text
stringlengths
23
517
label
stringclasses
31 values
Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP.
['TA0007:Discovery']
Winnti for Windows can set the timestamps for its worker and service components to match that of cmd.exe.
['TA0005:Defense Evasion']
Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.
['TA0011:Command and Control']
Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.
['TA0003:Persistence', 'TA0004:Privilege Escalation']
It is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the Wiper malware.
['TA0002:Execution', 'TA0008:Lateral Movement']
Woody RAT can identify administrator accounts on an infected machine.
['TA0007:Discovery']
Woody RAT can use RSA-4096 to encrypt data sent to its C2 server.
['TA0011:Command and Control']
Woody RAT can collect information from a compromised host.
['TA0009:Collection']
Woody RAT can deobfuscate Base64-encoded strings and scripts.
['TA0005:Defense Evasion']
Woody RAT has used Base64 encoded strings and scripts.
['TA0005:Defense Evasion']
Woody RAT can exfiltrate files from an infected machine to its C2 server.
['TA0010:Exfiltration']
Woody RAT has relied on CVE-2022-30190 for execution during delivery.
['TA0002:Execution']
Woody RAT has the ability to delete itself from disk by creating a suspended notepad process and writing shellcode to delete a file into the suspended process using `NtWriteVirtualMemory`.
['TA0005:Defense Evasion']
Woody RAT can list all files and their associated attributes, including filename, type, owner, creation time, last access time, last write time, size, and permissions.
['TA0007:Discovery']
Woody RAT has suppressed all error reporting by calling `SetErrorMode` with 0x8007 as a parameter.
['TA0005:Defense Evasion']
Woody RAT can download files from its C2 server, including the .NET DLLs, `WoodySharpExecutor` and `WoodyPowerSession`.
['TA0011:Command and Control']
Woody RAT can make `Ping` GET HTTP requests to its C2 server at regular intervals for network connectivity checks.
['TA0007:Discovery']
Woody RAT has relied on users opening a malicious email attachment for execution.
['TA0002:Execution']
Woody RAT can use multiple native APIs, including `WriteProcessMemory`, `CreateProcess`, and `CreateRemoteThread` for process injection.
['TA0002:Execution']
Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, `WoodyPowerSession`.
['TA0002:Execution']
Woody RAT can call `NtQuerySystemProcessInformation` with `SystemProcessInformation` to enumerate all running processes, including associated information such as PID, parent PID, image name, and owner.
['TA0007:Discovery']
Woody RAT can create a suspended notepad process and write shellcode to delete a file into the suspended process using `NtWriteVirtualMemory`.
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
Woody RAT can inject code into a targeted process by writing to the remote memory of an infected system and then create a remote thread.
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
Woody RAT can search registry keys to identify antivirus programs on an compromised host.
['TA0007:Discovery']
Woody RAT has the ability to take a screenshot of the infected host desktop using Windows GDI+.
['TA0009:Collection']
Woody RAT can detect Avast Software, Doctor Web, Kaspersky, AVG, ESET, and Sophos antivirus programs.
['TA0007:Discovery']
Woody RAT can collect .NET, PowerShell, and Python information from an infected host.
['TA0007:Discovery']
Woody RAT has been delivered via malicious Word documents and archive files.
['TA0001:Initial Access']
Woody RAT can use AES-CBC to encrypt data sent to its C2 server.
['TA0011:Command and Control']
Woody RAT can retrieve the following information from an infected machine: OS, architecture, computer name, OS build version, environment variables, and storage drives.
['TA0007:Discovery']
Woody RAT can retrieve network interface and proxy information.
['TA0007:Discovery']
Woody RAT can retrieve a list of user accounts and usernames from an infected machine.
['TA0007:Discovery']
Woody RAT can communicate with its C2 server using HTTP requests.
['TA0011:Command and Control']
Woody RAT can execute commands using `cmd.exe`.
['TA0002:Execution']
XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords.
['TA0006:Credential Access']
XAgentOSX contains the deletFileFromPath function to delete a specified file using the NSFileManager:removeFileAtPath method.
['TA0005:Defense Evasion']
XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.
