prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Network Configuration Discovery
BADFLICK has captured victim IP address details.
System Network Configuration Discovery
Bandook has a command to get the public IP address from a system.
System Network Configuration Discovery
Bazar can collect the IP address and NetBIOS name of an infected machine.
System Network Configuration Discovery
Bisonal can execute ipconfig on the victim’s machine.
System Network Configuration Discovery
BlackEnergy has gathered information about network IP configurations using ipconfig.exe and about routing tables using route.exe.
System Network Configuration Discovery
BLINDINGCAN has collected the victim machine's local IP address information and MAC address.
System Network Configuration Discovery
BLUELIGHT can collect IP information from the victim’s machine.
System Network Configuration Discovery
Bonadan can find the external IP address of the infected host.
System Network Configuration Discovery
BoxCaon can collect the victim's MAC address by using the GetAdaptersInfo API.
System Network Configuration Discovery
Brave Prince gathers network configuration information as well as the ARP cache.
System Network Configuration Discovery
During C0015, the threat actors used code to obtain the external public-facing IPv4 address of the compromised host.
System Network Configuration Discovery
During C0017, It used cmd.exe /c ping %userdomain% for discovery.
System Network Configuration Discovery
During C0018, the threat actors ran nslookup and Advanced IP Scanner on the target network.
System Network Configuration Discovery
Calisto runs the ifconfig command to obtain the IP address from the victim’s machine.
System Network Configuration Discovery
Carbon can collect the IP address of the victims and other computers on the network using the commands: ipconfig -all nbtstat -n, and nbtstat -s.
System Network Configuration Discovery
Catchamas gathers the Mac address, IP address, and the network adapter information from the victim’s machine.
System Network Configuration Discovery
Caterpillar WebShell can gather the IP address from the victim's machine using the IP config command.
System Network Configuration Discovery
CharmPower has the ability to use ipconfig to enumerate system network settings.
System Network Configuration Discovery
It has used ipconfig, Ping, and tracert to enumerate the IP address and network environment and settings of the local host.
System Network Configuration Discovery
Chrommme can enumerate the IP address of a compromised host.
System Network Configuration Discovery
Clambling can enumerate the IP address of a compromised machine.
System Network Configuration Discovery
Cobalt Strike can determine the NetBios name and the IP addresses of targets machines including domain controllers.
System Network Configuration Discovery
Comnie uses ipconfig /all and route PRINT to identify network adapter and interface information.
System Network Configuration Discovery
Conti can retrieve the ARP cache from the local system by using the GetIpNetTable() API call and check to ensure IP addresses it connects to are for local, non-Internet, systems.
System Network Configuration Discovery
CrackMapExec can collect DNS information from the targeted system.
System Network Configuration Discovery
CreepySnail can use getmac and Get-NetIPAddress to enumerate network settings.
System Network Configuration Discovery
Crimson contains a command to collect the victim MAC address and LAN IP.
System Network Configuration Discovery
Cuba can retrieve the ARP cache from the local system by using GetIpNetTable.
System Network Configuration Discovery
Cyclops Blink can use the Linux API if_nameindex to gather network interface names.
System Network Configuration Discovery
It has collected the IP address and network adapter information from the victim’s machine.
System Network Configuration Discovery
DEADEYE can discover the DNS domain name of a targeted system.
System Network Configuration Discovery
Denis uses ipconfig to gather the IP address from the system.
System Network Configuration Discovery
Diavol can enumerate victims' local and external IPs when registering with C2.
System Network Configuration Discovery
down_new has the ability to identify the MAC address of a compromised host.
System Network Configuration Discovery
It has used batch scripts to enumerate network information, including information about trusts, zones, and the domain.
System Network Configuration Discovery
Dtrack can collect the host's IP addresses using the ipconfig command.
System Network Configuration Discovery
The reconnaissance modules used with Duqu can collect information on network configuration.
System Network Configuration Discovery
Dyre has the ability to identify network settings on a compromised host.
System Network Configuration Discovery
It used the command ipconfig to obtain information about network configurations.
System Network Configuration Discovery
EKANS can determine the domain of a compromised host.
System Network Configuration Discovery
Elise executes ipconfig /all after initial communication is made to the remote server.
System Network Configuration Discovery
Emissary has the capability to execute the command ipconfig /all.
System Network Configuration Discovery
Empire can acquire network configuration information like DNS servers, public IP, and network proxies used by a host.
System Network Configuration Discovery
Epic uses the nbtstat -n and nbtstat -s commands on the victim’s machine.
System Network Configuration Discovery
Explosive has collected the MAC address from the victim's machine.
System Network Configuration Discovery
FALLCHILL collects MAC address and local IP address information from the victim.
System Network Configuration Discovery
FatDuke can identify the MAC address on the target computer.
System Network Configuration Discovery
Felismus collects the victim LAN IP address and sends it to the C2 server.
System Network Configuration Discovery
FELIXROOT collects information about the network including the IP address and DHCP server.
System Network Configuration Discovery
It has used nslookup and ipconfig for network reconnaissance efforts. It has also utilized a compromised Symantec Altiris console and LanDesk account to retrieve network information.
