prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Information Discovery | It has a tool that can obtain information about the local system. |
System Information Discovery | It has collected the OS version and computer name from victims. One of the group's backdoors can also query the Windows Registry to gather system information, and another macOS backdoor performs a fingerprint of the machine on its first connection to the C&C server. It executed shellcode to identify the name of the infected host. |
System Information Discovery | It collects the computer name, the BIOS model, and execution path. |
System Information Discovery | It has attempted to get detailed information about a compromised host, including the operating system, version, patches, hotfixes, and service packs. |
System Information Discovery | It has used native OS commands to understand privilege levels and system details. |
System Information Discovery | Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host. |
System Information Discovery | Astaroth collects the machine name and keyboard language from the system. |
System Information Discovery | AsyncRAT can check the disk size through the values obtained with DeviceInfo. |
System Information Discovery | Attor monitors the free disk space on the system. |
System Information Discovery | AuTo Stealer has the ability to collect the hostname and OS information from an infected host. |
System Information Discovery | Avenger has the ability to identify the host volume ID and the OS architecture on a compromised host. |
System Information Discovery | Azorult can collect the machine information, system architecture, the OS version, computer name, Windows product name, the number of CPU cores, video card information, and the system language. |
System Information Discovery | Babuk can enumerate disk volumes, get disk information, and query service status. |
System Information Discovery | BabyShark has executed the ver command. |
System Information Discovery | BackConfig has the ability to gather the victim's computer name. |
System Information Discovery | Backdoor.Oldrea collects information about the OS and computer name. |
System Information Discovery | During its initial execution, BACKSPACE extracts operating system information from the infected host. |
System Information Discovery | BADCALL collects the computer name and host name on the compromised system. |
System Information Discovery | BADFLICK has captured victim computer name, memory space, and CPU details. |
System Information Discovery | BADHATCH can obtain current system information from a compromised machine such as the SHELL PID, PSVERSION, HOSTNAME, LOGONSERVER, LASTBOOTUP, UPTIME, drive information, OS type/version, bitness, and hostname. |
System Information Discovery | BadPatch collects the OS system, OS version, MAC address, and the computer name from the victim’s machine. |
System Information Discovery | Bandook can collect information about the drives available on the system. |
System Information Discovery | Bankshot gathers system information, network addresses, disk type, disk free space, and the operation system version. |
System Information Discovery | Bazar can fingerprint architecture, computer name, and OS version on the compromised host. Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found. |
System Information Discovery | BISCUIT has a command to collect the processor type, operation system, computer name, uptime, and whether the system is a laptop or PC. |
System Information Discovery | Bisonal has used commands and API calls to gather system information. |
System Information Discovery | Black Basta can enumerate volumes and collect system boot configuration and CPU information. |
System Information Discovery | BlackCat can obtain the computer name and UUID, and enumerate local drives. |
System Information Discovery | BlackEnergy has used Systeminfo to gather the OS version, as well as information on the system configuration, BIOS, the motherboard, and the processor. |
System Information Discovery | BlackMould can enumerate local drives on a compromised host. |
System Information Discovery | BLINDINGCAN has collected from a victim machine the system name, processor information, OS version, and disk information, including type and free space available. |
System Information Discovery | It has collected hardware details for the victim's system, including CPU and memory information. |
System Information Discovery | BLUELIGHT has collected the computer name and OS version from victim machines. |
System Information Discovery | Bonadan has discovered the OS version, CPU model, and RAM size of the system it has been installed on. |
System Information Discovery | BoomBox can enumerate the hostname, domain, and IP of a compromised host. |
System Information Discovery | Brave Prince collects hard drive content and system configuration information. |
System Information Discovery | BUBBLEWRAP collects system information, including the operating system version and hostname. |
System Information Discovery | build_downer has the ability to send system volume information to C2. |
System Information Discovery | Bumblebee can enumerate the OS version and domain on a targeted system. |
System Information Discovery | Bundlore will enumerate the macOS version to determine which follow-on behaviors to execute using /usr/bin/sw_vers -productVersion. |
System Information Discovery | During C0017, It issued ping -n 1 ((cmd /c dir c:\|findstr Number).split()[-1]+ commands to find the volume serial number of compromised systems. |
System Information Discovery | CaddyWiper can use DsRoleGetPrimaryDomainInformation to determine the role of the infected machine. CaddyWiper can also halt execution if the compromised host is identified as a domain controller. |
System Information Discovery | Cadelspy has the ability to discover information about the compromised host. |
System Information Discovery | Cannon can gather system information from the victim’s machine such as the OS version, machine name, and drive information. |
System Information Discovery | Carberp has collected the operating system version from the infected system. |
System Information Discovery | Cardinal RAT can collect the hostname, Microsoft Windows version, and processor architecture from a victim machine. |
System Information Discovery | CARROTBAT has the ability to determine the operating system of the compromised host and whether Windows is being run with x86 or x64 architecture. |
System Information Discovery | Caterpillar WebShell has a module to gather information from the compromrised asset, including the computer version, computer name, IIS version, and more. |
System Information Discovery | Chaes has collected system information, including the machine name and OS version. |
