prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Information Discovery | Octopus can collect system drive information, the computer name, the size of the disk, OS version, and OS architecture information. |
System Information Discovery | It has run hostname and systeminfo on a victim. |
System Information Discovery | Okrum can collect computer name, locale information, and information about the OS and architecture. |
System Information Discovery | OopsIE checks for information on the CPU fan, temperature, mouse, hard disk, and motherboard as part of its anti-VM checks. |
System Information Discovery | During Operation CuckooBees, the threat actors used the systeminfo command to gather details about a compromised system. |
System Information Discovery | During Operation Honeybee, the threat actors collected the computer name, OS, and other system information using cmd /c systeminfo > %temp%\ temp.ini. |
System Information Discovery | During Operation Wocao, threat actors discovered the local disks attached to the system and their hardware information including manufacturer and model, as well as the OS versions of systems connected to a targeted network. |
System Information Discovery | Orz can gather the victim OS version and whether it is 64 or 32 bit. |
System Information Discovery | OSInfo discovers information about the infected machine. |
System Information Discovery | OSX/Shlayer has collected the IOPlatformUUID, session UID, and the OS version using the command sw_vers -productVersion. |
System Information Discovery | OSX_OCEANLOTUS.D collects processor information, memory information, computer name, hardware UUID, serial number, and operating system version. OSX_OCEANLOTUS.D has used the ioreg command to gather some of this information. |
System Information Discovery | Pasam creates a backdoor through which remote attackers can retrieve information such as hostname and free disk space. |
System Information Discovery | It collected the victim computer name, OS version, and architecture type and sent the information to its C2 server. It also enumerated all available drives on the victim's machine. |
System Information Discovery | Pay2Key has the ability to gather the hostname of the victim machine. |
System Information Discovery | Penquin can report the file system type and disk space of a compromised host to C2. |
System Information Discovery | PinchDuke gathers system configuration information. |
System Information Discovery | PingPull can retrieve the hostname of a compromised host. |
System Information Discovery | PipeMon can collect and send OS version and computer name as a part of its C2 beacon. |
System Information Discovery | Pisloader has a command to collect victim system information, including the system name and OS version. |
System Information Discovery | PLAINTEE collects general system enumeration data about the infected machine and checks the OS version. |
System Information Discovery | PoetRAT has the ability to gather information about the compromised host. |
System Information Discovery | Pony has collected the Service Pack, language, and region information to send to the C2. |
System Information Discovery | POORAIM can identify system information, including battery status. |
System Information Discovery | PoshC2 contains modules, such as Get-ComputerInfo, for enumerating common system information. |
System Information Discovery | PowerDuke has commands to get information about the victim's name, build, version, serial number, and memory usage. |
System Information Discovery | PowerShower has collected system information on the infected host. |
System Information Discovery | POWERSTATS can retrieve OS name/architecture and computer/domain name information from compromised hosts. |
System Information Discovery | POWRUNER may collect information about the system by running hostname and systeminfo on a victim. |
System Information Discovery | A module in Prikormka collects information from the victim about Windows OS version, computer name, battery info, and physical memory. |
System Information Discovery | Proxysvc collects the OS version, country name, MAC address, computer name, physical memory statistics, and volume information for all drives on the system. |
System Information Discovery | PUNCHBUGGY can gather system information such as computer names. |
System Information Discovery | Pupy can grab a system’s information including the OS version, architecture, etc. |
System Information Discovery | QakBot can collect system information including the OS version and domain on a compromised host. |
System Information Discovery | QuasarRAT can gather system information from the victim’s machine including the OS type. |
System Information Discovery | Ramsay can detect system information--including disk names, total space, and remaining space--to create a hardware profile GUID which acts as a system identifier for operators. |
System Information Discovery | RATANKBA gathers information about the OS architecture, OS name, and OS version/Service pack. |
System Information Discovery | RCSession can gather system information from a compromised host. |
System Information Discovery | Reaver collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information. |
System Information Discovery | RedLeaves can gather extended system information including the hostname, OS version number, platform, memory information, time elapsed since system startup, and CPU information. |
System Information Discovery | Remsec can obtain the OS version information, computer name, processor architecture, machine role, and OS edition. |
System Information Discovery | Revenge RAT collects the CPU information, OS information, and system language. |
System Information Discovery | REvil can identify the username, machine name, system language, keyboard layout, OS version, and system drive information on a compromised host. |
System Information Discovery | Rifdoor has the ability to identify the Windows version on the compromised host. |
System Information Discovery | Rising Sun can detect the computer name, operating system, and drive information, including drive type, total number of bytes on disk, total number of free bytes on disk, and name of a specified volume. |
System Information Discovery | It has used uname -m to collect the name and information about the infected system's kernel. |
System Information Discovery | RogueRobin gathers BIOS versions and manufacturers, the number of CPU cores, the total physical memory, and the computer name. |
System Information Discovery | ROKRAT can gather the hostname and the OS version to ensure it doesn’t run on a Windows XP or Windows Server 2003 systems. |
