prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Data Staged:Remote Data Staging
|
It actors have compressed data from remote systems and moved it to another staging system before exfiltration.
|
Data Staged:Remote Data Staging
|
It aggregates staged data from a network into a single location.
|
Data Staged:Remote Data Staging
|
It has staged data remotely prior to exfiltration.
|
Data Staged:Remote Data Staging
|
It has staged data on remote MSP systems or other victim networks prior to exfiltration.
|
Data Staged:Remote Data Staging
|
It has used plugins to save captured screenshots to .\AActdata\ on an SMB share.
|
Data Staged:Remote Data Staging
|
During Night Dragon, threat actors copied files to company web servers and subsequently downloaded them.
|
Data Staged:Remote Data Staging
|
During the SolarWinds Compromise, It staged data and files in password-protected archives on a victim's OWA server.
|
Data Staged:Remote Data Staging
|
It has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration.
|
Email Collection
|
Emotet has been observed leveraging a module that can scrape email addresses from Outlook.
|
Email Collection
|
It has compromised email credentials in order to steal sensitive data.
|
Email Collection
|
It has exfiltrated entire mailboxes from compromised accounts.
|
Email Collection:Local Email Collection
|
It uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.
|
Email Collection:Local Email Collection
|
It searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server.
|
Email Collection:Local Email Collection
|
It has harvested data from victim's e-mail including through execution of wmic /node: process call create "cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst" copy "i:\\\My Documents\.pst"copy.
|
Email Collection:Local Email Collection
|
CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.
|
Email Collection:Local Email Collection
|
Crimson contains a command to collect and exfiltrate emails from Outlook.
|
Email Collection:Local Email Collection
|
Emotet has been observed leveraging a module that scrapes email data from Outlook.
|
Email Collection:Local Email Collection
|
Empire has the ability to collect emails on a target system.
|
Email Collection:Local Email Collection
|
KGH_SPY can harvest data from mail clients.
|
Email Collection:Local Email Collection
|
It has collected .PST archives.
|
Email Collection:Local Email Collection
|
During Night Dragon, threat actors used RAT malware to exfiltrate email archives.
|
Email Collection:Local Email Collection
|
Out1 can parse e-mails on a target machine.
|
Email Collection:Local Email Collection
|
Pupy can interact with a victim’s Outlook session and look through folders and emails.
|
Email Collection:Local Email Collection
|
QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns.
|
Email Collection:Local Email Collection
|
Smoke Loader searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).
|
Email Collection:Remote Email Collection
|
It uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.
|
Email Collection:Remote Email Collection
|
It has collected emails from victim Microsoft Exchange servers.
|
Email Collection:Remote Email Collection
|
It has collected emails from targeted mailboxes within a compromised Azure AD tenant and compromised Exchange servers, including via Exchange Web Services (EWS) API requests.
|
Email Collection:Remote Email Collection
|
It has harvested data from remote mailboxes including through execution of \\c$\Users\\AppData\Local\Microsoft\Outlook*.ost.
|
Email Collection:Remote Email Collection
|
It has accessed email accounts using Outlook Web Access.
|
Email Collection:Remote Email Collection
|
It has accessed and hijacked online email communications using stolen credentials.
|
Email Collection:Remote Email Collection
|
It has used web shells to export mailbox data.
|
Email Collection:Remote Email Collection
|
It has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.
|
Email Collection:Remote Email Collection
|
It has used tools such as the MailFetch mail crawler to collect victim emails (excluding spam) from online services via IMAP.
|
Email Collection:Remote Email Collection
|
It used a tool called MailSniper to search through the Exchange server mailboxes for keywords.
|
Email Collection:Remote Email Collection
|
LightNeuron collects Exchange emails matching rules specified in its configuration.
|
Email Collection:Remote Email Collection
|
It has exported emails from compromised Exchange servers including through use of the cmdlet New-MailboxExportRequest.
|
Email Collection:Remote Email Collection
|
MailSniper can be used for searching through email in Exchange and Office 365 environments.
|
Email Collection:Remote Email Collection
|
Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.
|
Email Collection:Remote Email Collection
|
During the SolarWinds Compromise, It collected emails from specific individuals, such as executives and IT staff, using New-MailboxExportRequest followed by Get-MailboxExportRequest.
|
Email Collection:Remote Email Collection
|
Valak can collect sensitive mailing information from Exchange servers, including credentials and the domain certificate of an enterprise.
|
Email Collection:Email Forwarding Rule
|
It has set auto-forward rules on victim's e-mail accounts.
|
Email Collection:Email Forwarding Rule
|
It has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account.
|
Email Collection:Email Forwarding Rule
|
It has set up auto forwarding rules on compromised e-mail accounts.
