value
stringlengths 25
18k
⌀ | subtecnique
int64 0
1
| answer
stringclasses 2
values | id
stringlengths 5
9
| name
stringlengths 3
102
|
---|---|---|---|---|
The attackers established persistence by executing malicious content triggered by Netsh Helper DLLs. | 1 | accept | T1546.007 | Event Triggered Execution: Netsh Helper Dll |
Threat group FIN13 has been observed to use netsh to install the downloader known as DRAWSTRING. | 1 | accept | T1546.007 | Event Triggered Execution: Netsh Helper Dll |
A previously unknown Chinese hacking group used netsh rules to attempt to bypass network restrictions on the victim machine. | 1 | accept | T1546.007 | Event Triggered Execution: Netsh Helper Dll |
APT1 uses two utilities GETMAIL and MAPIGET to steal email. GETMAIL extracts emails from archived Outlook .pst files. | 1 | accept | T1114.001 | Email Collection: Local Email Collection |
Carbanak searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server. | 1 | accept | T1114.001 | Email Collection: Local Email Collection |
Chimera has harvested data from victim's e-mail including through execution of wmic /node: process call create cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst" copy "i:\\\My Documents\.pst"copy. | 1 | accept | T1114.001 | Email Collection: Local Email Collection |
CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration. | 1 | accept | T1114.001 | Email Collection: Local Email Collection |
Crimson contains a command to collect and exfiltrate emails from Outlook. | 1 | accept | T1114.001 | Email Collection: Local Email Collection |
Emotet has been observed leveraging a module that scrapes email data from Outlook. | 1 | accept | T1114.001 | Email Collection: Local Email Collection |
Empire has the ability to collect emails on a target system. | 1 | accept | T1114.001 | Email Collection: Local Email Collection |
KGH_SPY can harvest data from mail clients. ;; Magic Hound has collected .PST archives. ;; Out1 can parse e-mails on a target machine. ;; Pupy can interact with a victim’s Outlook session and look through folders and emails. ;; Smoke Loader searches through Outlook files and directories (e.g. inbox sent templates drafts archives etc.).";;The FBI and CISA have detected multiple zero-day exploits, with actors attempting to collect mailbox data in the form of .ost files from Microsoft Exchange servers. ;; Warzone features functionality precipitating the theft of browser and email clients. ;; The cmdlet New-MailboxExportRequest within Powershell is used to steal email boxes, and has been observed to be used by Chinese state sponsored actors. | 1 | accept | T1114.001 | Email Collection: Local Email Collection |
null | 1 | accept | T1546.005 | Event Triggered Execution: Trap |
Cobaltstrike often achieves persistence through executing malicious code through a system event triggered by the trap command. | 1 | accept | T1546.005 | Event Triggered Execution: Trap |
WMI runs commands on remote systems via malicious commands triggered through a system event such as the trap command. | 1 | accept | T1546.005 | Event Triggered Execution: Trap |
Helper .dll files can be utilized for persistence, often executed through the trap command. | 1 | accept | T1546.005 | Event Triggered Execution: Trap |
Remote access trojans (RATs), such as Neurevt maintain persistence on a machine with malicious payloads triggered via a system event such as the trap command. | 1 | accept | T1546.005 | Event Triggered Execution: Trap |
The trap command can be utilised to achieve remote code execution when an interrupt signal is received. | 1 | accept | T1546.005 | Event Triggered Execution: Trap |
null | 1 | accept | T1213.001 | Data from Information Repositories: Confluence |
APT41 often gather information from popular data sharing repositories such as Confluence. | 1 | accept | T1213.001 | Data from Information Repositories: Confluence |
"Lebanese Cedar '', an APT group, often creates campaigns where a large amount of data is stolen from Confluence. | 1 | accept | T1213.001 | Data from Information Repositories: Confluence |
