prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Network Configuration Discovery
Milan can run C:\Windows\system32\cmd.exe /c cmd /c ipconfig /all 2>&1 to discover network settings.
System Network Configuration Discovery
Mis-Type may create a file containing the results of the command cmd.exe /c ipconfig /all.
System Network Configuration Discovery
MoonWind obtains the victim IP address.
System Network Configuration Discovery
More_eggs has the capability to gather the IP address from the victim's machine.
System Network Configuration Discovery
It has collected the domain name of a compromised network.
System Network Configuration Discovery
Mosquito uses the ipconfig command.
System Network Configuration Discovery
It has used malware to collect the victim’s IP address and domain name.
System Network Configuration Discovery
It has used ipconfig and arp to determine network configuration information.
System Network Configuration Discovery
Naid collects the domain name from a compromised host.
System Network Configuration Discovery
It uses commands such as netsh interface show to discover network interface settings.
System Network Configuration Discovery
NanHaiShu can gather information about the victim proxy server.
System Network Configuration Discovery
NanoCore gathers the IP address from the victim’s machine.
System Network Configuration Discovery
NBTscan can be used to collect MAC addresses.
System Network Configuration Discovery
nbtstat can be used to discover local NetBIOS domain names.
System Network Configuration Discovery
Neoichor can gather the IP address from an infected host.
System Network Configuration Discovery
NETWIRE can collect the IP address of a compromised host.
System Network Configuration Discovery
Nltest may be used to enumerate the parent domain of a local machine using /parentdomain.
System Network Configuration Discovery
NOKKI can gather information on the victim IP address.
System Network Configuration Discovery
OceanSalt can collect the victim’s IP address.
System Network Configuration Discovery
Octopus can collect the host IP address from the victim’s machine.
System Network Configuration Discovery
It has run ipconfig /all on a victim.
System Network Configuration Discovery
Okrum can collect network information, including the host IP address, DNS, and proxy information.
System Network Configuration Discovery
Olympic Destroyer uses API calls to enumerate the infected system's ARP table.
System Network Configuration Discovery
During Operation CuckooBees, the threat actors used ipconfig, nbtstat, tracert, route print, and cat /etc/hosts commands.
System Network Configuration Discovery
During Operation Wocao, threat actors discovered the local network configuration with ipconfig.
System Network Configuration Discovery
Orz can gather victim proxy information.
System Network Configuration Discovery
OSInfo discovers the current domain information.
System Network Configuration Discovery
OSX_OCEANLOTUS.D can collect the network interface MAC address on the infected host.
System Network Configuration Discovery
Pay2Key can identify the IP and MAC addresses of the compromised host.
System Network Configuration Discovery
PcShare can obtain the proxy settings of a compromised machine using InternetQueryOptionA and its IP address by running nslookup myip.opendns.comresolver1.opendns.com\r\n.
System Network Configuration Discovery
Penquin can report the IP of the compromised host to attacker controlled infrastructure.
System Network Configuration Discovery
PingPull can retrieve the IP address of a compromised host.
System Network Configuration Discovery
PipeMon can collect and send the local IP address, RDP information, and the network adapter physical address as a part of its C2 beacon.
System Network Configuration Discovery
Pisloader has a command to collect the victim's IP address.
System Network Configuration Discovery
PLAINTEE uses the ipconfig /all command to gather the victim’s IP address.
System Network Configuration Discovery
PoshC2 can enumerate network adapter information.
System Network Configuration Discovery
PowerDuke has a command to get the victim's domain and NetBIOS name.
System Network Configuration Discovery
PowerShower has the ability to identify the current Windows domain of the infected host.
System Network Configuration Discovery
POWERSTATS can retrieve IP, network adapter configuration information, and domain from compromised hosts.
System Network Configuration Discovery
POWRUNER may collect network configuration data by running ipconfig /all on a victim.
System Network Configuration Discovery
A module in Prikormka collects information from the victim about its IP addresses and MAC addresses.
System Network Configuration Discovery
Proxysvc collects the network adapter information and domain/username information based on current remote sessions.
System Network Configuration Discovery
Pupy has built in commands to identify a host’s IP address and find out other network configuration settings by viewing connected sessions.
System Network Configuration Discovery
Pysa can perform network reconnaissance using the Advanced IP Scanner tool.
System Network Configuration Discovery
QakBot can use net config workstation, arp -a, nslookup, and ipconfig /all to gather network configuration information.
System Network Configuration Discovery
QUADAGENT gathers the current domain the victim system belongs to.
System Network Configuration Discovery
QuasarRAT has the ability to enumerate the Wide Area Network (WAN) IP through requests to ip-api[.]com, freegeoip[.]net, or api[.]ipify[.]org observed with user-agent string Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0.
System Network Configuration Discovery
QUIETCANARY can identify the default proxy setting on a compromised host.
System Network Configuration Discovery
Ramsay can use ipconfig and Arp to collect network configuration information, including routing information and ARP tables.
