text
stringlengths 23
517
| label
stringclasses 31
values |
|---|---|
WellMess can use junk data in the Base64 string for additional obfuscation.
|
['TA0011:Command and Control']
|
WellMess can execute PowerShell scripts received from C2.
|
['TA0002:Execution']
|
WellMess has used Base64 encoding to uniquely identify communication to and from the C2.
|
['TA0011:Command and Control']
|
WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key.
|
['TA0011:Command and Control']
|
WellMess can identify the computer name of a compromised host.
|
['TA0007:Discovery']
|
WellMess can identify the IP address and user domain on the target machine.
|
['TA0007:Discovery']
|
WellMess can collect the username on the victim machine to send to C2.
|
['TA0007:Discovery']
|
WellMess can use HTTP and HTTPS in C2 communications.
|
['TA0011:Command and Control']
|
WellMess can execute command line scripts received from C2.
|
['TA0002:Execution']
|
Wevtutil can be used to clear system and security event logs from the system.
|
['TA0005:Defense Evasion']
|
Wevtutil can be used to export events from a specific log.
|
['TA0009:Collection']
|
Wevtutil can be used to disable specific event logs on the system.
|
['TA0005:Defense Evasion']
|
WhisperGate overwrites the MBR with a bootloader component that performs destructive wiping operations on hard drives and displays a fake ransom note when the host boots.
|
['TA0005:Defense Evasion', 'TA0003:Persistence']
|
The WhisperGate third stage can use the AdvancedRun.exe tool to execute commands in the context of the Windows TrustedInstaller group via `%TEMP%\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run`.
|
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
|
WhisperGate can corrupt files by overwriting the first 1 MB with `0xcc` and appending random extensions.
|
['TA0040:Impact']
|
WhisperGate can deobfuscate downloaded files stored in reverse byte order and decrypt embedded resources using multiple XOR operations.
|
['TA0005:Defense Evasion']
|
WhisperGate can download and execute AdvancedRun.exe to disable the Windows Defender Theat Protection service and set an exclusion path for the C:\ drive.
|
['TA0005:Defense Evasion']
|
WhisperGate can overwrite sectors of a victim host's hard drive at periodic offsets.
|
['TA0040:Impact']
|
WhisperGate can overwrite the Master Book Record on victim systems with a malicious 16-bit bootloader.
|
['TA0040:Impact']
|
WhisperGate can Base64 encode strings, store downloaded files in reverse byte order, and use the Eazfuscator tool to obfuscate its third stage.
|
['TA0005:Defense Evasion']
|
WhisperGate can delete tools from a compromised host after execution.
|
['TA0005:Defense Evasion']
|
WhisperGate can locate files based on hardcoded file extensions.
|
['TA0007:Discovery']
|
WhisperGate can download additional stages of malware from a Discord CDN channel.
|
['TA0011:Command and Control']
|
WhisperGate has used `InstallUtil.exe` as part of its process to disable Windows Defender.
|
['TA0005:Defense Evasion']
|
WhisperGate has been disguised as a JPG extension to avoid detection as a malicious PE file.
|
['TA0005:Defense Evasion']
|
WhisperGate has used the `ExitWindowsEx` to flush file buffers to disk and stop running processes and other API calls.
|
['TA0002:Execution']
|
WhisperGate can enumerate connected remote logical drives.
|
['TA0007:Discovery']
|
WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.
|
['TA0002:Execution']
|
WhisperGate has the ability to inject its fourth stage into a suspended process created by the legitimate Windows utility `InstallUtil.exe`.
|
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
|
WhisperGate's downloader can reverse its third stage file bytes and reflectively load the file as a .NET assembly.
|
['TA0005:Defense Evasion']
|
WhisperGate can recognize the presence of monitoring tools on a target system.
|
['TA0007:Discovery']
|
WhisperGate can download and execute AdvancedRun.exe via `sc.exe`.
|
['TA0002:Execution']
|
WhisperGate can stop its execution when it recognizes the presence of certain monitoring tools.
