prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Information Discovery
During FunnyDream, the threat actors used Systeminfo to collect information on targeted hosts.
System Information Discovery
Fysbis has used the command ls /etc | egrep -e"fedora*|debian*|gentoo*|mandriva*|mandrake*|meego*|redhat*|lsb-*|sun-*|SUSE*|release" to determine which Linux OS version is running.
System Information Discovery
A It file stealer can gather the victim's computer name and drive serial numbers to send to a C2 server.
System Information Discovery
Gelsemium can determine the operating system and whether a targeted machine has a 32 or 64 bit architecture.
System Information Discovery
Get2 has the ability to identify the computer name and Windows version of an infected host.
System Information Discovery
gh0st RAT has gathered system architecture, processor, OS configuration, and installed hardware information.
System Information Discovery
Gold Dragon collects endpoint information using the systeminfo command.
System Information Discovery
GoldenSpy has gathered operating system information.
System Information Discovery
Grandoreiro can collect the computer name and OS version from a compromised host.
System Information Discovery
GravityRAT collects the MAC address, computer name, and CPU information.
System Information Discovery
Green Lambert can use uname to identify the operating system name, version, and processor type.
System Information Discovery
GRIFFON has used a reconnaissance module that can be used to retrieve information about a victim's computer, including the resolution of the workstation .
System Information Discovery
GrimAgent can collect the OS, and build version on a compromised host.
System Information Discovery
HALFBAKED can obtain information about the OS, processor, and BIOS.
System Information Discovery
can collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path.
System Information Discovery
HAWKBALL can collect the OS version, architecture information, and computer name.
System Information Discovery
HELLOKITTY can enumerate logical drives on a target system.
System Information Discovery
HermeticWiper can determine the OS version, bitness, and enumerate physical drives on a targeted host.
System Information Discovery
It has collected the hostname of a compromised machine.
System Information Discovery
Heyoka Backdoor can enumerate drives on a compromised host.
System Information Discovery
It collected the system volume serial number, GUID, and computer name.
System Information Discovery
Hildegard has collected the host's OS, CPU, and memory information.
System Information Discovery
HOPLIGHT has been observed collecting victim machine information like OS version, volume information, and more.
System Information Discovery
HotCroissant has the ability to determine if the current user is an administrator, Windows product name, processor name, screen resolution, and physical RAM of the infected host.
System Information Discovery
Hydraq creates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed.
System Information Discovery
The IceApple Server Variable Dumper module iterates over all server variables present for the current request and returns them to the adversary.
System Information Discovery
IcedID has the ability to identify the computer name and OS version on a compromised host.
System Information Discovery
It has used a reconnaissance module to gather information about the operating system and hardware on the infected host.
System Information Discovery
Industroyer collects the victim machine’s Windows GUID.
System Information Discovery
InnaputRAT gathers volume drive information and system information.
System Information Discovery
InvisiMole can gather information on the mapped drives, OS version, computer name, DEP policy, memory size, and system volume serial number.
System Information Discovery
Ixeshe collects the computer name of the victim's system during the initial infection.
System Information Discovery
JHUHUGIT obtains a build identifier as well as victim hard drive information from Windows registry key HKLM\SYSTEM\CurrentControlSet\Services\Disk\Enum. Another JHUHUGIT variant gathers the victim storage volume serial number and the storage device name.
System Information Discovery
JPIN can obtain system information such as OS version and disk space.
System Information Discovery
jRAT collects information about the OS (version, build type, install date) as well as system up-time upon receiving a connection from a backdoor.
System Information Discovery
KARAE can collect system information.
System Information Discovery
Kasidet has the ability to obtain a victim's system name and operating system version.
System Information Discovery
Kazuar gathers information on the system and local drives.
System Information Discovery
It performs operating system information discovery using systeminfo and has used implants to identify the system language and computer name.
System Information Discovery
Kerrdown has the ability to determine if the compromised host is running a 32 or 64 bit OS architecture.
System Information Discovery
Kessel has collected the system architecture, OS version, and MAC address information.
System Information Discovery
Kevin can enumerate the OS version and hostname of a targeted machine.
System Information Discovery
KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.
System Information Discovery
KEYMARBLE has the capability to collect the computer name, language settings, the OS version, CPU information, disk devices, and time elapsed since system start.
System Information Discovery
KGH_SPY can collect drive information from a compromised host.
System Information Discovery
KillDisk retrieves the hard disk name by calling the CreateFileA to \.\PHYSICALDRIVE0 API.
System Information Discovery
It has enumerated drives, OS type, OS version, and other information using a script or the "systeminfo" command.
System Information Discovery
Koadic can obtain the OS version and build, computer name, and processor architecture from a compromised host.
System Information Discovery
Kobalos can record the hostname and kernel version of the target machine.
