prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Network Connections Discovery
It obtains and saves information about victim network interfaces and addresses.
System Network Connections Discovery
PoshC2 contains an implementation of netstat to enumerate TCP and UDP connections.
System Network Connections Discovery
POWRUNER may collect active network connections by running netstat -an on a victim.
System Network Connections Discovery
Pupy has a built-in utility command for netstat, can do net session through PowerView, and has an interactive shell which can be used to discover additional information.
System Network Connections Discovery
PyDCrypt has used netsh to find RPC connections on remote machines.
System Network Connections Discovery
QakBot can use netstat to enumerate current network connections.
System Network Connections Discovery
Ramsay can use netstat to enumerate network connections.
System Network Connections Discovery
RATANKBA uses netstat -ano to search for specific IP address ranges.
System Network Connections Discovery
RedLeaves can enumerate drives and Remote Desktop sessions.
System Network Connections Discovery
Remsec can obtain a list of active connections and open ports.
System Network Connections Discovery
It had gathered user, IP address, and server data related to RDP sessions on a compromised host. It has also accessed network diagram files useful for understanding how a host's network was configured.
System Network Connections Discovery
Sardonic has the ability to execute the netstat command.
System Network Connections Discovery
ShimRatReporter used the Windows function GetExtendedUdpTable to detect connected UDP endpoints.
System Network Connections Discovery
SHOTPUT uses netstat to list TCP connection status.
System Network Connections Discovery
Sibot has retrieved a GUID associated with a present LAN connection on a compromised machine.
System Network Connections Discovery
Sliver can collect network connection information.
System Network Connections Discovery
SLOTHFULMEDIA can enumerate open ports on a victim machine.
System Network Connections Discovery
SpeakUp uses the arp -a command.
System Network Connections Discovery
Sykipot may use netstat -ano to display active network connections.
System Network Connections Discovery
It has run netstat -anp to search for rival malware connections. It has also used libprocesshider to modify /etc/ld.so.preload.
System Network Connections Discovery
It has used net use and netstat to conduct internal discovery of systems. The group has also used quser.exe to identify existing RDP sessions on a victim.
System Network Connections Discovery
Torisma can use WTSEnumerateSessionsW to monitor remote desktop connections.
System Network Connections Discovery
Trojan.Karagany can use netstat to collect a list of network connections.
System Network Connections Discovery
It has tested if the localhost network is available and other connection capability on an infected system using command scripts.
System Network Connections Discovery
It surveys a system upon check-in to discover active local network connections using the netstat -an, net use, net file, and net session commands. It RPC backdoors have also enumerated the IPv4 TCP connection table via the GetTcpTable2 API call.
System Network Connections Discovery
USBferry can use netstat and nbtstat to detect active network connections.
System Network Connections Discovery
Volgmer can gather information about TCP connection state.
System Network Connections Discovery
It has used netstat -ano on compromised hosts to enumerate network connections.
System Network Connections Discovery
Waterbear can use API hooks on GetExtendedTcpTable to retrieve a table containing a list of TCP endpoints available to the application.
System Network Connections Discovery
Zebrocy uses netstat -aon to gather network connection information.
System Owner
Action RAT has the ability to collect the username from an infected host.
System Owner
Agent Tesla can collect the username from the victim’s machine.
System Owner
Agent.btz obtains the victim username and saves it to a file.
System Owner
Amadey has collected the user name from a compromised host using GetUserNameA.
System Owner
It used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username.
System Owner
An It downloader uses the Windows command "cmd.exe" /C whoami to verify that it is running with the elevated privileges of "System."
System Owner
It collected the victim's username and executed the whoami command on the victim's machine. It executed shellcode to collect the username on the victim's machine.
System Owner
It identifies the victim username.
System Owner
It has identified primary users, currently logged in users, sets of users that commonly use a system, or inactive users.
System Owner
It used Remexi to collect usernames from the system.
System Owner
It used the WMIEXEC utility to execute whoami commands on remote machines.
System Owner
Aria-body has the ability to identify the username on a compromised host.
