prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Information Discovery
Octopus can collect system drive information, the computer name, the size of the disk, OS version, and OS architecture information.
System Information Discovery
It has run hostname and systeminfo on a victim.
System Information Discovery
Okrum can collect computer name, locale information, and information about the OS and architecture.
System Information Discovery
OopsIE checks for information on the CPU fan, temperature, mouse, hard disk, and motherboard as part of its anti-VM checks.
System Information Discovery
During Operation CuckooBees, the threat actors used the systeminfo command to gather details about a compromised system.
System Information Discovery
During Operation Honeybee, the threat actors collected the computer name, OS, and other system information using cmd /c systeminfo > %temp%\ temp.ini.
System Information Discovery
During Operation Wocao, threat actors discovered the local disks attached to the system and their hardware information including manufacturer and model, as well as the OS versions of systems connected to a targeted network.
System Information Discovery
Orz can gather the victim OS version and whether it is 64 or 32 bit.
System Information Discovery
OSInfo discovers information about the infected machine.
System Information Discovery
OSX/Shlayer has collected the IOPlatformUUID, session UID, and the OS version using the command sw_vers -productVersion.
System Information Discovery
OSX_OCEANLOTUS.D collects processor information, memory information, computer name, hardware UUID, serial number, and operating system version. OSX_OCEANLOTUS.D has used the ioreg command to gather some of this information.
System Information Discovery
Pasam creates a backdoor through which remote attackers can retrieve information such as hostname and free disk space.
System Information Discovery
It collected the victim computer name, OS version, and architecture type and sent the information to its C2 server. It also enumerated all available drives on the victim's machine.
System Information Discovery
Pay2Key has the ability to gather the hostname of the victim machine.
System Information Discovery
Penquin can report the file system type and disk space of a compromised host to C2.
System Information Discovery
PinchDuke gathers system configuration information.
System Information Discovery
PingPull can retrieve the hostname of a compromised host.
System Information Discovery
PipeMon can collect and send OS version and computer name as a part of its C2 beacon.
System Information Discovery
Pisloader has a command to collect victim system information, including the system name and OS version.
System Information Discovery
PLAINTEE collects general system enumeration data about the infected machine and checks the OS version.
System Information Discovery
PoetRAT has the ability to gather information about the compromised host.
System Information Discovery
Pony has collected the Service Pack, language, and region information to send to the C2.
System Information Discovery
POORAIM can identify system information, including battery status.
System Information Discovery
PoshC2 contains modules, such as Get-ComputerInfo, for enumerating common system information.
System Information Discovery
PowerDuke has commands to get information about the victim's name, build, version, serial number, and memory usage.
System Information Discovery
PowerShower has collected system information on the infected host.
System Information Discovery
POWERSTATS can retrieve OS name/architecture and computer/domain name information from compromised hosts.
System Information Discovery
POWRUNER may collect information about the system by running hostname and systeminfo on a victim.
System Information Discovery
A module in Prikormka collects information from the victim about Windows OS version, computer name, battery info, and physical memory.
System Information Discovery
Proxysvc collects the OS version, country name, MAC address, computer name, physical memory statistics, and volume information for all drives on the system.
System Information Discovery
PUNCHBUGGY can gather system information such as computer names.
System Information Discovery
Pupy can grab a system’s information including the OS version, architecture, etc.
System Information Discovery
QakBot can collect system information including the OS version and domain on a compromised host.
System Information Discovery
QuasarRAT can gather system information from the victim’s machine including the OS type.
System Information Discovery
Ramsay can detect system information--including disk names, total space, and remaining space--to create a hardware profile GUID which acts as a system identifier for operators.
System Information Discovery
RATANKBA gathers information about the OS architecture, OS name, and OS version/Service pack.
System Information Discovery
RCSession can gather system information from a compromised host.
System Information Discovery
Reaver collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information.
System Information Discovery
RedLeaves can gather extended system information including the hostname, OS version number, platform, memory information, time elapsed since system startup, and CPU information.
System Information Discovery
Remsec can obtain the OS version information, computer name, processor architecture, machine role, and OS edition.
System Information Discovery
Revenge RAT collects the CPU information, OS information, and system language.
System Information Discovery
REvil can identify the username, machine name, system language, keyboard layout, OS version, and system drive information on a compromised host.
System Information Discovery
Rifdoor has the ability to identify the Windows version on the compromised host.
System Information Discovery
Rising Sun can detect the computer name, operating system, and drive information, including drive type, total number of bytes on disk, total number of free bytes on disk, and name of a specified volume.
System Information Discovery
It has used uname -m to collect the name and information about the infected system's kernel.
System Information Discovery
RogueRobin gathers BIOS versions and manufacturers, the number of CPU cores, the total physical memory, and the computer name.
System Information Discovery
ROKRAT can gather the hostname and the OS version to ensure it doesn’t run on a Windows XP or Windows Server 2003 systems.
