prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Information Discovery | During FunnyDream, the threat actors used Systeminfo to collect information on targeted hosts. |
System Information Discovery | Fysbis has used the command ls /etc | egrep -e"fedora*|debian*|gentoo*|mandriva*|mandrake*|meego*|redhat*|lsb-*|sun-*|SUSE*|release" to determine which Linux OS version is running. |
System Information Discovery | A It file stealer can gather the victim's computer name and drive serial numbers to send to a C2 server. |
System Information Discovery | Gelsemium can determine the operating system and whether a targeted machine has a 32 or 64 bit architecture. |
System Information Discovery | Get2 has the ability to identify the computer name and Windows version of an infected host. |
System Information Discovery | gh0st RAT has gathered system architecture, processor, OS configuration, and installed hardware information. |
System Information Discovery | Gold Dragon collects endpoint information using the systeminfo command. |
System Information Discovery | GoldenSpy has gathered operating system information. |
System Information Discovery | Grandoreiro can collect the computer name and OS version from a compromised host. |
System Information Discovery | GravityRAT collects the MAC address, computer name, and CPU information. |
System Information Discovery | Green Lambert can use uname to identify the operating system name, version, and processor type. |
System Information Discovery | GRIFFON has used a reconnaissance module that can be used to retrieve information about a victim's computer, including the resolution of the workstation . |
System Information Discovery | GrimAgent can collect the OS, and build version on a compromised host. |
System Information Discovery | HALFBAKED can obtain information about the OS, processor, and BIOS. |
System Information Discovery | can collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path. |
System Information Discovery | HAWKBALL can collect the OS version, architecture information, and computer name. |
System Information Discovery | HELLOKITTY can enumerate logical drives on a target system. |
System Information Discovery | HermeticWiper can determine the OS version, bitness, and enumerate physical drives on a targeted host. |
System Information Discovery | It has collected the hostname of a compromised machine. |
System Information Discovery | Heyoka Backdoor can enumerate drives on a compromised host. |
System Information Discovery | It collected the system volume serial number, GUID, and computer name. |
System Information Discovery | Hildegard has collected the host's OS, CPU, and memory information. |
System Information Discovery | HOPLIGHT has been observed collecting victim machine information like OS version, volume information, and more. |
System Information Discovery | HotCroissant has the ability to determine if the current user is an administrator, Windows product name, processor name, screen resolution, and physical RAM of the infected host. |
System Information Discovery | Hydraq creates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed. |
System Information Discovery | The IceApple Server Variable Dumper module iterates over all server variables present for the current request and returns them to the adversary. |
System Information Discovery | IcedID has the ability to identify the computer name and OS version on a compromised host. |
System Information Discovery | It has used a reconnaissance module to gather information about the operating system and hardware on the infected host. |
System Information Discovery | Industroyer collects the victim machine’s Windows GUID. |
System Information Discovery | InnaputRAT gathers volume drive information and system information. |
System Information Discovery | InvisiMole can gather information on the mapped drives, OS version, computer name, DEP policy, memory size, and system volume serial number. |
System Information Discovery | Ixeshe collects the computer name of the victim's system during the initial infection. |
System Information Discovery | JHUHUGIT obtains a build identifier as well as victim hard drive information from Windows registry key HKLM\SYSTEM\CurrentControlSet\Services\Disk\Enum. Another JHUHUGIT variant gathers the victim storage volume serial number and the storage device name. |
System Information Discovery | JPIN can obtain system information such as OS version and disk space. |
System Information Discovery | jRAT collects information about the OS (version, build type, install date) as well as system up-time upon receiving a connection from a backdoor. |
System Information Discovery | KARAE can collect system information. |
System Information Discovery | Kasidet has the ability to obtain a victim's system name and operating system version. |
System Information Discovery | Kazuar gathers information on the system and local drives. |
System Information Discovery | It performs operating system information discovery using systeminfo and has used implants to identify the system language and computer name. |
System Information Discovery | Kerrdown has the ability to determine if the compromised host is running a 32 or 64 bit OS architecture. |
System Information Discovery | Kessel has collected the system architecture, OS version, and MAC address information. |
System Information Discovery | Kevin can enumerate the OS version and hostname of a targeted machine. |
System Information Discovery | KeyBoy can gather extended system information, such as information about the operating system, disks, and memory. |
System Information Discovery | KEYMARBLE has the capability to collect the computer name, language settings, the OS version, CPU information, disk devices, and time elapsed since system start. |
System Information Discovery | KGH_SPY can collect drive information from a compromised host. |
System Information Discovery | KillDisk retrieves the hard disk name by calling the CreateFileA to \.\PHYSICALDRIVE0 API. |
System Information Discovery | It has enumerated drives, OS type, OS version, and other information using a script or the "systeminfo" command. |
System Information Discovery | Koadic can obtain the OS version and build, computer name, and processor architecture from a compromised host. |
System Information Discovery | Kobalos can record the hostname and kernel version of the target machine. |