System Network Configuration Discovery
RATANKBA gathers the victim’s IP address via the ipconfig -all command.
System Network Configuration Discovery
Reaver collects the victim's IP address.
System Network Configuration Discovery
RedLeaves can obtain information about network parameters.
System Network Configuration Discovery
Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache.
System Network Configuration Discovery
Revenge RAT collects the IP address and MAC address from the system.
System Network Configuration Discovery
Rifdoor has the ability to identify the IP address of the compromised host.
System Network Configuration Discovery
Rising Sun can detect network adapter and IP address information.
System Network Configuration Discovery
RogueRobin gathers the IP address and domain from the victim’s machine.
System Network Configuration Discovery
route can be used to discover routing configuration information.
System Network Configuration Discovery
Royal can enumerate IP addresses using GetIpAddrTable.
System Network Configuration Discovery
Ryuk has called GetIpNetTable in attempt to identify all mounted drives and hosts that have Address Resolution Protocol (ARP) entries.
System Network Configuration Discovery
S-Type has used ipconfig /all on a compromised host.
System Network Configuration Discovery
Saint Bot can collect the IP address of a victim machine.
System Network Configuration Discovery
Sardonic has the ability to execute the ipconfig command.
System Network Configuration Discovery
SDBbot has the ability to determine the domain name and whether a proxy is configured on a compromised host.
System Network Configuration Discovery
ShadowPad has collected the domain name of the victim system.
System Network Configuration Discovery
Shamoon obtains the target's IP address and local network segment.
System Network Configuration Discovery
SHARPSTATS has the ability to identify the domain of the compromised host.
System Network Configuration Discovery
ShimRatReporter gathered the local proxy, domain, IP, routing tables, mac address, gateway, DNS servers, and DHCP status information from an infected host.
System Network Configuration Discovery
Sibot checked if the compromised system is configured to use proxies.
System Network Configuration Discovery
It has identified the IP address of a compromised host.
System Network Configuration Discovery
SideTwist has the ability to collect the domain name on a compromised host.
System Network Configuration Discovery
It has used malware to collect information on network interfaces, including the MAC address.
System Network Configuration Discovery
Sliver has the ability to gather network configuration information.
System Network Configuration Discovery
Small Sieve can obtain the IP address of a victim host.
System Network Configuration Discovery
SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via ipconfig.exe /all.
System Network Configuration Discovery
SpeakUp uses the ifconfig -a command.
System Network Configuration Discovery
SpicyOmelette can identify the IP of a compromised system.
System Network Configuration Discovery
Squirrelwaffle has collected the victim’s external IP address.
System Network Configuration Discovery
STARWHALE has the ability to collect the IP address of an infected host.
System Network Configuration Discovery
It malware gathers the Address Resolution Protocol (ARP) table from the victim.
System Network Configuration Discovery
StrongPity can identify the IP address of a compromised host.
System Network Configuration Discovery
Stuxnet collects the IP address of a compromised system.
System Network Configuration Discovery
SUNBURST collected all network interface MAC addresses that are up and not loopback devices, as well as IP address, DHCP configuration, and domain information.
System Network Configuration Discovery
Sykipot may use ipconfig /all to gather system network configuration details.
System Network Configuration Discovery
Sys10 collects the local IP address of the victim and sends it to the C2.
System Network Configuration Discovery
SysUpdate can collected the IP address and domain name of a compromised host.
System Network Configuration Discovery
T9000 gathers and beacons the MAC and IP addresses during installation.
System Network Configuration Discovery
Taidoor has collected the MAC address of a compromised host; it can also use GetAdaptersInfo to identify network adapters.
System Network Configuration Discovery
TajMahal has the ability to identify the MAC address on an infected host.
System Network Configuration Discovery
It has enumerated the host machine’s IP address.
System Network Configuration Discovery
It actors use NBTscan to discover vulnerable systems.
System Network Configuration Discovery
Torisma can collect the local MAC address using GetAdaptersInfo as well as the system's IP address.
System Network Configuration Discovery
TrickBot obtains the IP address, location, and other relevant network information from the victim’s machine.
System Network Configuration Discovery
Trojan.Karagany can gather information on the network configuration of a compromised host.
System Network Configuration Discovery
It has used scripts to collect the host's network topology.
System Network Configuration Discovery
TSCookie has the ability to identify the IP of the infected host.
System Network Configuration Discovery
Turian can retrieve the internal IP address of a compromised host.
System Network Configuration Discovery
It surveys a system upon check-in to discover network configuration details using the arp -a, nbtstat -n, net config, ipconfig /all, and route commands, as well as NBTscan. It RPC backdoors have also retrieved registered RPC interface information from process memory.
System Network Configuration Discovery
Unknown Logger can obtain information about the victim's IP address.
System Network Configuration Discovery
UPPERCUT has the capability to gather the victim's proxy information.