|
Input Capture
|
It has utilized tools to capture mouse movements.
|
Input Capture
|
Chaes has a module to perform any API hooking it desires.
|
Input Capture
|
FlawedAmmyy can collect mouse events.
|
Input Capture
|
Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host.
|
Input Capture
|
Mafalda can conduct mouse event logging.
|
Input Capture
|
metaMain can log mouse events.
|
Input Capture:Keylogging
|
During the 2015 Ukraine Electric Power Attack, It gathered account credentials via a BlackEnergy keylogger plugin.
|
Input Capture:Keylogging
|
ADVSTORESHELL can perform keylogging.
|
Input Capture:Keylogging
|
Agent Tesla can log keystrokes on the victim’s machine.
|
Input Capture:Keylogging
|
It has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system.
|
Input Capture:Keylogging
|
AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine.
|
Input Capture:Keylogging
|
It has used tools to perform keylogging.
|
Input Capture:Keylogging
|
It has used a keylogging tool that records keystrokes in encrypted files.
|
Input Capture:Keylogging
|
It has abused the PasswordChangeNotify to monitor for and capture account password changes.
|
Input Capture:Keylogging
|
It used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.
|
Input Capture:Keylogging
|
It has used tools for capturing keystrokes.
|
Input Capture:Keylogging
|
It used a keylogger called GEARSHIFT on a target system.
|
Input Capture:Keylogging
|
Astaroth logs keystrokes from the victim's machine.
|
Input Capture:Keylogging
|
AsyncRAT can capture keystrokes on the victim’s machine.
|
Input Capture:Keylogging
|
One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process.
|
Input Capture:Keylogging
|
BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.
|
Input Capture:Keylogging
|
When it first starts, BADNEWS spawns a new thread to log keystrokes.
|
Input Capture:Keylogging
|
BadPatch has a keylogging capability.
|
Input Capture:Keylogging
|
Bandook contains keylogging capabilities.
|
Input Capture:Keylogging
|
BISCUIT can capture keystrokes.
|
Input Capture:Keylogging
|
BlackEnergy has run a keylogger plug-in on a victim.
|
Input Capture:Keylogging
|
Cadelspy has the ability to log keystrokes on the compromised host.
|
Input Capture:Keylogging
|
It logs key strokes for configured processes and sends them back to the C2 server.
|
Input Capture:Keylogging
|
Cardinal RAT can log keystrokes.
|
Input Capture:Keylogging
|
Catchamas collects keystrokes from the victim’s machine.
|
Input Capture:Keylogging
|
CHOPSTICK is capable of performing keylogging.
|
Input Capture:Keylogging
|
Clambling can capture keystrokes on a compromised host.
|
Input Capture:Keylogging
|
Cobalt Strike can track key presses with a keylogger module.
|
Input Capture:Keylogging
|
Cobian RAT has a feature to perform keylogging on the victim’s machine.
|
Input Capture:Keylogging
|
CosmicDuke uses a keylogger.
|
Input Capture:Keylogging
|
Crimson can use a module to perform keylogging on compromised hosts.
|
Input Capture:Keylogging
|
Cuba logs keystrokes via polling by using GetKeyState and VkKeyScan functions.
|
Input Capture:Keylogging
|
DarkComet has a keylogging capability.
|
Input Capture:Keylogging
|
It has used a keylogger.
|
Input Capture:Keylogging
|
DarkTortilla can download a keylogging module.
|
Input Capture:Keylogging
|
DarkWatchman can track key presses with a keylogger module.
|
Input Capture:Keylogging
|
Daserf can log keystrokes.
|
Input Capture:Keylogging
|
Derusbi is capable of logging keystrokes.
|
Input Capture:Keylogging
|
DOGCALL is capable of logging keystrokes.
|
Input Capture:Keylogging
|
Dtrack’s dropper contains a keylogging executable.
|
Input Capture:Keylogging
|
Duqu can track key presses with a keylogger module.
|
Input Capture:Keylogging
|
DustySky contains a keylogger.
|
Input Capture:Keylogging
|
ECCENTRICBANDWAGON can capture and store keystrokes.
|
Input Capture:Keylogging
|
Empire includes keylogging capabilities for Windows, Linux, and macOS systems.
|
Input Capture:Keylogging
|
EvilGrab has the capability to capture keystrokes.
|
Input Capture:Keylogging
|
Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers.
|
Input Capture:Keylogging
|
FakeM contains a keylogger module.
|
Input Capture:Keylogging
|
It has logged the keystrokes of victims to escalate privileges.
|
Input Capture:Keylogging
|
It has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger.
|
Input Capture:Keylogging
|
FlawedAmmyy can collect keyboard events.
|
Input Capture:Keylogging
|
The FunnyDream Keyrecord component can capture keystrokes.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.