prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Time Discovery | BADHATCH can obtain the DATETIME from a compromised machine. |
System Time Discovery | Bazar can collect the time on the compromised host. |
System Time Discovery | BendyBear has the ability to determine local time on a compromised host. |
System Time Discovery | Bisonal can check the system time set on the infected host. |
System Time Discovery | BLUELIGHT can collect the local time on a compromised host. |
System Time Discovery | It has used net time to check the local time on a target system. |
System Time Discovery | build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active. |
System Time Discovery | During C0015, the threat actors used the command net view /all time to gather the local time of a compromised network. |
System Time Discovery | Cannon can collect the current time zone information from the victim’s machine. |
System Time Discovery | Carbon uses the command net time \127.0.0.1 to get information the system’s time. |
System Time Discovery | ccf32 can determine the local time on targeted machines. |
System Time Discovery | It has used time /t and net time \ip/hostname for system time discovery. |
System Time Discovery | Clambling can determine the current time. |
System Time Discovery | ComRAT has checked the victim system's date and time to perform tasks during business hours (9 to 5, Monday to Friday). |
System Time Discovery | Conficker uses the current UTC victim system date for domain generation and connects to time servers to determine the current date. |
System Time Discovery | Crimson has the ability to determine the date and time on a compromised host. |
System Time Discovery | It malware can obtain system time from a compromised host. |
System Time Discovery | DarkWatchman can collect the time zone information from the system. |
System Time Discovery | DCSrv can compare the current time on an infected host with a configuration value to determine when to start the encryption process. |
System Time Discovery | DRATzarus can use the GetTickCount and GetSystemTimeAsFileTime API calls to inspect system time. |
System Time Discovery | Egregor contains functionality to query the local/system time. |
System Time Discovery | Epic uses the net time command to get the system time from the machine and collect the current date and time zone information. |
System Time Discovery | EvilBunny has used the API calls NtQuerySystemTime, GetSystemTimeAsFileTime, and GetTickCount to gather time metrics as part of its checks to see if the malware is running in a sandbox. |
System Time Discovery | FELIXROOT gathers the time zone information from the victim’s machine. |
System Time Discovery | FunnyDream can check system time to help determine when changes were made to specified files. |
System Time Discovery | GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server. |
System Time Discovery | Grandoreiro can determine the time on the victim machine via IPinfo. |
System Time Discovery | GravityRAT can obtain the date and time of a system. |
System Time Discovery | Green Lambert can collect the date and time from a compromised host. |
System Time Discovery | GRIFFON has used a reconnaissance module that can be used to retrieve the date and time of the system. |
System Time Discovery | It used a function to gather the current time. |
System Time Discovery | HOPLIGHT has been observed collecting system time from victim machines. |
System Time Discovery | InvisiMole gathers the local system time from the victim’s machine. |
System Time Discovery | KEYPLUG can obtain the current tick count of an infected computer. |
System Time Discovery | A Destover-like implant used by It can obtain the current system time and send it to the C2 server. |
System Time Discovery | Metamorfo uses JavaScript to get the system time. |
System Time Discovery | MoonWind obtains the victim's current time. |
System Time Discovery | The net time command can be used in Net to determine the local or remote system time. |
System Time Discovery | NOKKI can collect the current timestamp of the victim's machine. |
System Time Discovery | Okrum can obtain the date and time of the compromised system. |
System Time Discovery | OopsIE checks to see if the system is configured with "Daylight" time and checks for a specific region to be set for the timezone. |
System Time Discovery | During Operation CuckooBees, the threat actors used the net time command as part of their advanced reconnaissance. |
System Time Discovery | During Operation Wocao, threat actors used the time command to retrieve the current time of a compromised system. |
System Time Discovery | PipeMon can send time zone information from a compromised host to C2. |
System Time Discovery | PowerDuke has commands to get the time the machine was built, the time, and the time zone. |
System Time Discovery | As part of the data reconnaissance phase, Proxysvc grabs the system time to send back to the control server. |
System Time Discovery | QakBot can identify the system time on a targeted host. |
System Time Discovery | It can obtain the victim time zone. |
System Time Discovery | ShadowPad has collected the current date and time of the victim system. |
System Time Discovery | Shamoon obtains the system time and will only activate if it is greater than a preset date. |
System Time Discovery | SHARPSTATS has the ability to identify the current date and time on the compromised host. |
System Time Discovery | It has used tools to obtain the current system time. |
