prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Automated Collection | It has collected information automatically using the adversary's USBferry attack. |
Automated Collection | For all non-removable drives on a victim, USBStealer executes automated collection of certain files for later exfiltration. |
Automated Collection | Valak can download a module to search for and build a report of harvested credential data. |
Automated Collection | VERMIN saves each collected file with the automatically generated format {0:dd-MM-yyyy}.txt . |
Automated Collection | WindTail can identify and add files that possess specific file extensions to an array for archiving. |
Automated Collection | Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz. |
Browser Session Hijacking | Agent Tesla has the ability to use form-grabbing to extract data from web data forms. |
Browser Session Hijacking | Carberp has captured credentials when a user performs login through a SSL session. |
Browser Session Hijacking | Chaes has used the Puppeteer module to hook and monitor the Chrome web browser to collect user information from infected hosts. |
Browser Session Hijacking | Cobalt Strike can perform browser pivoting and inject into a user's browser to inherit cookies, authenticated HTTP sessions, and client SSL certificates. |
Browser Session Hijacking | Dridex can perform browser attacks via web injects to steal information such as credentials, certificates, and cookies. |
Browser Session Hijacking | Grandoreiro can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields. |
Browser Session Hijacking | IcedID has used web injection attacks to redirect victims to spoofed sites designed to harvest banking and other credentials. IcedID can use a self signed TLS certificate in connection with the spoofed site and simultaneously maintains a live connection with the legitimate site to display the correct URL and certificates in the browser. |
Browser Session Hijacking | Melcoz can monitor the victim's browser for online banking sessions and display an overlay window to manipulate the session in the background. |
Browser Session Hijacking | QakBot can use advanced web injects to steal web banking credentials. |
Browser Session Hijacking | TrickBot uses web injects and browser redirection to trick the user into providing their login credentials on a fake or modified web page. |
Browser Session Hijacking | Ursnif has injected HTML codes into banking sites to steal sensitive online banking information (ex: usernames and passwords). |
Clipboard Data | Agent Tesla can steal data from the victim’s clipboard. |
Clipboard Data | It used a Trojan called KEYLIME to collect data from the clipboard. |
Clipboard Data | It has used tools capable of stealing contents of the clipboard. |
Clipboard Data | Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries. |
Clipboard Data | Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs. |
Clipboard Data | Cadelspy has the ability to steal data from the clipboard. |
Clipboard Data | Catchamas steals data stored in the clipboard. |
Clipboard Data | Clambling has the ability to capture and store clipboard data. |
Clipboard Data | CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds. |
Clipboard Data | DarkComet can steal data from the clipboard. |
Clipboard Data | DarkTortilla can download a clipboard information stealer module. |
Clipboard Data | Empire can harvest clipboard data on both Windows and macOS systems. |
Clipboard Data | Explosive has a function to use the OpenClipboard wrapper. |
Clipboard Data | FlawedAmmyy can collect clipboard data. |
Clipboard Data | Grandoreiro can capture clipboard data from a compromised host. |
Clipboard Data | The executable version of Helminth has a module to log clipboard contents. |
Clipboard Data | A JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image. |
Clipboard Data | jRAT can capture clipboard data. |
Clipboard Data | Koadic can retrieve the current content of the user clipboard. |
Clipboard Data | KONNI had a feature to steal data from the clipboard. |
Clipboard Data | It hijacks the clipboard data by creating an overlapped window that listens to keyboard events. |
Clipboard Data | MacSpy can steal clipboard contents. |
Clipboard Data | MarkiRAT can capture clipboard content. |
Clipboard Data | Melcoz can monitor content saved to the clipboard. |
Clipboard Data | Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's. |
Clipboard Data | During Operation Wocao, threat actors collected clipboard data in plaintext. |
Clipboard Data | Remcos steals and modifies data from the clipboard. |
Clipboard Data | Remexi collects text from the clipboard. |
Clipboard Data | ROKRAT can extract clipboard data from a compromised host. |
Clipboard Data | It collects data from the clipboard. |
Clipboard Data | RunningRAT contains code to open and copy data from the clipboard. |
Clipboard Data | TajMahal has the ability to steal data from the clipboard of an infected host. |
Clipboard Data | TinyZBot contains functionality to collect information from the clipboard. |
Clipboard Data | VERMIN collects data stored in the clipboard. |
Clipboard Data | Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect. |
Data from Cloud Storage | AADInternals can collect files from a user’s OneDrive. |
