prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Network Configuration Discovery | USBferry can detect the infected machine's network topology using ipconfig and arp. |
System Network Configuration Discovery | Valak has the ability to identify the domain and the MAC and IP addresses of an infected machine. |
System Network Configuration Discovery | VERMIN gathers the local IP address. |
System Network Configuration Discovery | Volgmer can gather the IP address from the victim's machine. |
System Network Configuration Discovery | It has executed multiple commands to enumerate network topology and settings including ipconfig, netsh interface firewall show all, and netsh interface portproxy show all. |
System Network Configuration Discovery | WannaCry will attempt to determine the local network segment it is a part of. |
System Network Configuration Discovery | WellMail can identify the IP address of the victim system. |
System Network Configuration Discovery | WellMess can identify the IP address and user domain on the target machine. |
System Network Configuration Discovery | It has used ipconfig to identify the network configuration of a victim machine. It has also used the PowerShell cmdlet Get-ADComputer to collect IP address data from Active Directory. |
System Network Configuration Discovery | Woody RAT can retrieve network interface and proxy information. |
System Network Configuration Discovery | Xbash can collect IP addresses and local intranet information from a victim’s machine. |
System Network Configuration Discovery | xCaon has used the GetAdaptersInfo() API call to get the victim's MAC address. |
System Network Configuration Discovery | yty runs ipconfig /all and collects the domain name. |
System Network Configuration Discovery | Zebrocy runs the ipconfig /all command. |
System Network Configuration Discovery | ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server. |
System Network Configuration Discovery | ItM has used a tool to enumerate proxy settings in the target environment. |
System Network Configuration Discovery | zwShell can obtain the victim IP address. |
System Network Configuration Discovery:Internet Connection Discovery | It has ensured web servers in a victim environment are Internet accessible before copying tools or malware to it. |
System Network Configuration Discovery:Internet Connection Discovery | DarkTortilla can check for internet connectivity by issuing HTTP GET requests. |
System Network Configuration Discovery:Internet Connection Discovery | It has used Ping and tracert for network reconnaissance efforts. |
System Network Configuration Discovery:Internet Connection Discovery | It has used the Ping command to check connectivity to actor-controlled C2 servers. |
System Network Configuration Discovery:Internet Connection Discovery | It has tested connectivity between a compromised machine and a C2 server using Ping with commands such as CSIDL_SYSTEM\cmd.exe /c ping -n 1. |
System Network Configuration Discovery:Internet Connection Discovery | GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through. |
System Network Configuration Discovery:Internet Connection Discovery | It has checked for network connectivity from a compromised host using ping, including attempts to contact google[.]com. |
System Network Configuration Discovery:Internet Connection Discovery | It has used tools including BITSAdmin to test internet connectivity from compromised hosts. |
System Network Configuration Discovery:Internet Connection Discovery | It has conducted a network call out to a specific website as part of their initial discovery activity. |
System Network Configuration Discovery:Internet Connection Discovery | More_eggs has used HTTP GET requests to check internet connectivity. |
System Network Configuration Discovery:Internet Connection Discovery | Neoichor can check for Internet connectivity by contacting bing[.]com with the request format bing[.]com?id=<GetTickCount>. |
System Network Configuration Discovery:Internet Connection Discovery | During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity. |
System Network Configuration Discovery:Internet Connection Discovery | QakBot can measure the download speed on a targeted host. |
System Network Configuration Discovery:Internet Connection Discovery | QuietSieve can check C2 connectivity with a ping to 8.8.8.8 (Google public DNS). |
System Network Configuration Discovery:Internet Connection Discovery | Rising Sun can test a connection to a specified network IP address over a specified port number. |
System Network Configuration Discovery:Internet Connection Discovery | During the SolarWinds Compromise, It used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through. |
System Network Configuration Discovery:Internet Connection Discovery | SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection. |
System Network Configuration Discovery:Internet Connection Discovery | SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process. |
System Network Configuration Discovery:Internet Connection Discovery | It has run scripts to check internet connectivity from compromised hosts. |
System Network Configuration Discovery:Internet Connection Discovery | It has used tracert to check internet connectivity. |
System Network Configuration Discovery:Internet Connection Discovery | Woody RAT can make Ping GET HTTP requests to its C2 server at regular intervals for network connectivity checks. |
System Network Configuration Discovery:Wi-Fi Discovery | Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected. |
System Network Configuration Discovery:Wi-Fi Discovery | Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks. |
System Network Configuration Discovery:Wi-Fi Discovery | It has collected names and passwords of all Wi-Fi networks to which a device has previously connected. |
System Network Connections Discovery | It actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: netstat -ano >> %temp%\download |
System Network Connections Discovery | It has used the netstat -naop tcp command to display TCP connections on a victim's machine. |
System Network Connections Discovery | It used the net use command to get a listing on network connections. |
System Network Connections Discovery | It has a tool that can enumerate current network connections. |
System Network Connections Discovery | It used the netstat -anpo tcp command to display TCP connections on the victim's machine. |
System Network Connections Discovery | It installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system. |
System Network Connections Discovery | It has enumerated IP addresses of network resources and used the netstat command as part of network reconnaissance. The group has also used a malware variant, HIGHNOON, to enumerate active RDP sessions. |
