prompt
stringclasses
508 values
procedure
stringlengths
20
478
Boot or Logon Autostart Execution:Shortcut Modification
MarkiRAT can modify the shortcut that launches Telegram by replacing its path with the malicious payload to launch with the legitimate executable.
Boot or Logon Autostart Execution:Shortcut Modification
Micropsia creates a shortcut to maintain persistence.
Boot or Logon Autostart Execution:Shortcut Modification
Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.
Boot or Logon Autostart Execution:Shortcut Modification
RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence.
Boot or Logon Autostart Execution:Shortcut Modification
RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in.
Boot or Logon Autostart Execution:Shortcut Modification
S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk, which points to the malicious msdtc.exe file already created in the %CommonFiles% directory.
Boot or Logon Autostart Execution:Shortcut Modification
SeaDuke is capable of persisting via a .lnk file stored in the Startup directory.
Boot or Logon Autostart Execution:Shortcut Modification
SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut.
Boot or Logon Autostart Execution:Shortcut Modification
TinyZBot can create a shortcut in the Windows startup folder for persistence.
Boot or Logon Autostart Execution:Print Processors
It has added the Registry key HKLM\SYSTEM\ControlSet001\Control\Print\Environments\Windows x64\Print Processors\UDPrint" /v Driver /d "spool.dll /f to load malware as a Print Processor.
Boot or Logon Autostart Execution:Print Processors
Gelsemium can drop itself in C:\Windows\System32\spool\prtprocs\x64\winprint.dll to be loaded automatically by the spoolsv Windows service.
Boot or Logon Autostart Execution:Print Processors
The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor.
Boot or Logon Autostart Execution:XDG Autostart Entries
CrossRAT can use an XDG Autostart to establish persistence.
Boot or Logon Autostart Execution:XDG Autostart Entries
If executing without root privileges, Fysbis adds a .desktop configuration file to the user's ~/.config/autostart directory.
Boot or Logon Autostart Execution:XDG Autostart Entries
NETWIRE can use XDG Autostart Entries to establish persistence on Linux systems.
Boot or Logon Autostart Execution:XDG Autostart Entries
Pupy can use an XDG Autostart to establish persistence.
Boot or Logon Autostart Execution:XDG Autostart Entries
When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the $HOME/.config/autostart/ folder.
Boot or Logon Autostart Execution:Active Setup
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.
Boot or Logon Autostart Execution:Login Items
Dok uses AppleScript to install a login Item by sending Apple events to the System Events process.
Boot or Logon Autostart Execution:Login Items
Green Lambert can add Login Items to establish persistence.
Boot or Logon Autostart Execution:Login Items
NETWIRE can persist via startup options for Login items.
Boot or Logon Initialization Scripts
It has hijacked legitimate application-specific startup scripts to enable malware to execute on system startup.
Boot or Logon Initialization Scripts
It has installed an "init.d" startup script to maintain persistence.
Boot or Logon Initialization Scripts
Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .conf file in the /etc/init/ folder.
Boot or Logon Initialization Scripts:Logon Script (Windows)
An It loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
Boot or Logon Initialization Scripts:Logon Script (Windows)
Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment "UserInitMprLogonScript" .
Boot or Logon Initialization Scripts:Logon Script (Windows)
It has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript.
Boot or Logon Initialization Scripts:Logon Script (Windows)
JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
Boot or Logon Initialization Scripts:Logon Script (Windows)
KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts.
Boot or Logon Initialization Scripts:Logon Script (Windows)
Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.
Boot or Logon Initialization Scripts:RC Scripts
It has installed a run command on a compromised system to enable malware execution on system startup.
Boot or Logon Initialization Scripts:RC Scripts
Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled.
Boot or Logon Initialization Scripts:RC Scripts
Green Lambert can add init.d and rc.d files in the /etc folder to establish persistence.
Boot or Logon Initialization Scripts:RC Scripts
HiddenWasp installs reboot persistence by adding itself to /etc/rc.local.
Boot or Logon Initialization Scripts:RC Scripts
iKitten adds an entry to the rc.common file for persistence.
Boot or Logon Initialization Scripts:Startup Items
jRAT can list and manage startup entries.
Browser Extensions
Bundlore can install malicious browser extensions that are used to hijack user searches.
Browser Extensions
Grandoreiro can use malicious browser extensions to steal cookies and other user information.
Browser Extensions
It has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.
Browser Extensions
OSX/Shlayer can install malicious Safari browser extensions to serve ads.
Compromise Client Software Binary
During the 2016 Ukraine Electric Power Attack, It used a trojanized version of Windows Notepad to add a layer of persistence for Industroyer.
Compromise Client Software Binary
Bonadan has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.
Compromise Client Software Binary
Ebury has been embedded into modified OpenSSH binaries to gain persistent access to SSH credential information.
Compromise Client Software Binary
Industroyer has used a Trojanized version of the Windows Notepad application for an additional backdoor persistence mechanism.
Compromise Client Software Binary
Kessel has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.