|
['TA0005:Defense Evasion', 'TA0007:Discovery']
|
WhisperGate has the ability to enumerate fixed logical drives on a targeted system.
|
['TA0007:Discovery']
|
WhisperGate can shutdown a compromised host through execution of `ExitWindowsEx` with the `EXW_SHUTDOWN` flag.
|
['TA0040:Impact']
|
WhisperGate can pause for 20 seconds to bypass antivirus solutions.
|
['TA0005:Defense Evasion', 'TA0007:Discovery']
|
WhisperGate can use a Visual Basic script to exclude the `C:\` drive from Windows Defender.
|
['TA0002:Execution']
|
WhisperGate can make an HTTPS connection to download additional files.
|
['TA0011:Command and Control']
|
WhisperGate can download additional payloads hosted on a Discord channel.
|
['TA0011:Command and Control']
|
WhisperGate can use `cmd.exe` to execute commands.
|
['TA0002:Execution']
|
Wiarp creates a backdoor through which remote attackers can download files.
|
['TA0011:Command and Control']
|
Wiarp creates a backdoor through which remote attackers can inject files into running processes.
|
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
|
Wiarp creates a backdoor through which remote attackers can open a command line interface.
|
['TA0002:Execution']
|
Wiarp creates a backdoor through which remote attackers can create a service.
|
['TA0003:Persistence', 'TA0004:Privilege Escalation']
|
WinMM is usually configured with primary and backup domains for C2 communications.
|
['TA0011:Command and Control']
|
WinMM sets a WH_CBT Windows hook to search for and capture files on the victim.
|
['TA0007:Discovery']
|
WinMM sets a WH_CBT Windows hook to collect information on process creation.
|
['TA0007:Discovery']
|
WinMM collects the system name, OS version including service pack, and system install date and sends the information to the C2 server.
|
['TA0007:Discovery']
|
WinMM uses NetUser-GetInfo to identify that it is running under an “Admin” account on the local system.
|
['TA0007:Discovery']
|
WinMM uses HTTP for C2.
|
['TA0011:Command and Control']
|
WindTail has the ability to use the macOS built-in zip utility to archive files.
|
['TA0009:Collection']
|
WindTail can identify and add files that possess specific file extensions to an array for archiving.
|
['TA0009:Collection']
|
WindTail has the ability to decrypt strings using hard-coded AES keys.
|
['TA0005:Defense Evasion']
|
WindTail can be delivered as a compressed, encrypted, and encoded payload.
|
['TA0005:Defense Evasion']
|
WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.
|
['TA0010:Exfiltration']
|
WindTail has the ability to receive and execute a self-delete command.
|
['TA0005:Defense Evasion']
|
WindTail has the ability to enumerate the users home directory and the path to its own application bundle.
|
['TA0007:Discovery']
|
WindTail can instruct the OS to execute an application without a dock icon or menu.
|
['TA0005:Defense Evasion']
|
WindTail has been incompletely signed with revoked certificates.
|
['TA0005:Defense Evasion']
|
WindTail has used icons mimicking MS Office files to mask payloads.
|
['TA0005:Defense Evasion']
|
WindTail can invoke Apple APIs <code>contentsOfDirectoryAtPath</code>, <code>pathExtension</code>, and <code>compare</code>.
|
['TA0002:Execution']
|
WindTail has the ability to generate the current date and time.
|
['TA0007:Discovery']
|
WindTail can use the <code>open</code> command to execute an application.
|
['TA0002:Execution']
|
WindTail has the ability to use HTTP for C2 communications.
|
['TA0011:Command and Control']
|
Windows Credential Editor can dump credentials.
|
['TA0006:Credential Access']
|
Winexe installs a service on the remote system, executes the command, then uninstalls the service.
|
['TA0002:Execution']
|
Wingbird side loads a malicious file, sspisrv.dll, in part of a spoofed lssas.exe service.
|
['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
|
Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges.
