prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Data Staged:Remote Data Staging | It actors have compressed data from remote systems and moved it to another staging system before exfiltration. |
Data Staged:Remote Data Staging | It aggregates staged data from a network into a single location. |
Data Staged:Remote Data Staging | It has staged data remotely prior to exfiltration. |
Data Staged:Remote Data Staging | It has staged data on remote MSP systems or other victim networks prior to exfiltration. |
Data Staged:Remote Data Staging | It has used plugins to save captured screenshots to .\AActdata\ on an SMB share. |
Data Staged:Remote Data Staging | During Night Dragon, threat actors copied files to company web servers and subsequently downloaded them. |
Data Staged:Remote Data Staging | During the SolarWinds Compromise, It staged data and files in password-protected archives on a victim's OWA server. |
Data Staged:Remote Data Staging | It has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration. |
Email Collection | Emotet has been observed leveraging a module that can scrape email addresses from Outlook. |
Email Collection | It has compromised email credentials in order to steal sensitive data. |
Email Collection | It has exfiltrated entire mailboxes from compromised accounts. |
Email Collection:Local Email Collection | It uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files. |
Email Collection:Local Email Collection | It searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server. |
Email Collection:Local Email Collection | It has harvested data from victim's e-mail including through execution of wmic /node: process call create "cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst" copy "i:\\\My Documents\.pst"copy. |
Email Collection:Local Email Collection | CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration. |
Email Collection:Local Email Collection | Crimson contains a command to collect and exfiltrate emails from Outlook. |
Email Collection:Local Email Collection | Emotet has been observed leveraging a module that scrapes email data from Outlook. |
Email Collection:Local Email Collection | Empire has the ability to collect emails on a target system. |
Email Collection:Local Email Collection | KGH_SPY can harvest data from mail clients. |
Email Collection:Local Email Collection | It has collected .PST archives. |
Email Collection:Local Email Collection | During Night Dragon, threat actors used RAT malware to exfiltrate email archives. |
Email Collection:Local Email Collection | Out1 can parse e-mails on a target machine. |
Email Collection:Local Email Collection | Pupy can interact with a victim’s Outlook session and look through folders and emails. |
Email Collection:Local Email Collection | QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns. |
Email Collection:Local Email Collection | Smoke Loader searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.). |
Email Collection:Remote Email Collection | It uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived. |
Email Collection:Remote Email Collection | It has collected emails from victim Microsoft Exchange servers. |
Email Collection:Remote Email Collection | It has collected emails from targeted mailboxes within a compromised Azure AD tenant and compromised Exchange servers, including via Exchange Web Services (EWS) API requests. |
Email Collection:Remote Email Collection | It has harvested data from remote mailboxes including through execution of \\c$\Users\\AppData\Local\Microsoft\Outlook*.ost. |
Email Collection:Remote Email Collection | It has accessed email accounts using Outlook Web Access. |
Email Collection:Remote Email Collection | It has accessed and hijacked online email communications using stolen credentials. |
Email Collection:Remote Email Collection | It has used web shells to export mailbox data. |
Email Collection:Remote Email Collection | It has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes. |
Email Collection:Remote Email Collection | It has used tools such as the MailFetch mail crawler to collect victim emails (excluding spam) from online services via IMAP. |
Email Collection:Remote Email Collection | It used a tool called MailSniper to search through the Exchange server mailboxes for keywords. |
Email Collection:Remote Email Collection | LightNeuron collects Exchange emails matching rules specified in its configuration. |
Email Collection:Remote Email Collection | It has exported emails from compromised Exchange servers including through use of the cmdlet New-MailboxExportRequest. |
Email Collection:Remote Email Collection | MailSniper can be used for searching through email in Exchange and Office 365 environments. |
Email Collection:Remote Email Collection | Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials. |
Email Collection:Remote Email Collection | During the SolarWinds Compromise, It collected emails from specific individuals, such as executives and IT staff, using New-MailboxExportRequest followed by Get-MailboxExportRequest. |