Data from Cloud Storage | During C0027, It accessed victim OneDrive environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides. |
Data from Cloud Storage | It has obtained files from the victim's cloud storage instances. |
Data from Cloud Storage | Pacu can enumerate and download files stored in AWS storage services, such as S3 buckets. |
Data from Cloud Storage | Peirates can dump the contents of AWS S3 buckets. It can also retrieve service account tokens from kOps buckets in Google Cloud Storage or S3. |
Data from Information Repositories | It has collected files from various information repositories. |
Data from Information Repositories | It has collected schemas and user accounts from systems running SQL Server. |
Data from Information Repositories | It has accessed victim security and IT environments and Microsoft Teams to mine valuable information. |
Data from Information Repositories | It has searched a victim's network for organization collaboration channels like MS Teams or Slack to discover further high-privilege account credentials. |
Data from Information Repositories | P.A.S. Webshell has the ability to list and extract data from SQL databases. |
Data from Information Repositories | During the SolarWinds Compromise, It accessed victims' internal knowledge repositories (wikis) to view sensitive corporate information on products, services, and internal business operations. |
Data from Information Repositories | It has used a custom .NET tool to collect documents from an organization's internal central database. |
Data from Information Repositories:Confluence | It has searched a victim's network for collaboration platforms like Confluence and JIRA to discover further high-privilege account credentials. |
Data from Information Repositories:Sharepoint | It has collected information from Microsoft SharePoint services within target networks. |
Data from Information Repositories:Sharepoint | During C0027, It accessed victim SharePoint environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides. |
Data from Information Repositories:Sharepoint | It has collected documents from the victim's SharePoint. |
Data from Information Repositories:Sharepoint | It used a SharePoint enumeration and data dumping tool known as spwebmember. |
Data from Information Repositories:Sharepoint | It has searched a victim's network for collaboration platforms like SharePoint to discover further high-privilege account credentials. |
Data from Information Repositories:Sharepoint | spwebmember is used to enumerate and dump information from Microsoft SharePoint. |
Data from Information Repositories:Code Repositories | It has searched a victim's network for code repositories like GitLab and GitHub to discover further high-privilege account credentials. |
Data from Information Repositories:Code Repositories | During the SolarWinds Compromise, It downloaded source code from code repositories. |
Data from Local System | Action RAT can collect local data from an infected machine. |
Data from Local System | Amadey can collect information from a compromised host. |
Data from Local System | It has collected large numbers of files from compromised network systems for later extraction. |
Data from Local System | AppleSeed can collect data on a compromised host. |
Data from Local System | It has collected files from a local victim. |
Data from Local System | It has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration. |
Data from Local System | It has stolen data from compromised hosts. |
Data from Local System | It will identify Microsoft Office documents on the victim's computer. |
Data from Local System | It has collected data from victims' local systems. |
Data from Local System | It has collected data from a compromised host. |
Data from Local System | It has used various tools to steal files from the compromised host. |
Data from Local System | It has uploaded files and data from a compromised host. |
Data from Local System | AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine. |
Data from Local System | It has collected data from a compromised network. |
Data from Local System | BADFLICK has uploaded files from victims' machines. |
Data from Local System | When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt. |
Data from Local System | BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx. |
Data from Local System | Bandook can collect local files from the system . |
Data from Local System | Bankshot collects files from the local system. |
Data from Local System | Bazar can retrieve information from the infected machine. |
Data from Local System | Bisonal has collected information from a compromised host. |
Data from Local System | BlackMould can copy files on a compromised host. |
Data from Local System | BLINDINGCAN has uploaded files from victim machines. |
Data from Local System | BoxCaon can upload files from a compromised host. |
Data from Local System | It has exfiltrated files stolen from local systems. |
Data from Local System | Brute Ratel C4 has the ability to upload files from a compromised system. |
Data from Local System | Bumblebee can capture and compress stolen credentials from the Registry and volume shadow copies. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.