System Information Discovery | KOCTOPUS has checked the OS version using wmic.exe and the find command. |
System Information Discovery | KOMPROGO is capable of retrieving information about the infected system. |
System Information Discovery | KONNI can gather the OS version, architecture information, connected drives, hostname, RAM size, and disk space information from the victim’s machine and has used cmd /c systeminfo command to get a snapshot of the current system state of the target machine. |
System Information Discovery | KOPILUWAK can discover logical drive information on compromised hosts. |
System Information Discovery | Kwampirs collects OS version information such as registered owner details, manufacturer details, processor type, available storage, installed patches, hostname, version info, system date, and other system information by using the commands systeminfo, net config workstation, hostname, ver, set, and date /t. |
System Information Discovery | Several It malware families collect information on the type and version of the victim OS, as well as the victim computer name and CPU information. A Destover-like variant used by It also collects disk space information and sends it to its C2 server. |
System Information Discovery | LightNeuron gathers the victim computer name using the Win32 API call GetComputerName. |
System Information Discovery | Linfo creates a backdoor through which remote attackers can retrieve system information. |
System Information Discovery | LiteDuke can enumerate the CPUID and BIOS version on a compromised system. |
System Information Discovery | LitePower has the ability to list local drives and enumerate the OS architecture. |
System Information Discovery | Lizar can collect the computer name from the machine,. |
System Information Discovery | Lokibot has the ability to discover the computer name and Windows product name/version. |
System Information Discovery | LoudMiner has monitored CPU usage. |
System Information Discovery | Lucifer can collect the computer name, system architecture, default language, and processor frequency of a compromised host. |
System Information Discovery | It collects the hostname of the target computer. |
System Information Discovery | MacMa can collect information about a compromised computer, including: Hardware UUID, Mac serial number, macOS version, and disk sizes. |
System Information Discovery | macOS.OSAMiner can gather the device serial number and has checked to ensure there is enough disk space using the Unix utility df. |
System Information Discovery | Mafalda can collect the computer name and enumerate all drives on a compromised host. |
System Information Discovery | It malware has used a PowerShell command to check the victim system architecture to determine if it is an x64 machine. Other malware has obtained the OS version, UUID, and computer/host name to send to the C2 server. |
System Information Discovery | MarkiRAT can obtain the computer name from a compromised host. |
System Information Discovery | Maze has checked the language of the infected system using the "GetUSerDefaultUILanguage" function. |
System Information Discovery | metaMain can collect the computer name from a compromised host. |
System Information Discovery | Metamorfo has collected the hostname and operating system version from the compromised host. |
System Information Discovery | Meteor has the ability to discover the hostname of a compromised host. |
System Information Discovery | Micropsia gathers the hostname and OS version from the victim’s machine. |
System Information Discovery | Milan can enumerate the targeted machine's name and GUID. |
System Information Discovery | MiniDuke can gather the hostname on a compromised machine. |
System Information Discovery | MirageFox can collect CPU and architecture information from the victim’s machine. |
System Information Discovery | The initial beacon packet for Mis-Type contains the operating system version and file system of the victim. |
System Information Discovery | The initial beacon packet for Misdat contains the operating system version of the victim. |
System Information Discovery | MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information. |
System Information Discovery | MoleNet can collect information about the about the system. |
System Information Discovery | Mongall can identify drives on compromised hosts and retrieve the hostname via gethostbyname. |
System Information Discovery | MoonWind can obtain the victim hostname, Windows version, RAM amount, number of drives, and screen resolution. |
System Information Discovery | More_eggs has the capability to gather the OS version and computer name. |
System Information Discovery | It collected information about the infected host, including the machine names and OS architecture. |
System Information Discovery | It has used malware that can collect the victim’s OS version and machine name. |
System Information Discovery | MURKYTOP has the capability to retrieve information about the OS. |
System Information Discovery | It has gathered system information using systeminfo. |
System Information Discovery | Naid collects a unique identifier (UID) from a compromised host. |
System Information Discovery | NanHaiShu can gather the victim computer name and serial number. |
System Information Discovery | NavRAT uses systeminfo on a victim’s machine. |
System Information Discovery | NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel. |
System Information Discovery | Nebulae can discover logical drive information including the drive type, free space, and volume information. |
System Information Discovery | Neoichor can collect the OS version and computer name from a compromised host. |
System Information Discovery | Netwalker can determine the system architecture it is running on to choose which version of the DLL to use. |
System Information Discovery | NETWIRE can discover and collect victim system information. |
System Information Discovery | njRAT enumerates the victim operating system and computer name during the initial infection. |
System Information Discovery | NOKKI can gather information on drives and the operating system on the victim’s machine. |
System Information Discovery | ObliqueRAT has the ability to check for blocklisted computer names on infected endpoints. |
System Information Discovery | OceanSalt can collect the computer name from the system. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.