prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Network Configuration Discovery | Milan can run C:\Windows\system32\cmd.exe /c cmd /c ipconfig /all 2>&1 to discover network settings. |
System Network Configuration Discovery | Mis-Type may create a file containing the results of the command cmd.exe /c ipconfig /all. |
System Network Configuration Discovery | MoonWind obtains the victim IP address. |
System Network Configuration Discovery | More_eggs has the capability to gather the IP address from the victim's machine. |
System Network Configuration Discovery | It has collected the domain name of a compromised network. |
System Network Configuration Discovery | Mosquito uses the ipconfig command. |
System Network Configuration Discovery | It has used malware to collect the victim’s IP address and domain name. |
System Network Configuration Discovery | It has used ipconfig and arp to determine network configuration information. |
System Network Configuration Discovery | Naid collects the domain name from a compromised host. |
System Network Configuration Discovery | It uses commands such as netsh interface show to discover network interface settings. |
System Network Configuration Discovery | NanHaiShu can gather information about the victim proxy server. |
System Network Configuration Discovery | NanoCore gathers the IP address from the victim’s machine. |
System Network Configuration Discovery | NBTscan can be used to collect MAC addresses. |
System Network Configuration Discovery | nbtstat can be used to discover local NetBIOS domain names. |
System Network Configuration Discovery | Neoichor can gather the IP address from an infected host. |
System Network Configuration Discovery | NETWIRE can collect the IP address of a compromised host. |
System Network Configuration Discovery | Nltest may be used to enumerate the parent domain of a local machine using /parentdomain. |
System Network Configuration Discovery | NOKKI can gather information on the victim IP address. |
System Network Configuration Discovery | OceanSalt can collect the victim’s IP address. |
System Network Configuration Discovery | Octopus can collect the host IP address from the victim’s machine. |
System Network Configuration Discovery | It has run ipconfig /all on a victim. |
System Network Configuration Discovery | Okrum can collect network information, including the host IP address, DNS, and proxy information. |
System Network Configuration Discovery | Olympic Destroyer uses API calls to enumerate the infected system's ARP table. |
System Network Configuration Discovery | During Operation CuckooBees, the threat actors used ipconfig, nbtstat, tracert, route print, and cat /etc/hosts commands. |
System Network Configuration Discovery | During Operation Wocao, threat actors discovered the local network configuration with ipconfig. |
System Network Configuration Discovery | Orz can gather victim proxy information. |
System Network Configuration Discovery | OSInfo discovers the current domain information. |
System Network Configuration Discovery | OSX_OCEANLOTUS.D can collect the network interface MAC address on the infected host. |
System Network Configuration Discovery | Pay2Key can identify the IP and MAC addresses of the compromised host. |
System Network Configuration Discovery | PcShare can obtain the proxy settings of a compromised machine using InternetQueryOptionA and its IP address by running nslookup myip.opendns.comresolver1.opendns.com\r\n. |
System Network Configuration Discovery | Penquin can report the IP of the compromised host to attacker controlled infrastructure. |
System Network Configuration Discovery | PingPull can retrieve the IP address of a compromised host. |
System Network Configuration Discovery | PipeMon can collect and send the local IP address, RDP information, and the network adapter physical address as a part of its C2 beacon. |
System Network Configuration Discovery | Pisloader has a command to collect the victim's IP address. |
System Network Configuration Discovery | PLAINTEE uses the ipconfig /all command to gather the victim’s IP address. |
System Network Configuration Discovery | PoshC2 can enumerate network adapter information. |
System Network Configuration Discovery | PowerDuke has a command to get the victim's domain and NetBIOS name. |
System Network Configuration Discovery | PowerShower has the ability to identify the current Windows domain of the infected host. |
System Network Configuration Discovery | POWERSTATS can retrieve IP, network adapter configuration information, and domain from compromised hosts. |
System Network Configuration Discovery | POWRUNER may collect network configuration data by running ipconfig /all on a victim. |
System Network Configuration Discovery | A module in Prikormka collects information from the victim about its IP addresses and MAC addresses. |
System Network Configuration Discovery | Proxysvc collects the network adapter information and domain/username information based on current remote sessions. |
System Network Configuration Discovery | Pupy has built in commands to identify a host’s IP address and find out other network configuration settings by viewing connected sessions. |
System Network Configuration Discovery | Pysa can perform network reconnaissance using the Advanced IP Scanner tool. |
System Network Configuration Discovery | QakBot can use net config workstation, arp -a, nslookup, and ipconfig /all to gather network configuration information. |
System Network Configuration Discovery | QUADAGENT gathers the current domain the victim system belongs to. |
System Network Configuration Discovery | QuasarRAT has the ability to enumerate the Wide Area Network (WAN) IP through requests to ip-api[.]com, freegeoip[.]net, or api[.]ipify[.]org observed with user-agent string Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0. |
System Network Configuration Discovery | QUIETCANARY can identify the default proxy setting on a compromised host. |
System Network Configuration Discovery | Ramsay can use ipconfig and Arp to collect network configuration information, including routing information and ARP tables. |
