prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Data Staged | It has staged collected data in password-protected archives. |
Data Staged | It has collected and staged credentials and network enumeration information, using the networkdll and psfin TrickBot modules. |
Data Staged:Local Data Staging | ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory. |
Data Staged:Local Data Staging | AppleSeed can stage files in a central location prior to exfiltration. |
Data Staged:Local Data Staging | It has stored captured credential information in a file named pi.log. |
Data Staged:Local Data Staging | It has been known to stage files for exfiltration in a single location. |
Data Staged:Local Data Staging | It has utilized tools to aggregate data prior to exfiltration. |
Data Staged:Local Data Staging | Astaroth collects data in a plaintext file named r1.log before exfiltration. |
Data Staged:Local Data Staging | Attor has staged collected data in a central upload directory prior to exfiltration. |
Data Staged:Local Data Staging | AuTo Stealer can store collected data from an infected host to a file named Hostname_UserName.txt prior to exfiltration. |
Data Staged:Local Data Staging | It has copied files of interest to the main drive's recycle bin. |
Data Staged:Local Data Staging | BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory. |
Data Staged:Local Data Staging | BadPatch stores collected data in log files before exfiltration. |
Data Staged:Local Data Staging | BoxCaon has created a working folder for collected files that it sends to the C2 server. |
Data Staged:Local Data Staging | During C0015, PowerView's file share enumeration results were stored in the file c:\ProgramData\found_shares.txt. |
Data Staged:Local Data Staging | During C0017, It copied the local SAM and SYSTEM Registry hives to a staging directory. |
Data Staged:Local Data Staging | Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration. |
Data Staged:Local Data Staging | Carbon creates a base directory that contains the files and folders that are collected. |
Data Staged:Local Data Staging | Catchamas stores the gathered data from the machine in .db files and .bmp files under four separate locations. |
Data Staged:Local Data Staging | ccf32 can temporarily store files in a hidden directory on the local host. |
Data Staged:Local Data Staging | It has staged stolen data locally on compromised hosts. |
Data Staged:Local Data Staging | Chrommme can store captured system information locally prior to exfiltration. |
Data Staged:Local Data Staging | Crutch has staged stolen files in the C:\AMD\Temp directory. |
Data Staged:Local Data Staging | DarkWatchman can stage local data in the Windows Registry. |
Data Staged:Local Data Staging | It has created a directory named "out" in the user's %AppData% folder and copied files to it. |
Data Staged:Local Data Staging | Dtrack can save collected data to disk, different file formats, and network shares. |
Data Staged:Local Data Staging | Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it. |
Data Staged:Local Data Staging | DustySky created folders in temp directories to host collected files before exfiltration. |
Data Staged:Local Data Staging | Dyre has the ability to create files in a TEMP folder to act as a database to store information. |
Data Staged:Local Data Staging | ECCENTRICBANDWAGON has stored keystrokes and screenshots within the %temp%\GoogleChrome, %temp%\Downloads, and %temp%\TrendMicroUpdate directories. |
Data Staged:Local Data Staging | Elise creates a file in AppData\Local\Microsoft\Windows\Explorer and stores all harvested data in that file. |
Data Staged:Local Data Staging | Exaramel for Windows specifies a path to store files scheduled for exfiltration. |
Data Staged:Local Data Staging | It has utilized the following temporary folders on compromised Windows and Linux systems for their operations prior to exfiltration: C:\Windows\Temp and /tmp. |
Data Staged:Local Data Staging | It scripts save memory dump data into a specific directory on hosts in the victim environment. |
Data Staged:Local Data Staging | FLASHFLOOD stages data it copies from the local system or removable drives in the "%WINDIR%\$NtUninstallKB885884$\" directory. |
Data Staged:Local Data Staging | FrameworkPOS can identifiy payment card track data on the victim and copy it to a local file in a subdirectory of C:\Windows. |
Data Staged:Local Data Staging | FunnyDream can stage collected information including screen captures and logged keystrokes locally. |
Data Staged:Local Data Staging | It compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration. |
Data Staged:Local Data Staging | Gold Dragon stores information gathered from the endpoint in a file named 1.hwp. |
Data Staged:Local Data Staging | Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server. |
Data Staged:Local Data Staging | It has stored collected date in a .tmp file. |
Data Staged:Local Data Staging | InvisiMole determines a working directory where it stores all the gathered data about the compromised machine. |
Data Staged:Local Data Staging | Kazuar stages command output and collected data in files before exfiltration. |
Data Staged:Local Data Staging | KGH_SPY can save collected system information to a file named "info" before exfiltration. |
Data Staged:Local Data Staging | It has staged collected data files under C:\Program Files\Common Files\System\Ole DB\. |
Data Staged:Local Data Staging | KOPILUWAK has piped the results from executed C2 commands to %TEMP%\result2.dat on the local machine. |
Data Staged:Local Data Staging | It malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory, then compressed, encrypted, and uploaded to a C2 server. |
Data Staged:Local Data Staging | It has used C:\Windows\Debug and C:\Perflogs as staging directories. |
Data Staged:Local Data Staging | LightNeuron can store email data in files and directories specified in its configuration, such as C:\Windows\ServiceProfiles\NetworkService\appdata\Local\Temp\. |
Data Staged:Local Data Staging | It stores files and logs in a folder on the local drive. |
Data Staged:Local Data Staging | MacMa has stored collected files locally before exfiltration. |
Data Staged:Local Data Staging | Mafalda can place retrieved files into a destination directory. |