['TA0011:Command and Control']
XAgentOSX contains the readFiles function to return a detailed listing of a specified directory. XAgentOSX contains the showBackupIosFolder function to check for IOS device backups by running <code>ls -la ~/Library/Application\ Support/MobileSync/Backup/</code>.
['TA0007:Discovery']
XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log, it can handle special characters, and it will buffer by default 50 characters before sending them out over the C2 infrastructure.
['TA0009:Collection', 'TA0006:Credential Access']
XAgentOSX contains the execFile function to execute a specified file on the system using the NSTask:launch method.
['TA0002:Execution']
XAgentOSX contains the getProcessList function to run <code>ps aux</code> to get running processes.
['TA0007:Discovery']
XAgentOSX contains the takeScreenShot functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods.
['TA0009:Collection']
XAgentOSX contains the getInstalledAPP function to run <code>ls -la /Applications</code> to gather what applications are installed.
['TA0007:Discovery']
XAgentOSX contains the getInfoOSX function to return the OS X version as well as the current user.
['TA0007:Discovery']
XCSSET attempts to discover accounts from various locations such as a user's Evernote, AppleID, Telegram, Skype, and WeChat data.
['TA0007:Discovery']
XCSSET will compress entire <code>~/Desktop</code> folders excluding all <code>.git</code> folders, but only if the total data size is under 200MB.
['TA0009:Collection']
XCSSET uses a malicious browser application to replace the legitimate browser in order to continuously capture credentials, monitor web traffic, and download additional modules.
['TA0003:Persistence']
XCSSET adds malicious code to a host's Xcode projects by enumerating CocoaPods <code>target_integrator.rb</code> files under the <code>/Library/Ruby/Gems</code> folder or enumerates all <code>.xcodeproj</code> folders under a given directory. XCSSET then downloads a script and Mach-O file into the Xcode project folder.
['TA0001:Initial Access']
XCSSET performs AES-CBC encryption on files under <code>~/Documents</code>, <code>~/Downloads</code>, and <code>~/Desktop</code> with a fixed key and renames files to give them a <code>.enc</code> extension. Only files with sizes less than 500MB are encrypted.
['TA0040:Impact']
XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders.
['TA0009:Collection']
XCSSET adds malicious file paths to the <code>DYLD_FRAMEWORK_PATH</code> and <code>DYLD_LIBRARY_PATH</code> environment variables to execute malicious code.
['TA0005:Defense Evasion', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
XCSSET exfiltrates data stolen from a system over its C2 channel.
['TA0010:Exfiltration']
XCSSET has used a zero-day exploit in the ssh launchdaemon to elevate privileges and bypass SIP.
['TA0004:Privilege Escalation']
XCSSET has used `mdfind` to enumerate a list of apps known to grant screen sharing permissions.
['TA0007:Discovery']
XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process <code>/Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment</code>.
['TA0009:Collection', 'TA0006:Credential Access']
XCSSET has dropped a malicious applet into an app's `.../Contents/MacOS/` folder of a previously launched app to bypass Gatekeeper's security checks on first launch apps .
['TA0005:Defense Evasion']
XCSSET uses a hidden folder named <code>.xcassets</code> and <code>.git</code> to embed itself in Xcode.
['TA0005:Defense Evasion']
XCSSET downloads browser specific AppleScript modules using a constructed URL with the <code>curl</code> command, <code>https://" & domain & "/agent/scripts/" & moduleName & ".applescript</code>.
['TA0011:Command and Control']
XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim.
['TA0003:Persistence', 'TA0004:Privilege Escalation']
XCSSET loads a system level launchdaemon using the <code>launchctl load -w</code> command from <code>/System/Librarby/LaunchDaemons/ssh.plist</code>.
['TA0002:Execution']
XCSSET uses the <code>chmod +x</code> command to grant executable permissions to the malicious file.
['TA0005:Defense Evasion']
XCSSET builds a malicious application bundle to resemble Safari through using the Safari icon and <code>Info.plist</code>.
['TA0005:Defense Evasion']
XCSSET uses the <code>plutil</code> command to modify the <code>LSUIElement</code>, <code>DFBundleDisplayName</code>, and <code>CFBundleIdentifier</code> keys in the <code>/Contents/Info.plist</code> file to change how XCSSET is visible on the system.