System Information Discovery | RotaJakiro executes a set of commands to collect device information, including uname. Another example is the cat /etc/*release | uniq command used to collect the current OS distribution. |
System Information Discovery | Royal can use GetNativeSystemInfo and GetLogicalDrives to enumerate system processors and logical drives. |
System Information Discovery | It can obtain the computer name, OS version, and default language identifier. |
System Information Discovery | RunningRAT gathers the OS version, logical drives information, processor information, and volume information. |
System Information Discovery | Ryuk has called GetLogicalDrives to emumerate all mounted drives, and GetDriveTypeW to determine the drive type. |
System Information Discovery | The initial beacon packet for S-Type contains the operating system version and file system of the victim. |
System Information Discovery | Saint Bot can identify the OS version, CPU, and other details from a victim's machine. |
System Information Discovery | It used a backdoor to enumerate information about the infected system's operating system. |
System Information Discovery | Sardonic has the ability to collect the computer name, CPU manufacturer name, and C:\ drive serial number from a compromised machine. Sardonic also has the ability to execute the ver and systeminfo commands. |
System Information Discovery | SDBbot has the ability to identify the OS version, OS bit information and computer name. |
System Information Discovery | ServHelper will attempt to enumerate Windows version and system architecture. |
System Information Discovery | ShadowPad has discovered system information including memory status, CPU frequency, OS versions, and volume serial numbers. |
System Information Discovery | Shamoon obtains the victim's operating system version and keyboard layout and sends the information to the C2 server. |
System Information Discovery | Shark can collect the GUID of a targeted machine. |
System Information Discovery | SharpDisco can use a plugin to enumerate system drives. |
System Information Discovery | SharpStage has checked the system settings to see if Arabic is the configured language. |
System Information Discovery | SHARPSTATS has the ability to identify the IP address, machine name, and OS of the compromised host. |
System Information Discovery | ShimRatReporter gathered the operating system name and specific Windows version of an infected machine. |
System Information Discovery | SHUTTERSPEED can collect system information. |
System Information Discovery | It has identified the OS version of a compromised host. |
System Information Discovery | SideTwist can collect the computer name of a targeted system. |
System Information Discovery | It has used tools to collect the computer name, OS version, installed hotfixes, as well as information regarding the memory and processor on a compromised host. |
System Information Discovery | SILENTTRINITY can collect information related to a compromised host, including OS version and a list of drives. |
System Information Discovery | Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use. |
System Information Discovery | SLOTHFULMEDIA has collected system name, OS version, adapter information, memory usage, and disk information from a victim machine. |
System Information Discovery | SLOWDRIFT collects and sends system information to its C2. |
System Information Discovery | SMOKEDHAM has used the systeminfo command on a compromised host. |
System Information Discovery | Snip3 has the ability to query Win32_ComputerSystem for system information. |
System Information Discovery | SodaMaster can enumerate the host name and OS version on a target system. |
System Information Discovery | During the SolarWinds Compromise, It used fsutil to check available free space before executing actions that might create large files on disk. |
System Information Discovery | SombRAT can execute getinfo to enumerate the computer name and OS version of a compromised system. |
System Information Discovery | SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo. |
System Information Discovery | SOUNDBITE is capable of gathering system information. |
System Information Discovery | It obtained OS version and hardware configuration from a victim. |
System Information Discovery | Spark can collect the hostname, keyboard layout, and language from the system. |
System Information Discovery | SpeakUp uses the cat /proc/cpuinfo | grep -c "cpu family" 2>&1 command to gather system information. |
System Information Discovery | SpicyOmelette can identify the system name of a compromised host. |
System Information Discovery | Squirrelwaffle has gathered victim computer information and configurations. |
System Information Discovery | SslMM sends information to its hard-coded C2, including OS version, service pack information, processor speed, system name, and OS install date. |
System Information Discovery | STARWHALE can gather the computer name of an infected host. |
System Information Discovery | It malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory. |
System Information Discovery | StoneDrill has the capability to discover the system OS, Windows version, architecture and environment. |
System Information Discovery | StreamEx has the ability to enumerate system information. |
System Information Discovery | StrifeWater can collect the OS version, architecture, and machine name to create a unique token for the infected host. |
System Information Discovery | StrongPity can identify the hard disk volume serial number on a compromised host. |
System Information Discovery | Stuxnet collects system information including computer and domain names, OS version, and S7P paths. |
System Information Discovery | SUNBURST collected hostname, OS version, and device uptime. |
System Information Discovery | SVCReady has the ability to collect information such as computer name, computer manufacturer, BIOS, operating system, and firmware, including through the use of systeminfo.exe. |
System Information Discovery | SynAck gathers computer names, OS version info, and also checks installed keyboard layouts to estimate if it has been launched from a certain list of countries. |
System Information Discovery | Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2. |
System Information Discovery | SYSCON has the ability to use Systeminfo to identify system information. |
System Information Discovery | Systeminfo can be used to gather information about the operating system. |
System Information Discovery | SysUpdate can collect a system's architecture, operating system version, hostname, and drive information. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.