System Information Discovery
RotaJakiro executes a set of commands to collect device information, including uname. Another example is the cat /etc/*release | uniq command used to collect the current OS distribution.
System Information Discovery
Royal can use GetNativeSystemInfo and GetLogicalDrives to enumerate system processors and logical drives.
System Information Discovery
It can obtain the computer name, OS version, and default language identifier.
System Information Discovery
RunningRAT gathers the OS version, logical drives information, processor information, and volume information.
System Information Discovery
Ryuk has called GetLogicalDrives to emumerate all mounted drives, and GetDriveTypeW to determine the drive type.
System Information Discovery
The initial beacon packet for S-Type contains the operating system version and file system of the victim.
System Information Discovery
Saint Bot can identify the OS version, CPU, and other details from a victim's machine.
System Information Discovery
It used a backdoor to enumerate information about the infected system's operating system.
System Information Discovery
Sardonic has the ability to collect the computer name, CPU manufacturer name, and C:\ drive serial number from a compromised machine. Sardonic also has the ability to execute the ver and systeminfo commands.
System Information Discovery
SDBbot has the ability to identify the OS version, OS bit information and computer name.
System Information Discovery
ServHelper will attempt to enumerate Windows version and system architecture.
System Information Discovery
ShadowPad has discovered system information including memory status, CPU frequency, OS versions, and volume serial numbers.
System Information Discovery
Shamoon obtains the victim's operating system version and keyboard layout and sends the information to the C2 server.
System Information Discovery
Shark can collect the GUID of a targeted machine.
System Information Discovery
SharpDisco can use a plugin to enumerate system drives.
System Information Discovery
SharpStage has checked the system settings to see if Arabic is the configured language.
System Information Discovery
SHARPSTATS has the ability to identify the IP address, machine name, and OS of the compromised host.
System Information Discovery
ShimRatReporter gathered the operating system name and specific Windows version of an infected machine.
System Information Discovery
SHUTTERSPEED can collect system information.
System Information Discovery
It has identified the OS version of a compromised host.
System Information Discovery
SideTwist can collect the computer name of a targeted system.
System Information Discovery
It has used tools to collect the computer name, OS version, installed hotfixes, as well as information regarding the memory and processor on a compromised host.
System Information Discovery
SILENTTRINITY can collect information related to a compromised host, including OS version and a list of drives.
System Information Discovery
Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use.
System Information Discovery
SLOTHFULMEDIA has collected system name, OS version, adapter information, memory usage, and disk information from a victim machine.
System Information Discovery
SLOWDRIFT collects and sends system information to its C2.
System Information Discovery
SMOKEDHAM has used the systeminfo command on a compromised host.
System Information Discovery
Snip3 has the ability to query Win32_ComputerSystem for system information.
System Information Discovery
SodaMaster can enumerate the host name and OS version on a target system.
System Information Discovery
During the SolarWinds Compromise, It used fsutil to check available free space before executing actions that might create large files on disk.
System Information Discovery
SombRAT can execute getinfo to enumerate the computer name and OS version of a compromised system.
System Information Discovery
SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo.
System Information Discovery
SOUNDBITE is capable of gathering system information.
System Information Discovery
It obtained OS version and hardware configuration from a victim.
System Information Discovery
Spark can collect the hostname, keyboard layout, and language from the system.
System Information Discovery
SpeakUp uses the cat /proc/cpuinfo | grep -c "cpu family" 2>&1 command to gather system information.
System Information Discovery
SpicyOmelette can identify the system name of a compromised host.
System Information Discovery
Squirrelwaffle has gathered victim computer information and configurations.
System Information Discovery
SslMM sends information to its hard-coded C2, including OS version, service pack information, processor speed, system name, and OS install date.
System Information Discovery
STARWHALE can gather the computer name of an infected host.
System Information Discovery
It malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory.
System Information Discovery
StoneDrill has the capability to discover the system OS, Windows version, architecture and environment.
System Information Discovery
StreamEx has the ability to enumerate system information.
System Information Discovery
StrifeWater can collect the OS version, architecture, and machine name to create a unique token for the infected host.
System Information Discovery
StrongPity can identify the hard disk volume serial number on a compromised host.
System Information Discovery
Stuxnet collects system information including computer and domain names, OS version, and S7P paths.
System Information Discovery
SUNBURST collected hostname, OS version, and device uptime.
System Information Discovery
SVCReady has the ability to collect information such as computer name, computer manufacturer, BIOS, operating system, and firmware, including through the use of systeminfo.exe.
System Information Discovery
SynAck gathers computer names, OS version info, and also checks installed keyboard layouts to estimate if it has been launched from a certain list of countries.
System Information Discovery
Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2.
System Information Discovery
SYSCON has the ability to use Systeminfo to identify system information.
System Information Discovery
Systeminfo can be used to gather information about the operating system.
System Information Discovery
SysUpdate can collect a system's architecture, operating system version, hostname, and drive information.