prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Boot or Logon Autostart Execution:Shortcut Modification | The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | Comnie establishes persistence via a .lnk file in the victim’s startup path. |
Boot or Logon Autostart Execution:Shortcut Modification | Empire can persist by modifying a .LNK file to include a backdoor. |
Boot or Logon Autostart Execution:Shortcut Modification | FELIXROOT creates a .LNK file for persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe. |
Boot or Logon Autostart Execution:Shortcut Modification | It malware can create a .lnk file and add a Registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions. |
Boot or Logon Autostart Execution:Shortcut Modification | Helminth establishes persistence by creating a shortcut. |
Boot or Logon Autostart Execution:Shortcut Modification | InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | Kazuar adds a .lnk file to the Windows startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | It malware has maintained persistence on a system by creating a LNK shortcut in the user’s Startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | It has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor. |
Boot or Logon Autostart Execution:Shortcut Modification | MarkiRAT can modify the shortcut that launches Telegram by replacing its path with the malicious payload to launch with the legitimate executable. |
Boot or Logon Autostart Execution:Shortcut Modification | Micropsia creates a shortcut to maintain persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | Reaver creates a shortcut file and saves it in a Startup folder to establish persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. |
Boot or Logon Autostart Execution:Shortcut Modification | RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in. |
Boot or Logon Autostart Execution:Shortcut Modification | S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk, which points to the malicious msdtc.exe file already created in the %CommonFiles% directory. |
Boot or Logon Autostart Execution:Shortcut Modification | SeaDuke is capable of persisting via a .lnk file stored in the Startup directory. |
Boot or Logon Autostart Execution:Shortcut Modification | SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder. |
Boot or Logon Autostart Execution:Shortcut Modification | To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut. |
Boot or Logon Autostart Execution:Shortcut Modification | TinyZBot can create a shortcut in the Windows startup folder for persistence. |
Boot or Logon Autostart Execution:Print Processors | It has added the Registry key HKLM\SYSTEM\ControlSet001\Control\Print\Environments\Windows x64\Print Processors\UDPrint" /v Driver /d "spool.dll /f to load malware as a Print Processor. |
Boot or Logon Autostart Execution:Print Processors | Gelsemium can drop itself in C:\Windows\System32\spool\prtprocs\x64\winprint.dll to be loaded automatically by the spoolsv Windows service. |
Boot or Logon Autostart Execution:Print Processors | The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor. |
Boot or Logon Autostart Execution:XDG Autostart Entries | CrossRAT can use an XDG Autostart to establish persistence. |
Boot or Logon Autostart Execution:XDG Autostart Entries | If executing without root privileges, Fysbis adds a .desktop configuration file to the user's ~/.config/autostart directory. |
Boot or Logon Autostart Execution:XDG Autostart Entries | NETWIRE can use XDG Autostart Entries to establish persistence on Linux systems. |
Boot or Logon Autostart Execution:XDG Autostart Entries | Pupy can use an XDG Autostart to establish persistence. |
Boot or Logon Autostart Execution:XDG Autostart Entries | When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the $HOME/.config/autostart/ folder. |
Boot or Logon Autostart Execution:Active Setup | PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable. |
Boot or Logon Autostart Execution:Login Items | Dok uses AppleScript to install a login Item by sending Apple events to the System Events process. |
Boot or Logon Autostart Execution:Login Items | Green Lambert can add Login Items to establish persistence. |
Boot or Logon Autostart Execution:Login Items | NETWIRE can persist via startup options for Login items. |
Boot or Logon Initialization Scripts | It has hijacked legitimate application-specific startup scripts to enable malware to execute on system startup. |
Boot or Logon Initialization Scripts | It has installed an "init.d" startup script to maintain persistence. |
Boot or Logon Initialization Scripts | Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .conf file in the /etc/init/ folder. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | An It loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment "UserInitMprLogonScript" . |
Boot or Logon Initialization Scripts:Logon Script (Windows) | It has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts. |
Boot or Logon Initialization Scripts:Logon Script (Windows) | Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript. |
Boot or Logon Initialization Scripts:RC Scripts | It has installed a run command on a compromised system to enable malware execution on system startup. |
Boot or Logon Initialization Scripts:RC Scripts | Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled. |
Boot or Logon Initialization Scripts:RC Scripts | Green Lambert can add init.d and rc.d files in the /etc folder to establish persistence. |
Boot or Logon Initialization Scripts:RC Scripts | HiddenWasp installs reboot persistence by adding itself to /etc/rc.local. |
Boot or Logon Initialization Scripts:RC Scripts | iKitten adds an entry to the rc.common file for persistence. |
Boot or Logon Initialization Scripts:Startup Items | jRAT can list and manage startup entries. |
Create or Modify System Process | Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root. |
Create or Modify System Process:Launch Agent | Bundlore can persist via a LaunchAgent. |
Create or Modify System Process:Launch Agent | Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence. |
Create or Modify System Process:Launch Agent | CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence. |
Create or Modify System Process:Launch Agent | CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software. |
