text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Tropic Trooper's backdoor could list the infected system's installed software. | ['T1518'] |
Windigo has used a script to detect installed software on targeted systems. | ['T1518'] |
Windshift has used malware to identify installed software. | ['T1518'] |
XCSSET uses "ps aux" with the "grep" command to enumerate common browsers and system processes potentially impacting XCSSET's exfiltration capabilities. | ['T1518'] |
down_new has the ability to gather information on installed applications. | ['T1518'] |
ABK has the ability to identify the installed anti-virus product on the compromised host. | ['T1518.001'] |
APT38 has identified security software, configurations, defensive tools, and sensors installed on a compromised system. | ['T1518.001'] |
Action RAT can identify AV products on an infected host using the following command: `cmd.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List`. | ['T1518.001'] |
Amadey has checked for a variety of antivirus products. | ['T1518.001'] |
Aquatic Panda has attempted to discover third party endpoint detection and response (EDR) tools on compromised systems. | ['T1518.001'] |
Astaroth checks for the presence of Avast antivirus in the "C:\Program\Files\" folder. | ['T1518.001'] |
AuTo Stealer has the ability to collect information about installed AV products from an infected host. | ['T1518.001'] |
BLUELIGHT can collect a list of anti-virus products installed on a machine. | ['T1518.001'] |
Bazar can identify the installed antivirus engine. | ['T1518.001'] |
CHOPSTICK checks for antivirus and forensics software. | ['T1518.001'] |
Clop can search for processes with antivirus and antimalware product names. | ['T1518.001'] |
Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine. | ['T1518.001'] |
Comnie attempts to detect several anti-virus products. | ['T1518.001'] |
DarkWatchman can search for anti-virus products on the system. | ['T1518.001'] |
Darkhotel has searched for anti-malware strings and anti-virus processes running on the system. | ['T1518.001'] |
During Frankenstein, the threat actors used WMI queries to determine if analysis tools were running on a compromised system. | ['T1518.001'] |
During Operation Wocao, threat actors used scripts to detect security software. | ['T1518.001'] |
EVILNUM can search for anti-virus products on the system. | ['T1518.001'] |
Empire can enumerate antivirus software on the target. | ['T1518.001'] |
Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them. | ['T1518.001'] |
EvilBunny has been observed querying installed antivirus software. | ['T1518.001'] |
FELIXROOT checks for installed security software like antivirus and firewall. | ['T1518.001'] |
FIN8 has used Registry keys to detect and avoid executing in potential sandboxes. | ['T1518.001'] |
Felismus checks for processes associated with anti-virus vendors. | ['T1518.001'] |
FinFisher probes the system to check for antimalware processes. | ['T1518.001'] |
Flame identifies security software such as antivirus through the Security module. | ['T1518.001'] |
FlawedAmmyy will attempt to detect anti-virus products during the initial infection. | ['T1518.001'] |
Frankenstein has used WMI queries to detect if virtualization environments or analysis tools were running on the system. | ['T1518.001'] |
FunnyDream can identify the processes for Bkav antivirus. | ['T1518.001'] |
Gelsemium can check for the presence of specific security products. | ['T1518.001'] |
Gold Dragon checks for anti-malware products and processes. | ['T1518.001'] |
Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections. | ['T1518.001'] |
InvisiMole can check for the presence of network sniffers, AV, and BitDefender firewall. | ['T1518.001'] |
JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them. | ['T1518.001'] |
Kimsuky has checked for the presence of antivirus software with "powershell Get-CimInstance -Namespace root/securityCenter2 – classname antivirusproduct". | ['T1518.001'] |
LiteDuke has the ability to check for the presence of Kaspersky security software. | ['T1518.001'] |
LitePower can identify installed AV software. | ['T1518.001'] |
MarkiRAT can check for running processes on the victim’s machine to look for Kaspersky and Bitdefender antivirus products. | ['T1518.001'] |
Meteor has the ability to search for Kaspersky Antivirus on a victim's machine. | ['T1518.001'] |
More_eggs can obtain information on installed anti-malware programs. | ['T1518.001'] |
MuddyWater has used malware to check running processes against a hard-coded list of security tools often used by malware researchers. | ['T1518.001'] |
Naikon uses commands such as "netsh advfirewall firewall" to discover local firewall settings. | ['T1518.001'] |
Netwalker can detect and terminate active security software-related processes on infected systems. | ['T1518.001', 'T1562.001'] |
NotPetya determines if specific antivirus programs are running on an infected host machine. | ['T1518.001'] |
POWERSTATS has detected security tools. | ['T1518.001'] |
POWRUNER may collect information on the victim's anti-virus software. | ['T1518.001'] |
PUNCHBUGGY can gather AVs registered in the system. | ['T1518.001'] |