Confluence and JIRA are popular targets for APT groups wishing to receive sensitive documents and share them publicly. | 1 | accept | T1213.001 | Data from Information Repositories: Confluence |
A popular reconnaissance technique that threat actors employ is to steal data from company data repositories, such as Confluence. | 1 | accept | T1213.001 | Data from Information Repositories: Confluence |
Given that companies often store development documentation on Confluence, it is often a target for APT27 to harvest data from. | 1 | accept | T1213.001 | Data from Information Repositories: Confluence |
APT28 has collected information from Microsoft SharePoint services within target networks. | 1 | accept | T1213.002 | Data from Information Repositories: Sharepoint |
Chimera has collected documents from the victim's SharePoint. | 1 | accept | T1213.002 | Data from Information Repositories: Sharepoint |
Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember. | 1 | accept | T1213.002 | Data from Information Repositories: Sharepoint |
spwebmember is used to enumerate and dump information from Microsoft SharePoint. | 1 | accept | T1213.002 | Data from Information Repositories: Sharepoint |
After achieving persistence on a network, threat actors will often move to harvesting data from popular data repositories such as SharePoint. | 1 | accept | T1213.002 | Data from Information Repositories: Sharepoint |
APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. | 1 | accept | T1053.002 | Scheduled Task/Job: At (Windows) |
at can be used to schedule a task on a system. | 1 | accept | T1053.002 | Scheduled Task/Job: At (Windows) |
BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement. | 1 | accept | T1053.002 | Scheduled Task/Job: At (Windows) |
CrackMapExec can set a scheduled task on the target system to execute commands remotely using at. | 1 | accept | T1053.002 | Scheduled Task/Job: At (Windows) |
MURKYTOP has the capability to schedule remote AT jobs. | 1 | accept | T1053.002 | Scheduled Task/Job: At (Windows) |
Threat Group-3390 actors use at to schedule tasks to run self-extracting RAR archives which install HTTPBrowser or PlugX on other victims on a network. | 1 | accept | T1053.002 | Scheduled Task/Job: At (Windows) |
Lateral movement within infrastructure has been observed by CTU analysts, with attackers utilising at.exe for the movement. | 1 | accept | T1053.002 | Scheduled Task/Job: At (Windows) |
Scheduled tasks that run using at.exe could be an indicator of a depreciated program that needs to be updated or malicious activity. ;; The Bamital Trojan utilised at.exe for privilege escalation. | 1 | accept | T1053.002 | Scheduled Task/Job: At (Windows) |
null | 1 | accept | T1098.003 | Account Manipulation: Add Office 365 Global Administrator Role |
WastedLocker often achieves persistence through creating user accounts, or upgrading existing accounts to have Office 365 Administrator privileges. | 1 | accept | T1098.003 | Account Manipulation: Add Office 365 Global Administrator Role |
Phishing campaigns targeting business, tech, and telecom industries often use phishing emails to compromise an account before upgrading it to an Office 365 Administrator for further malicious activity. | 1 | accept | T1098.003 | Account Manipulation: Add Office 365 Global Administrator Role |
SODINOKIBI, a REvil ransomware as a service (RaaS), can compromise accounts and achieve persistence through malicious code executed via privileges achieved via an account being upgraded to an administrator of Office 365. | 1 | accept | T1098.003 | Account Manipulation: Add Office 365 Global Administrator Role |
APT41 employs a variety of persistence methods, one of which involved increasing a compromised account's privileges through the Office 365 Administrator role. | 1 | accept | T1098.003 | Account Manipulation: Add Office 365 Global Administrator Role |
In order to compromise more accounts, TEMP.Zagros employs malicious software which will increase the privileges of an already compromised account via increasing it's Office 365 account to an administrator one. | 1 | accept | T1098.003 | Account Manipulation: Add Office 365 Global Administrator Role |
Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers. | 1 | accept | T1542.002 | Pre |
Trickbot will often achieve persistence through compromising the firmware of a system. | 1 | accept | T1542.002 | Pre |
UEFI-related attacks increasingly involve the component firmware of critical systems being compromised. | 1 | accept | T1542.002 | Pre |
Attackers are increasingly targeting the firmware of component systems to achieve persistence as they often cannot verify their integrity as well as the main system components. | 1 | accept | T1542.002 | Pre |
APT34 can achieve persistence on machines via compromising component firmware, allowing them to execute low level commands before the BIOS loads. | 1 | accept | T1542.002 | Pre |
APT39 used secure shell (SSH) to move laterally among their targets. | 1 | accept | T1021.004 | Remote Services: Ssh |
Cobalt Strike can SSH to a remote service. | 1 | accept | T1021.004 | Remote Services: Ssh |
Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection. | 1 | accept | T1021.004 | Remote Services: Ssh |
Fox Kitten has used the PuTTY and Plink tools for lateral movement. | 1 | accept | T1021.004 | Remote Services: Ssh |
GCMAN uses Putty for lateral movement. | 1 | accept | T1021.004 | Remote Services: Ssh |
Kinsing has used SSH for lateral movement. | 1 | accept | T1021.004 | Remote Services: Ssh |
Leviathan used ssh for internal reconnaissance. | 1 | accept | T1021.004 | Remote Services: Ssh |
menuPass has used Putty Secure Copy Client (PSCP) to transfer data. ;; OilRig has used Putty to access compromised systems. ;; Rocke has spread its coinminer via SSH. ;; TEMP.Veles has relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.;;SSH fingerprint data shows that Sysrv-hello compromised 26 servers, utilising them as C2 servers. ;; APT24 has utilised SSH, in addition to a credential stealer such as MIMIKATZ to operate on victim hosts. ;; SSH client Bitvise was used to log into a VMWare ESXi with an open SSH connection. | 1 | accept | T1021.004 | Remote Services: Ssh |
Anchor can install itself as a cron job. | 1 | accept | T1053.003 | Scheduled Task/Job: Cron |
Exaramel for Linux uses crontab for persistence if it does not have root privileges. | 1 | accept | T1053.003 | Scheduled Task/Job: Cron |
Janicab used a cron job for persistence on Mac devices. | 1 | accept | T1053.003 | Scheduled Task/Job: Cron |
Kinsing has used crontab to download and run shell scripts every minute to ensure persistence. | 1 | accept | T1053.003 | Scheduled Task/Job: Cron |
NETWIRE can use crontabs to establish persistence. | 1 | accept | T1053.003 | Scheduled Task/Job: Cron |
Penquin can use Cron to create periodic and pre-scheduled background jobs. | 1 | accept | T1053.003 | Scheduled Task/Job: Cron |
Rocke installed a cron job that downloaded and executed files from the C2. | 1 | accept | T1053.003 | Scheduled Task/Job: Cron |
Skidmap has installed itself via crontab. ;; SpeakUp uses cron tasks to ensure persistence. ;; Xbash can create a cronjob for persistence if it determines it is on a Linux system.;;Muhstik, a threat actor group often abuses the cron utility, using crontab files within scripts such as IDM scripts to establish persistence. ;; Chinese state sponsored actors often utilise CLI tools, such as crontab to schedule malicious tasks that enumerate victim devices. ;; Moobot, a Mirai botnet variant, achieves persistence through crontab and connections to malicious domains for communication and malware downloads. | 1 | accept | T1053.003 | Scheduled Task/Job: Cron |
WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session. | 1 | accept | T1563.002 | Remote Service Session Hijacking: Rdp Hijacking |
REvil will hijack Remote Desktop Services (RDS) for lateral movement. | 1 | accept | T1563.002 | Remote Service Session Hijacking: Rdp Hijacking |
CIS based ransomware, such as Fonix will often try to infect as many machines that are accessed via lateral movement instagated from the hijacking of a Remote Desktop Protocol (RDP). | 1 | accept | T1563.002 | Remote Service Session Hijacking: Rdp Hijacking |
