prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Data Staged
|
It has staged collected data in password-protected archives.
|
Data Staged
|
It has collected and staged credentials and network enumeration information, using the networkdll and psfin TrickBot modules.
|
Data Staged:Local Data Staging
|
ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory.
|
Data Staged:Local Data Staging
|
AppleSeed can stage files in a central location prior to exfiltration.
|
Data Staged:Local Data Staging
|
It has stored captured credential information in a file named pi.log.
|
Data Staged:Local Data Staging
|
It has been known to stage files for exfiltration in a single location.
|
Data Staged:Local Data Staging
|
It has utilized tools to aggregate data prior to exfiltration.
|
Data Staged:Local Data Staging
|
Astaroth collects data in a plaintext file named r1.log before exfiltration.
|
Data Staged:Local Data Staging
|
Attor has staged collected data in a central upload directory prior to exfiltration.
|
Data Staged:Local Data Staging
|
AuTo Stealer can store collected data from an infected host to a file named Hostname_UserName.txt prior to exfiltration.
|
Data Staged:Local Data Staging
|
It has copied files of interest to the main drive's recycle bin.
|
Data Staged:Local Data Staging
|
BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory.
|
Data Staged:Local Data Staging
|
BadPatch stores collected data in log files before exfiltration.
|
Data Staged:Local Data Staging
|
BoxCaon has created a working folder for collected files that it sends to the C2 server.
|
Data Staged:Local Data Staging
|
During C0015, PowerView's file share enumeration results were stored in the file c:\ProgramData\found_shares.txt.
|
Data Staged:Local Data Staging
|
During C0017, It copied the local SAM and SYSTEM Registry hives to a staging directory.
|
Data Staged:Local Data Staging
|
Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.
|
Data Staged:Local Data Staging
|
Carbon creates a base directory that contains the files and folders that are collected.
|
Data Staged:Local Data Staging
|
Catchamas stores the gathered data from the machine in .db files and .bmp files under four separate locations.
|
Data Staged:Local Data Staging
|
ccf32 can temporarily store files in a hidden directory on the local host.
|
Data Staged:Local Data Staging
|
It has staged stolen data locally on compromised hosts.
|
Data Staged:Local Data Staging
|
Chrommme can store captured system information locally prior to exfiltration.
|
Data Staged:Local Data Staging
|
Crutch has staged stolen files in the C:\AMD\Temp directory.
|
Data Staged:Local Data Staging
|
DarkWatchman can stage local data in the Windows Registry.
|
Data Staged:Local Data Staging
|
It has created a directory named "out" in the user's %AppData% folder and copied files to it.
|
Data Staged:Local Data Staging
|
Dtrack can save collected data to disk, different file formats, and network shares.
|
Data Staged:Local Data Staging
|
Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it.
|
Data Staged:Local Data Staging
|
DustySky created folders in temp directories to host collected files before exfiltration.
|
Data Staged:Local Data Staging
|
Dyre has the ability to create files in a TEMP folder to act as a database to store information.
|
Data Staged:Local Data Staging
|
ECCENTRICBANDWAGON has stored keystrokes and screenshots within the %temp%\GoogleChrome, %temp%\Downloads, and %temp%\TrendMicroUpdate directories.
|
Data Staged:Local Data Staging
|
Elise creates a file in AppData\Local\Microsoft\Windows\Explorer and stores all harvested data in that file.
|
Data Staged:Local Data Staging
|
Exaramel for Windows specifies a path to store files scheduled for exfiltration.
|
Data Staged:Local Data Staging
|
It has utilized the following temporary folders on compromised Windows and Linux systems for their operations prior to exfiltration: C:\Windows\Temp and /tmp.
|
Data Staged:Local Data Staging
|
It scripts save memory dump data into a specific directory on hosts in the victim environment.
|
Data Staged:Local Data Staging
|
FLASHFLOOD stages data it copies from the local system or removable drives in the "%WINDIR%\$NtUninstallKB885884$\" directory.
