prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Owner
Gold Dragon collects the endpoint victim's username and uses it as a basis for downloading additional components from the C2 server.
System Owner
Goopy has the ability to enumerate the infected system's user name.
System Owner
Grandoreiro can collect the username from the victim's machine.
System Owner
GravityRAT collects the victim username along with other account information (account type, description, full name, SID and status).
System Owner
GrimAgent can identify the user id on a target machine.
System Owner
It has used whoami to gather user information.
System Owner
can collect the victim user name.
System Owner
HAWKBALL can collect the user name of the system.
System Owner
It has run whoami on compromised machines to identify the current user.
System Owner
HotCroissant has the ability to collect the username on the infected host.
System Owner
InvisiMole lists local users and session information.
System Owner
Ixeshe collects the username from the victim’s machine.
System Owner
JPIN can obtain the victim user name.
System Owner
Kazuar gathers information on users.
System Owner
It has used implants capable of collecting the signed-in username.
System Owner
Koadic can identify logged in users across the domain and views user sessions.
System Owner
The OsInfo function in Komplex collects the current running username.
System Owner
KONNI can collect the username from the victim’s machine.
System Owner
KOPILUWAK can conduct basic network reconnaissance on the victim machine with whoami, to get user details.
System Owner
Kwampirs collects registered owner details by using the commands systeminfo and net config workstation.
System Owner
Various It malware enumerates logged-on users.
System Owner
Linux Rabbit opens a socket on port 22 and if it receives a response it attempts to obtain the machine's hostname and Top-Level Domain.
System Owner
LiteDuke can enumerate the account name on a targeted system.
System Owner
LitePower can determine if the current user has admin privileges.
System Owner
Lizar can collect the username from the system.
System Owner
Lokibot has the ability to discover the username on the infected host.
System Owner
Lucifer has the ability to identify the username on a compromised host.
System Owner
It has used a malicious DLL to collect the username from compromised hosts.
System Owner
MacMa can collect the username from the compromised machine.
System Owner
Mafalda can collect the username from a compromised host.
System Owner
It malware has obtained the victim username and sent it to the C2 server.
System Owner
MarkiRAT can retrieve the victim’s username.
System Owner
MechaFlounder has the ability to identify the username and hostname on a compromised host.
System Owner
metaMain can collect the username from a compromised host.
System Owner
Metamorfo has collected the username from the victim's machine.
System Owner
Micropsia collects the username from the victim’s machine.
System Owner
Milan can identify users registered to a targeted machine.
System Owner
MirageFox can gather the username from the victim’s machine.
System Owner
Mis-Type runs tests to determine the privilege level of the compromised user.
System Owner
MoonWind obtains the victim username.
System Owner
More_eggs has the capability to gather the username from the victim's machine.
System Owner
Mosquito runs whoami on the victim’s machine.
System Owner
It has used malware that can collect the victim’s username.
System Owner
NanHaiShu collects the username from the victim.
System Owner
NBTscan can list active users on the system.
System Owner
NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel.
System Owner
Neoichor can collect the user name from a victim's machine.
System Owner
During Night Dragon, threat actors used password cracking and pass-the-hash tools to discover usernames and passwords.
System Owner
njRAT enumerates the current user during the initial infection.
System Owner
NOKKI can collect the username from the victim’s machine.
System Owner
ObliqueRAT can check for blocklisted usernames on infected endpoints.
System Owner
Octopus can collect the username from the victim’s machine.
System Owner
It has run whoami on a victim.
System Owner
Okrum can collect the victim username.
System Owner
During Operation CuckooBees, the threat actors used the query user and whoami commands as part of their advanced reconnaissance.
System Owner
During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system.
System Owner
It collected the victim username and whether it was running as admin, then sent the information to its C2 server.
System Owner
PoetRAT sent username, computer name, and the previously generated UUID in reply to a "who" command from C2.
System Owner
PowerDuke has commands to get the current user's name and SID.
System Owner
PowerShower has the ability to identify the current user on the infected host.
System Owner
POWERSTATS has the ability to identify the username on the compromised host.
System Owner
POWRUNER may collect information about the currently logged in user by running whoami on a victim.
System Owner
A module in Prikormka collects information from the victim about the current user name.
System Owner
Pupy can enumerate local information for Linux hosts and find currently logged on users for Windows hosts.
System Owner
PyDCrypt has probed victim machines with whoami and has collected the username from the machine.
System Owner
QakBot can identify the user name on a compromised system.
System Owner
QUADAGENT gathers the victim username.
System Owner
QuasarRAT can enumerate the username and account type.
System Owner
RATANKBA runs the whoami and query user commands.
System Owner
RCSession can gather system owner information, including user and administrator privileges.
System Owner
Reaver collects the victim's username.
System Owner
RedLeaves can obtain information about the logged on user both locally and for Remote Desktop sessions.
System Owner
Remsec can obtain information about the current user.
System Owner
Revenge RAT gathers the username from the system.
System Owner
RGDoor executes the whoami on the victim’s machine.
System Owner
Rifdoor has the ability to identify the username on the compromised host.
System Owner
Rising Sun can detect the username of the infected host.
System Owner
RogueRobin collects the victim’s username and whether that user is an admin.
System Owner
ROKRAT can collect the username from a compromised host.
System Owner
It can obtain the victim username and permissions.
System Owner
S-Type has run tests to determine the privilege level of the compromised user.
System Owner
Saint Bot can collect the username from a compromised host.
System Owner
It has collected the username from a compromised host.
System Owner
SDBbot has the ability to identify the user on a compromised host.
System Owner
ServHelper will attempt to enumerate the username of the victim.
System Owner
ShadowPad has collected the username of the victim system.
System Owner
SHARPSTATS has the ability to identify the username on the compromised host.
System Owner
SideTwist can collect the username on a targeted system.
System Owner
It has used tools to identify the user of a compromised host.
System Owner
SILENTTRINITY can gather a list of logged on users.
System Owner
SLOTHFULMEDIA has collected the username from a victim machine.
System Owner
Small Sieve can obtain the id of a logged in user.
System Owner
SMOKEDHAM has used whoami commands to identify system owners.
System Owner
SodaMaster can identify the username on a compromised host.
System Owner
SombRAT can execute getinfo to identify the username on a compromised host.
System Owner
Spark has run the whoami command and has a built-in command to identify the user logged in.
System Owner
SpeakUp uses the whoami command.
System Owner
Squirrelwaffle can collect the user name from a compromised host.
System Owner
SslMM sends the logged-on username to its hard-coded C2.
System Owner
STARWHALE can gather the username from an infected host.