prompt
stringclasses
508 values
procedure
stringlengths
20
478
Automated Collection
It has collected information automatically using the adversary's USBferry attack.
Automated Collection
For all non-removable drives on a victim, USBStealer executes automated collection of certain files for later exfiltration.
Automated Collection
Valak can download a module to search for and build a report of harvested credential data.
Automated Collection
VERMIN saves each collected file with the automatically generated format {0:dd-MM-yyyy}.txt .
Automated Collection
WindTail can identify and add files that possess specific file extensions to an array for archiving.
Automated Collection
Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.
Browser Session Hijacking
Agent Tesla has the ability to use form-grabbing to extract data from web data forms.
Browser Session Hijacking
Carberp has captured credentials when a user performs login through a SSL session.
Browser Session Hijacking
Chaes has used the Puppeteer module to hook and monitor the Chrome web browser to collect user information from infected hosts.
Browser Session Hijacking
Cobalt Strike can perform browser pivoting and inject into a user's browser to inherit cookies, authenticated HTTP sessions, and client SSL certificates.
Browser Session Hijacking
Dridex can perform browser attacks via web injects to steal information such as credentials, certificates, and cookies.
Browser Session Hijacking
Grandoreiro can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.
Browser Session Hijacking
IcedID has used web injection attacks to redirect victims to spoofed sites designed to harvest banking and other credentials. IcedID can use a self signed TLS certificate in connection with the spoofed site and simultaneously maintains a live connection with the legitimate site to display the correct URL and certificates in the browser.
Browser Session Hijacking
Melcoz can monitor the victim's browser for online banking sessions and display an overlay window to manipulate the session in the background.
Browser Session Hijacking
QakBot can use advanced web injects to steal web banking credentials.
Browser Session Hijacking
TrickBot uses web injects and browser redirection to trick the user into providing their login credentials on a fake or modified web page.
Browser Session Hijacking
Ursnif has injected HTML codes into banking sites to steal sensitive online banking information (ex: usernames and passwords).
Clipboard Data
Agent Tesla can steal data from the victim’s clipboard.
Clipboard Data
It used a Trojan called KEYLIME to collect data from the clipboard.
Clipboard Data
It has used tools capable of stealing contents of the clipboard.
Clipboard Data
Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries.
Clipboard Data
Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs.
Clipboard Data
Cadelspy has the ability to steal data from the clipboard.
Clipboard Data
Catchamas steals data stored in the clipboard.
Clipboard Data
Clambling has the ability to capture and store clipboard data.
Clipboard Data
CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds.
Clipboard Data
DarkComet can steal data from the clipboard.
Clipboard Data
DarkTortilla can download a clipboard information stealer module.
Clipboard Data
Empire can harvest clipboard data on both Windows and macOS systems.
Clipboard Data
Explosive has a function to use the OpenClipboard wrapper.
Clipboard Data
FlawedAmmyy can collect clipboard data.
Clipboard Data
Grandoreiro can capture clipboard data from a compromised host.
Clipboard Data
The executable version of Helminth has a module to log clipboard contents.
Clipboard Data
A JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image.
Clipboard Data
jRAT can capture clipboard data.
Clipboard Data
Koadic can retrieve the current content of the user clipboard.
Clipboard Data
KONNI had a feature to steal data from the clipboard.
Clipboard Data
It hijacks the clipboard data by creating an overlapped window that listens to keyboard events.
Clipboard Data
MacSpy can steal clipboard contents.
Clipboard Data
MarkiRAT can capture clipboard content.
Clipboard Data
Melcoz can monitor content saved to the clipboard.
Clipboard Data
Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.
Clipboard Data
During Operation Wocao, threat actors collected clipboard data in plaintext.
Clipboard Data
Remcos steals and modifies data from the clipboard.
Clipboard Data
Remexi collects text from the clipboard.
Clipboard Data
ROKRAT can extract clipboard data from a compromised host.
Clipboard Data
It collects data from the clipboard.
Clipboard Data
RunningRAT contains code to open and copy data from the clipboard.
Clipboard Data
TajMahal has the ability to steal data from the clipboard of an infected host.
