value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
The attackers established persistence by executing malicious content triggered by Netsh Helper DLLs.
1
accept
T1546.007
Event Triggered Execution: Netsh Helper Dll
Threat group FIN13 has been observed to use netsh to install the downloader known as DRAWSTRING.
1
accept
T1546.007
Event Triggered Execution: Netsh Helper Dll
A previously unknown Chinese hacking group used netsh rules to attempt to bypass network restrictions on the victim machine.
1
accept
T1546.007
Event Triggered Execution: Netsh Helper Dll
APT1 uses two utilities GETMAIL and MAPIGET to steal email. GETMAIL extracts emails from archived Outlook .pst files.
1
accept
T1114.001
Email Collection: Local Email Collection
Carbanak searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server.
1
accept
T1114.001
Email Collection: Local Email Collection
Chimera has harvested data from victim's e-mail including through execution of wmic /node: process call create cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst" copy "i:\\\My Documents\.pst"copy.
1
accept
T1114.001
Email Collection: Local Email Collection
CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.
1
accept
T1114.001
Email Collection: Local Email Collection
Crimson contains a command to collect and exfiltrate emails from Outlook.
1
accept
T1114.001
Email Collection: Local Email Collection
Emotet has been observed leveraging a module that scrapes email data from Outlook.
1
accept
T1114.001
Email Collection: Local Email Collection
Empire has the ability to collect emails on a target system.
1
accept
T1114.001
Email Collection: Local Email Collection
KGH_SPY can harvest data from mail clients. ;; Magic Hound has collected .PST archives. ;; Out1 can parse e-mails on a target machine. ;; Pupy can interact with a victim’s Outlook session and look through folders and emails. ;; Smoke Loader searches through Outlook files and directories (e.g. inbox sent templates drafts archives etc.).";;The FBI and CISA have detected multiple zero-day exploits, with actors attempting to collect mailbox data in the form of .ost files from Microsoft Exchange servers. ;; Warzone features functionality precipitating the theft of browser and email clients. ;; The cmdlet New-MailboxExportRequest within Powershell is used to steal email boxes, and has been observed to be used by Chinese state sponsored actors.
1
accept
T1114.001
Email Collection: Local Email Collection
null
1
accept
T1546.005
Event Triggered Execution: Trap
Cobaltstrike often achieves persistence through executing malicious code through a system event triggered by the trap command.
1
accept
T1546.005
Event Triggered Execution: Trap
WMI runs commands on remote systems via malicious commands triggered through a system event such as the trap command.
1
accept
T1546.005
Event Triggered Execution: Trap
Helper .dll files can be utilized for persistence, often executed through the trap command.
1
accept
T1546.005
Event Triggered Execution: Trap
Remote access trojans (RATs), such as Neurevt maintain persistence on a machine with malicious payloads triggered via a system event such as the trap command.
1
accept
T1546.005
Event Triggered Execution: Trap
The trap command can be utilised to achieve remote code execution when an interrupt signal is received.
1
accept
T1546.005
Event Triggered Execution: Trap
null
1
accept
T1213.001
Data from Information Repositories: Confluence
APT41 often gather information from popular data sharing repositories such as Confluence.
1
accept
T1213.001
Data from Information Repositories: Confluence
"Lebanese Cedar '', an APT group, often creates campaigns where a large amount of data is stolen from Confluence.
1
accept
T1213.001
Data from Information Repositories: Confluence
Confluence and JIRA are popular targets for APT groups wishing to receive sensitive documents and share them publicly.
1
accept
T1213.001
Data from Information Repositories: Confluence
A popular reconnaissance technique that threat actors employ is to steal data from company data repositories, such as Confluence.
1
accept
T1213.001
Data from Information Repositories: Confluence
Given that companies often store development documentation on Confluence, it is often a target for APT27 to harvest data from.
1
accept
T1213.001
Data from Information Repositories: Confluence
APT28 has collected information from Microsoft SharePoint services within target networks.
1
accept
T1213.002
Data from Information Repositories: Sharepoint
Chimera has collected documents from the victim's SharePoint.
1
accept
T1213.002
Data from Information Repositories: Sharepoint
Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember.
1
accept
T1213.002
Data from Information Repositories: Sharepoint
spwebmember is used to enumerate and dump information from Microsoft SharePoint.
1
accept
T1213.002
Data from Information Repositories: Sharepoint
After achieving persistence on a network, threat actors will often move to harvesting data from popular data repositories such as SharePoint.
1
accept
T1213.002
Data from Information Repositories: Sharepoint
APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network.
