text
stringlengths
23
517
label
stringclasses
31 values
Zox has been encoded with Base64.
['TA0005:Defense Evasion']
Zox has the ability to leverage local and remote exploits to escalate privileges.
['TA0004:Privilege Escalation']
Zox can enumerate files on a compromised host.
['TA0007:Discovery']
Zox can download files to a compromised machine.
['TA0011:Command and Control']
Zox has the ability to list processes.
['TA0007:Discovery']
Zox has the ability to use SMB for communication.
['TA0008:Lateral Movement']
Zox has used the .PNG file format for C2 communications.
['TA0011:Command and Control']
Zox can enumerate attached drives.
['TA0007:Discovery']
ZxShell has a command to clear system event logs.
['TA0005:Defense Evasion']
ZxShell has a command called RunAs, which creates a new process as another user or process context.
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
ZxShell hooks several API functions to spawn system threads.
['TA0009:Collection', 'TA0006:Credential Access']
ZxShell can transfer files from a compromised host.
['TA0009:Collection']
ZxShell can disable the firewall by modifying the registry key <code>HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile</code>.
['TA0005:Defense Evasion']
ZxShell can kill AV products' processes.
['TA0005:Defense Evasion']
ZxShell is injected into a shared SVCHOST process.
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
ZxShell has a feature to perform SYN flood attack on a host.
['TA0040:Impact']
ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322.
['TA0001:Initial Access']
ZxShell can delete files from the system.
['TA0005:Defense Evasion']
ZxShell has used FTP for C2 connections.
['TA0011:Command and Control']
ZxShell has a command to open a file manager and explorer on the system.
['TA0007:Discovery']
ZxShell has a command to transfer files from a remote host.
['TA0011:Command and Control']
ZxShell has a feature to capture a remote computer's keystrokes using a keylogger.
['TA0009:Collection', 'TA0006:Credential Access']
ZxShell has a feature to create local user accounts.
['TA0003:Persistence']
ZxShell can create Registry entries to enable services to run.
['TA0005:Defense Evasion']
ZxShell can leverage native API including <code>RegisterServiceCtrlHandler </code> to register a service.RegisterServiceCtrlHandler
['TA0002:Execution']
ZxShell can launch port scans.
['TA0007:Discovery']
ZxShell can use ports 1985 and 1986 in HTTP/S communication.
['TA0011:Command and Control']
ZxShell has a command, ps, to obtain a listing of processes on the system.
['TA0007:Discovery']
ZxShell can set up an HTTP or SOCKS proxy.
['TA0011:Command and Control']
ZxShell can query the netsvc group value data located in the svchost group Registry key.
['TA0007:Discovery']
ZxShell has remote desktop functionality.
['TA0008:Lateral Movement']
ZxShell has used rundll32.exe to execute other DLLs and named pipes.
['TA0005:Defense Evasion']
ZxShell can capture screenshots.
['TA0009:Collection']
ZxShell can create a new service for execution.
['TA0002:Execution']
ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory.
['TA0007:Discovery']
ZxShell can collect the owner and organization information from the target workstation.
['TA0007:Discovery']
ZxShell can check the services on the system.
['TA0007:Discovery']
ZxShell supports functionality for VNC sessions.
['TA0008:Lateral Movement']
ZxShell has a command to perform video device spying.
['TA0009:Collection']
ZxShell has used HTTP for C2 connections.
['TA0011:Command and Control']
ZxShell can launch a reverse command shell.
['TA0002:Execution']
ZxShell can create a new service using the service parser function ProcessScCommand.
['TA0003:Persistence', 'TA0004:Privilege Escalation']
ZxxZ can collect data from a compromised host.
['TA0009:Collection']
ZxxZ has used a XOR key to decrypt strings.
['TA0005:Defense Evasion']
ZxxZ has been encoded to avoid detection from static analysis tools.
['TA0005:Defense Evasion']
ZxxZ can download and execute additional files.
['TA0011:Command and Control']
ZxxZ has relied on victims to open a malicious attachment delivered via email.
['TA0002:Execution']
ZxxZ has been disguised as a Windows security update service.
['TA0005:Defense Evasion']
ZxxZ has used API functions such as `Process32First`, `Process32Next`, and `ShellExecuteA`.
['TA0002:Execution']
ZxxZ has created a snapshot of running processes using `CreateToolhelp32Snapshot`.
['TA0007:Discovery']
ZxxZ can search the registry of a compromised host.