Clipboard Data
TinyZBot contains functionality to collect information from the clipboard.
Clipboard Data
VERMIN collects data stored in the clipboard.
Clipboard Data
Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect.
Data from Cloud Storage
AADInternals can collect files from a user’s OneDrive.
Data from Cloud Storage
During C0027, It accessed victim OneDrive environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides.
Data from Cloud Storage
It has obtained files from the victim's cloud storage instances.
Data from Cloud Storage
Pacu can enumerate and download files stored in AWS storage services, such as S3 buckets.
Data from Cloud Storage
Peirates can dump the contents of AWS S3 buckets. It can also retrieve service account tokens from kOps buckets in Google Cloud Storage or S3.
Data from Information Repositories
It has collected files from various information repositories.
Data from Information Repositories
It has collected schemas and user accounts from systems running SQL Server.
Data from Information Repositories
It has accessed victim security and IT environments and Microsoft Teams to mine valuable information.
Data from Information Repositories
It has searched a victim's network for organization collaboration channels like MS Teams or Slack to discover further high-privilege account credentials.
Data from Information Repositories
P.A.S. Webshell has the ability to list and extract data from SQL databases.
Data from Information Repositories
During the SolarWinds Compromise, It accessed victims' internal knowledge repositories (wikis) to view sensitive corporate information on products, services, and internal business operations.
Data from Information Repositories
It has used a custom .NET tool to collect documents from an organization's internal central database.
Data from Information Repositories:Confluence
It has searched a victim's network for collaboration platforms like Confluence and JIRA to discover further high-privilege account credentials.
Data from Information Repositories:Sharepoint
It has collected information from Microsoft SharePoint services within target networks.
Data from Information Repositories:Sharepoint
During C0027, It accessed victim SharePoint environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides.
Data from Information Repositories:Sharepoint
It has collected documents from the victim's SharePoint.
Data from Information Repositories:Sharepoint
It used a SharePoint enumeration and data dumping tool known as spwebmember.
Data from Information Repositories:Sharepoint
It has searched a victim's network for collaboration platforms like SharePoint to discover further high-privilege account credentials.
Data from Information Repositories:Sharepoint
spwebmember is used to enumerate and dump information from Microsoft SharePoint.
Data from Information Repositories:Code Repositories
It has searched a victim's network for code repositories like GitLab and GitHub to discover further high-privilege account credentials.
Data from Information Repositories:Code Repositories
During the SolarWinds Compromise, It downloaded source code from code repositories.
Data from Local System
Action RAT can collect local data from an infected machine.
Data from Local System
Amadey can collect information from a compromised host.
Data from Local System
It has collected large numbers of files from compromised network systems for later extraction.
Data from Local System
AppleSeed can collect data on a compromised host.
Data from Local System
It has collected files from a local victim.
Data from Local System
It has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.
Data from Local System
It has stolen data from compromised hosts.
Data from Local System
It will identify Microsoft Office documents on the victim's computer.
Data from Local System
It has collected data from victims' local systems.
Data from Local System
It has collected data from a compromised host.
Data from Local System
It has used various tools to steal files from the compromised host.
Data from Local System
It has uploaded files and data from a compromised host.
Data from Local System
AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine.
Data from Local System
It has collected data from a compromised network.
Data from Local System
BADFLICK has uploaded files from victims' machines.
Data from Local System
When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.
Data from Local System
BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.
Data from Local System
Bandook can collect local files from the system .
Data from Local System
Bankshot collects files from the local system.
Data from Local System
Bazar can retrieve information from the infected machine.
Data from Local System
Bisonal has collected information from a compromised host.
Data from Local System
BlackMould can copy files on a compromised host.
Data from Local System
BLINDINGCAN has uploaded files from victim machines.
Data from Local System
BoxCaon can upload files from a compromised host.
Data from Local System
It has exfiltrated files stolen from local systems.
Data from Local System
Brute Ratel C4 has the ability to upload files from a compromised system.
Data from Local System
Bumblebee can capture and compress stolen credentials from the Registry and volume shadow copies.