prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Network Connections Discovery | It obtains and saves information about victim network interfaces and addresses. |
System Network Connections Discovery | PoshC2 contains an implementation of netstat to enumerate TCP and UDP connections. |
System Network Connections Discovery | POWRUNER may collect active network connections by running netstat -an on a victim. |
System Network Connections Discovery | Pupy has a built-in utility command for netstat, can do net session through PowerView, and has an interactive shell which can be used to discover additional information. |
System Network Connections Discovery | PyDCrypt has used netsh to find RPC connections on remote machines. |
System Network Connections Discovery | QakBot can use netstat to enumerate current network connections. |
System Network Connections Discovery | Ramsay can use netstat to enumerate network connections. |
System Network Connections Discovery | RATANKBA uses netstat -ano to search for specific IP address ranges. |
System Network Connections Discovery | RedLeaves can enumerate drives and Remote Desktop sessions. |
System Network Connections Discovery | Remsec can obtain a list of active connections and open ports. |
System Network Connections Discovery | It had gathered user, IP address, and server data related to RDP sessions on a compromised host. It has also accessed network diagram files useful for understanding how a host's network was configured. |
System Network Connections Discovery | Sardonic has the ability to execute the netstat command. |
System Network Connections Discovery | ShimRatReporter used the Windows function GetExtendedUdpTable to detect connected UDP endpoints. |
System Network Connections Discovery | SHOTPUT uses netstat to list TCP connection status. |
System Network Connections Discovery | Sibot has retrieved a GUID associated with a present LAN connection on a compromised machine. |
System Network Connections Discovery | Sliver can collect network connection information. |
System Network Connections Discovery | SLOTHFULMEDIA can enumerate open ports on a victim machine. |
System Network Connections Discovery | SpeakUp uses the arp -a command. |
System Network Connections Discovery | Sykipot may use netstat -ano to display active network connections. |
System Network Connections Discovery | It has run netstat -anp to search for rival malware connections. It has also used libprocesshider to modify /etc/ld.so.preload. |
System Network Connections Discovery | It has used net use and netstat to conduct internal discovery of systems. The group has also used quser.exe to identify existing RDP sessions on a victim. |
System Network Connections Discovery | Torisma can use WTSEnumerateSessionsW to monitor remote desktop connections. |
System Network Connections Discovery | Trojan.Karagany can use netstat to collect a list of network connections. |
System Network Connections Discovery | It has tested if the localhost network is available and other connection capability on an infected system using command scripts. |
System Network Connections Discovery | It surveys a system upon check-in to discover active local network connections using the netstat -an, net use, net file, and net session commands. It RPC backdoors have also enumerated the IPv4 TCP connection table via the GetTcpTable2 API call. |
System Network Connections Discovery | USBferry can use netstat and nbtstat to detect active network connections. |
System Network Connections Discovery | Volgmer can gather information about TCP connection state. |
System Network Connections Discovery | It has used netstat -ano on compromised hosts to enumerate network connections. |
System Network Connections Discovery | Waterbear can use API hooks on GetExtendedTcpTable to retrieve a table containing a list of TCP endpoints available to the application. |
System Network Connections Discovery | Zebrocy uses netstat -aon to gather network connection information. |
System Owner | Action RAT has the ability to collect the username from an infected host. |
System Owner | Agent Tesla can collect the username from the victim’s machine. |
System Owner | Agent.btz obtains the victim username and saves it to a file. |
System Owner | Amadey has collected the user name from a compromised host using GetUserNameA. |
System Owner | It used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username. |
System Owner | An It downloader uses the Windows command "cmd.exe" /C whoami to verify that it is running with the elevated privileges of "System." |
System Owner | It collected the victim's username and executed the whoami command on the victim's machine. It executed shellcode to collect the username on the victim's machine. |
System Owner | It identifies the victim username. |
System Owner | It has identified primary users, currently logged in users, sets of users that commonly use a system, or inactive users. |
System Owner | It used Remexi to collect usernames from the system. |
System Owner | It used the WMIEXEC utility to execute whoami commands on remote machines. |
System Owner | Aria-body has the ability to identify the username on a compromised host. |