Create or Modify System Process:Launch Agent | CrossRAT creates a Launch Agent on macOS. |
Create or Modify System Process:Launch Agent | Dacls can establish persistence via a LaunchAgent. |
Create or Modify System Process:Launch Agent | Dok installs two LaunchAgents to redirect all network traffic with a randomly generated name for each plist file maintaining the format com.random.name.plist. |
Create or Modify System Process:Launch Agent | FruitFly persists via a Launch Agent. |
Create or Modify System Process:Launch Agent | Green Lambert can create a Launch Agent with the RunAtLoad key-value pair set to true, ensuring the com.apple.GrowlHelper.plist file runs every time a user logs in. |
Create or Modify System Process:Launch Agent | Keydnap uses a Launch Agent to persist. |
Create or Modify System Process:Launch Agent | The Komplex trojan creates a persistent launch agent called with $HOME/Library/LaunchAgents/com.apple.updates.plist with launchctl load -w ~/Library/LaunchAgents/com.apple.updates.plist. |
Create or Modify System Process:Launch Agent | MacMa installs a com.apple.softwareupdate.plist file in the /LaunchAgents folder with the RunAtLoad value set to true. Upon user login, MacMa is executed from /var/root/.local/softwareupdate with root privileges. Some variations also include the LimitLoadToSessionType key with the value Aqua, ensuring the MacMa only runs when there is a logged in GUI user. |
Create or Modify System Process:Launch Agent | macOS.OSAMiner has placed a Stripped Payloads with a plist extension in the Launch Agent's folder. |
Create or Modify System Process:Launch Agent | MacSpy persists via a Launch Agent. |
Create or Modify System Process:Launch Agent | NETWIRE can use launch agents for persistence. |
Create or Modify System Process:Launch Agent | OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchAgents. |
Create or Modify System Process:Launch Agent | Proton persists via Launch Agent. |
Create or Modify System Process:Launch Agent | ThiefQuest installs a launch item using an embedded encrypted launch agent property list template. The plist file is installed in the ~/Library/LaunchAgents/ folder and configured with the path to the persistent binary located in the ~/Library/ folder. |
Create or Modify System Process:Systemd Service | Exaramel for Linux has a hardcoded location under systemd that it uses to achieve persistence if it is running as root. |
Create or Modify System Process:Systemd Service | Fysbis has established persistence using a systemd service. |
Create or Modify System Process:Systemd Service | Hildegard has started a monero service. |
Create or Modify System Process:Systemd Service | Pupy can be used to establish persistence using a systemd service. |
Create or Modify System Process:Systemd Service | It has installed a systemd service script to maintain persistence. |
Create or Modify System Process:Systemd Service | Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .service file under the /lib/systemd/system/ folder. |
Create or Modify System Process:Systemd Service | SysUpdate can copy a script to the user owned /usr/lib/systemd/system/ directory with a symlink mapped to a root owned directory, /etc/ystem/system, in the unit configuration file's ExecStart directive to establish persistence and elevate privileges. |
Create or Modify System Process:Systemd Service | It has established persistence through the creation of a cryptocurrency mining system service using systemctl. |
Create or Modify System Process:Windows Service | During the 2016 Ukraine Electric Power Attack, It used an arbitrary system service to load at system boot for persistence for Industroyer. They also replaced the ImagePath registry value of a Windows service with a new backdoor binary. |
Create or Modify System Process:Windows Service | Anchor can establish persistence by creating a service. |
Create or Modify System Process:Windows Service | AppleJeus can install itself as a service. |
Create or Modify System Process:Windows Service | An It Port 22 malware variant registers itself as a service. |
Create or Modify System Process:Windows Service | It has a tool that creates a new service for persistence. |
Create or Modify System Process:Windows Service | It modified Windows Services to ensure PowerShell scripts were loaded on the system. It also creates a Windows service to establish persistence. |
Create or Modify System Process:Windows Service | It has installed a new Windows service to establish persistence. |
Create or Modify System Process:Windows Service | It modified legitimate Windows services to install malware backdoors. It created the StorSyncSvc service to provide persistence for Cobalt Strike. |
Create or Modify System Process:Windows Service | Attor's dispatcher can establish persistence by registering a new service. |
Create or Modify System Process:Windows Service | AuditCred is installed as a new service on the system. |
Create or Modify System Process:Windows Service | Bankshot can terminate a specific process by its process id. |
Create or Modify System Process:Windows Service | BBSRAT can modify service configurations. |
Create or Modify System Process:Windows Service | Bisonal has been modified to be used as a Windows service. |
Create or Modify System Process:Windows Service | BitPaymer has attempted to install itself as a service to maintain persistence. |
Create or Modify System Process:Windows Service | Black Basta can create a new service to establish persistence. |
Create or Modify System Process:Windows Service | One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name. |
Create or Modify System Process:Windows Service | It has made their XMRIG payloads persistent as a Windows Service. |
Create or Modify System Process:Windows Service | Briba installs a service pointing to a malicious DLL dropped to disk. |
Create or Modify System Process:Windows Service | It malware installs itself as a service to provide persistence and SYSTEM privileges. |
Create or Modify System Process:Windows Service | Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine. |
Create or Modify System Process:Windows Service | Catchamas adds a new service named NetAdapter to establish persistence. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.