System Information Discovery | CharmPower can enumerate the OS version and computer name on a targeted system. |
System Information Discovery | ChChes collects the victim hostname, window resolution, and Microsoft Windows version. |
System Information Discovery | It has used fsutil fsinfo drives, systeminfo, and vssadmin list shadows for system information including shadow volumes and drive information. |
System Information Discovery | Chrommme has the ability to list drives and obtain the computer name of a compromised host. |
System Information Discovery | Clambling can discover the hostname, computer name, and Windows version of a targeted machine. |
System Information Discovery | cmd can be used to find information about the operating system. |
System Information Discovery | Comnie collects the hostname of the victim machine. |
System Information Discovery | It has used a file stealer that can examine system drives, including those other than the C drive. |
System Information Discovery | CORESHELL collects hostname, volume serial number and OS version data from the victim and sends the information to its C2 server. |
System Information Discovery | A system info module in CozyCar gathers information on the victim host’s configuration. |
System Information Discovery | CrackMapExec can enumerate the system drives and associated system name. |
System Information Discovery | Crimson contains a command to collect the victim PC name, disk drive information, and operating system. |
System Information Discovery | Cuba can enumerate local drives, disk type, and disk free space. |
System Information Discovery | Cyclops Blink has the ability to query device information. |
System Information Discovery | DarkComet can collect the computer name, RAM used, and operating system version from the victim’s machine. |
System Information Discovery | It has collected the hostname, OS version, service pack version, and the processor architecture from the victim’s machine. |
System Information Discovery | DarkTortilla can obtain system information by querying the Win32_ComputerSystem, Win32_BIOS, Win32_MotherboardDevice, Win32_PnPEntity, and Win32_DiskDrive WMI objects. |
System Information Discovery | DarkWatchman can collect the OS version, system architecture, uptime, and computer name. |
System Information Discovery | DEADEYE can enumerate a victim computer's volume serial number and host name. |
System Information Discovery | DEATHRANSOM can enumerate logical drives on a target system. |
System Information Discovery | Denis collects OS information and the computer name from the victim’s machine. |
System Information Discovery | Derusbi gathers the name of the local host, version of GNU Compiler Collection (GCC), and the system information about the CPU, machine, and operating system. |
System Information Discovery | Diavol can collect the computer name and OS version from the system. |
System Information Discovery | down_new has the ability to identify the system volume information of a compromised host. |
System Information Discovery | DownPaper collects the victim host name and serial number, and then sends the information to the C2 server. |
System Information Discovery | Dridex has collected the computer name and OS architecture information from the system. |
System Information Discovery | DropBook has checked for the presence of Arabic language in the infected machine's settings. |
System Information Discovery | dsquery has the ability to enumerate various information, such as the operating system and host name, for systems within a domain. |
System Information Discovery | Dtrack can collect the victim's computer name, hostname and adapter information to create a unique identifier. |
System Information Discovery | DustySky extracts basic information about the operating system. |
System Information Discovery | Dyre has the ability to identify the computer name, OS version, and hardware configuration on a compromised host. |
System Information Discovery | Egregor can perform a language check of the infected system and can query the CPU information (cupid). |
System Information Discovery | Elise executes systeminfo after initial communication is made to the remote server. |
System Information Discovery | Emissary has the capability to execute ver and systeminfo commands. |
System Information Discovery | Empire can enumerate host system information like OS, architecture, domain name, applied patches, and more. |
System Information Discovery | EnvyScout can determine whether the ISO payload was received by a Windows or iOS device. |
System Information Discovery | Epic collects the OS version, hardware information, computer name, available system memory status, disk space information, and system and user language settings. |
System Information Discovery | EVILNUM can obtain the computer name from the victim's system. |
System Information Discovery | Explosive has collected the computer name from the infected host. |
System Information Discovery | FALLCHILL can collect operating system (OS) version information, processor information, system name, and information about installed disks from the victim. |
System Information Discovery | FatDuke can collect the user name, Windows version, computer name, and available space on discs from a compromised host. |
System Information Discovery | Felismus collects the system information, including hostname and OS version, and sends it to the C2 server. |
System Information Discovery | FELIXROOT collects the victim’s computer name, processor architecture, OS version, volume serial number, and system type. |
System Information Discovery | Ferocious can use GET.WORKSPACE in Microsoft Excel to determine the OS version of the compromised host. |
System Information Discovery | It has collected local host information by utilizing Windows commands systeminfo, fsutil, and fsinfo. It has also utilized a compromised Symantex Altiris console and LanDesk account to retrieve host information. |
System Information Discovery | It has used PowerShell Scripts to check the architecture of a compromised machine before the selection of a 32-bit or 64-bit version of a malicious .NET loader. |
System Information Discovery | Final1stspy obtains victim Microsoft Windows version information and CPU architecture. |
System Information Discovery | FinFisher checks if the victim OS is 32 or 64-bit. |
System Information Discovery | FlawedAmmyy can collect the victim's operating system and computer name during the initial infection. |
System Information Discovery | During Frankenstein, the threat actors used Empire to obtain the compromised machine's name. |
System Information Discovery | FunnyDream can enumerate all logical drives on a targeted machine. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.