text
stringlengths 23
517
| label
stringclasses 31
values |
|---|---|
Zox has been encoded with Base64.
|
['TA0005:Defense Evasion']
|
Zox has the ability to leverage local and remote exploits to escalate privileges.
|
['TA0004:Privilege Escalation']
|
Zox can enumerate files on a compromised host.
|
['TA0007:Discovery']
|
Zox can download files to a compromised machine.
|
['TA0011:Command and Control']
|
Zox has the ability to list processes.
|
['TA0007:Discovery']
|
Zox has the ability to use SMB for communication.
|
['TA0008:Lateral Movement']
|
Zox has used the .PNG file format for C2 communications.
|
['TA0011:Command and Control']
|
Zox can enumerate attached drives.
|
['TA0007:Discovery']
|
ZxShell has a command to clear system event logs.
|
['TA0005:Defense Evasion']
|
ZxShell has a command called RunAs, which creates a new process as another user or process context.
|
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
|
ZxShell hooks several API functions to spawn system threads.
|
['TA0009:Collection', 'TA0006:Credential Access']
|
ZxShell can transfer files from a compromised host.
|
['TA0009:Collection']
|
ZxShell can disable the firewall by modifying the registry key <code>HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile</code>.
|
['TA0005:Defense Evasion']
|
ZxShell can kill AV products' processes.
|
['TA0005:Defense Evasion']
|
ZxShell is injected into a shared SVCHOST process.
|
['TA0005:Defense Evasion', 'TA0004:Privilege Escalation']
|
ZxShell has a feature to perform SYN flood attack on a host.
|
['TA0040:Impact']
|
ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322.
|
['TA0001:Initial Access']
|
ZxShell can delete files from the system.
|
['TA0005:Defense Evasion']
|
ZxShell has used FTP for C2 connections.
|
['TA0011:Command and Control']
|
ZxShell has a command to open a file manager and explorer on the system.
|
['TA0007:Discovery']
|
ZxShell has a command to transfer files from a remote host.
|
['TA0011:Command and Control']
|
ZxShell has a feature to capture a remote computer's keystrokes using a keylogger.
|
['TA0009:Collection', 'TA0006:Credential Access']
|
ZxShell has a feature to create local user accounts.
|
['TA0003:Persistence']
|
ZxShell can create Registry entries to enable services to run.
|
['TA0005:Defense Evasion']
|
ZxShell can leverage native API including <code>RegisterServiceCtrlHandler </code> to register a service.RegisterServiceCtrlHandler
|
['TA0002:Execution']
|
ZxShell can launch port scans.
|
['TA0007:Discovery']
|
ZxShell can use ports 1985 and 1986 in HTTP/S communication.
|
['TA0011:Command and Control']
|
ZxShell has a command, ps, to obtain a listing of processes on the system.
|
['TA0007:Discovery']
|
ZxShell can set up an HTTP or SOCKS proxy.
|
['TA0011:Command and Control']
|
ZxShell can query the netsvc group value data located in the svchost group Registry key.
|
['TA0007:Discovery']
|
ZxShell has remote desktop functionality.
|
['TA0008:Lateral Movement']
|
ZxShell has used rundll32.exe to execute other DLLs and named pipes.
|
['TA0005:Defense Evasion']
|
ZxShell can capture screenshots.
|
['TA0009:Collection']
|
ZxShell can create a new service for execution.
|
['TA0002:Execution']
|
ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory.
|
['TA0007:Discovery']
|
ZxShell can collect the owner and organization information from the target workstation.
|
['TA0007:Discovery']
|
ZxShell can check the services on the system.
|
['TA0007:Discovery']
|
ZxShell supports functionality for VNC sessions.
|
['TA0008:Lateral Movement']
|
ZxShell has a command to perform video device spying.
|
['TA0009:Collection']
|
ZxShell has used HTTP for C2 connections.
|
['TA0011:Command and Control']
|
ZxShell can launch a reverse command shell.
|
['TA0002:Execution']
|
ZxShell can create a new service using the service parser function ProcessScCommand.
|
['TA0003:Persistence', 'TA0004:Privilege Escalation']
|
ZxxZ can collect data from a compromised host.
|
['TA0009:Collection']
|
ZxxZ has used a XOR key to decrypt strings.
|
['TA0005:Defense Evasion']
|
ZxxZ has been encoded to avoid detection from static analysis tools.
|
['TA0005:Defense Evasion']
|
ZxxZ can download and execute additional files.
|
['TA0011:Command and Control']
|
ZxxZ has relied on victims to open a malicious attachment delivered via email.
|
['TA0002:Execution']
|
ZxxZ has been disguised as a Windows security update service.
|
['TA0005:Defense Evasion']
|
ZxxZ has used API functions such as `Process32First`, `Process32Next`, and `ShellExecuteA`.
|
['TA0002:Execution']
|
ZxxZ has created a snapshot of running processes using `CreateToolhelp32Snapshot`.
|
['TA0007:Discovery']
|
ZxxZ can search the registry of a compromised host.