Companies should ensure that Remote Desktop Services are secure, as they are commonly hijacked my ransomware such as CryptConsole for movements and victim enumeration. | 1 | accept | T1563.002 | Remote Service Session Hijacking: Rdp Hijacking |
Blocking RDP access from the internet is a recommended security policy to prevent them from being abused by Phobos, a ransomware that can hijack RDP sessions. | 1 | accept | T1563.002 | Remote Service Session Hijacking: Rdp Hijacking |
null | 1 | accept | T1563.001 | Remote Service Session Hijacking: Ssh Hijacking |
From old ransomware such as Cryakl to new ones like XMRLocker, lateral movement via SSH hijacking is a popular TTP. | 1 | accept | T1563.001 | Remote Service Session Hijacking: Ssh Hijacking |
Ransomware will utilise SSH vulnerabilities to move laterally within a system. | 1 | accept | T1563.001 | Remote Service Session Hijacking: Ssh Hijacking |
Password policies should be implemented and enforced for SSH usage to prevent hijacking of weak/standard passwords by malicious actors. | 1 | accept | T1563.001 | Remote Service Session Hijacking: Ssh Hijacking |
Linux/Mac OS administrators should be wary of unprotected SSH communications within the network as these remote connections are a favourite way of maintaining persistence by threat actors. | 1 | accept | T1563.001 | Remote Service Session Hijacking: Ssh Hijacking |
SSH certificates should always be validated as forged credentials will allow actors to move laterally within the network. | 1 | accept | T1563.001 | Remote Service Session Hijacking: Ssh Hijacking |
null | 1 | accept | T1053.004 | Scheduled Task/Job: Launchd |
Malware that installs .msi files often abuse the root privileges of launchd daemons to repeatedly execute malicious activity. | 1 | accept | T1053.004 | Scheduled Task/Job: Launchd |
Launchd can change the permissions of files, escalating the privileges of malware. | 1 | accept | T1053.004 | Scheduled Task/Job: Launchd |
Copying malicious files from the installer location to /Library/LaunchDaemons/folder will escalate the copied privileges. | 1 | accept | T1053.004 | Scheduled Task/Job: Launchd |
BeagleBoyz, North Korean Actors, will often obfuscate their malware whilst simultaneously escalating it's privilege through running the malware under launchd's privileged context. | 1 | accept | T1053.004 | Scheduled Task/Job: Launchd |
Reconnaissance and background checks can be routinely automated through scheduling a launchd task. | 1 | accept | T1053.004 | Scheduled Task/Job: Launchd |
null | 1 | accept | T1053.001 | Scheduled Task/Job: At (Linux) |
Cryptocurrency miners abuse the at command on Linux to schedule recurring mining on victim machines. | 1 | accept | T1053.001 | Scheduled Task/Job: At (Linux) |
Communication with a CnC server can be automated via the at command on Linux OS. | 1 | accept | T1053.001 | Scheduled Task/Job: At (Linux) |
Golden Chickens Malware-as-a-Service (MaaS) will utilize to schedule malicious tasks. | 1 | accept | T1053.001 | Scheduled Task/Job: At (Linux) |
Malware will exfiltrate stolen data at regular intervals on Linux servers through abusing the at command functionality | 1 | accept | T1053.001 | Scheduled Task/Job: At (Linux) |
Ransomware will often schedule the encryption of victim data via the at command. | 1 | accept | T1053.001 | Scheduled Task/Job: At (Linux) |
Anchor can support windows execution via SMB shares. | 1 | accept | T1021.002 | Remote Services: Smb/Windows Admin Shares |
APT3 will copy files over to Windows Admin Shares (like ADMIN$) as part of lateral movement. | 1 | accept | T1021.002 | Remote Services: Smb/Windows Admin Shares |
APT32 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution. | 1 | accept | T1021.002 | Remote Services: Smb/Windows Admin Shares |
APT39 has used SMB for lateral movement. | 1 | accept | T1021.002 | Remote Services: Smb/Windows Admin Shares |
APT41 has transferred implant files using Windows Admin Shares. | 1 | accept | T1021.002 | Remote Services: Smb/Windows Admin Shares |