Compromise Client Software Binary
Kobalos replaced the SSH client with a trojanized SSH client to steal credentials on compromised systems.
Compromise Client Software Binary
ThiefQuest searches through the /Users/ folder looking for executable files. For each executable, ThiefQuest prepends a copy of itself to the beginning of the file. When the file is executed, the ThiefQuest code is executed first. ThiefQuest creates a hidden file, copies the original target executable to the file, then executes the new hidden file to maintain the appearance of normal behavior.
Compromise Client Software Binary
XCSSET uses a malicious browser application to replace the legitimate browser in order to continuously capture credentials, monitor web traffic, and download additional modules.
Create Account
During the 2016 Ukraine Electric Power Attack, It added a login to a SQL Server with sp_addlinkedsrvlogin.
Create Account
It used wmic.exe to add a new user to the system.
Create Account:Local Account
It has been known to create or enable accounts, such as support_388945a0.
Create Account:Local Account
It has created accounts on multiple compromised hosts to perform actions within the network.
Create Account:Local Account
It has created user accounts.
Create Account:Local Account
Calisto has the capability to add its own account to the victim's machine.
Create Account:Local Account
It can create a Windows account.
Create Account:Local Account
It has created accounts on victims, including administrator accounts, some of which appeared to be tailored to each individual staging target.
Create Account:Local Account
Empire has a module for creating a local user if permissions allow.
Create Account:Local Account
It has created MS-SQL local accounts in a compromised network.
Create Account:Local Account
Flame can create backdoor accounts with login "HelpAssistant" on domain connected systems if appropriate rights are available.
Create Account:Local Account
It has created a local user account with administrator privileges.
Create Account:Local Account
GoldenSpy can create new users on an infected system.
Create Account:Local Account
HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine.
Create Account:Local Account
Hildegard has created a user named "monerodaemon".
Create Account:Local Account
It has created accounts with net user.
Create Account:Local Account
It used a tool called Imecab to set up a persistent remote access account on the victim machine.
Create Account:Local Account
It has created local accounts named help and DefaultAccount on compromised machines.
Create Account:Local Account
Mis-Type may create a temporary user on the system named Lost_{Unique Identifier}.
Create Account:Local Account
The net user username \password commands in Net can be used to create a local account.
Create Account:Local Account
Pupy can user PowerView to execute "net user" commands and create local system accounts.
Create Account:Local Account
S-Type may create a temporary user on the system named Lost_{Unique Identifier} with the password pond~!@6"{Unique Identifier}.
Create Account:Local Account
ServHelper has created a new user named "supportaccount".
Create Account:Local Account
SMOKEDHAM has created user accounts.
Create Account:Local Account
It has created local privileged users on victim machines.
Create Account:Local Account
It has created local administrator accounts to maintain persistence in compromised networks.
Create Account:Local Account
ZxShell has a feature to create local user accounts.
Create Account:Domain Account
During the 2015 Ukraine Electric Power Attack, It created privileged domain accounts to be used for further exploitation and lateral movement.
Create Account:Domain Account
During the 2016 Ukraine Electric Power Attack, It created two new accounts, "admin" and "система" (System). The accounts were then assigned to a domain matching local operation and were delegated new privileges.
Create Account:Domain Account
Empire has a module for creating a new domain user if permissions allow.
Create Account:Domain Account
It created high-privileged domain user accounts to maintain access to victim networks.
Create Account:Domain Account
It has created domain accounts.
Create Account:Domain Account
The net user username \password \domain commands in Net can be used to create a domain account.
Create Account:Domain Account
PsExec has the ability to remotely create accounts on target systems.
Create Account:Domain Account
Pupy can user PowerView to execute "net user" commands and create domain accounts.
Create Account:Domain Account
It has created and used new accounts within a victim's Active Directory environment to maintain persistence.
Create Account:Cloud Account
AADInternals can create new Azure AD users.
Create Account:Cloud Account
It can create new users through Azure AD.
Create Account:Cloud Account
It has created global admin accounts in the targeted organization's cloud instances to gain persistence.
Create or Modify System Process
Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root.
Create or Modify System Process:Launch Agent
Bundlore can persist via a LaunchAgent.
Create or Modify System Process:Launch Agent
Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence.
Create or Modify System Process:Launch Agent
CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence.
Create or Modify System Process:Launch Agent
CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software.
Create or Modify System Process:Launch Agent
CrossRAT creates a Launch Agent on macOS.
Create or Modify System Process:Launch Agent
Dacls can establish persistence via a LaunchAgent.
Create or Modify System Process:Launch Agent
Dok installs two LaunchAgents to redirect all network traffic with a randomly generated name for each plist file maintaining the format com.random.name.plist.
Create or Modify System Process:Launch Agent
FruitFly persists via a Launch Agent.
Create or Modify System Process:Launch Agent
Green Lambert can create a Launch Agent with the RunAtLoad key-value pair set to true, ensuring the com.apple.GrowlHelper.plist file runs every time a user logs in.