|
Data Staged:Local Data Staging
|
FrameworkPOS can identifiy payment card track data on the victim and copy it to a local file in a subdirectory of C:\Windows.
|
Data Staged:Local Data Staging
|
FunnyDream can stage collected information including screen captures and logged keystrokes locally.
|
Data Staged:Local Data Staging
|
It compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration.
|
Data Staged:Local Data Staging
|
Gold Dragon stores information gathered from the endpoint in a file named 1.hwp.
|
Data Staged:Local Data Staging
|
Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server.
|
Data Staged:Local Data Staging
|
It has stored collected date in a .tmp file.
|
Data Staged:Local Data Staging
|
InvisiMole determines a working directory where it stores all the gathered data about the compromised machine.
|
Data Staged:Local Data Staging
|
Kazuar stages command output and collected data in files before exfiltration.
|
Data Staged:Local Data Staging
|
KGH_SPY can save collected system information to a file named "info" before exfiltration.
|
Data Staged:Local Data Staging
|
It has staged collected data files under C:\Program Files\Common Files\System\Ole DB\.
|
Data Staged:Local Data Staging
|
KOPILUWAK has piped the results from executed C2 commands to %TEMP%\result2.dat on the local machine.
|
Data Staged:Local Data Staging
|
It malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory, then compressed, encrypted, and uploaded to a C2 server.
|
Data Staged:Local Data Staging
|
It has used C:\Windows\Debug and C:\Perflogs as staging directories.
|
Data Staged:Local Data Staging
|
LightNeuron can store email data in files and directories specified in its configuration, such as C:\Windows\ServiceProfiles\NetworkService\appdata\Local\Temp\.
|
Data Staged:Local Data Staging
|
It stores files and logs in a folder on the local drive.
|
Data Staged:Local Data Staging
|
MacMa has stored collected files locally before exfiltration.
|
Data Staged:Local Data Staging
|
Mafalda can place retrieved files into a destination directory.
|
Data Staged:Local Data Staging
|
MarkiRAT can store collected data locally in a created .nfo file.
|
Data Staged:Local Data Staging
|
It stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin.
|
Data Staged:Local Data Staging
|
MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system.
|
Data Staged:Local Data Staging
|
metaMain has stored the collected system files in a working directory.
|
Data Staged:Local Data Staging
|
Milan has saved files prior to upload from a compromised host to folders beginning with the characters a9850d2f.
|
Data Staged:Local Data Staging
|
Mis-Type has temporarily stored collected information to the files "%AppData%\{Unique Identifier}\HOSTRURKLSR" and "%AppData%\{Unique Identifier}\NEWERSSEMP".
|
Data Staged:Local Data Staging
|
MoonWind saves information from its keylogging routine as a .zip file in the present working directory.
|
Data Staged:Local Data Staging
|
It has stored a decoy PDF file within a victim's %temp% folder.
|
Data Staged:Local Data Staging
|
It has stored collected credential files in c:\windows\temp prior to exfiltration. It has also stored documents for exfiltration in a hidden folder on USB drives.
|
Data Staged:Local Data Staging
|
NavRAT writes multiple outputs to a TMP file using the >> method.
|
Data Staged:Local Data Staging
|
NETWIRE has the ability to write collected data to a file created in the ./LOGS directory.
|
Data Staged:Local Data Staging
|
NightClub has copied captured files and keystrokes to the %TEMP% directory of compromised hosts.
|
Data Staged:Local Data Staging
|
NOKKI can collect data from the victim and stage it in LOCALAPPDATA%\MicroSoft Updatea\uplog.tmp.
|
Data Staged:Local Data Staging
|
ObliqueRAT can copy specific files, webcam captures, and screenshots to local directories.
|
Data Staged:Local Data Staging
|
Octopus has stored collected information in the Application Data directory on a compromised host.
|
Data Staged:Local Data Staging
|
OopsIE stages the output from command execution and collected files in specific folders before exfiltration.
|
Data Staged:Local Data Staging
|
During Operation Honeybee, stolen data was copied into a text file using the format From <COMPUTER-NAME> (<Month>-<Day> <Hour>-<Minute>-<Second>).txt prior to compression, encoding, and exfiltration.