BlackEnergy has run a plug-in on a victim to spread through the local network by using PsExec and accessing admin shares. | 1 | accept | T1021.002 | Remote Services: Smb/Windows Admin Shares |
Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB. | 1 | accept | T1021.002 | Remote Services: Smb/Windows Admin Shares |
Chimera has used Windows admin shares to move laterally. ;; Cobalt Strike can use Window admin shares (C$ and ADMIN$) for lateral movement. ;; Conti can spread via SMB and encrypts files on different hosts potentially compromising an entire network. ;; Deep Panda uses net.exe to connect to network shares using net use commands with compromised credentials. ;; Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. ;; Emotet leverages the Admin$ share for lateral movement once the local admin password has been brute forced. ;; FIN8 has attempted to map to C$ on enumerated hosts to test the scope of their current credentials/context. ;; Fox Kitten has used valid accounts to access SMB shares. ;; Ke3chang actors have been known to copy files to the network shares of other computers to move laterally. ;; Kwampirs copies itself over network shares to move laterally on a victim network. ;; Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement. ;; Lucifer can infect victims by brute forcing SMB. ;; Lateral movement can be done with Net through net use commands to connect to the on remote systems. ;; Net Crawler uses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement. ;; NotPetya can use PsExec which interacts with the ADMIN$ network share to execute commands on remote systems. ;; Olympic Destroyer uses PsExec to interact with the ADMIN$ network share to execute commands on remote systems. ;; Operation Wocao has used Impacket's smbexec.py as well as accessing the C$ and IPC$ shares to move laterally. ;; Orangeworm has copied its backdoor across open network shares including ADMIN$ C$WINDOWS D$WINDOWS and E$WINDOWS. ;; PsExec a tool that has been used by adversaries writes programs to the ADMIN$ network share to execute commands on remote systems. ;; The Regin malware platform can use Windows admin shares to move laterally. ;; Ryuk has used the C$ network share for lateral movement. ;; Shamoon accesses network share(s) enables share access to the target device copies an executable payload to the target system and uses a Scheduled Task/Job to execute the malware. ;; Threat Group-1314 actors mapped network drives using net use. ;; Turla used net use commands to connect to lateral systems within a network. ;; Wizard Spider has used SMB to drop Cobalt Strike Beacon on a domain controller for lateral movement. ;; zwShell has been copied over network shares to move laterally.;;BlackMatter ransomware, with stolen credentials, often uses SMB to access the active directory (AD) and perform host discovery. ;; Attackers often use CobaltStrike functionality, specifically named pipes, in combination with SMB for lateral movement within networks. ;; Net, a utility program in windows systems, is often used by APT groups synchronously with SMB to perform a variety of tasks on host machines such as discovery, lateral movement and system/network information gathering. | 1 | accept | T1021.002 | Remote Services: Smb/Windows Admin Shares |
Carberp can start a remote VNC session by downloading a new plugin. | 1 | accept | T1021.005 | Remote Services: Vnc |
Fox Kitten has installed TightVNC server and client on compromised servers and endpoints for lateral movement. | 1 | accept | T1021.005 | Remote Services: Vnc |
GCMAN uses VNC for lateral movement. | 1 | accept | T1021.005 | Remote Services: Vnc |
Proton uses VNC to connect into systems. | 1 | accept | T1021.005 | Remote Services: Vnc |
ZxShell supports functionality for VNC sessions. | 1 | accept | T1021.005 | Remote Services: Vnc |
Ramnit banking trojan and botnet uses VNC to access victim machines, typically deploying the technique in later stages of the kill chain on command via the attacker C&C server. | 1 | accept | T1021.005 | Remote Services: Vnc |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.