|
['TA0004:Privilege Escalation']
|
Wingbird deletes its payload along with the payload's parent process after it finishes copying files.
|
['TA0005:Defense Evasion']
|
Wingbird drops a malicious file alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes.
|
['TA0003:Persistence', 'TA0004:Privilege Escalation']
|
Wingbird performs multiple process injections to hijack system processes and execute malicious code.
|
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
|
Wingbird checks for the presence of Bitdefender security software.
|
['TA0007:Discovery']
|
Wingbird uses services.exe to register a new autostart service named "Audit Service" using a copy of the local lsass.exe file.
|
['TA0002:Execution']
|
Wingbird checks the victim OS version after executing to determine where to drop files based on whether the victim is 32-bit or 64-bit.
|
['TA0007:Discovery']
|
Wingbird uses services.exe to register a new autostart service named "Audit Service" using a copy of the local lsass.exe file.
|
['TA0003:Persistence', 'TA0004:Privilege Escalation']
|
Winnti for Linux has decoded XOR encoded strings holding its configuration upon execution.
|
['TA0005:Defense Evasion']
|
Winnti for Linux can encode its configuration file with single-byte XOR encoding.
|
['TA0005:Defense Evasion']
|
Winnti for Linux has the ability to deploy modules directly from command and control servers, possibly for remote command execution, file exfiltration, and socks5 proxying on the infected host.
|
['TA0011:Command and Control']
|
Winnti for Linux has used ICMP, custom TCP, and UDP in outbound communications.
|
['TA0011:Command and Control']
|
Winnti for Linux has used a modified copy of the open-source userland rootkit Azazel, named libxselinux.so, to hide the malware's operations and network activity.
|
['TA0005:Defense Evasion']
|
Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control .
|
['TA0011:Command and Control']
|
Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control mechanism.
|
['TA0011:Command and Control', 'TA0005:Defense Evasion', 'TA0003:Persistence']
|
Winnti for Linux has used HTTP in outbound communications.
|
['TA0011:Command and Control']
|
Winnti for Windows can use a variant of the sysprep UAC bypass.
|
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
|
The Winnti for Windows dropper can decrypt and decompresses a data blob.
|
['TA0005:Defense Evasion']
|
Winnti for Windows has the ability to encrypt and compress its payload.
|
['TA0005:Defense Evasion']
|
The Winnti for Windows dropper component can verify the existence of a single command line parameter and either terminate if it is not found or later use it as a decryption key.
|
['TA0005:Defense Evasion']
|
The Winnti for Windows HTTP/S C2 mode can make use of an external proxy.
|
['TA0011:Command and Control']
|
Winnti for Windows can delete the DLLs for its various components from a compromised host.
|
['TA0005:Defense Evasion']
|
Winnti for Windows can check for the presence of specific files prior to moving to the next phase of execution.
|
['TA0007:Discovery']
|
The Winnti for Windows dropper can place malicious payloads on targeted systems.
|
['TA0011:Command and Control']
|
The Winnti for Windows HTTP/S C2 mode can make use of a local proxy.
|
['TA0011:Command and Control']
|
A Winnti for Windows implant file was named ASPNET_FILTER.DLL, mimicking the legitimate ASP.NET ISAPI filter DLL with the same name.
|
['TA0005:Defense Evasion']
|
Winnti for Windows can use Native API to create a new process and to start services.
|
['TA0002:Execution']
|
Winnti for Windows can communicate using custom TCP.
|
['TA0011:Command and Control']
|
Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.
|
['TA0007:Discovery']
|
Winnti for Windows can add a service named <code>wind0ws</code> to the Registry to achieve persistence after reboot.
|
['TA0003:Persistence', 'TA0004:Privilege Escalation']
|
The Winnti for Windows installer loads a DLL using rundll32.
|
['TA0005:Defense Evasion']
|
Winnti for Windows can run as a service using svchost.exe.
|
['TA0002:Execution']
|
Winnti for Windows can XOR encrypt C2 traffic.
|
['TA0011:Command and Control']
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.