System Network Configuration Discovery
Flagpro has been used to execute the ipconfig /all command on a victim system.
System Network Configuration Discovery
During Frankenstein, the threat actors used Empire to find the public IP address of a compromised system.
System Network Configuration Discovery
FunnyDream can parse the ProxyServer string in the Registry to discover http proxies.
System Network Configuration Discovery
During FunnyDream, the threat actors used ipconfig for discovery on remote systems.
System Network Configuration Discovery
It used ipconfig /all to obtain information about the victim network configuration. The group also ran a modified version of NBTscan to identify available NetBIOS name servers.
System Network Configuration Discovery
GeminiDuke collects information on network settings and Internet proxy settings from the victim.
System Network Configuration Discovery
GoldMax retrieved a list of the system's network interface after execution.
System Network Configuration Discovery
Grandoreiro can determine the IP and physical location of the compromised host via IPinfo.
System Network Configuration Discovery
GravityRAT collects the victim IP address, MAC address, as well as the victim account domain name.
System Network Configuration Discovery
Green Lambert can obtain proxy information from a victim's machine using system environment variables.
System Network Configuration Discovery
GrimAgent can enumerate the IP and domain of a target system.
System Network Configuration Discovery
It has collected IP information via IPInfo.
System Network Configuration Discovery
It has used Ping and tracert for network discovery.
System Network Configuration Discovery
It used ipconfig to gather network configuration information.
System Network Configuration Discovery
HotCroissant has the ability to identify the IP address of the compromised machine.
System Network Configuration Discovery
Hydraq creates a backdoor through which remote attackers can retrieve IP addresses of compromised machines.
System Network Configuration Discovery
The IceApple ifconfig module can iterate over all network interfaces on the host and retrieve the name, description, MAC address, DNS suffix, DNS servers, gateways, IPv4 addresses, and subnet masks.
System Network Configuration Discovery
ifconfig can be used to display adapter configuration on Unix systems, including information for TCP/IP, DNS, and DHCP.
System Network Configuration Discovery
iKitten will look for the current IP address.
System Network Configuration Discovery
Industroyer’s 61850 payload component enumerates connected network adapters and their corresponding IP addresses.
System Network Configuration Discovery
InvisiMole gathers information on the IP forwarding table, MAC address, configured proxy, and network SSID.
System Network Configuration Discovery
ipconfig can be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP.
System Network Configuration Discovery
Ixeshe enumerates the IP address, network proxy settings, and domain name from a victim's system.
System Network Configuration Discovery
A JHUHUGIT variant gathers network interface card information.
System Network Configuration Discovery
JPIN can obtain network information, including DNS, IP, and proxies.
System Network Configuration Discovery
jRAT can gather victim internal and external IPs.
System Network Configuration Discovery
Kazuar gathers information about network adapters.
System Network Configuration Discovery
It has performed local network configuration discovery using ipconfig.
System Network Configuration Discovery
Kessel has collected the DNS address of the infected host.
System Network Configuration Discovery
Kevin can collect the MAC address and other information from a victim machine using ipconfig/all.
System Network Configuration Discovery
KeyBoy can determine the public or WAN IP address for the system.
System Network Configuration Discovery
KEYMARBLE gathers the MAC address of the victim’s machine.
System Network Configuration Discovery
It has used ipconfig/all to gather network configuration information.
System Network Configuration Discovery
Koadic can retrieve the contents of the IP routing table as well as information about the Windows domain.
System Network Configuration Discovery
Kobalos can record the IP address of the target machine.
System Network Configuration Discovery
KONNI can collect the IP address from the victim’s machine.
System Network Configuration Discovery
KOPILUWAK can use Arp to discover a target's network configuration setttings.
System Network Configuration Discovery
Kwampirs collects network adapter and interface information by using the commands ipconfig /all, arp -a and route print. It also collects the system's MAC address with getmac and domain configuration with net config workstation.
System Network Configuration Discovery
It malware IndiaIndia obtains and sends to its C2 server information about the first network interface card’s configuration, including IP address, gateways, subnet mask, DHCP information, and whether WINS is available.
System Network Configuration Discovery
LightNeuron gathers information about network adapters using the Win32 API call GetAdaptersInfo.
System Network Configuration Discovery
LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera.
System Network Configuration Discovery
Lizar can retrieve network information from a compromised host.
System Network Configuration Discovery
Lokibot has the ability to discover the domain name of the infected host.
System Network Configuration Discovery
LoudMiner used a script to gather the IP address of the infected machine before sending to the C2.
System Network Configuration Discovery
Lucifer can collect the IP address of a compromised host.
System Network Configuration Discovery
It collects the MAC address of the target computer and other network configuration information.
System Network Configuration Discovery
MacMa can collect IP addresses from a compromised host.
System Network Configuration Discovery
Mafalda can use the GetAdaptersInfo function to retrieve information about network adapters and the GetIpNetTable function to retrieve the IPv4 to physical network address mapping table.
System Network Configuration Discovery
It malware gathers the victim's local IP address, MAC address, and external IP address.
System Network Configuration Discovery
It has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions.