prompt
stringclasses
508 values
procedure
stringlengths
20
478
Hide Artifacts
OSX/Shlayer has used the mktemp utility to make random and unique filenames for payloads, such as export tmpDir="$(mktemp -d /tmp/XXXXXXXXXXXX)" or mktemp -t Installer.
Hide Artifacts
Tarrask is able to create "hidden" scheduled tasks by deleting the Security Descriptor (SD) registry value.
Hide Artifacts
WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide it's attempts to elevate privileges through IFileOperation.
Hide Artifacts:Hidden Files and Directories
Agent Tesla has created hidden folders.
Hide Artifacts:Hidden Files and Directories
AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings.
Hide Artifacts:Hidden Files and Directories
It has saved files with hidden file attributes.
Hide Artifacts:Hidden Files and Directories
It's macOS backdoor hides the clientID file via a chflags function.
Hide Artifacts:Hidden Files and Directories
Attor can set attributes of log files and directories to HIDDEN, SYSTEM, ARCHIVE, or a combination of those.
Hide Artifacts:Hidden Files and Directories
BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view.
Hide Artifacts:Hidden Files and Directories
Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.
Hide Artifacts:Hidden Files and Directories
Carberp has created a hidden file in the Startup folder of the current user.
Hide Artifacts:Hidden Files and Directories
ccf32 has created a hidden directory on targeted systems, naming it after the current local time (year, month, and day).
Hide Artifacts:Hidden Files and Directories
Clambling has the ability to set its file attributes to hidden.
Hide Artifacts:Hidden Files and Directories
CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc, /private/tmp/.info.py, /private/tmp/.server.sh, ~/Library/LaunchAgents/.espl.plist, ~/Library/Containers/.[random string]/[random string].
Hide Artifacts:Hidden Files and Directories
Dacls has had its payload named with a dot prefix to make it hidden from view in the Finder application.
Hide Artifacts:Hidden Files and Directories
EnvyScout can use hidden directories and files to hide malicious executables.
Hide Artifacts:Hidden Files and Directories
Explosive has commonly set file and path attributes to hidden.
Hide Artifacts:Hidden Files and Directories
It has created hidden files and folders within a compromised Linux system /tmp directory. It also has used attrib.exe to hide gathered local host information.
Hide Artifacts:Hidden Files and Directories
FruitFly saves itself with a leading "." to make it a hidden file.
Hide Artifacts:Hidden Files and Directories
It has hidden files on a compromised host.
Hide Artifacts:Hidden Files and Directories
iKitten saves itself with a leading "." so that it's hidden from users by default.
Hide Artifacts:Hidden Files and Directories
Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden.
Hide Artifacts:Hidden Files and Directories
InvisiMole can create hidden system directories.
Hide Artifacts:Hidden Files and Directories
Ixeshe sets its own executable file's attributes to hidden.
Hide Artifacts:Hidden Files and Directories
The Komplex payload is stored in a hidden directory at /Users/Shared/.local/kextd.
Hide Artifacts:Hidden Files and Directories
It has used a VBA Macro to set its file attributes to System and Hidden and has named files with a dot prefix to hide them from the Finder application.
Hide Artifacts:Hidden Files and Directories
Lokibot has the ability to copy itself to a hidden file and directory.
Hide Artifacts:Hidden Files and Directories
LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to "hidden".
Hide Artifacts:Hidden Files and Directories
It has used malware to store malicious binaries in hidden directories on victim's USB drives.
Hide Artifacts:Hidden Files and Directories
It has the capability to exfiltrate stolen data to a hidden folder on a removable drive.
Hide Artifacts:Hidden Files and Directories
MacSpy stores itself in ~/Library/.DS_Stores/
Hide Artifacts:Hidden Files and Directories
Micropsia creates a new hidden directory to store all components' outputs in a dedicated sub-folder for each.
Hide Artifacts:Hidden Files and Directories
It's PlugX variant has created a hidden folder on USB drives named RECYCLE.BIN to store malicious executables and collected data.
Hide Artifacts:Hidden Files and Directories
NETWIRE can copy itself to and launch itself from hidden folders.
Hide Artifacts:Hidden Files and Directories
Before exfiltration, Okrum's backdoor has used hidden files to store logs and outputs from backdoor commands.
Hide Artifacts:Hidden Files and Directories
OSX/Shlayer has executed a .command script from a hidden directory in a mounted DMG.
Hide Artifacts:Hidden Files and Directories
OSX_OCEANLOTUS.D sets the main loader file’s attributes to hidden.
Hide Artifacts:Hidden Files and Directories
PlugX can modify the characteristics of folders to hide them from the compromised user.
Hide Artifacts:Hidden Files and Directories
PoetRAT has the ability to hide and unhide files.
Hide Artifacts:Hidden Files and Directories
QakBot has placed its payload in hidden subdirectories.
Hide Artifacts:Hidden Files and Directories
QuasarRAT has the ability to set file attributes to "hidden" to hide files from the compromised user's view in Windows File Explorer.
Hide Artifacts:Hidden Files and Directories
Rising Sun can modify file attributes to hide files.
Hide Artifacts:Hidden Files and Directories
It downloaded a file "libprocesshider", which could hide files on the target system.
Hide Artifacts:Hidden Files and Directories
SLOTHFULMEDIA has been created with a hidden attribute to insure it's not visible to the victim.
Hide Artifacts:Hidden Files and Directories
SysUpdate has the ability to set file attributes to hidden.
Hide Artifacts:Hidden Files and Directories
ThiefQuest hides a copy of itself in the user's ~/Library directory by using a . at the beginning of the file name followed by 9 random characters.
Hide Artifacts:Hidden Files and Directories
It can hide legitimate directories and replace them with malicious copies of the same name.
