prompt
stringclasses
508 values
procedure
stringlengths
20
478
Data Staged:Remote Data Staging
It actors have compressed data from remote systems and moved it to another staging system before exfiltration.
Data Staged:Remote Data Staging
It aggregates staged data from a network into a single location.
Data Staged:Remote Data Staging
It has staged data remotely prior to exfiltration.
Data Staged:Remote Data Staging
It has staged data on remote MSP systems or other victim networks prior to exfiltration.
Data Staged:Remote Data Staging
It has used plugins to save captured screenshots to .\AActdata\ on an SMB share.
Data Staged:Remote Data Staging
During Night Dragon, threat actors copied files to company web servers and subsequently downloaded them.
Data Staged:Remote Data Staging
During the SolarWinds Compromise, It staged data and files in password-protected archives on a victim's OWA server.
Data Staged:Remote Data Staging
It has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration.
Email Collection
Emotet has been observed leveraging a module that can scrape email addresses from Outlook.
Email Collection
It has compromised email credentials in order to steal sensitive data.
Email Collection
It has exfiltrated entire mailboxes from compromised accounts.
Email Collection:Local Email Collection
It uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.
Email Collection:Local Email Collection
It searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server.
Email Collection:Local Email Collection
It has harvested data from victim's e-mail including through execution of wmic /node: process call create "cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst" copy "i:\\\My Documents\.pst"copy.
Email Collection:Local Email Collection
CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.
Email Collection:Local Email Collection
Crimson contains a command to collect and exfiltrate emails from Outlook.
Email Collection:Local Email Collection
Emotet has been observed leveraging a module that scrapes email data from Outlook.
Email Collection:Local Email Collection
Empire has the ability to collect emails on a target system.
Email Collection:Local Email Collection
KGH_SPY can harvest data from mail clients.
Email Collection:Local Email Collection
It has collected .PST archives.
Email Collection:Local Email Collection
During Night Dragon, threat actors used RAT malware to exfiltrate email archives.
Email Collection:Local Email Collection
Out1 can parse e-mails on a target machine.
Email Collection:Local Email Collection
Pupy can interact with a victim’s Outlook session and look through folders and emails.
Email Collection:Local Email Collection
QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns.
Email Collection:Local Email Collection
Smoke Loader searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).
Email Collection:Remote Email Collection
It uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.
Email Collection:Remote Email Collection
It has collected emails from victim Microsoft Exchange servers.
Email Collection:Remote Email Collection
It has collected emails from targeted mailboxes within a compromised Azure AD tenant and compromised Exchange servers, including via Exchange Web Services (EWS) API requests.
Email Collection:Remote Email Collection
It has harvested data from remote mailboxes including through execution of \\c$\Users\\AppData\Local\Microsoft\Outlook*.ost.
Email Collection:Remote Email Collection
It has accessed email accounts using Outlook Web Access.
Email Collection:Remote Email Collection
It has accessed and hijacked online email communications using stolen credentials.
Email Collection:Remote Email Collection
It has used web shells to export mailbox data.
Email Collection:Remote Email Collection
It has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.
Email Collection:Remote Email Collection
It has used tools such as the MailFetch mail crawler to collect victim emails (excluding spam) from online services via IMAP.
Email Collection:Remote Email Collection
It used a tool called MailSniper to search through the Exchange server mailboxes for keywords.
Email Collection:Remote Email Collection
LightNeuron collects Exchange emails matching rules specified in its configuration.
Email Collection:Remote Email Collection
It has exported emails from compromised Exchange servers including through use of the cmdlet New-MailboxExportRequest.
Email Collection:Remote Email Collection
MailSniper can be used for searching through email in Exchange and Office 365 environments.
Email Collection:Remote Email Collection
Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.
Email Collection:Remote Email Collection
During the SolarWinds Compromise, It collected emails from specific individuals, such as executives and IT staff, using New-MailboxExportRequest followed by Get-MailboxExportRequest.
Email Collection:Remote Email Collection
Valak can collect sensitive mailing information from Exchange servers, including credentials and the domain certificate of an enterprise.
Email Collection:Email Forwarding Rule
It has set auto-forward rules on victim's e-mail accounts.
Email Collection:Email Forwarding Rule
It has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account.