|
['TA0007:Discovery']
|
ZxxZ has used scheduled tasks for persistence and execution.
|
['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
|
ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.
|
['TA0007:Discovery']
|
ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.
|
['TA0001:Initial Access']
|
ZxxZ has collected the host name and operating system product name from a compromised machine.
|
['TA0007:Discovery']
|
ZxxZ can collect the username from a compromised host.
|
['TA0007:Discovery']
|
adbupd contains a copy of the OpenSSL library to encrypt C2 traffic.
|
['TA0011:Command and Control']
|
adbupd can run a copy of cmd.exe.
|
['TA0002:Execution']
|
adbupd can use a WMI script to achieve persistence.
|
['TA0003:Persistence', 'TA0004:Privilege Escalation']
|
at can be used to schedule a task on a system to be executed at a specific date or time.
|
['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
|
build_downer has the ability to download files from C2 to the infected host.
|
['TA0011:Command and Control']
|
build_downer has added itself to the Registry Run key as "NVIDIA" to appear legitimate.
|
['TA0005:Defense Evasion']
|
build_downer has the ability to use the <code>WinExec</code> API to execute malware on a compromised host.
|
['TA0002:Execution']
|
build_downer has the ability to add itself to the Registry Run key for persistence.
|
['TA0003:Persistence', 'TA0004:Privilege Escalation']
|
build_downer has the ability to detect if the infected host is running an anti-virus process.
|
['TA0007:Discovery']
|
build_downer can extract malware from a downloaded JPEG.
|
['TA0005:Defense Evasion']
|
build_downer has the ability to send system volume information to C2.
|
['TA0007:Discovery']
|
build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.
|
['TA0007:Discovery']
|
ccf32 has used `xcopy \\<target_host>\c$\users\public\path.7z c:\users\public\bin\<target_host>.7z /H /Y` to archive collected files.
|
['TA0009:Collection']
|
ccf32 can be used to automatically collect files from a compromised host.
|
['TA0009:Collection']
|
ccf32 can collect files from a compromised host.
|
['TA0009:Collection']
|
ccf32 can upload collected data and files to an FTP server.
|
['TA0010:Exfiltration']
|
ccf32 can delete files and folders from compromised machines.
|
['TA0005:Defense Evasion']
|
ccf32 can parse collected files to identify specific file extensions.
|
['TA0007:Discovery']
|
ccf32 has created a hidden directory on targeted systems, naming it after the current local time .
|
['TA0005:Defense Evasion']
|
ccf32 can temporarily store files in a hidden directory on the local host.
|
['TA0009:Collection']
|
ccf32 has copied files to a remote machine infected with Chinoxy or another backdoor.
|
['TA0009:Collection']
|
ccf32 can run on a daily basis using a scheduled task.
|
['TA0002:Execution', 'TA0003:Persistence', 'TA0004:Privilege Escalation']
|
ccf32 can determine the local time on targeted machines.
|
['TA0007:Discovery']
|
ccf32 has used `cmd.exe` for archiving data and deleting files.
|
['TA0002:Execution']
|
certutil may be used to Base64 encode collected data.
|
['TA0009:Collection']
|
certutil has been used to decode binaries hidden inside certificate files as Base64 information.
|
['TA0005:Defense Evasion']
|
certutil can be used to download files from a given URL.
|
['TA0011:Command and Control']
|
certutil can be used to install browser root certificates as a precursor to performing Adversary-in-the-Middle between connections to banking websites. Example command: <code>certutil -addstore -f -user ROOT ProgramData\cert512121.der</code>.
|
['TA0005:Defense Evasion']
|
cmd can be used to delete files from the file system.
|
['TA0005:Defense Evasion']
|
cmd can be used to find files and directories with native functionality such as <code>dir</code> commands.
|
['TA0007:Discovery']
|
cmd can be used to copy files to/from a remotely connected external system.
|
['TA0011:Command and Control']
|
cmd can be used to copy files to/from a remotely connected internal system.
|
['TA0008:Lateral Movement']
|
cmd can be used to find information about the operating system.
|
['TA0007:Discovery']
|
cmd is used to execute programs and other actions at the command-line interface.
|
['TA0002:Execution']
|
down_new has the ability to list the directories on a compromised host.
|
['TA0007:Discovery']
|
down_new has the ability to download files to the compromised host.
|
['TA0011:Command and Control']
|
down_new has the ability to list running processes on a compromised host.
|
['TA0007:Discovery']
|
down_new has the ability to detect anti-virus products and processes on a compromised host.
|
['TA0007:Discovery']
|
down_new has the ability to gather information on installed applications.
|
['TA0007:Discovery']
|
down_new has the ability to base64 encode C2 communications.
|
['TA0011:Command and Control']
|
down_new has the ability to AES encrypt C2 communications.
|
['TA0011:Command and Control']
|
down_new has the ability to identify the system volume information of a compromised host.
|
['TA0007:Discovery']
|
down_new has the ability to identify the MAC address of a compromised host.
|
['TA0007:Discovery']
|
down_new has the ability to use HTTP in C2 communications.
|
['TA0011:Command and Control']
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.