prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Network Configuration Discovery
USBferry can detect the infected machine's network topology using ipconfig and arp.
System Network Configuration Discovery
Valak has the ability to identify the domain and the MAC and IP addresses of an infected machine.
System Network Configuration Discovery
VERMIN gathers the local IP address.
System Network Configuration Discovery
Volgmer can gather the IP address from the victim's machine.
System Network Configuration Discovery
It has executed multiple commands to enumerate network topology and settings including ipconfig, netsh interface firewall show all, and netsh interface portproxy show all.
System Network Configuration Discovery
WannaCry will attempt to determine the local network segment it is a part of.
System Network Configuration Discovery
WellMail can identify the IP address of the victim system.
System Network Configuration Discovery
WellMess can identify the IP address and user domain on the target machine.
System Network Configuration Discovery
It has used ipconfig to identify the network configuration of a victim machine. It has also used the PowerShell cmdlet Get-ADComputer to collect IP address data from Active Directory.
System Network Configuration Discovery
Woody RAT can retrieve network interface and proxy information.
System Network Configuration Discovery
Xbash can collect IP addresses and local intranet information from a victim’s machine.
System Network Configuration Discovery
xCaon has used the GetAdaptersInfo() API call to get the victim's MAC address.
System Network Configuration Discovery
yty runs ipconfig /all and collects the domain name.
System Network Configuration Discovery
Zebrocy runs the ipconfig /all command.
System Network Configuration Discovery
ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server.
System Network Configuration Discovery
ItM has used a tool to enumerate proxy settings in the target environment.
System Network Configuration Discovery
zwShell can obtain the victim IP address.
System Network Configuration Discovery:Internet Connection Discovery
It has ensured web servers in a victim environment are Internet accessible before copying tools or malware to it.
System Network Configuration Discovery:Internet Connection Discovery
DarkTortilla can check for internet connectivity by issuing HTTP GET requests.
System Network Configuration Discovery:Internet Connection Discovery
It has used Ping and tracert for network reconnaissance efforts.
System Network Configuration Discovery:Internet Connection Discovery
It has used the Ping command to check connectivity to actor-controlled C2 servers.
System Network Configuration Discovery:Internet Connection Discovery
It has tested connectivity between a compromised machine and a C2 server using Ping with commands such as CSIDL_SYSTEM\cmd.exe /c ping -n 1.
System Network Configuration Discovery:Internet Connection Discovery
GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.
System Network Configuration Discovery:Internet Connection Discovery
It has checked for network connectivity from a compromised host using ping, including attempts to contact google[.]com.
System Network Configuration Discovery:Internet Connection Discovery
It has used tools including BITSAdmin to test internet connectivity from compromised hosts.
System Network Configuration Discovery:Internet Connection Discovery
It has conducted a network call out to a specific website as part of their initial discovery activity.
System Network Configuration Discovery:Internet Connection Discovery
More_eggs has used HTTP GET requests to check internet connectivity.
System Network Configuration Discovery:Internet Connection Discovery
Neoichor can check for Internet connectivity by contacting bing[.]com with the request format bing[.]com?id=<GetTickCount>.
System Network Configuration Discovery:Internet Connection Discovery
During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity.
System Network Configuration Discovery:Internet Connection Discovery
QakBot can measure the download speed on a targeted host.
System Network Configuration Discovery:Internet Connection Discovery
QuietSieve can check C2 connectivity with a ping to 8.8.8.8 (Google public DNS).
System Network Configuration Discovery:Internet Connection Discovery
Rising Sun can test a connection to a specified network IP address over a specified port number.
System Network Configuration Discovery:Internet Connection Discovery
During the SolarWinds Compromise, It used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.
System Network Configuration Discovery:Internet Connection Discovery
SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.
System Network Configuration Discovery:Internet Connection Discovery
SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.
System Network Configuration Discovery:Internet Connection Discovery
It has run scripts to check internet connectivity from compromised hosts.
System Network Configuration Discovery:Internet Connection Discovery
It has used tracert to check internet connectivity.
System Network Configuration Discovery:Internet Connection Discovery
Woody RAT can make Ping GET HTTP requests to its C2 server at regular intervals for network connectivity checks.
System Network Configuration Discovery:Wi-Fi Discovery
Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected.
System Network Configuration Discovery:Wi-Fi Discovery
Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.
System Network Configuration Discovery:Wi-Fi Discovery
It has collected names and passwords of all Wi-Fi networks to which a device has previously connected.
System Network Connections Discovery
It actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: netstat -ano >> %temp%\download
System Network Connections Discovery
It has used the netstat -naop tcp command to display TCP connections on a victim's machine.
System Network Connections Discovery
It used the net use command to get a listing on network connections.
System Network Connections Discovery
It has a tool that can enumerate current network connections.
System Network Connections Discovery
It used the netstat -anpo tcp command to display TCP connections on the victim's machine.
System Network Connections Discovery
It installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system.
System Network Connections Discovery
It has enumerated IP addresses of network resources and used the netstat command as part of network reconnaissance. The group has also used a malware variant, HIGHNOON, to enumerate active RDP sessions.
System Network Connections Discovery
Aria-body has the ability to gather TCP and UDP table status listings.
