prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Owner | Gold Dragon collects the endpoint victim's username and uses it as a basis for downloading additional components from the C2 server. |
System Owner | Goopy has the ability to enumerate the infected system's user name. |
System Owner | Grandoreiro can collect the username from the victim's machine. |
System Owner | GravityRAT collects the victim username along with other account information (account type, description, full name, SID and status). |
System Owner | GrimAgent can identify the user id on a target machine. |
System Owner | It has used whoami to gather user information. |
System Owner | can collect the victim user name. |
System Owner | HAWKBALL can collect the user name of the system. |
System Owner | It has run whoami on compromised machines to identify the current user. |
System Owner | HotCroissant has the ability to collect the username on the infected host. |
System Owner | InvisiMole lists local users and session information. |
System Owner | Ixeshe collects the username from the victim’s machine. |
System Owner | JPIN can obtain the victim user name. |
System Owner | Kazuar gathers information on users. |
System Owner | It has used implants capable of collecting the signed-in username. |
System Owner | Koadic can identify logged in users across the domain and views user sessions. |
System Owner | The OsInfo function in Komplex collects the current running username. |
System Owner | KONNI can collect the username from the victim’s machine. |
System Owner | KOPILUWAK can conduct basic network reconnaissance on the victim machine with whoami, to get user details. |
System Owner | Kwampirs collects registered owner details by using the commands systeminfo and net config workstation. |
System Owner | Various It malware enumerates logged-on users. |
System Owner | Linux Rabbit opens a socket on port 22 and if it receives a response it attempts to obtain the machine's hostname and Top-Level Domain. |
System Owner | LiteDuke can enumerate the account name on a targeted system. |
System Owner | LitePower can determine if the current user has admin privileges. |
System Owner | Lizar can collect the username from the system. |
System Owner | Lokibot has the ability to discover the username on the infected host. |
System Owner | Lucifer has the ability to identify the username on a compromised host. |
System Owner | It has used a malicious DLL to collect the username from compromised hosts. |
System Owner | MacMa can collect the username from the compromised machine. |
System Owner | Mafalda can collect the username from a compromised host. |
System Owner | It malware has obtained the victim username and sent it to the C2 server. |
System Owner | MarkiRAT can retrieve the victim’s username. |
System Owner | MechaFlounder has the ability to identify the username and hostname on a compromised host. |
System Owner | metaMain can collect the username from a compromised host. |
System Owner | Metamorfo has collected the username from the victim's machine. |
System Owner | Micropsia collects the username from the victim’s machine. |
System Owner | Milan can identify users registered to a targeted machine. |
System Owner | MirageFox can gather the username from the victim’s machine. |
System Owner | Mis-Type runs tests to determine the privilege level of the compromised user. |
System Owner | MoonWind obtains the victim username. |
System Owner | More_eggs has the capability to gather the username from the victim's machine. |
System Owner | Mosquito runs whoami on the victim’s machine. |
System Owner | It has used malware that can collect the victim’s username. |
System Owner | NanHaiShu collects the username from the victim. |
System Owner | NBTscan can list active users on the system. |
System Owner | NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel. |
System Owner | Neoichor can collect the user name from a victim's machine. |
System Owner | During Night Dragon, threat actors used password cracking and pass-the-hash tools to discover usernames and passwords. |
System Owner | njRAT enumerates the current user during the initial infection. |
System Owner | NOKKI can collect the username from the victim’s machine. |
System Owner | ObliqueRAT can check for blocklisted usernames on infected endpoints. |
System Owner | Octopus can collect the username from the victim’s machine. |
System Owner | It has run whoami on a victim. |
System Owner | Okrum can collect the victim username. |
System Owner | During Operation CuckooBees, the threat actors used the query user and whoami commands as part of their advanced reconnaissance. |
System Owner | During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system. |
System Owner | It collected the victim username and whether it was running as admin, then sent the information to its C2 server. |
System Owner | PoetRAT sent username, computer name, and the previously generated UUID in reply to a "who" command from C2. |
System Owner | PowerDuke has commands to get the current user's name and SID. |
System Owner | PowerShower has the ability to identify the current user on the infected host. |
System Owner | POWERSTATS has the ability to identify the username on the compromised host. |
System Owner | POWRUNER may collect information about the currently logged in user by running whoami on a victim. |
System Owner | A module in Prikormka collects information from the victim about the current user name. |
System Owner | Pupy can enumerate local information for Linux hosts and find currently logged on users for Windows hosts. |
System Owner | PyDCrypt has probed victim machines with whoami and has collected the username from the machine. |
System Owner | QakBot can identify the user name on a compromised system. |
System Owner | QUADAGENT gathers the victim username. |
System Owner | QuasarRAT can enumerate the username and account type. |
System Owner | RATANKBA runs the whoami and query user commands. |
System Owner | RCSession can gather system owner information, including user and administrator privileges. |
System Owner | Reaver collects the victim's username. |
System Owner | RedLeaves can obtain information about the logged on user both locally and for Remote Desktop sessions. |
System Owner | Remsec can obtain information about the current user. |
System Owner | Revenge RAT gathers the username from the system. |
System Owner | RGDoor executes the whoami on the victim’s machine. |
System Owner | Rifdoor has the ability to identify the username on the compromised host. |
System Owner | Rising Sun can detect the username of the infected host. |
System Owner | RogueRobin collects the victim’s username and whether that user is an admin. |
System Owner | ROKRAT can collect the username from a compromised host. |
System Owner | It can obtain the victim username and permissions. |
System Owner | S-Type has run tests to determine the privilege level of the compromised user. |
System Owner | Saint Bot can collect the username from a compromised host. |
System Owner | It has collected the username from a compromised host. |
System Owner | SDBbot has the ability to identify the user on a compromised host. |
System Owner | ServHelper will attempt to enumerate the username of the victim. |
System Owner | ShadowPad has collected the username of the victim system. |
System Owner | SHARPSTATS has the ability to identify the username on the compromised host. |
System Owner | SideTwist can collect the username on a targeted system. |
System Owner | It has used tools to identify the user of a compromised host. |
System Owner | SILENTTRINITY can gather a list of logged on users. |
System Owner | SLOTHFULMEDIA has collected the username from a victim machine. |
System Owner | Small Sieve can obtain the id of a logged in user. |
System Owner | SMOKEDHAM has used whoami commands to identify system owners. |
System Owner | SodaMaster can identify the username on a compromised host. |
System Owner | SombRAT can execute getinfo to identify the username on a compromised host. |
System Owner | Spark has run the whoami command and has a built-in command to identify the user logged in. |
System Owner | SpeakUp uses the whoami command. |
System Owner | Squirrelwaffle can collect the user name from a compromised host. |
System Owner | SslMM sends the logged-on username to its hard-coded C2. |
System Owner | STARWHALE can gather the username from an infected host. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.