the time on a compromised host in order to register it with C2.
['T1124']
Zebrocy gathers the current time zone and date information from the system.
['T1124']
build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.
['T1124']
Agent Tesla can access the victim’s webcam and record video.
['T1125']
Bandook has modules that are capable of capturing video from a victim's webcam.
['T1125']
Clambling can record screen content in AVI format.
['T1125']
ConnectWise can record video on remote hosts.
['T1125']
Crimson can capture webcam video on targeted systems.
['T1125']
DarkComet can access the victim’s webcam to take pictures.
['T1125']
Empire can capture webcam data on Windows and macOS systems.
['T1125']
EvilGrab has the capability to capture video from a victim machine.
['T1125']
FIN7 created a custom video recording capability that could be used to monitor operations in the victim's environment.
['T1125']
Imminent Monitor has a remote webcam monitoring capability.
['T1125']
InvisiMole can remotely activate the victim’s webcam to capture content.
['T1125']
Kazuar captures images from the webcam.
['T1125']
NanoCore can access the victim's webcam and capture data.
['T1125']
ObliqueRAT can capture images from webcams on compromised hosts.
['T1125']
PcShare can capture camera video as part of its collection process.
['T1125']
PoetRAT has used a Python tool named Bewmac to record the webcam on compromised hosts.
['T1125']
QuasarRAT can perform webcam viewing.
['T1125']
Remcos can access a system’s webcam and take pictures.
['T1125']
SDBbot has the ability to record video on a compromised host.
['T1125']
TajMahal has the ability to capture webcam video.
['T1125']
WarzoneRAT can access the webcam on a victim's machine.
['T1125']
ZxShell has a command to perform video device spying.
['T1125']
jRAT has the capability to capture video from a webcam.
['T1125']
A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application whitelisting techniques.
['T1127']
Empire can use built-in modules to abuse trusted utilities like MSBuild.exe.
['T1127', 'T1127.001']
A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application control techniques.
['T1127.001']
During Frankenstein, the threat actors used MSbuild to execute an actor-created file.
['T1127.001']
Astaroth uses the LoadLibraryExW() function to load additional modules.
['T1129']
Attor's dispatcher can execute additional plugins by loading the respective DLLs.
['T1129']
BLINDINGCAN has loaded and executed DLLs in memory during runtime on a victim machine.
['T1129']
BOOSTWRITE has used the DWriteCreateFactory() function to load additional modules.
['T1129']
Bumblebee can use `LoadLibrary` to attempt to execute GdiPlus.dll.
['T1129']
Dtrack contains a function that calls "LoadLibrary" and "GetProcAddress".
['T1129']
FoggyWeb's loader can call the "load()" function to load the FoggyWeb dll into an Application Domain on a compromised AD FS server.
['T1129']
Hydraq creates a backdoor through which remote attackers can load and call DLL functions.
['T1129']
KillDisk loads and executes functions from a DLL.
['T1129']
Metamorfo had used AutoIt to load and execute the DLL payload.
['T1129']
PipeMon has used call to "LoadLibrary" to load its installer. PipeMon loads its modules using reflective loading or custom shellcode.
['T1129']
Stuxnet calls LoadLibrary then executes exports from a DLL.
['T1129']
TajMahal has the ability to inject the "LoadLibrary" call template DLL into running processes.
['T1129']
gh0st RAT can load DLLs into memory.
['T1129']
After encrypting C2 data, BADNEWS converts it into a hexadecimal representation and then encodes it into base64.
['T1132']
H1N1 obfuscates C2 traffic with an altered version of base64.
['T1132']
Linux Rabbit sends the payload from the C2 server as an encoded URL parameter.
['T1132']
Mythic provides various transform functions to encode and/or randomize C2 data.
['T1132']
Ursnif has used encoded data in HTTP URLs for C2.
['T1132']
A JHUHUGIT variant encodes C2 POST data base64.
['T1132.001']
APT33 has used base64 to encode command and control traffic.
['T1132.001']
An APT19 HTTP malware variant used Base64 to encode communications to the C2 server.
['T1132.001']
Astaroth encodes data using Base64 before sending it to the C2 server.
['T1132.001']
AutoIt backdoor has sent a C2 response that was base64-encoded.
['T1132.001']
BADNEWS encodes C2 traffic with base64.
['T1132.001']
BS2005 uses Base64 encoding for communication in the message body of an HTTP request.
['T1132.001']
BabyShark has encoded data using certutil before exfiltration.
['T1132.001']
Bisonal has encoded binary data with Base64 and ASCII.
['T1132.001']
Bumblebee has the ability to base64 encode C2 server responses.
['T1132.001']
C2 traffic from ADVSTORESHELL is encrypted, then encoded with Base64 encoding.
['T1132.001']
Carbanak encodes the message body of HTTP traffic with Base64.
['T1132.001']
ChChes can encode C2 data with a custom technique that utilizes Base64.
['T1132.001']
Chaes has used Base64 to encode C2 communications.
['T1132.001']
CharmPower can send additional modules over C2 encoded with base64.
['T1132.001']
Cobian RAT obfuscates communications with the C2 server using Base64 encoding.
['T1132.001']
CreepySnail can use Base64 to encode its C2 traffic.
['T1132.001']
DarkWatchman encodes data using hexadecimal representation before sending it to the C2 server.
['T1132.001']
Daserf uses custom base64 encoding to obfuscate HTTP traffic.
['T1132.001']
Denis encodes the data sent to the server in Base64.
['T1132.001']
Dipsind encodes C2 traffic with base64.
['T1132.001']
DnsSystem can Base64 encode data sent to C2.
['T1132.001']
Ebury has encoded C2 traffic in hexadecimal format.
['T1132.001']
Elise exfiltrates data using cookie values that are Base64-encoded.
['T1132.001']
For C2 over HTTP, Helminth encodes data with base64 and sends it via the "Cookie" field of HTTP requests. For C2 over DNS, Helminth converts ASCII characters into their hexadecimal values and sends the data in cleartext.
['T1132.001']
Fysbis can use Base64 to encode its C2 traffic.
['T1132.001']
GrimAgent can base64 encode C2 replies.
['T1132.001']
HAFNIUM has used ASCII encoding for C2 traffic.
['T1132.001']
HOPLIGHT has utilized Zlib compression to obfuscate the communications payload.
['T1132.001']
Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests.
['T1132.001']
KONNI has used a custom base64 key to encode stolen data before exfiltration.
['T1132.001']
Kazuar encodes communications to the C2 server in Base64.
['T1132.001']
Kessel has exfiltrated data via hexadecimal-encoded subdomain fields of DNS queries.
['T1132.001']
Kevin can Base32 encode chunks of output files during exfiltration.
['T1132.001']
Machete has used base64 encoding.
['T1132.001']
MechaFlounder has the ability to use base16 encoded strings in C2.
['T1132.001']
Mis-Type uses Base64 encoding for C2 traffic.
['T1132.001']
Misdat network traffic is Base64-encoded plaintext.
['T1132.001']
Mongall can use Base64 to encode information sent to its C2.
['T1132.001']
More_eggs has used basE91 encoding, along with encryption, for C2 communication.
['T1132.001']
Mori can use Base64 encoded JSON libraries used in C2.
['T1132.001']
MuddyWater has used tools to encode C2 communications including Base64 encoding.
['T1132.001']
Octopus has encoded C2 communications in Base64.
['T1132.001']
Okrum has used base64 to encode C2 communication.
['T1132.001']