Email Collection:Remote Email Collection | Valak can collect sensitive mailing information from Exchange servers, including credentials and the domain certificate of an enterprise. |
Email Collection:Email Forwarding Rule | It has set auto-forward rules on victim's e-mail accounts. |
Email Collection:Email Forwarding Rule | It has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account. |
Email Collection:Email Forwarding Rule | It has set up auto forwarding rules on compromised e-mail accounts. |
Input Capture | It has utilized tools to capture mouse movements. |
Input Capture | Chaes has a module to perform any API hooking it desires. |
Input Capture | FlawedAmmyy can collect mouse events. |
Input Capture | Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host. |
Input Capture | Mafalda can conduct mouse event logging. |
Input Capture | metaMain can log mouse events. |
Input Capture:Keylogging | During the 2015 Ukraine Electric Power Attack, It gathered account credentials via a BlackEnergy keylogger plugin. |
Input Capture:Keylogging | ADVSTORESHELL can perform keylogging. |
Input Capture:Keylogging | Agent Tesla can log keystrokes on the victim’s machine. |
Input Capture:Keylogging | It has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system. |
Input Capture:Keylogging | AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine. |
Input Capture:Keylogging | It has used tools to perform keylogging. |
Input Capture:Keylogging | It has used a keylogging tool that records keystrokes in encrypted files. |
Input Capture:Keylogging | It has abused the PasswordChangeNotify to monitor for and capture account password changes. |
Input Capture:Keylogging | It used a Trojan called KEYLIME to capture keystrokes from the victim’s machine. |
Input Capture:Keylogging | It has used tools for capturing keystrokes. |
Input Capture:Keylogging | It used a keylogger called GEARSHIFT on a target system. |
Input Capture:Keylogging | Astaroth logs keystrokes from the victim's machine. |
Input Capture:Keylogging | AsyncRAT can capture keystrokes on the victim’s machine. |
Input Capture:Keylogging | One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process. |
Input Capture:Keylogging | BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger. |
Input Capture:Keylogging | When it first starts, BADNEWS spawns a new thread to log keystrokes. |
Input Capture:Keylogging | BadPatch has a keylogging capability. |
Input Capture:Keylogging | Bandook contains keylogging capabilities. |
Input Capture:Keylogging | BISCUIT can capture keystrokes. |
Input Capture:Keylogging | BlackEnergy has run a keylogger plug-in on a victim. |
Input Capture:Keylogging | Cadelspy has the ability to log keystrokes on the compromised host. |
Input Capture:Keylogging | It logs key strokes for configured processes and sends them back to the C2 server. |
Input Capture:Keylogging | Cardinal RAT can log keystrokes. |
Input Capture:Keylogging | Catchamas collects keystrokes from the victim’s machine. |
Input Capture:Keylogging | CHOPSTICK is capable of performing keylogging. |
Input Capture:Keylogging | Clambling can capture keystrokes on a compromised host. |
Input Capture:Keylogging | Cobalt Strike can track key presses with a keylogger module. |
Input Capture:Keylogging | Cobian RAT has a feature to perform keylogging on the victim’s machine. |
Input Capture:Keylogging | CosmicDuke uses a keylogger. |
Input Capture:Keylogging | Crimson can use a module to perform keylogging on compromised hosts. |
Input Capture:Keylogging | Cuba logs keystrokes via polling by using GetKeyState and VkKeyScan functions. |
Input Capture:Keylogging | DarkComet has a keylogging capability. |
Input Capture:Keylogging | It has used a keylogger. |
Input Capture:Keylogging | DarkTortilla can download a keylogging module. |
Input Capture:Keylogging | DarkWatchman can track key presses with a keylogger module. |
Input Capture:Keylogging | Daserf can log keystrokes. |
Input Capture:Keylogging | Derusbi is capable of logging keystrokes. |
Input Capture:Keylogging | DOGCALL is capable of logging keystrokes. |
Input Capture:Keylogging | Dtrack’s dropper contains a keylogging executable. |
Input Capture:Keylogging | Duqu can track key presses with a keylogger module. |
Input Capture:Keylogging | DustySky contains a keylogger. |
Input Capture:Keylogging | ECCENTRICBANDWAGON can capture and store keystrokes. |
Input Capture:Keylogging | Empire includes keylogging capabilities for Windows, Linux, and macOS systems. |
Input Capture:Keylogging | EvilGrab has the capability to capture keystrokes. |
Input Capture:Keylogging | Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers. |
Input Capture:Keylogging | FakeM contains a keylogger module. |
Input Capture:Keylogging | It has logged the keystrokes of victims to escalate privileges. |
Input Capture:Keylogging | It has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger. |
Input Capture:Keylogging | FlawedAmmyy can collect keyboard events. |
Input Capture:Keylogging | The FunnyDream Keyrecord component can capture keystrokes. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.