System Owner | AsyncRAT can check if the current user of a compromised system is an administrator. |
System Owner | AuTo Stealer has the ability to collect the username from an infected host. |
System Owner | Azorult can collect the username from the victim’s machine. |
System Owner | BabyShark has executed the whoami command. |
System Owner | Backdoor.Oldrea collects the current username from the victim. |
System Owner | BADHATCH can obtain logged user information from a compromised machine and can execute the command whoami.exe. |
System Owner | Bazar can identify the username of the infected user. |
System Owner | BISCUIT has a command to gather the username from the system. |
System Owner | BlackCat can utilize net use commands to discover the user name on a compromised host. |
System Owner | BloodHound can collect information on user sessions. |
System Owner | BLUELIGHT can collect the username on a compromised host. |
System Owner | Bonadan has discovered the username of the user running the backdoor. |
System Owner | BoomBox can enumerate the username on a compromised host. |
System Owner | Bumblebee has the ability to identify the user name. |
System Owner | During C0017, It used whoami to gather information from victim machines. |
System Owner | During C0018, the threat actors collected whoami information via PowerShell scripts. |
System Owner | Cannon can gather the username from the system. |
System Owner | Cardinal RAT can collect the username from a victim machine. |
System Owner | Caterpillar WebShell can obtain a list of user accounts from a victim's machine. |
System Owner | Chaes has collected the username and UID from the infected machine. |
System Owner | It has used the quser command to show currently logged on users. |
System Owner | Chrommme can retrieve the username from a targeted system. |
System Owner | Clambling can identify the username on a compromised host. |
System Owner | CreepySnail can execute getUsername on compromised systems. |
System Owner | Crimson can identify the user on a targeted system. |
System Owner | Cryptoistic can gather data on the user of a compromised host. |
System Owner | DarkComet gathers the username from the victim’s machine. |
System Owner | DarkWatchman has collected the username from a victim machine. |
System Owner | Denis enumerates and collects the username from the victim’s machine. |
System Owner | A Linux version of Derusbi checks if the victim user ID is anything other than zero (normally used for root), and the malware will not execute if it does not have root privileges. Derusbi also gathers the username of the victim. |
System Owner | Diavol can collect the username from a compromised host. |
System Owner | DnsSystem can use the Windows user name to create a unique identification for infected users and systems. |
System Owner | DownPaper collects the victim username and sends it to the C2 server. |
System Owner | It used the command query user on victim hosts. |
System Owner | DRATzarus can obtain a list of users from an infected machine. |
System Owner | Dyre has the ability to identify the users on a compromised host. |
System Owner | It collected information on user accounts via the whoami command. |
System Owner | Egregor has used tools to gather information about users. |
System Owner | Emotet has enumerated all users connected to network shares. |
System Owner | Empire can enumerate the username on targeted hosts. |
System Owner | Epic collects the user name from the victim’s machine. |
System Owner | EVILNUM can obtain the username from the victim's machine. |
System Owner | Exaramel for Linux can run whoami to identify the system owner. |
System Owner | Explosive has collected the username from the infected host. |
System Owner | Felismus collects the current username and sends it to the C2 server. |
System Owner | FELIXROOT collects the username from the victim’s machine. |
System Owner | It has used Meterpreter to enumerate users on remote systems. |
System Owner | It has used the command cmd.exe /C quser to collect user session information. |
System Owner | It has executed the command quser to display the session details of a compromised machine. |
System Owner | Flagpro has been used to run the whoami command on the system. |
System Owner | FlawedAmmyy enumerates the current user during the initial infection. |
System Owner | During Frankenstein, the threat actors used Empire to enumerate hosts and gather username, machine name, and administrative permissions information. |
System Owner | FunnyDream has the ability to gather user information from the targeted system using whoami/upn&whoami/fqdn&whoami/logonid&whoami/all. |
System Owner | It used whoami and query user to obtain information about the victim user. |
System Owner | A It file stealer can gather the victim's username to send to a C2 server. |
System Owner | Gazer obtains the current user's security identifier. |
System Owner | Gelsemium has the ability to distinguish between a standard user and an administrator on a compromised host. |
System Owner | Get2 has the ability to identify the current username of an infected host. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.