['TA0005:Defense Evasion']
XCSSET will create an ssh key if necessary with the <code>ssh-keygen -t rsa -f $HOME/.ssh/id_rsa -P</code> command. XCSSET will upload a private key file to the server to remotely access the host without a password.
['TA0003:Persistence', 'TA0004:Privilege Escalation']
XCSSET saves a screen capture of the victim's system with a numbered filename and <code>.jpg</code> extension. Screen captures are taken at specified intervals based on the system.
['TA0009:Collection']
XCSSET searches firewall configuration files located in <code>/Library/Preferences/</code> and uses <code>csrutil status</code> to determine if System Integrity Protection is enabled.
['TA0007:Discovery']
XCSSET uses <code>ps aux</code> with the <code>grep</code> command to enumerate common browsers and system processes potentially impacting XCSSET's exfiltration capabilities.
['TA0007:Discovery']
XCSSET uses <code>scp</code> to access the <code>~/Library/Cookies/Cookies.binarycookies</code> file.
['TA0006:Credential Access']
XCSSET uses RC4 encryption over TCP to communicate with its C2 server.
['TA0011:Command and Control']
XCSSET identifies the macOS version and uses <code>ioreg</code> to determine serial number.
['TA0007:Discovery']
XCSSET uses AppleScript to check the host's language and location with the command <code>user locale of </code>.
['TA0007:Discovery']
Using the machine's local time, XCSSET waits 43200 seconds from the initial creation timestamp of a specific file, <code>.report</code>. After the elapsed time, XCSSET executes additional modules.
['TA0005:Defense Evasion', 'TA0007:Discovery']
XCSSET uses a shell script to execute Mach-o files and <code>osacompile</code> commands such as, <code>osacompile -x -o xcode.app main.applescript</code>.
['TA0002:Execution']
XTunnel uses SSL/TLS and RC4 to encrypt traffic.
['TA0011:Command and Control']
A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products.
['TA0005:Defense Evasion']
XTunnel is capable of accessing locally stored passwords on victims.
['TA0006:Credential Access']
The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.
['TA0011:Command and Control']
XTunnel is capable of probing the network for open ports.
['TA0007:Discovery']
A version of XTunnel introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.
['TA0005:Defense Evasion']
XTunnel relays traffic between a C2 server and a victim.
['TA0011:Command and Control']
XTunnel has been used to execute remote commands.
['TA0002:Execution']
Xbash can create a cronjob for persistence if it determines it is on a Linux system.
['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
Xbash has destroyed Linux-based databases as part of its ransomware capabilities.
['TA0040:Impact']
Xbash has maliciously encrypted victim's database systems and demanded a cryptocurrency ransom be paid.
['TA0040:Impact']
Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list.
['TA0011:Command and Control']
Xbash can attempt to exploit known vulnerabilities in Hadoop, Redis, or ActiveMQ when it finds those services running in order to conduct further execution.
['TA0002:Execution']
Xbash can download additional malicious files from its C2 server.
['TA0011:Command and Control']
Xbash can execute malicious JavaScript payloads on the victim’s machine.
['TA0002:Execution']
Xbash can use mshta for executing scripts.
['TA0005:Defense Evasion']
Xbash can perform port scanning of TCP and UDP ports.
['TA0007:Discovery']
Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports.
['TA0006:Credential Access']
Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution.
['TA0002:Execution']
Xbash can create a Startup item for persistence if it determines it is on a Windows system.
['TA0003:Persistence', 'TA0004:Privilege Escalation']
Xbash can use regsvr32 for executing scripts.
['TA0005:Defense Evasion']
Xbash can collect IP addresses and local intranet information from a victim’s machine.
['TA0007:Discovery']
Xbash can execute malicious VBScript payloads on the victim’s machine.
['TA0002:Execution']
Xbash uses HTTP for C2 communications.
['TA0011:Command and Control']
YAHOYAH decrypts downloaded files before execution.
['TA0005:Defense Evasion']
YAHOYAH encrypts its configuration file using a simple algorithm.
['TA0005:Defense Evasion']
YAHOYAH uses HTTP GET requests to download other files that are executed in memory.
['TA0011:Command and Control']