Hide Artifacts:Hidden Files and Directories
It has created a hidden directory under C:\ProgramData\Apple\Updates\ and C:\Users\Public\Documents\Flash\.
Hide Artifacts:Hidden Files and Directories
WannaCry uses attrib +h to make some of its files hidden.
Hide Artifacts:Hidden Files and Directories
WastedLocker has copied a random file from the Windows System32 folder to the %APPDATA% location under a different hidden filename.
Hide Artifacts:Hidden Files and Directories
XCSSET uses a hidden folder named .xcassets and .git to embed itself in Xcode.
Hide Artifacts:Hidden Users
It has modified the Registry to hide created user accounts.
Hide Artifacts:Hidden Users
It has run reg add ‘HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList’ /v to hide a newly created user.
Hide Artifacts:Hidden Users
SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen.
Hide Artifacts:Hidden Window
Agent Tesla has used ProcessWindowStyle.Hidden to hide windows.
Hide Artifacts:Hidden Window
It used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.
Hide Artifacts:Hidden Window
It has used the WindowStyle parameter to conceal PowerShell windows.
Hide Artifacts:Hidden Window
It has been known to use -WindowStyle Hidden to conceal PowerShell windows.
Hide Artifacts:Hidden Window
It has used the WindowStyle parameter to conceal PowerShell windows.
Hide Artifacts:Hidden Window
Astaroth loads its module with the XSL script parameter vShow set to zero, which opens the application with a hidden window.
Hide Artifacts:Hidden Window
AsyncRAT can hide the execution of scheduled tasks using ProcessWindowStyle.Hidden.
Hide Artifacts:Hidden Window
AvosLocker has hidden its console window by using the ShowWindow API function.
Hide Artifacts:Hidden Window
BONDUPDATER uses -windowstyle hidden to conceal a PowerShell window that downloads a payload.
Hide Artifacts:Hidden Window
It has used -w hidden and -windowstyle hidden to conceal PowerShell windows.
Hide Artifacts:Hidden Window
Cuba has executed hidden PowerShell windows.
Hide Artifacts:Hidden Window
It has used -WindowStyle Hidden to conceal PowerShell windows.
Hide Artifacts:Hidden Window
It has used -w hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.
Hide Artifacts:Hidden Window
It has used hidcon to run batch files in a hidden console window.
Hide Artifacts:Hidden Window
It has used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.
Hide Artifacts:Hidden Window
HAMMERTOSS has used -WindowStyle hidden to conceal PowerShell windows.
Hide Artifacts:Hidden Window
It used a payload that creates a hidden window.
Hide Artifacts:Hidden Window
HotCroissant has the ability to hide the window for operations performed on a given file.
Hide Artifacts:Hidden Window
InvisiMole has executed legitimate tools in hidden windows.
Hide Artifacts:Hidden Window
Kevin can hide the current window from the targeted user via the ShowWindow API function.
Hide Artifacts:Hidden Window
KeyBoy uses -w Hidden to conceal a PowerShell window that downloads a payload.
Hide Artifacts:Hidden Window
It has used an information gathering module that will hide an AV software window from the victim.
Hide Artifacts:Hidden Window
Kivars has the ability to conceal its activity through hiding active windows.
Hide Artifacts:Hidden Window
Koadic has used the command Powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden to hide its window.
Hide Artifacts:Hidden Window
KOCTOPUS has used -WindowsStyle Hidden to hide the command window.
Hide Artifacts:Hidden Window
It malware has a function to determine whether the C2 server wishes to execute the newly dropped file in a hidden window.
Hide Artifacts:Hidden Window
MCMD can modify processes to prevent them from being visible on the desktop.
Hide Artifacts:Hidden Window
Metamorfo has hidden its GUI using the ShowWindow() WINAPI call.
Hide Artifacts:Hidden Window
Meteor can hide its console window upon execution to decrease its visibility to a victim.
Hide Artifacts:Hidden Window
It executed PowerShell in a hidden window.
Hide Artifacts:Hidden Window
PowerShower has added a registry key so future powershell.exe instances are spawned with coordinates for a window position off-screen by default.
Hide Artifacts:Hidden Window
QuasarRAT can hide process windows and make web requests invisible to the compromised user. Requests marked as invisible have been sent with user-agent string Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A though QuasarRAT can only be run on Windows systems.
Hide Artifacts:Hidden Window
QUIETCANARY can execute processes in a hidden window.
Hide Artifacts:Hidden Window
QuietSieve has the ability to execute payloads in a hidden window.
Hide Artifacts:Hidden Window
SharpDisco can hide windows using ProcessWindowStyle.Hidden.
Hide Artifacts:Hidden Window
SILENTTRINITY has the ability to set its window state to hidden.
Hide Artifacts:Hidden Window
Snip3 can execute PowerShell scripts in a hidden window.
Hide Artifacts:Hidden Window
StrongPity has the ability to hide the console window for its document search module from the user.
Hide Artifacts:Hidden Window
Ursnif droppers have used COM properties to execute malware in hidden windows.
Hide Artifacts:Hidden Window
WindTail can instruct the OS to execute an application without a dock icon or menu.
Hide Artifacts:NTFS File Attributes
Anchor has used NTFS to hide files.
Hide Artifacts:NTFS File Attributes
It used NTFS alternate data streams to hide their payloads.
Hide Artifacts:NTFS File Attributes
Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads.
Hide Artifacts:NTFS File Attributes
BitPaymer has copied itself to the :bin alternate data stream of a newly created file.
Hide Artifacts:NTFS File Attributes
The DEADEYE.EMBED variant of DEADEYE can embed its payload in an alternate data stream of a local file.
Hide Artifacts:NTFS File Attributes
esentutl can be used to read and write alternate data streams.