System Network Connections Discovery
Babuk can use "WNetOpenEnumW" and "WNetEnumResourceW" to enumerate files in network resources for encryption.
System Network Connections Discovery
It has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports.
System Network Connections Discovery
BADHATCH can execute netstat.exe -f on a compromised machine.
System Network Connections Discovery
BlackEnergy has gathered information about local network connections using netstat.
System Network Connections Discovery
Carbon uses the netstat -r and netstat -an commands.
System Network Connections Discovery
CharmPower can use netsh wlan show profiles to list specific Wi-Fi profile details.
System Network Connections Discovery
It has used netstat -ano | findstr EST to discover network connections.
System Network Connections Discovery
Cobalt Strike can produce a sessions report from compromised hosts.
System Network Connections Discovery
Comnie executes the netstat -ano command.
System Network Connections Discovery
Conti can enumerate routine network connections from a compromised host.
System Network Connections Discovery
CrackMapExec can discover active sessions for a targeted system.
System Network Connections Discovery
Cuba can use the function GetIpNetTable to recover the last connections to the victim's machine.
System Network Connections Discovery
Dtrack can collect network and active connection information.
System Network Connections Discovery
The discovery modules used with Duqu can collect information on network connections.
System Network Connections Discovery
It employed a PowerShell script called RDPConnectionParser to read and filter the Windows event log "Microsoft-Windows-TerminalServices-RDPClient/Operational"(Event ID 1024) to obtain network information from RDP connections. It has also used netstat from a compromised system to obtain network connection information.
System Network Connections Discovery
Egregor can enumerate all connected drives.
System Network Connections Discovery
Empire can enumerate the current network connections of a host.
System Network Connections Discovery
Epic uses the net use, net session, and netstat commands to gather information on network connections.
System Network Connections Discovery
It has used netstat and other net commands for network reconnaissance efforts.
System Network Connections Discovery
Flagpro has been used to execute netstat -ano on a compromised host.
System Network Connections Discovery
During FunnyDream, the threat actors used netstat to discover network connections on remote systems.
System Network Connections Discovery
It used netstat -oan to obtain information about the victim network connections.
System Network Connections Discovery
GravityRAT uses the netstat command to find open ports on the victim’s machine.
System Network Connections Discovery
It has used netstat to monitor connections to specific ports.
System Network Connections Discovery
jRAT can list network connections.
System Network Connections Discovery
It performs local network connection discovery using netstat.
System Network Connections Discovery
KONNI has used net session on the victim's machine.
System Network Connections Discovery
KOPILUWAK can use netstat, Arp, and Net to discover current TCP connections.
System Network Connections Discovery
Kwampirs collects a list of active and listening connections by using the command netstat -nao as well as a list of available network mappings with net use.
System Network Connections Discovery
It has used net use to identify and establish a network connection with a remote host.
System Network Connections Discovery
Lizar has a plugin to retrieve information about all active network sessions on the infected server.
System Network Connections Discovery
Lucifer can identify the IP and port numbers for all remote connections from the compromised host.
System Network Connections Discovery
It uses the netsh wlan show networks mode=bssid and netsh wlan show interfaces commands to list all nearby WiFi networks and connected interfaces.
System Network Connections Discovery
Mafalda can use the GetExtendedTcpTable function to retrieve information about established TCP connections.
System Network Connections Discovery
It has used quser.exe to identify existing RDP connections.
System Network Connections Discovery
Maze has used the "WNetOpenEnumW", "WNetEnumResourceW", "WNetCloseEnum" and "WNetAddConnection2W" functions to enumerate the network resources on the infected machine.
System Network Connections Discovery
It has used net use to conduct connectivity checks to machines.
System Network Connections Discovery
After loading the keyword and phone data files, MESSAGETAP begins monitoring all network connections to and from the victim server.
System Network Connections Discovery
It has used a PowerShell backdoor to check for Skype connections on the target machine.
System Network Connections Discovery
It has used netstat -ano to determine network connection information.
System Network Connections Discovery
nbtstat can be used to discover current NetBIOS sessions.
System Network Connections Discovery
Commands such as net use and net session can be used in Net to gather information about network connections from a particular host.
System Network Connections Discovery
netstat can be used to enumerate local network connections, including active TCP connections and other network statistics.
System Network Connections Discovery
NETWIRE can capture session logon details from a compromised host.
System Network Connections Discovery
It has used netstat -an on a victim to get a listing of network connections.
System Network Connections Discovery
Okrum was seen using NetSess to discover NetBIOS sessions.
System Network Connections Discovery
During Operation CuckooBees, the threat actors used the net session, net use, and netstat commands as part of their advanced reconnaissance.
System Network Connections Discovery
During Operation Wocao, threat actors collected a list of open connections on the infected system using netstat and checks whether it has an internet connection.
System Network Connections Discovery
OSInfo enumerates the current network connections similar to net use .
System Network Connections Discovery
Once inside a Virtual Private Cloud, Pacu can attempt to identify DirectConnect, VPN, or VPC Peering.
System Network Connections Discovery
PlugX has a module for enumerating TCP and UDP network connections and associated processes using the netstat command.