prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Boot or Logon Autostart Execution:Shortcut Modification | MarkiRAT can modify the shortcut that launches Telegram by replacing its path with the malicious payload to launch with the legitimate executable. |
Boot or Logon Autostart Execution:Shortcut Modification | Micropsia creates a shortcut to maintain persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | Reaver creates a shortcut file and saves it in a Startup folder to establish persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in. |
Boot or Logon Autostart Execution:Shortcut Modification | S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk, which points to the malicious msdtc.exe file already created in the %CommonFiles% directory. |
Boot or Logon Autostart Execution:Shortcut Modification | SeaDuke is capable of persisting via a .lnk file stored in the Startup directory. |
Boot or Logon Autostart Execution:Shortcut Modification | SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut. |
Boot or Logon Autostart Execution:Shortcut Modification | TinyZBot can create a shortcut in the Windows startup folder for persistence. |
Boot or Logon Autostart Execution:Print Processors | It has added the Registry key HKLM\SYSTEM\ControlSet001\Control\Print\Environments\Windows x64\Print Processors\UDPrint" /v Driver /d "spool.dll /f to load malware as a Print Processor. |
Boot or Logon Autostart Execution:Print Processors | Gelsemium can drop itself in C:\Windows\System32\spool\prtprocs\x64\winprint.dll to be loaded automatically by the spoolsv Windows service. |
Boot or Logon Autostart Execution:Print Processors | The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor. |
Boot or Logon Autostart Execution:XDG Autostart Entries | CrossRAT can use an XDG Autostart to establish persistence. |
Boot or Logon Autostart Execution:XDG Autostart Entries | If executing without root privileges, Fysbis adds a .desktop configuration file to the user's ~/.config/autostart directory. |
Boot or Logon Autostart Execution:XDG Autostart Entries | NETWIRE can use XDG Autostart Entries to establish persistence on Linux systems. |
Boot or Logon Autostart Execution:XDG Autostart Entries | Pupy can use an XDG Autostart to establish persistence. |
Boot or Logon Autostart Execution:XDG Autostart Entries | When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the $HOME/.config/autostart/ folder. |
Boot or Logon Autostart Execution:Active Setup | PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable. |
Boot or Logon Autostart Execution:Login Items | Dok uses AppleScript to install a login Item by sending Apple events to the System Events process. |
Boot or Logon Autostart Execution:Login Items | Green Lambert can add Login Items to establish persistence. |
Boot or Logon Autostart Execution:Login Items | NETWIRE can persist via startup options for Login items. |
Boot or Logon Initialization Scripts | It has hijacked legitimate application-specific startup scripts to enable malware to execute on system startup. |
Boot or Logon Initialization Scripts | It has installed an "init.d" startup script to maintain persistence. |
Boot or Logon Initialization Scripts | Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .conf file in the /etc/init/ folder. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | An It loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment "UserInitMprLogonScript" . |
Boot or Logon Initialization Scripts:Logon Script (Windows) | It has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript. |
Boot or Logon Initialization Scripts:RC Scripts | It has installed a run command on a compromised system to enable malware execution on system startup. |
Boot or Logon Initialization Scripts:RC Scripts | Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled. |
Boot or Logon Initialization Scripts:RC Scripts | Green Lambert can add init.d and rc.d files in the /etc folder to establish persistence. |
Boot or Logon Initialization Scripts:RC Scripts | HiddenWasp installs reboot persistence by adding itself to /etc/rc.local. |
Boot or Logon Initialization Scripts:RC Scripts | iKitten adds an entry to the rc.common file for persistence. |
Boot or Logon Initialization Scripts:Startup Items | jRAT can list and manage startup entries. |
Browser Extensions | Bundlore can install malicious browser extensions that are used to hijack user searches. |
Browser Extensions | Grandoreiro can use malicious browser extensions to steal cookies and other user information. |
Browser Extensions | It has used Google Chrome browser extensions to infect victims and to steal passwords and cookies. |
Browser Extensions | OSX/Shlayer can install malicious Safari browser extensions to serve ads. |
Compromise Client Software Binary | During the 2016 Ukraine Electric Power Attack, It used a trojanized version of Windows Notepad to add a layer of persistence for Industroyer. |
Compromise Client Software Binary | Bonadan has maliciously altered the OpenSSH binary on targeted systems to create a backdoor. |
Compromise Client Software Binary | Ebury has been embedded into modified OpenSSH binaries to gain persistent access to SSH credential information. |
Compromise Client Software Binary | Industroyer has used a Trojanized version of the Windows Notepad application for an additional backdoor persistence mechanism. |
Compromise Client Software Binary | Kessel has maliciously altered the OpenSSH binary on targeted systems to create a backdoor. |
Compromise Client Software Binary | Kobalos replaced the SSH client with a trojanized SSH client to steal credentials on compromised systems. |
Compromise Client Software Binary | ThiefQuest searches through the /Users/ folder looking for executable files. For each executable, ThiefQuest prepends a copy of itself to the beginning of the file. When the file is executed, the ThiefQuest code is executed first. ThiefQuest creates a hidden file, copies the original target executable to the file, then executes the new hidden file to maintain the appearance of normal behavior. |