1
accept
T1053.002
Scheduled Task/Job: At (Windows)
at can be used to schedule a task on a system.
1
accept
T1053.002
Scheduled Task/Job: At (Windows)
BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement.
1
accept
T1053.002
Scheduled Task/Job: At (Windows)
CrackMapExec can set a scheduled task on the target system to execute commands remotely using at.
1
accept
T1053.002
Scheduled Task/Job: At (Windows)
MURKYTOP has the capability to schedule remote AT jobs.
1
accept
T1053.002
Scheduled Task/Job: At (Windows)
Threat Group-3390 actors use at to schedule tasks to run self-extracting RAR archives which install HTTPBrowser or PlugX on other victims on a network.
1
accept
T1053.002
Scheduled Task/Job: At (Windows)
Lateral movement within infrastructure has been observed by CTU analysts, with attackers utilising at.exe for the movement.
1
accept
T1053.002
Scheduled Task/Job: At (Windows)
Scheduled tasks that run using at.exe could be an indicator of a depreciated program that needs to be updated or malicious activity. ;; The Bamital Trojan utilised at.exe for privilege escalation.
1
accept
T1053.002
Scheduled Task/Job: At (Windows)
null
1
accept
T1098.003
Account Manipulation: Add Office 365 Global Administrator Role
WastedLocker often achieves persistence through creating user accounts, or upgrading existing accounts to have Office 365 Administrator privileges.
1
accept
T1098.003
Account Manipulation: Add Office 365 Global Administrator Role
Phishing campaigns targeting business, tech, and telecom industries often use phishing emails to compromise an account before upgrading it to an Office 365 Administrator for further malicious activity.
1
accept
T1098.003
Account Manipulation: Add Office 365 Global Administrator Role
SODINOKIBI, a REvil ransomware as a service (RaaS), can compromise accounts and achieve persistence through malicious code executed via privileges achieved via an account being upgraded to an administrator of Office 365.
1
accept
T1098.003
Account Manipulation: Add Office 365 Global Administrator Role
APT41 employs a variety of persistence methods, one of which involved increasing a compromised account's privileges through the Office 365 Administrator role.
1
accept
T1098.003
Account Manipulation: Add Office 365 Global Administrator Role
In order to compromise more accounts, TEMP.Zagros employs malicious software which will increase the privileges of an already compromised account via increasing it's Office 365 account to an administrator one.
1
accept
T1098.003
Account Manipulation: Add Office 365 Global Administrator Role
Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers.
1
accept
T1542.002
Pre
Trickbot will often achieve persistence through compromising the firmware of a system.
1
accept
T1542.002
Pre
UEFI-related attacks increasingly involve the component firmware of critical systems being compromised.
1
accept
T1542.002
Pre
Attackers are increasingly targeting the firmware of component systems to achieve persistence as they often cannot verify their integrity as well as the main system components.
1
accept
T1542.002
Pre
APT34 can achieve persistence on machines via compromising component firmware, allowing them to execute low level commands before the BIOS loads.
1
accept
T1542.002
Pre
APT39 used secure shell (SSH) to move laterally among their targets.
1
accept
T1021.004
Remote Services: Ssh
Cobalt Strike can SSH to a remote service.
1
accept
T1021.004
Remote Services: Ssh
Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection.
1
accept
T1021.004
Remote Services: Ssh
Fox Kitten has used the PuTTY and Plink tools for lateral movement.
1
accept
T1021.004
Remote Services: Ssh
GCMAN uses Putty for lateral movement.
1
accept
T1021.004
Remote Services: Ssh
Kinsing has used SSH for lateral movement.
1
accept
T1021.004
Remote Services: Ssh
Leviathan used ssh for internal reconnaissance.
1
accept
T1021.004
Remote Services: Ssh
menuPass has used Putty Secure Copy Client (PSCP) to transfer data. ;; OilRig has used Putty to access compromised systems. ;; Rocke has spread its coinminer via SSH. ;; TEMP.Veles has relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.;;SSH fingerprint data shows that Sysrv-hello compromised 26 servers, utilising them as C2 servers. ;; APT24 has utilised SSH, in addition to a credential stealer such as MIMIKATZ to operate on victim hosts. ;; SSH client Bitvise was used to log into a VMWare ESXi with an open SSH connection.
1
accept
T1021.004
Remote Services: Ssh
Anchor can install itself as a cron job.
1
accept
T1053.003
Scheduled Task/Job: Cron
Exaramel for Linux uses crontab for persistence if it does not have root privileges.
1
accept
T1053.003
Scheduled Task/Job: Cron
Janicab used a cron job for persistence on Mac devices.