Email Collection:Email Forwarding Rule
It has set up auto forwarding rules on compromised e-mail accounts.
Input Capture
It has utilized tools to capture mouse movements.
Input Capture
Chaes has a module to perform any API hooking it desires.
Input Capture
FlawedAmmyy can collect mouse events.
Input Capture
Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host.
Input Capture
Mafalda can conduct mouse event logging.
Input Capture
metaMain can log mouse events.
Input Capture:Keylogging
During the 2015 Ukraine Electric Power Attack, It gathered account credentials via a BlackEnergy keylogger plugin.
Input Capture:Keylogging
ADVSTORESHELL can perform keylogging.
Input Capture:Keylogging
Agent Tesla can log keystrokes on the victim’s machine.
Input Capture:Keylogging
It has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system.
Input Capture:Keylogging
AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine.
Input Capture:Keylogging
It has used tools to perform keylogging.
Input Capture:Keylogging
It has used a keylogging tool that records keystrokes in encrypted files.
Input Capture:Keylogging
It has abused the PasswordChangeNotify to monitor for and capture account password changes.
Input Capture:Keylogging
It used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.
Input Capture:Keylogging
It has used tools for capturing keystrokes.
Input Capture:Keylogging
It used a keylogger called GEARSHIFT on a target system.
Input Capture:Keylogging
Astaroth logs keystrokes from the victim's machine.
Input Capture:Keylogging
AsyncRAT can capture keystrokes on the victim’s machine.
Input Capture:Keylogging
One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process.
Input Capture:Keylogging
BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.
Input Capture:Keylogging
When it first starts, BADNEWS spawns a new thread to log keystrokes.
Input Capture:Keylogging
BadPatch has a keylogging capability.
Input Capture:Keylogging
Bandook contains keylogging capabilities.
Input Capture:Keylogging
BISCUIT can capture keystrokes.
Input Capture:Keylogging
BlackEnergy has run a keylogger plug-in on a victim.
Input Capture:Keylogging
Cadelspy has the ability to log keystrokes on the compromised host.
Input Capture:Keylogging
It logs key strokes for configured processes and sends them back to the C2 server.
Input Capture:Keylogging
Cardinal RAT can log keystrokes.
Input Capture:Keylogging
Catchamas collects keystrokes from the victim’s machine.
Input Capture:Keylogging
CHOPSTICK is capable of performing keylogging.
Input Capture:Keylogging
Clambling can capture keystrokes on a compromised host.
Input Capture:Keylogging
Cobalt Strike can track key presses with a keylogger module.
Input Capture:Keylogging
Cobian RAT has a feature to perform keylogging on the victim’s machine.
Input Capture:Keylogging
CosmicDuke uses a keylogger.
Input Capture:Keylogging
Crimson can use a module to perform keylogging on compromised hosts.
Input Capture:Keylogging
Cuba logs keystrokes via polling by using GetKeyState and VkKeyScan functions.
Input Capture:Keylogging
DarkComet has a keylogging capability.
Input Capture:Keylogging
It has used a keylogger.
Input Capture:Keylogging
DarkTortilla can download a keylogging module.
Input Capture:Keylogging
DarkWatchman can track key presses with a keylogger module.
Input Capture:Keylogging
Daserf can log keystrokes.
Input Capture:Keylogging
Derusbi is capable of logging keystrokes.
Input Capture:Keylogging
DOGCALL is capable of logging keystrokes.
Input Capture:Keylogging
Dtrack’s dropper contains a keylogging executable.
Input Capture:Keylogging
Duqu can track key presses with a keylogger module.
Input Capture:Keylogging
DustySky contains a keylogger.
Input Capture:Keylogging
ECCENTRICBANDWAGON can capture and store keystrokes.
Input Capture:Keylogging
Empire includes keylogging capabilities for Windows, Linux, and macOS systems.
Input Capture:Keylogging
EvilGrab has the capability to capture keystrokes.
Input Capture:Keylogging
Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers.
Input Capture:Keylogging
FakeM contains a keylogger module.
Input Capture:Keylogging
It has logged the keystrokes of victims to escalate privileges.
Input Capture:Keylogging
It has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger.
Input Capture:Keylogging
FlawedAmmyy can collect keyboard events.
Input Capture:Keylogging
The FunnyDream Keyrecord component can capture keystrokes.