System Information Discovery
KOCTOPUS has checked the OS version using wmic.exe and the find command.
System Information Discovery
KOMPROGO is capable of retrieving information about the infected system.
System Information Discovery
KONNI can gather the OS version, architecture information, connected drives, hostname, RAM size, and disk space information from the victim’s machine and has used cmd /c systeminfo command to get a snapshot of the current system state of the target machine.
System Information Discovery
KOPILUWAK can discover logical drive information on compromised hosts.
System Information Discovery
Kwampirs collects OS version information such as registered owner details, manufacturer details, processor type, available storage, installed patches, hostname, version info, system date, and other system information by using the commands systeminfo, net config workstation, hostname, ver, set, and date /t.
System Information Discovery
Several It malware families collect information on the type and version of the victim OS, as well as the victim computer name and CPU information. A Destover-like variant used by It also collects disk space information and sends it to its C2 server.
System Information Discovery
LightNeuron gathers the victim computer name using the Win32 API call GetComputerName.
System Information Discovery
Linfo creates a backdoor through which remote attackers can retrieve system information.
System Information Discovery
LiteDuke can enumerate the CPUID and BIOS version on a compromised system.
System Information Discovery
LitePower has the ability to list local drives and enumerate the OS architecture.
System Information Discovery
Lizar can collect the computer name from the machine,.
System Information Discovery
Lokibot has the ability to discover the computer name and Windows product name/version.
System Information Discovery
LoudMiner has monitored CPU usage.
System Information Discovery
Lucifer can collect the computer name, system architecture, default language, and processor frequency of a compromised host.
System Information Discovery
It collects the hostname of the target computer.
System Information Discovery
MacMa can collect information about a compromised computer, including: Hardware UUID, Mac serial number, macOS version, and disk sizes.
System Information Discovery
macOS.OSAMiner can gather the device serial number and has checked to ensure there is enough disk space using the Unix utility df.
System Information Discovery
Mafalda can collect the computer name and enumerate all drives on a compromised host.
System Information Discovery
It malware has used a PowerShell command to check the victim system architecture to determine if it is an x64 machine. Other malware has obtained the OS version, UUID, and computer/host name to send to the C2 server.
System Information Discovery
MarkiRAT can obtain the computer name from a compromised host.
System Information Discovery
Maze has checked the language of the infected system using the "GetUSerDefaultUILanguage" function.
System Information Discovery
metaMain can collect the computer name from a compromised host.
System Information Discovery
Metamorfo has collected the hostname and operating system version from the compromised host.
System Information Discovery
Meteor has the ability to discover the hostname of a compromised host.
System Information Discovery
Micropsia gathers the hostname and OS version from the victim’s machine.
System Information Discovery
Milan can enumerate the targeted machine's name and GUID.
System Information Discovery
MiniDuke can gather the hostname on a compromised machine.
System Information Discovery
MirageFox can collect CPU and architecture information from the victim’s machine.
System Information Discovery
The initial beacon packet for Mis-Type contains the operating system version and file system of the victim.
System Information Discovery
The initial beacon packet for Misdat contains the operating system version of the victim.
System Information Discovery
MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.
System Information Discovery
MoleNet can collect information about the about the system.
System Information Discovery
Mongall can identify drives on compromised hosts and retrieve the hostname via gethostbyname.
System Information Discovery
MoonWind can obtain the victim hostname, Windows version, RAM amount, number of drives, and screen resolution.
System Information Discovery
More_eggs has the capability to gather the OS version and computer name.
System Information Discovery
It collected information about the infected host, including the machine names and OS architecture.
System Information Discovery
It has used malware that can collect the victim’s OS version and machine name.
System Information Discovery
MURKYTOP has the capability to retrieve information about the OS.
System Information Discovery
It has gathered system information using systeminfo.
System Information Discovery
Naid collects a unique identifier (UID) from a compromised host.
System Information Discovery
NanHaiShu can gather the victim computer name and serial number.
System Information Discovery
NavRAT uses systeminfo on a victim’s machine.
System Information Discovery
NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel.
System Information Discovery
Nebulae can discover logical drive information including the drive type, free space, and volume information.
System Information Discovery
Neoichor can collect the OS version and computer name from a compromised host.
System Information Discovery
Netwalker can determine the system architecture it is running on to choose which version of the DLL to use.
System Information Discovery
NETWIRE can discover and collect victim system information.
System Information Discovery
njRAT enumerates the victim operating system and computer name during the initial infection.
System Information Discovery
NOKKI can gather information on drives and the operating system on the victim’s machine.
System Information Discovery
ObliqueRAT has the ability to check for blocklisted computer names on infected endpoints.
System Information Discovery
OceanSalt can collect the computer name from the system.