System Time Discovery | SILENTTRINITY can collect start time information from a compromised host. |
System Time Discovery | SombRAT can execute getinfo to discover the current time on a compromised host. |
System Time Discovery | StoneDrill can obtain the current date and time of the victim machine. |
System Time Discovery | StrifeWater can collect the time zone from the victim's machine. |
System Time Discovery | Stuxnet collects the time and date of a system when it is infected. |
System Time Discovery | SVCReady can collect time zone information. |
System Time Discovery | T9000 gathers and beacons the system time during installation. |
System Time Discovery | Taidoor can use GetLocalTime and GetSystemTime to collect system time. |
System Time Discovery | TAINTEDSCRIBE can execute GetLocalTime for time discovery. |
System Time Discovery | TajMahal has the ability to determine local time on a compromised host. |
System Time Discovery | It has checked the current date on the victim system. |
System Time Discovery | Torisma can collect the current time on a victim machine. |
System Time Discovery | It surveys a system upon check-in to discover the system time by using the net time command. |
System Time Discovery | UPPERCUT has the capability to obtain the time zone information and current timestamp of the victim’s machine. |
System Time Discovery | WindTail has the ability to generate the current date and time. |
System Time Discovery | Zebrocy gathers the current time zone and date information from the system. |
System Time Discovery | Zeus Panda collects the current system time (UTC) and sends it back to the C2 server. |
System Time Discovery | ItM has used a tool to capture the time on a compromised host in order to register it with C2. |
Virtualization | Agent Tesla has the ability to perform anti-sandboxing and anti-virtualization checks. |
Virtualization | Bazar can attempt to overload sandbox analysis by sending 1550 calls to printf. |
Virtualization | Bisonal can check to determine if the compromised system is running on VMware. |
Virtualization | Black Basta can make a random number of calls to the kernel32.beep function to hinder log analysis. |
Virtualization | Bumblebee has the ability to perform anti-virtualization checks. |
Virtualization | Carberp has removed various hooks before installing the trojan or bootkit to evade sandbox analysis or other analysis software. |
Virtualization | CHOPSTICK includes runtime checks to identify an analysis environment and prevent execution on it. |
Virtualization | Some versions of CozyCar will check to ensure it is not being executed inside a virtual machine or a known malware analysis sandbox environment. If it detects that it is, it will exit. |
Virtualization | It malware has employed just-in-time decryption of strings to evade sandbox detection. |
Virtualization | Egregor has used multiple anti-analysis and anti-sandbox techniques to prevent automated analysis by sandboxes. |
Virtualization | Gelsemium can use junk code to generate random activity to obscure malware behavior. |
Virtualization | Hancitor has used a macro to check that an ActiveDocument shape object in the lure message is present. If this object is not found, the macro will exit without downloading additional payloads. |
Virtualization | Kevin can sleep for a time interval between C2 communication attempts. |
Virtualization | Metamorfo has embedded a "vmdetect.exe" executable to identify virtual machines at the beginning of execution. |
Virtualization | During Operation Spalax, the threat actors used droppers that would run anti-analysis checks before executing malware on a compromised host. |
Virtualization | Pteranodon has the ability to use anti-detection functions to identify sandbox environments. |
Virtualization | It can detect if it is running within a sandbox or other virtualized analysis environment. |
Virtualization | Squirrelwaffle has contained a hardcoded list of IP addresses to block that belong to sandboxes and analysis platforms. |
Virtualization | StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes. |
Virtualization | Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments. |
Virtualization | AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments. |
Virtualization | Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instructions. |
Virtualization | BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name, BIOS, and motherboard information. |
Virtualization | Black Basta can check system flags and libraries, process timing, and API's to detect code emulation or sandboxing. |
Virtualization | BLUELIGHT can check to see if the infected machine has VM tools running. |
Virtualization | Bumblebee has the ability to search for designated file paths and Registry keys that indicate a virtualized environment from multiple products. |
Virtualization | CSPY Downloader can search loaded modules, PEB structure, file paths, Registry keys, and memory to determine if it is being debugged or running in a virtual environment. |
Virtualization | It malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with .Md5.exe, and if the program is executed from the root of the C:\ drive, as well as checks for sandbox-related libraries. |
Virtualization | DarkTortilla can search a compromised system's running processes and services to detect Hyper-V, QEMU, Virtual PC, Virtual Box, and VMware, as well as Sandboxie. |
Virtualization | Denis ran multiple system checks, looking for processor and register characteristics, to evade emulation and analysis. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.