Data Staged:Local Data Staging | MarkiRAT can store collected data locally in a created .nfo file. |
Data Staged:Local Data Staging | It stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin. |
Data Staged:Local Data Staging | MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system. |
Data Staged:Local Data Staging | metaMain has stored the collected system files in a working directory. |
Data Staged:Local Data Staging | Milan has saved files prior to upload from a compromised host to folders beginning with the characters a9850d2f. |
Data Staged:Local Data Staging | Mis-Type has temporarily stored collected information to the files "%AppData%\{Unique Identifier}\HOSTRURKLSR" and "%AppData%\{Unique Identifier}\NEWERSSEMP". |
Data Staged:Local Data Staging | MoonWind saves information from its keylogging routine as a .zip file in the present working directory. |
Data Staged:Local Data Staging | It has stored a decoy PDF file within a victim's %temp% folder. |
Data Staged:Local Data Staging | It has stored collected credential files in c:\windows\temp prior to exfiltration. It has also stored documents for exfiltration in a hidden folder on USB drives. |
Data Staged:Local Data Staging | NavRAT writes multiple outputs to a TMP file using the >> method. |
Data Staged:Local Data Staging | NETWIRE has the ability to write collected data to a file created in the ./LOGS directory. |
Data Staged:Local Data Staging | NightClub has copied captured files and keystrokes to the %TEMP% directory of compromised hosts. |
Data Staged:Local Data Staging | NOKKI can collect data from the victim and stage it in LOCALAPPDATA%\MicroSoft Updatea\uplog.tmp. |
Data Staged:Local Data Staging | ObliqueRAT can copy specific files, webcam captures, and screenshots to local directories. |
Data Staged:Local Data Staging | Octopus has stored collected information in the Application Data directory on a compromised host. |
Data Staged:Local Data Staging | OopsIE stages the output from command execution and collected files in specific folders before exfiltration. |
Data Staged:Local Data Staging | During Operation Honeybee, stolen data was copied into a text file using the format From <COMPUTER-NAME> (<Month>-<Day> <Hour>-<Minute>-<Second>).txt prior to compression, encoding, and exfiltration. |
Data Staged:Local Data Staging | During Operation Wocao, threat actors staged archived files in a temporary directory prior to exfiltration. |
Data Staged:Local Data Staging | It copied all targeted files to a directory called index that was eventually uploaded to the C&C server. |
Data Staged:Local Data Staging | PoisonIvy stages collected data in a text file. |
Data Staged:Local Data Staging | PowerLess can stage stolen browser data in C:\\Windows\\Temp\\cup.tmp and keylogger data in C:\\Windows\\Temp\\Report.06E17A5A-7325-4325-8E5D-E172EBA7FC5BK. |
Data Staged:Local Data Staging | Prikormka creates a directory, %USERPROFILE%\AppData\Local\SKC\, which is used to store collected log files. |
Data Staged:Local Data Staging | Pteranodon creates various subdirectories under %Temp%\reports\% and copies files to those subdirectories. It also creates a folder at C:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files. |
Data Staged:Local Data Staging | PUNCHBUGGY has saved information to a random temp file before exfil. |
Data Staged:Local Data Staging | PUNCHTRACK aggregates collected data in a tmp file. |
Data Staged:Local Data Staging | QakBot has stored stolen emails and other data into new folders prior to exfiltration. |
Data Staged:Local Data Staging | RainyDay can use a file exfiltration tool to copy files to C:\ProgramData\Adobe\temp prior to exfiltration. |
Data Staged:Local Data Staging | Ramsay can stage data prior to exfiltration in %APPDATA%\Microsoft\UserSetting and %APPDATA%\Microsoft\UserSetting\MediaCache. |
Data Staged:Local Data Staging | Data captured by RawPOS is placed in a temporary file under a directory named "memdump". |
Data Staged:Local Data Staging | Rover copies files from removable drives to C:\system. |
Data Staged:Local Data Staging | It has collected stolen files in a temporary folder in preparation for exfiltration. |
Data Staged:Local Data Staging | SombRAT can store harvested data in a custom database under the %TEMP% directory. |
Data Staged:Local Data Staging | SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile. |
Data Staged:Local Data Staging | STARWHALE has stored collected data in a file called stari.txt. |
Data Staged:Local Data Staging | SUGARDUMP has stored collected data under %<malware_execution_folder>%\\CrashLog.txt. |
Data Staged:Local Data Staging | It has aggregated collected credentials in text files before exfiltrating. |
Data Staged:Local Data Staging | It has created staging folders in directories that were infrequently used by legitimate users or processes. |
Data Staged:Local Data Staging | It has locally staged encrypted archives for later exfiltration efforts. |
Data Staged:Local Data Staging | Trojan.Karagany can create directories to store plugin output and stage data for exfiltration. |
Data Staged:Local Data Staging | Turian can store copied files in a specific directory prior to exfiltration. |
Data Staged:Local Data Staging | Ursnif has used tmp files to stage gathered information. |
Data Staged:Local Data Staging | USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration. |
Data Staged:Local Data Staging | It has saved stolen files including the ntds.dit database and the SYSTEM and SECURITY Registry hives locally to the C:\Windows\Temp\ directory. |
Data Staged:Local Data Staging | It has staged ZIP files in local directories such as, C:\PerfLogs\1\ and C:\User\1\ prior to exfiltration. |
Data Staged:Local Data Staging | Zebrocy stores all collected information in a single file before exfiltration. |
Data Staged:Remote Data Staging | It has staged archives of collected data on a target's Outlook Web Access (OWA) server. |
Data Staged:Remote Data Staging | ccf32 has copied files to a remote machine infected with Chinoxy or another backdoor. |
Data Staged:Remote Data Staging | It has staged stolen data on designated servers in the target environment. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.