System Network Configuration Discovery | RATANKBA gathers the victim’s IP address via the ipconfig -all command. |
System Network Configuration Discovery | Reaver collects the victim's IP address. |
System Network Configuration Discovery | RedLeaves can obtain information about network parameters. |
System Network Configuration Discovery | Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache. |
System Network Configuration Discovery | Revenge RAT collects the IP address and MAC address from the system. |
System Network Configuration Discovery | Rifdoor has the ability to identify the IP address of the compromised host. |
System Network Configuration Discovery | Rising Sun can detect network adapter and IP address information. |
System Network Configuration Discovery | RogueRobin gathers the IP address and domain from the victim’s machine. |
System Network Configuration Discovery | route can be used to discover routing configuration information. |
System Network Configuration Discovery | Royal can enumerate IP addresses using GetIpAddrTable. |
System Network Configuration Discovery | Ryuk has called GetIpNetTable in attempt to identify all mounted drives and hosts that have Address Resolution Protocol (ARP) entries. |
System Network Configuration Discovery | S-Type has used ipconfig /all on a compromised host. |
System Network Configuration Discovery | Saint Bot can collect the IP address of a victim machine. |
System Network Configuration Discovery | Sardonic has the ability to execute the ipconfig command. |
System Network Configuration Discovery | SDBbot has the ability to determine the domain name and whether a proxy is configured on a compromised host. |
System Network Configuration Discovery | ShadowPad has collected the domain name of the victim system. |
System Network Configuration Discovery | Shamoon obtains the target's IP address and local network segment. |
System Network Configuration Discovery | SHARPSTATS has the ability to identify the domain of the compromised host. |
System Network Configuration Discovery | ShimRatReporter gathered the local proxy, domain, IP, routing tables, mac address, gateway, DNS servers, and DHCP status information from an infected host. |
System Network Configuration Discovery | Sibot checked if the compromised system is configured to use proxies. |
System Network Configuration Discovery | It has identified the IP address of a compromised host. |
System Network Configuration Discovery | SideTwist has the ability to collect the domain name on a compromised host. |
System Network Configuration Discovery | It has used malware to collect information on network interfaces, including the MAC address. |
System Network Configuration Discovery | Sliver has the ability to gather network configuration information. |
System Network Configuration Discovery | Small Sieve can obtain the IP address of a victim host. |
System Network Configuration Discovery | SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via ipconfig.exe /all. |
System Network Configuration Discovery | SpeakUp uses the ifconfig -a command. |
System Network Configuration Discovery | SpicyOmelette can identify the IP of a compromised system. |
System Network Configuration Discovery | Squirrelwaffle has collected the victim’s external IP address. |
System Network Configuration Discovery | STARWHALE has the ability to collect the IP address of an infected host. |
System Network Configuration Discovery | It malware gathers the Address Resolution Protocol (ARP) table from the victim. |
System Network Configuration Discovery | StrongPity can identify the IP address of a compromised host. |
System Network Configuration Discovery | Stuxnet collects the IP address of a compromised system. |
System Network Configuration Discovery | SUNBURST collected all network interface MAC addresses that are up and not loopback devices, as well as IP address, DHCP configuration, and domain information. |
System Network Configuration Discovery | Sykipot may use ipconfig /all to gather system network configuration details. |
System Network Configuration Discovery | Sys10 collects the local IP address of the victim and sends it to the C2. |
System Network Configuration Discovery | SysUpdate can collected the IP address and domain name of a compromised host. |
System Network Configuration Discovery | T9000 gathers and beacons the MAC and IP addresses during installation. |
System Network Configuration Discovery | Taidoor has collected the MAC address of a compromised host; it can also use GetAdaptersInfo to identify network adapters. |
System Network Configuration Discovery | TajMahal has the ability to identify the MAC address on an infected host. |
System Network Configuration Discovery | It has enumerated the host machine’s IP address. |
System Network Configuration Discovery | It actors use NBTscan to discover vulnerable systems. |
System Network Configuration Discovery | Torisma can collect the local MAC address using GetAdaptersInfo as well as the system's IP address. |
System Network Configuration Discovery | TrickBot obtains the IP address, location, and other relevant network information from the victim’s machine. |
System Network Configuration Discovery | Trojan.Karagany can gather information on the network configuration of a compromised host. |
System Network Configuration Discovery | It has used scripts to collect the host's network topology. |
System Network Configuration Discovery | TSCookie has the ability to identify the IP of the infected host. |
System Network Configuration Discovery | Turian can retrieve the internal IP address of a compromised host. |
System Network Configuration Discovery | It surveys a system upon check-in to discover network configuration details using the arp -a, nbtstat -n, net config, ipconfig /all, and route commands, as well as NBTscan. It RPC backdoors have also retrieved registered RPC interface information from process memory. |
System Network Configuration Discovery | Unknown Logger can obtain information about the victim's IP address. |
System Network Configuration Discovery | UPPERCUT has the capability to gather the victim's proxy information. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.