prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Network Configuration Discovery | BADFLICK has captured victim IP address details. |
System Network Configuration Discovery | Bandook has a command to get the public IP address from a system. |
System Network Configuration Discovery | Bazar can collect the IP address and NetBIOS name of an infected machine. |
System Network Configuration Discovery | Bisonal can execute ipconfig on the victim’s machine. |
System Network Configuration Discovery | BlackEnergy has gathered information about network IP configurations using ipconfig.exe and about routing tables using route.exe. |
System Network Configuration Discovery | BLINDINGCAN has collected the victim machine's local IP address information and MAC address. |
System Network Configuration Discovery | BLUELIGHT can collect IP information from the victim’s machine. |
System Network Configuration Discovery | Bonadan can find the external IP address of the infected host. |
System Network Configuration Discovery | BoxCaon can collect the victim's MAC address by using the GetAdaptersInfo API. |
System Network Configuration Discovery | Brave Prince gathers network configuration information as well as the ARP cache. |
System Network Configuration Discovery | During C0015, the threat actors used code to obtain the external public-facing IPv4 address of the compromised host. |
System Network Configuration Discovery | During C0017, It used cmd.exe /c ping %userdomain% for discovery. |
System Network Configuration Discovery | During C0018, the threat actors ran nslookup and Advanced IP Scanner on the target network. |
System Network Configuration Discovery | Calisto runs the ifconfig command to obtain the IP address from the victim’s machine. |
System Network Configuration Discovery | Carbon can collect the IP address of the victims and other computers on the network using the commands: ipconfig -all nbtstat -n, and nbtstat -s. |
System Network Configuration Discovery | Catchamas gathers the Mac address, IP address, and the network adapter information from the victim’s machine. |
System Network Configuration Discovery | Caterpillar WebShell can gather the IP address from the victim's machine using the IP config command. |
System Network Configuration Discovery | CharmPower has the ability to use ipconfig to enumerate system network settings. |
System Network Configuration Discovery | It has used ipconfig, Ping, and tracert to enumerate the IP address and network environment and settings of the local host. |
System Network Configuration Discovery | Chrommme can enumerate the IP address of a compromised host. |
System Network Configuration Discovery | Clambling can enumerate the IP address of a compromised machine. |
System Network Configuration Discovery | Cobalt Strike can determine the NetBios name and the IP addresses of targets machines including domain controllers. |
System Network Configuration Discovery | Comnie uses ipconfig /all and route PRINT to identify network adapter and interface information. |
System Network Configuration Discovery | Conti can retrieve the ARP cache from the local system by using the GetIpNetTable() API call and check to ensure IP addresses it connects to are for local, non-Internet, systems. |
System Network Configuration Discovery | CrackMapExec can collect DNS information from the targeted system. |
System Network Configuration Discovery | CreepySnail can use getmac and Get-NetIPAddress to enumerate network settings. |
System Network Configuration Discovery | Crimson contains a command to collect the victim MAC address and LAN IP. |
System Network Configuration Discovery | Cuba can retrieve the ARP cache from the local system by using GetIpNetTable. |
System Network Configuration Discovery | Cyclops Blink can use the Linux API if_nameindex to gather network interface names. |
System Network Configuration Discovery | It has collected the IP address and network adapter information from the victim’s machine. |
System Network Configuration Discovery | DEADEYE can discover the DNS domain name of a targeted system. |
System Network Configuration Discovery | Denis uses ipconfig to gather the IP address from the system. |
System Network Configuration Discovery | Diavol can enumerate victims' local and external IPs when registering with C2. |
System Network Configuration Discovery | down_new has the ability to identify the MAC address of a compromised host. |
System Network Configuration Discovery | It has used batch scripts to enumerate network information, including information about trusts, zones, and the domain. |
System Network Configuration Discovery | Dtrack can collect the host's IP addresses using the ipconfig command. |
System Network Configuration Discovery | The reconnaissance modules used with Duqu can collect information on network configuration. |
System Network Configuration Discovery | Dyre has the ability to identify network settings on a compromised host. |
System Network Configuration Discovery | It used the command ipconfig to obtain information about network configurations. |
System Network Configuration Discovery | EKANS can determine the domain of a compromised host. |
System Network Configuration Discovery | Elise executes ipconfig /all after initial communication is made to the remote server. |
System Network Configuration Discovery | Emissary has the capability to execute the command ipconfig /all. |
System Network Configuration Discovery | Empire can acquire network configuration information like DNS servers, public IP, and network proxies used by a host. |
System Network Configuration Discovery | Epic uses the nbtstat -n and nbtstat -s commands on the victim’s machine. |
System Network Configuration Discovery | Explosive has collected the MAC address from the victim's machine. |
System Network Configuration Discovery | FALLCHILL collects MAC address and local IP address information from the victim. |
System Network Configuration Discovery | FatDuke can identify the MAC address on the target computer. |
System Network Configuration Discovery | Felismus collects the victim LAN IP address and sends it to the C2 server. |
System Network Configuration Discovery | FELIXROOT collects information about the network including the IP address and DHCP server. |
System Network Configuration Discovery | It has used nslookup and ipconfig for network reconnaissance efforts. It has also utilized a compromised Symantec Altiris console and LanDesk account to retrieve network information. |