Patchwork scanned the “Program Files” directories for a directory with the string “Total Security” (the installation path of the “360 Total Security” antivirus tool). | ['T1518.001'] |
PipeMon can check for the presence of ESET and Kaspersky security software. | ['T1518.001'] |
QakBot can identify the installed antivirus product on a targeted system. | ['T1518.001'] |
RTM can obtain information about security software on the victim. | ['T1518.001'] |
Remsec has a plugin to detect active drivers of some security products. | ['T1518.001'] |
Rocke used scripts which detected and uninstalled antivirus software. | ['T1518.001', 'T1562.001'] |
SILENTTRINITY can determine if an anti-virus product is installed through the resolution of the service's virtual SID. | ['T1518.001'] |
SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution. | ['T1518.001'] |
SideCopy uses a loader DLL file to collect AV product names from an infected host. | ['T1518.001'] |
Sidewinder has used the Windows service "winmgmts:\\.\root\SecurityCenter2" to check installed antivirus products. | ['T1518.001'] |
Skidmap has the ability to check if "/usr/sbin/setenforce" exists. This file controls what mode SELinux is in. | ['T1518.001'] |
StoneDrill can check for antivirus and antimalware programs. | ['T1518.001'] |
T9000 performs checks for various antivirus and security products during installation. | ['T1518.001'] |
Tasklist can be used to enumerate security software currently running on a system by process name of known products. | ['T1518.001'] |
TeamTNT has searched for security products on infected machines. | ['T1518.001'] |
The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET. | ['T1518.001'] |
The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list, the dropper will exit. | ['T1518.001'] |
ThiefQuest uses the "kill_unwanted" function to get a list of running processes, compares each process with an encrypted list of “unwanted” security related programs, and kills the processes for security related programs. | ['T1518.001'] |
Tropic Trooper can search for anti-virus software running on the system. | ['T1518.001'] |
Turla has obtained information on security software, including security logging information that may indicate whether their malware has been detected. | ['T1518.001'] |
Valak can determine if a compromised host has security products installed. | ['T1518.001'] |
Waterbear can find the presence of a specific security software. | ['T1518.001'] |
WhisperGate can recognize the presence of monitoring tools on a target system. | ['T1518.001'] |
Windshift has used malware to identify installed AV and commonly used forensic and malware analysis tools. | ['T1518.001'] |
Wingbird checks for the presence of Bitdefender security software. | ['T1518.001'] |
Wizard Spider has used WMI to identify anti-virus products installed on a victim's machine. | ['T1518.001'] |
Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment. | ['T1518.001'] |
down_new has the ability to detect anti-virus products and processes on a compromised host. | ['T1518.001'] |
jRAT can list security software, such as by using WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details. | ['T1518.001'] |
netsh can be used to discover system firewall settings. | ['T1518.001'] |
xCaon has checked for the existence of Kaspersky antivirus software on the system. | ['T1518.001'] |
AADInternals can enumerate information about a variety of cloud services, such as Office 365 and Sharepoint instances or OpenID Configurations. | ['T1526'] |
APT28 has used several malicious applications to steal user OAuth access tokens including applications masquerading as "Google Defender" "Google Email Protection," and "Google Scanner" for Gmail users. They also targeted Yahoo users with applications masquerading as "Delivery Service" and "McAfee Email Protection". | ['T1528'] |
Peirates gathers Kubernetes service account tokens using a variety of techniques. | ['T1528'] |
APT37 has used malware that will issue the command "shutdown /r /t 1" to reboot a system after wiping its MBR. | ['T1529'] |
APT38 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR. | ['T1529'] |
DCSrv has a function to sleep for two hours before rebooting the system. | ['T1529'] |
DustySky can shutdown the infected machine. | ['T1529'] |
KillDisk attempts to reboot the machine by terminating specific processes. | ['T1529'] |
LockerGoga has been observed shutting down infected systems. | ['T1529'] |
LookBack can shutdown and reboot the victim machine. | ['T1529'] |
NotPetya will reboot the system one hour after infection. | ['T1529'] |
Peirates can dump the contents of AWS S3 buckets. It can also retrieve service account tokens from kOps buckets in Google Cloud Storage or S3. | ['T1530'] |
LAPSUS$ has removed a targeted organization's global admin accounts to lock the organization out of all access. | ['T1531'] |
LockerGoga has been observed changing account passwords and logging off current users. | ['T1531'] |
Meteor has the ability to change the password of local users on compromised hosts and can log off users. | ['T1531'] |
HEXANE has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access. | ['T1534'] |
Kimsuky has sent internal spearphishing emails for lateral movement after stealing victim information. | ['T1534'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.