System Network Connections Discovery | Aria-body has the ability to gather TCP and UDP table status listings. |
System Network Connections Discovery | Babuk can use "WNetOpenEnumW" and "WNetEnumResourceW" to enumerate files in network resources for encryption. |
System Network Connections Discovery | It has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports. |
System Network Connections Discovery | BADHATCH can execute netstat.exe -f on a compromised machine. |
System Network Connections Discovery | BlackEnergy has gathered information about local network connections using netstat. |
System Network Connections Discovery | Carbon uses the netstat -r and netstat -an commands. |
System Network Connections Discovery | CharmPower can use netsh wlan show profiles to list specific Wi-Fi profile details. |
System Network Connections Discovery | It has used netstat -ano | findstr EST to discover network connections. |
System Network Connections Discovery | Cobalt Strike can produce a sessions report from compromised hosts. |
System Network Connections Discovery | Comnie executes the netstat -ano command. |
System Network Connections Discovery | Conti can enumerate routine network connections from a compromised host. |
System Network Connections Discovery | CrackMapExec can discover active sessions for a targeted system. |
System Network Connections Discovery | Cuba can use the function GetIpNetTable to recover the last connections to the victim's machine. |
System Network Connections Discovery | Dtrack can collect network and active connection information. |
System Network Connections Discovery | The discovery modules used with Duqu can collect information on network connections. |
System Network Connections Discovery | It employed a PowerShell script called RDPConnectionParser to read and filter the Windows event log "Microsoft-Windows-TerminalServices-RDPClient/Operational"(Event ID 1024) to obtain network information from RDP connections. It has also used netstat from a compromised system to obtain network connection information. |
System Network Connections Discovery | Egregor can enumerate all connected drives. |
System Network Connections Discovery | Empire can enumerate the current network connections of a host. |
System Network Connections Discovery | Epic uses the net use, net session, and netstat commands to gather information on network connections. |
System Network Connections Discovery | It has used netstat and other net commands for network reconnaissance efforts. |
System Network Connections Discovery | Flagpro has been used to execute netstat -ano on a compromised host. |
System Network Connections Discovery | During FunnyDream, the threat actors used netstat to discover network connections on remote systems. |
System Network Connections Discovery | It used netstat -oan to obtain information about the victim network connections. |
System Network Connections Discovery | GravityRAT uses the netstat command to find open ports on the victim’s machine. |
System Network Connections Discovery | It has used netstat to monitor connections to specific ports. |
System Network Connections Discovery | jRAT can list network connections. |
System Network Connections Discovery | It performs local network connection discovery using netstat. |
System Network Connections Discovery | KONNI has used net session on the victim's machine. |
System Network Connections Discovery | KOPILUWAK can use netstat, Arp, and Net to discover current TCP connections. |
System Network Connections Discovery | Kwampirs collects a list of active and listening connections by using the command netstat -nao as well as a list of available network mappings with net use. |
System Network Connections Discovery | It has used net use to identify and establish a network connection with a remote host. |
System Network Connections Discovery | Lizar has a plugin to retrieve information about all active network sessions on the infected server. |
System Network Connections Discovery | Lucifer can identify the IP and port numbers for all remote connections from the compromised host. |
System Network Connections Discovery | It uses the netsh wlan show networks mode=bssid and netsh wlan show interfaces commands to list all nearby WiFi networks and connected interfaces. |
System Network Connections Discovery | Mafalda can use the GetExtendedTcpTable function to retrieve information about established TCP connections. |
System Network Connections Discovery | It has used quser.exe to identify existing RDP connections. |
System Network Connections Discovery | Maze has used the "WNetOpenEnumW", "WNetEnumResourceW", "WNetCloseEnum" and "WNetAddConnection2W" functions to enumerate the network resources on the infected machine. |
System Network Connections Discovery | It has used net use to conduct connectivity checks to machines. |
System Network Connections Discovery | After loading the keyword and phone data files, MESSAGETAP begins monitoring all network connections to and from the victim server. |
System Network Connections Discovery | It has used a PowerShell backdoor to check for Skype connections on the target machine. |
System Network Connections Discovery | It has used netstat -ano to determine network connection information. |
System Network Connections Discovery | nbtstat can be used to discover current NetBIOS sessions. |
System Network Connections Discovery | Commands such as net use and net session can be used in Net to gather information about network connections from a particular host. |
System Network Connections Discovery | netstat can be used to enumerate local network connections, including active TCP connections and other network statistics. |
System Network Connections Discovery | NETWIRE can capture session logon details from a compromised host. |
System Network Connections Discovery | It has used netstat -an on a victim to get a listing of network connections. |
System Network Connections Discovery | Okrum was seen using NetSess to discover NetBIOS sessions. |
System Network Connections Discovery | During Operation CuckooBees, the threat actors used the net session, net use, and netstat commands as part of their advanced reconnaissance. |
System Network Connections Discovery | During Operation Wocao, threat actors collected a list of open connections on the infected system using netstat and checks whether it has an internet connection. |
System Network Connections Discovery | OSInfo enumerates the current network connections similar to net use . |
System Network Connections Discovery | Once inside a Virtual Private Cloud, Pacu can attempt to identify DirectConnect, VPN, or VPC Peering. |
System Network Connections Discovery | PlugX has a module for enumerating TCP and UDP network connections and associated processes using the netstat command. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.