System Network Configuration Discovery | Flagpro has been used to execute the ipconfig /all command on a victim system. |
System Network Configuration Discovery | During Frankenstein, the threat actors used Empire to find the public IP address of a compromised system. |
System Network Configuration Discovery | FunnyDream can parse the ProxyServer string in the Registry to discover http proxies. |
System Network Configuration Discovery | During FunnyDream, the threat actors used ipconfig for discovery on remote systems. |
System Network Configuration Discovery | It used ipconfig /all to obtain information about the victim network configuration. The group also ran a modified version of NBTscan to identify available NetBIOS name servers. |
System Network Configuration Discovery | GeminiDuke collects information on network settings and Internet proxy settings from the victim. |
System Network Configuration Discovery | GoldMax retrieved a list of the system's network interface after execution. |
System Network Configuration Discovery | Grandoreiro can determine the IP and physical location of the compromised host via IPinfo. |
System Network Configuration Discovery | GravityRAT collects the victim IP address, MAC address, as well as the victim account domain name. |
System Network Configuration Discovery | Green Lambert can obtain proxy information from a victim's machine using system environment variables. |
System Network Configuration Discovery | GrimAgent can enumerate the IP and domain of a target system. |
System Network Configuration Discovery | It has collected IP information via IPInfo. |
System Network Configuration Discovery | It has used Ping and tracert for network discovery. |
System Network Configuration Discovery | It used ipconfig to gather network configuration information. |
System Network Configuration Discovery | HotCroissant has the ability to identify the IP address of the compromised machine. |
System Network Configuration Discovery | Hydraq creates a backdoor through which remote attackers can retrieve IP addresses of compromised machines. |
System Network Configuration Discovery | The IceApple ifconfig module can iterate over all network interfaces on the host and retrieve the name, description, MAC address, DNS suffix, DNS servers, gateways, IPv4 addresses, and subnet masks. |
System Network Configuration Discovery | ifconfig can be used to display adapter configuration on Unix systems, including information for TCP/IP, DNS, and DHCP. |
System Network Configuration Discovery | iKitten will look for the current IP address. |
System Network Configuration Discovery | Industroyer’s 61850 payload component enumerates connected network adapters and their corresponding IP addresses. |
System Network Configuration Discovery | InvisiMole gathers information on the IP forwarding table, MAC address, configured proxy, and network SSID. |
System Network Configuration Discovery | ipconfig can be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP. |
System Network Configuration Discovery | Ixeshe enumerates the IP address, network proxy settings, and domain name from a victim's system. |
System Network Configuration Discovery | A JHUHUGIT variant gathers network interface card information. |
System Network Configuration Discovery | JPIN can obtain network information, including DNS, IP, and proxies. |
System Network Configuration Discovery | jRAT can gather victim internal and external IPs. |
System Network Configuration Discovery | Kazuar gathers information about network adapters. |
System Network Configuration Discovery | It has performed local network configuration discovery using ipconfig. |
System Network Configuration Discovery | Kessel has collected the DNS address of the infected host. |
System Network Configuration Discovery | Kevin can collect the MAC address and other information from a victim machine using ipconfig/all. |
System Network Configuration Discovery | KeyBoy can determine the public or WAN IP address for the system. |
System Network Configuration Discovery | KEYMARBLE gathers the MAC address of the victim’s machine. |
System Network Configuration Discovery | It has used ipconfig/all to gather network configuration information. |
System Network Configuration Discovery | Koadic can retrieve the contents of the IP routing table as well as information about the Windows domain. |
System Network Configuration Discovery | Kobalos can record the IP address of the target machine. |
System Network Configuration Discovery | KONNI can collect the IP address from the victim’s machine. |
System Network Configuration Discovery | KOPILUWAK can use Arp to discover a target's network configuration setttings. |
System Network Configuration Discovery | Kwampirs collects network adapter and interface information by using the commands ipconfig /all, arp -a and route print. It also collects the system's MAC address with getmac and domain configuration with net config workstation. |
System Network Configuration Discovery | It malware IndiaIndia obtains and sends to its C2 server information about the first network interface card’s configuration, including IP address, gateways, subnet mask, DHCP information, and whether WINS is available. |
System Network Configuration Discovery | LightNeuron gathers information about network adapters using the Win32 API call GetAdaptersInfo. |
System Network Configuration Discovery | LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera. |
System Network Configuration Discovery | Lizar can retrieve network information from a compromised host. |
System Network Configuration Discovery | Lokibot has the ability to discover the domain name of the infected host. |
System Network Configuration Discovery | LoudMiner used a script to gather the IP address of the infected machine before sending to the C2. |
System Network Configuration Discovery | Lucifer can collect the IP address of a compromised host. |
System Network Configuration Discovery | It collects the MAC address of the target computer and other network configuration information. |
System Network Configuration Discovery | MacMa can collect IP addresses from a compromised host. |
System Network Configuration Discovery | Mafalda can use the GetAdaptersInfo function to retrieve information about network adapters and the GetIpNetTable function to retrieve the IPv4 to physical network address mapping table. |
System Network Configuration Discovery | It malware gathers the victim's local IP address, MAC address, and external IP address. |
System Network Configuration Discovery | It has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.