1
accept
T1053.003
Scheduled Task/Job: Cron
Kinsing has used crontab to download and run shell scripts every minute to ensure persistence.
1
accept
T1053.003
Scheduled Task/Job: Cron
NETWIRE can use crontabs to establish persistence.
1
accept
T1053.003
Scheduled Task/Job: Cron
Penquin can use Cron to create periodic and pre-scheduled background jobs.
1
accept
T1053.003
Scheduled Task/Job: Cron
Rocke installed a cron job that downloaded and executed files from the C2.
1
accept
T1053.003
Scheduled Task/Job: Cron
Skidmap has installed itself via crontab. ;; SpeakUp uses cron tasks to ensure persistence. ;; Xbash can create a cronjob for persistence if it determines it is on a Linux system.;;Muhstik, a threat actor group often abuses the cron utility, using crontab files within scripts such as IDM scripts to establish persistence. ;; Chinese state sponsored actors often utilise CLI tools, such as crontab to schedule malicious tasks that enumerate victim devices. ;; Moobot, a Mirai botnet variant, achieves persistence through crontab and connections to malicious domains for communication and malware downloads.
1
accept
T1053.003
Scheduled Task/Job: Cron
WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.
1
accept
T1563.002
Remote Service Session Hijacking: Rdp Hijacking
REvil will hijack Remote Desktop Services (RDS) for lateral movement.
1
accept
T1563.002
Remote Service Session Hijacking: Rdp Hijacking
CIS based ransomware, such as Fonix will often try to infect as many machines that are accessed via lateral movement instagated from the hijacking of a Remote Desktop Protocol (RDP).
1
accept
T1563.002
Remote Service Session Hijacking: Rdp Hijacking
Companies should ensure that Remote Desktop Services are secure, as they are commonly hijacked my ransomware such as CryptConsole for movements and victim enumeration.
1
accept
T1563.002
Remote Service Session Hijacking: Rdp Hijacking
Blocking RDP access from the internet is a recommended security policy to prevent them from being abused by Phobos, a ransomware that can hijack RDP sessions.
1
accept
T1563.002
Remote Service Session Hijacking: Rdp Hijacking
null
1
accept
T1563.001
Remote Service Session Hijacking: Ssh Hijacking
From old ransomware such as Cryakl to new ones like XMRLocker, lateral movement via SSH hijacking is a popular TTP.
1
accept
T1563.001
Remote Service Session Hijacking: Ssh Hijacking
Ransomware will utilise SSH vulnerabilities to move laterally within a system.
1
accept
T1563.001
Remote Service Session Hijacking: Ssh Hijacking
Password policies should be implemented and enforced for SSH usage to prevent hijacking of weak/standard passwords by malicious actors.
1
accept
T1563.001
Remote Service Session Hijacking: Ssh Hijacking
Linux/Mac OS administrators should be wary of unprotected SSH communications within the network as these remote connections are a favourite way of maintaining persistence by threat actors.
1
accept
T1563.001
Remote Service Session Hijacking: Ssh Hijacking
SSH certificates should always be validated as forged credentials will allow actors to move laterally within the network.
1
accept
T1563.001
Remote Service Session Hijacking: Ssh Hijacking
null
1
accept
T1053.004
Scheduled Task/Job: Launchd
Malware that installs .msi files often abuse the root privileges of launchd daemons to repeatedly execute malicious activity.
1
accept
T1053.004
Scheduled Task/Job: Launchd
Launchd can change the permissions of files, escalating the privileges of malware.
1
accept
T1053.004
Scheduled Task/Job: Launchd
Copying malicious files from the installer location to /Library/LaunchDaemons/folder will escalate the copied privileges.
1
accept
T1053.004
Scheduled Task/Job: Launchd
BeagleBoyz, North Korean Actors, will often obfuscate their malware whilst simultaneously escalating it's privilege through running the malware under launchd's privileged context.
1
accept
T1053.004
Scheduled Task/Job: Launchd
Reconnaissance and background checks can be routinely automated through scheduling a launchd task.
1
accept
T1053.004
Scheduled Task/Job: Launchd
null
1
accept
T1053.001
Scheduled Task/Job: At (Linux)
Cryptocurrency miners abuse the at command on Linux to schedule recurring mining on victim machines.
1
accept
T1053.001
Scheduled Task/Job: At (Linux)
Communication with a CnC server can be automated via the at command on Linux OS.
1
accept
T1053.001
Scheduled Task/Job: At (Linux)
Golden Chickens Malware-as-a-Service (MaaS) will utilize to schedule malicious tasks.
1
accept
T1053.001
Scheduled Task/Job: At (Linux)
Malware will exfiltrate stolen data at regular intervals on Linux servers through abusing the at command functionality
1
accept
T1053.001
Scheduled Task/Job: At (Linux)
Ransomware will often schedule the encryption of victim data via the at command.
1
accept
T1053.001
Scheduled Task/Job: At (Linux)
Anchor can support windows execution via SMB shares.
1
accept
T1021.002
Remote Services: Smb/Windows Admin Shares
APT3 will copy files over to Windows Admin Shares (like ADMIN$) as part of lateral movement.
1
accept
T1021.002
Remote Services: Smb/Windows Admin Shares
APT32 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution.
1
accept
T1021.002
Remote Services: Smb/Windows Admin Shares
APT39 has used SMB for lateral movement.
1
accept
T1021.002
Remote Services: Smb/Windows Admin Shares
APT41 has transferred implant files using Windows Admin Shares.
1
accept
T1021.002
Remote Services: Smb/Windows Admin Shares
BlackEnergy has run a plug-in on a victim to spread through the local network by using PsExec and accessing admin shares.
1
accept
T1021.002
Remote Services: Smb/Windows Admin Shares
Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB.
1
accept
T1021.002
Remote Services: Smb/Windows Admin Shares
Chimera has used Windows admin shares to move laterally. ;; Cobalt Strike can use Window admin shares (C$ and ADMIN$) for lateral movement. ;; Conti can spread via SMB and encrypts files on different hosts potentially compromising an entire network. ;; Deep Panda uses net.exe to connect to network shares using net use commands with compromised credentials. ;; Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. ;; Emotet leverages the Admin$ share for lateral movement once the local admin password has been brute forced. ;; FIN8 has attempted to map to C$ on enumerated hosts to test the scope of their current credentials/context. ;; Fox Kitten has used valid accounts to access SMB shares. ;; Ke3chang actors have been known to copy files to the network shares of other computers to move laterally. ;; Kwampirs copies itself over network shares to move laterally on a victim network. ;; Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement. ;; Lucifer can infect victims by brute forcing SMB. ;; Lateral movement can be done with Net through net use commands to connect to the on remote systems. ;; Net Crawler uses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement. ;; NotPetya can use PsExec which interacts with the ADMIN$ network share to execute commands on remote systems. ;; Olympic Destroyer uses PsExec to interact with the ADMIN$ network share to execute commands on remote systems. ;; Operation Wocao has used Impacket's smbexec.py as well as accessing the C$ and IPC$ shares to move laterally. ;; Orangeworm has copied its backdoor across open network shares including ADMIN$ C$WINDOWS D$WINDOWS and E$WINDOWS. ;; PsExec a tool that has been used by adversaries writes programs to the ADMIN$ network share to execute commands on remote systems. ;; The Regin malware platform can use Windows admin shares to move laterally. ;; Ryuk has used the C$ network share for lateral movement. ;; Shamoon accesses network share(s) enables share access to the target device copies an executable payload to the target system and uses a Scheduled Task/Job to execute the malware. ;; Threat Group-1314 actors mapped network drives using net use. ;; Turla used net use commands to connect to lateral systems within a network. ;; Wizard Spider has used SMB to drop Cobalt Strike Beacon on a domain controller for lateral movement. ;; zwShell has been copied over network shares to move laterally.;;BlackMatter ransomware, with stolen credentials, often uses SMB to access the active directory (AD) and perform host discovery. ;; Attackers often use CobaltStrike functionality, specifically named pipes, in combination with SMB for lateral movement within networks. ;; Net, a utility program in windows systems, is often used by APT groups synchronously with SMB to perform a variety of tasks on host machines such as discovery, lateral movement and system/network information gathering.
1
accept
T1021.002
Remote Services: Smb/Windows Admin Shares
Carberp can start a remote VNC session by downloading a new plugin.
1
accept
T1021.005
Remote Services: Vnc
Fox Kitten has installed TightVNC server and client on compromised servers and endpoints for lateral movement.
1
accept
T1021.005
Remote Services: Vnc
GCMAN uses VNC for lateral movement.
1
accept
T1021.005
Remote Services: Vnc
Proton uses VNC to connect into systems.
1
accept
T1021.005
Remote Services: Vnc
ZxShell supports functionality for VNC sessions.
1
accept
T1021.005
Remote Services: Vnc
Ramnit banking trojan and botnet uses VNC to access victim machines, typically deploying the technique in later stages of the kill chain on command via the attacker C&C server.
1
accept
T1021.005
Remote Services: Vnc