|
Data Staged:Local Data Staging
|
During Operation Wocao, threat actors staged archived files in a temporary directory prior to exfiltration.
|
Data Staged:Local Data Staging
|
It copied all targeted files to a directory called index that was eventually uploaded to the C&C server.
|
Data Staged:Local Data Staging
|
PoisonIvy stages collected data in a text file.
|
Data Staged:Local Data Staging
|
PowerLess can stage stolen browser data in C:\\Windows\\Temp\\cup.tmp and keylogger data in C:\\Windows\\Temp\\Report.06E17A5A-7325-4325-8E5D-E172EBA7FC5BK.
|
Data Staged:Local Data Staging
|
Prikormka creates a directory, %USERPROFILE%\AppData\Local\SKC\, which is used to store collected log files.
|
Data Staged:Local Data Staging
|
Pteranodon creates various subdirectories under %Temp%\reports\% and copies files to those subdirectories. It also creates a folder at C:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files.
|
Data Staged:Local Data Staging
|
PUNCHBUGGY has saved information to a random temp file before exfil.
|
Data Staged:Local Data Staging
|
PUNCHTRACK aggregates collected data in a tmp file.
|
Data Staged:Local Data Staging
|
QakBot has stored stolen emails and other data into new folders prior to exfiltration.
|
Data Staged:Local Data Staging
|
RainyDay can use a file exfiltration tool to copy files to C:\ProgramData\Adobe\temp prior to exfiltration.
|
Data Staged:Local Data Staging
|
Ramsay can stage data prior to exfiltration in %APPDATA%\Microsoft\UserSetting and %APPDATA%\Microsoft\UserSetting\MediaCache.
|
Data Staged:Local Data Staging
|
Data captured by RawPOS is placed in a temporary file under a directory named "memdump".
|
Data Staged:Local Data Staging
|
Rover copies files from removable drives to C:\system.
|
Data Staged:Local Data Staging
|
It has collected stolen files in a temporary folder in preparation for exfiltration.
|
Data Staged:Local Data Staging
|
SombRAT can store harvested data in a custom database under the %TEMP% directory.
|
Data Staged:Local Data Staging
|
SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile.
|
Data Staged:Local Data Staging
|
STARWHALE has stored collected data in a file called stari.txt.
|
Data Staged:Local Data Staging
|
SUGARDUMP has stored collected data under %<malware_execution_folder>%\\CrashLog.txt.
|
Data Staged:Local Data Staging
|
It has aggregated collected credentials in text files before exfiltrating.
|
Data Staged:Local Data Staging
|
It has created staging folders in directories that were infrequently used by legitimate users or processes.
|
Data Staged:Local Data Staging
|
It has locally staged encrypted archives for later exfiltration efforts.
|
Data Staged:Local Data Staging
|
Trojan.Karagany can create directories to store plugin output and stage data for exfiltration.
|
Data Staged:Local Data Staging
|
Turian can store copied files in a specific directory prior to exfiltration.
|
Data Staged:Local Data Staging
|
Ursnif has used tmp files to stage gathered information.
|
Data Staged:Local Data Staging
|
USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration.
|
Data Staged:Local Data Staging
|
It has saved stolen files including the ntds.dit database and the SYSTEM and SECURITY Registry hives locally to the C:\Windows\Temp\ directory.
|
Data Staged:Local Data Staging
|
It has staged ZIP files in local directories such as, C:\PerfLogs\1\ and C:\User\1\ prior to exfiltration.
|
Data Staged:Local Data Staging
|
Zebrocy stores all collected information in a single file before exfiltration.
|
Data Staged:Remote Data Staging
|
It has staged archives of collected data on a target's Outlook Web Access (OWA) server.
|
Data Staged:Remote Data Staging
|
ccf32 has copied files to a remote machine infected with Chinoxy or another backdoor.
|
Data Staged:Remote Data Staging
|
It has staged stolen data on designated servers in the target environment.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.