System Owner
AsyncRAT can check if the current user of a compromised system is an administrator.
System Owner
AuTo Stealer has the ability to collect the username from an infected host.
System Owner
Azorult can collect the username from the victim’s machine.
System Owner
BabyShark has executed the whoami command.
System Owner
Backdoor.Oldrea collects the current username from the victim.
System Owner
BADHATCH can obtain logged user information from a compromised machine and can execute the command whoami.exe.
System Owner
Bazar can identify the username of the infected user.
System Owner
BISCUIT has a command to gather the username from the system.
System Owner
BlackCat can utilize net use commands to discover the user name on a compromised host.
System Owner
BloodHound can collect information on user sessions.
System Owner
BLUELIGHT can collect the username on a compromised host.
System Owner
Bonadan has discovered the username of the user running the backdoor.
System Owner
BoomBox can enumerate the username on a compromised host.
System Owner
Bumblebee has the ability to identify the user name.
System Owner
During C0017, It used whoami to gather information from victim machines.
System Owner
During C0018, the threat actors collected whoami information via PowerShell scripts.
System Owner
Cannon can gather the username from the system.
System Owner
Cardinal RAT can collect the username from a victim machine.
System Owner
Caterpillar WebShell can obtain a list of user accounts from a victim's machine.
System Owner
Chaes has collected the username and UID from the infected machine.
System Owner
It has used the quser command to show currently logged on users.
System Owner
Chrommme can retrieve the username from a targeted system.
System Owner
Clambling can identify the username on a compromised host.
System Owner
CreepySnail can execute getUsername on compromised systems.
System Owner
Crimson can identify the user on a targeted system.
System Owner
Cryptoistic can gather data on the user of a compromised host.
System Owner
DarkComet gathers the username from the victim’s machine.
System Owner
DarkWatchman has collected the username from a victim machine.
System Owner
Denis enumerates and collects the username from the victim’s machine.
System Owner
A Linux version of Derusbi checks if the victim user ID is anything other than zero (normally used for root), and the malware will not execute if it does not have root privileges. Derusbi also gathers the username of the victim.
System Owner
Diavol can collect the username from a compromised host.
System Owner
DnsSystem can use the Windows user name to create a unique identification for infected users and systems.
System Owner
DownPaper collects the victim username and sends it to the C2 server.
System Owner
It used the command query user on victim hosts.
System Owner
DRATzarus can obtain a list of users from an infected machine.
System Owner
Dyre has the ability to identify the users on a compromised host.
System Owner
It collected information on user accounts via the whoami command.
System Owner
Egregor has used tools to gather information about users.
System Owner
Emotet has enumerated all users connected to network shares.
System Owner
Empire can enumerate the username on targeted hosts.
System Owner
Epic collects the user name from the victim’s machine.
System Owner
EVILNUM can obtain the username from the victim's machine.
System Owner
Exaramel for Linux can run whoami to identify the system owner.
System Owner
Explosive has collected the username from the infected host.
System Owner
Felismus collects the current username and sends it to the C2 server.
System Owner
FELIXROOT collects the username from the victim’s machine.
System Owner
It has used Meterpreter to enumerate users on remote systems.
System Owner
It has used the command cmd.exe /C quser to collect user session information.
System Owner
It has executed the command quser to display the session details of a compromised machine.
System Owner
Flagpro has been used to run the whoami command on the system.
System Owner
FlawedAmmyy enumerates the current user during the initial infection.
System Owner
During Frankenstein, the threat actors used Empire to enumerate hosts and gather username, machine name, and administrative permissions information.
System Owner
FunnyDream has the ability to gather user information from the targeted system using whoami/upn&whoami/fqdn&whoami/logonid&whoami/all.
System Owner
It used whoami and query user to obtain information about the victim user.
System Owner
A It file stealer can gather the victim's username to send to a C2 server.
System Owner
Gazer obtains the current user's security identifier.
System Owner
Gelsemium has the ability to distinguish between a standard user and an administrator on a compromised host.
System Owner
Get2 has the ability to identify the current username of an infected host.