['TA0007:Discovery']
ZxxZ has used scheduled tasks for persistence and execution.
['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.
['TA0007:Discovery']
ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.
['TA0001:Initial Access']
ZxxZ has collected the host name and operating system product name from a compromised machine.
['TA0007:Discovery']
ZxxZ can collect the username from a compromised host.
['TA0007:Discovery']
adbupd contains a copy of the OpenSSL library to encrypt C2 traffic.
['TA0011:Command and Control']
adbupd can run a copy of cmd.exe.
['TA0002:Execution']
adbupd can use a WMI script to achieve persistence.
['TA0003:Persistence', 'TA0004:Privilege Escalation']
at can be used to schedule a task on a system to be executed at a specific date or time.
['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
build_downer has the ability to download files from C2 to the infected host.
['TA0011:Command and Control']
build_downer has added itself to the Registry Run key as "NVIDIA" to appear legitimate.
['TA0005:Defense Evasion']
build_downer has the ability to use the <code>WinExec</code> API to execute malware on a compromised host.
['TA0002:Execution']
build_downer has the ability to add itself to the Registry Run key for persistence.
['TA0003:Persistence', 'TA0004:Privilege Escalation']
build_downer has the ability to detect if the infected host is running an anti-virus process.
['TA0007:Discovery']
build_downer can extract malware from a downloaded JPEG.
['TA0005:Defense Evasion']
build_downer has the ability to send system volume information to C2.
['TA0007:Discovery']
build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.
['TA0007:Discovery']
ccf32 has used `xcopy \\<target_host>\c$\users\public\path.7z c:\users\public\bin\<target_host>.7z /H /Y` to archive collected files.
['TA0009:Collection']
ccf32 can be used to automatically collect files from a compromised host.
['TA0009:Collection']
ccf32 can collect files from a compromised host.
['TA0009:Collection']
ccf32 can upload collected data and files to an FTP server.
['TA0010:Exfiltration']
ccf32 can delete files and folders from compromised machines.
['TA0005:Defense Evasion']
ccf32 can parse collected files to identify specific file extensions.
['TA0007:Discovery']
ccf32 has created a hidden directory on targeted systems, naming it after the current local time .
['TA0005:Defense Evasion']
ccf32 can temporarily store files in a hidden directory on the local host.
['TA0009:Collection']
ccf32 has copied files to a remote machine infected with Chinoxy or another backdoor.
['TA0009:Collection']
ccf32 can run on a daily basis using a scheduled task.
['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
ccf32 can determine the local time on targeted machines.
['TA0007:Discovery']
ccf32 has used `cmd.exe` for archiving data and deleting files.
['TA0002:Execution']
certutil may be used to Base64 encode collected data.
['TA0009:Collection']
certutil has been used to decode binaries hidden inside certificate files as Base64 information.
['TA0005:Defense Evasion']
certutil can be used to download files from a given URL.
['TA0011:Command and Control']
certutil can be used to install browser root certificates as a precursor to performing Adversary-in-the-Middle between connections to banking websites. Example command: <code>certutil -addstore -f -user ROOT ProgramData\cert512121.der</code>.
['TA0005:Defense Evasion']
cmd can be used to delete files from the file system.
['TA0005:Defense Evasion']
cmd can be used to find files and directories with native functionality such as <code>dir</code> commands.
['TA0007:Discovery']
cmd can be used to copy files to/from a remotely connected external system.
['TA0011:Command and Control']
cmd can be used to copy files to/from a remotely connected internal system.
['TA0008:Lateral Movement']
cmd can be used to find information about the operating system.
['TA0007:Discovery']
cmd is used to execute programs and other actions at the command-line interface.
['TA0002:Execution']
down_new has the ability to list the directories on a compromised host.
['TA0007:Discovery']
down_new has the ability to download files to the compromised host.
['TA0011:Command and Control']
down_new has the ability to list running processes on a compromised host.
['TA0007:Discovery']
down_new has the ability to detect anti-virus products and processes on a compromised host.
['TA0007:Discovery']
down_new has the ability to gather information on installed applications.
['TA0007:Discovery']
down_new has the ability to base64 encode C2 communications.
['TA0011:Command and Control']
down_new has the ability to AES encrypt C2 communications.
['TA0011:Command and Control']
down_new has the ability to identify the system volume information of a compromised host.
['TA0007:Discovery']
down_new has the ability to identify the MAC address of a compromised host.
['TA0007:Discovery']
down_new has the ability to use HTTP in C2 communications.
['TA0011:Command and Control']