Compromise Client Software Binary | XCSSET uses a malicious browser application to replace the legitimate browser in order to continuously capture credentials, monitor web traffic, and download additional modules. |
Create Account | During the 2016 Ukraine Electric Power Attack, It added a login to a SQL Server with sp_addlinkedsrvlogin. |
Create Account | It used wmic.exe to add a new user to the system. |
Create Account:Local Account | It has been known to create or enable accounts, such as support_388945a0. |
Create Account:Local Account | It has created accounts on multiple compromised hosts to perform actions within the network. |
Create Account:Local Account | It has created user accounts. |
Create Account:Local Account | Calisto has the capability to add its own account to the victim's machine. |
Create Account:Local Account | It can create a Windows account. |
Create Account:Local Account | It has created accounts on victims, including administrator accounts, some of which appeared to be tailored to each individual staging target. |
Create Account:Local Account | Empire has a module for creating a local user if permissions allow. |
Create Account:Local Account | It has created MS-SQL local accounts in a compromised network. |
Create Account:Local Account | Flame can create backdoor accounts with login "HelpAssistant" on domain connected systems if appropriate rights are available. |
Create Account:Local Account | It has created a local user account with administrator privileges. |
Create Account:Local Account | GoldenSpy can create new users on an infected system. |
Create Account:Local Account | HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine. |
Create Account:Local Account | Hildegard has created a user named "monerodaemon". |
Create Account:Local Account | It has created accounts with net user. |
Create Account:Local Account | It used a tool called Imecab to set up a persistent remote access account on the victim machine. |
Create Account:Local Account | It has created local accounts named help and DefaultAccount on compromised machines. |
Create Account:Local Account | Mis-Type may create a temporary user on the system named Lost_{Unique Identifier}. |
Create Account:Local Account | The net user username \password commands in Net can be used to create a local account. |
Create Account:Local Account | Pupy can user PowerView to execute "net user" commands and create local system accounts. |
Create Account:Local Account | S-Type may create a temporary user on the system named Lost_{Unique Identifier} with the password pond~!@6"{Unique Identifier}. |
Create Account:Local Account | ServHelper has created a new user named "supportaccount". |
Create Account:Local Account | SMOKEDHAM has created user accounts. |
Create Account:Local Account | It has created local privileged users on victim machines. |
Create Account:Local Account | It has created local administrator accounts to maintain persistence in compromised networks. |
Create Account:Local Account | ZxShell has a feature to create local user accounts. |
Create Account:Domain Account | During the 2015 Ukraine Electric Power Attack, It created privileged domain accounts to be used for further exploitation and lateral movement. |
Create Account:Domain Account | During the 2016 Ukraine Electric Power Attack, It created two new accounts, "admin" and "система" (System). The accounts were then assigned to a domain matching local operation and were delegated new privileges. |
Create Account:Domain Account | Empire has a module for creating a new domain user if permissions allow. |
Create Account:Domain Account | It created high-privileged domain user accounts to maintain access to victim networks. |
Create Account:Domain Account | It has created domain accounts. |
Create Account:Domain Account | The net user username \password \domain commands in Net can be used to create a domain account. |
Create Account:Domain Account | PsExec has the ability to remotely create accounts on target systems. |
Create Account:Domain Account | Pupy can user PowerView to execute "net user" commands and create domain accounts. |
Create Account:Domain Account | It has created and used new accounts within a victim's Active Directory environment to maintain persistence. |
Create Account:Cloud Account | AADInternals can create new Azure AD users. |
Create Account:Cloud Account | It can create new users through Azure AD. |
Create Account:Cloud Account | It has created global admin accounts in the targeted organization's cloud instances to gain persistence. |
Create or Modify System Process | Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root. |
Create or Modify System Process:Launch Agent | Bundlore can persist via a LaunchAgent. |
Create or Modify System Process:Launch Agent | Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence. |
Create or Modify System Process:Launch Agent | CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence. |
Create or Modify System Process:Launch Agent | CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software. |
Create or Modify System Process:Launch Agent | CrossRAT creates a Launch Agent on macOS. |
Create or Modify System Process:Launch Agent | Dacls can establish persistence via a LaunchAgent. |
Create or Modify System Process:Launch Agent | Dok installs two LaunchAgents to redirect all network traffic with a randomly generated name for each plist file maintaining the format com.random.name.plist. |
Create or Modify System Process:Launch Agent | FruitFly persists via a Launch Agent. |
Create or Modify System Process:Launch Agent | Green Lambert can create a Launch Agent with the RunAtLoad key-value pair set to true, ensuring the com.apple.GrowlHelper.plist file runs every time a user logs in. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.