prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Hide Artifacts | OSX/Shlayer has used the mktemp utility to make random and unique filenames for payloads, such as export tmpDir="$(mktemp -d /tmp/XXXXXXXXXXXX)" or mktemp -t Installer. |
Hide Artifacts | Tarrask is able to create "hidden" scheduled tasks by deleting the Security Descriptor (SD) registry value. |
Hide Artifacts | WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide it's attempts to elevate privileges through IFileOperation. |
Hide Artifacts:Hidden Files and Directories | Agent Tesla has created hidden folders. |
Hide Artifacts:Hidden Files and Directories | AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings. |
Hide Artifacts:Hidden Files and Directories | It has saved files with hidden file attributes. |
Hide Artifacts:Hidden Files and Directories | It's macOS backdoor hides the clientID file via a chflags function. |
Hide Artifacts:Hidden Files and Directories | Attor can set attributes of log files and directories to HIDDEN, SYSTEM, ARCHIVE, or a combination of those. |
Hide Artifacts:Hidden Files and Directories | BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view. |
Hide Artifacts:Hidden Files and Directories | Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration. |
Hide Artifacts:Hidden Files and Directories | Carberp has created a hidden file in the Startup folder of the current user. |
Hide Artifacts:Hidden Files and Directories | ccf32 has created a hidden directory on targeted systems, naming it after the current local time (year, month, and day). |
Hide Artifacts:Hidden Files and Directories | Clambling has the ability to set its file attributes to hidden. |
Hide Artifacts:Hidden Files and Directories | CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc, /private/tmp/.info.py, /private/tmp/.server.sh, ~/Library/LaunchAgents/.espl.plist, ~/Library/Containers/.[random string]/[random string]. |
Hide Artifacts:Hidden Files and Directories | Dacls has had its payload named with a dot prefix to make it hidden from view in the Finder application. |
Hide Artifacts:Hidden Files and Directories | EnvyScout can use hidden directories and files to hide malicious executables. |
Hide Artifacts:Hidden Files and Directories | Explosive has commonly set file and path attributes to hidden. |
Hide Artifacts:Hidden Files and Directories | It has created hidden files and folders within a compromised Linux system /tmp directory. It also has used attrib.exe to hide gathered local host information. |
Hide Artifacts:Hidden Files and Directories | FruitFly saves itself with a leading "." to make it a hidden file. |
Hide Artifacts:Hidden Files and Directories | It has hidden files on a compromised host. |
Hide Artifacts:Hidden Files and Directories | iKitten saves itself with a leading "." so that it's hidden from users by default. |
Hide Artifacts:Hidden Files and Directories | Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden. |
Hide Artifacts:Hidden Files and Directories | InvisiMole can create hidden system directories. |
Hide Artifacts:Hidden Files and Directories | Ixeshe sets its own executable file's attributes to hidden. |
Hide Artifacts:Hidden Files and Directories | The Komplex payload is stored in a hidden directory at /Users/Shared/.local/kextd. |
Hide Artifacts:Hidden Files and Directories | It has used a VBA Macro to set its file attributes to System and Hidden and has named files with a dot prefix to hide them from the Finder application. |
Hide Artifacts:Hidden Files and Directories | Lokibot has the ability to copy itself to a hidden file and directory. |
Hide Artifacts:Hidden Files and Directories | LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to "hidden". |
Hide Artifacts:Hidden Files and Directories | It has used malware to store malicious binaries in hidden directories on victim's USB drives. |
Hide Artifacts:Hidden Files and Directories | It has the capability to exfiltrate stolen data to a hidden folder on a removable drive. |
Hide Artifacts:Hidden Files and Directories | MacSpy stores itself in ~/Library/.DS_Stores/ |
Hide Artifacts:Hidden Files and Directories | Micropsia creates a new hidden directory to store all components' outputs in a dedicated sub-folder for each. |
Hide Artifacts:Hidden Files and Directories | It's PlugX variant has created a hidden folder on USB drives named RECYCLE.BIN to store malicious executables and collected data. |
Hide Artifacts:Hidden Files and Directories | NETWIRE can copy itself to and launch itself from hidden folders. |
Hide Artifacts:Hidden Files and Directories | Before exfiltration, Okrum's backdoor has used hidden files to store logs and outputs from backdoor commands. |
Hide Artifacts:Hidden Files and Directories | OSX/Shlayer has executed a .command script from a hidden directory in a mounted DMG. |
Hide Artifacts:Hidden Files and Directories | OSX_OCEANLOTUS.D sets the main loader file’s attributes to hidden. |
Hide Artifacts:Hidden Files and Directories | PlugX can modify the characteristics of folders to hide them from the compromised user. |
Hide Artifacts:Hidden Files and Directories | PoetRAT has the ability to hide and unhide files. |
Hide Artifacts:Hidden Files and Directories | QakBot has placed its payload in hidden subdirectories. |
Hide Artifacts:Hidden Files and Directories | QuasarRAT has the ability to set file attributes to "hidden" to hide files from the compromised user's view in Windows File Explorer. |
Hide Artifacts:Hidden Files and Directories | Rising Sun can modify file attributes to hide files. |
Hide Artifacts:Hidden Files and Directories | It downloaded a file "libprocesshider", which could hide files on the target system. |
Hide Artifacts:Hidden Files and Directories | SLOTHFULMEDIA has been created with a hidden attribute to insure it's not visible to the victim. |
Hide Artifacts:Hidden Files and Directories | SysUpdate has the ability to set file attributes to hidden. |
Hide Artifacts:Hidden Files and Directories | ThiefQuest hides a copy of itself in the user's ~/Library directory by using a . at the beginning of the file name followed by 9 random characters. |
Hide Artifacts:Hidden Files and Directories | It can hide legitimate directories and replace them with malicious copies of the same name. |
Hide Artifacts:Hidden Files and Directories | It has created a hidden directory under C:\ProgramData\Apple\Updates\ and C:\Users\Public\Documents\Flash\. |
Hide Artifacts:Hidden Files and Directories | WannaCry uses attrib +h to make some of its files hidden. |
Hide Artifacts:Hidden Files and Directories | WastedLocker has copied a random file from the Windows System32 folder to the %APPDATA% location under a different hidden filename. |
Hide Artifacts:Hidden Files and Directories | XCSSET uses a hidden folder named .xcassets and .git to embed itself in Xcode. |
Hide Artifacts:Hidden Users | It has modified the Registry to hide created user accounts. |
Hide Artifacts:Hidden Users | It has run reg add ‘HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList’ /v to hide a newly created user. |
Hide Artifacts:Hidden Users | SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen. |
Hide Artifacts:Hidden Window | Agent Tesla has used ProcessWindowStyle.Hidden to hide windows. |
Hide Artifacts:Hidden Window | It used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. |
Hide Artifacts:Hidden Window | It has used the WindowStyle parameter to conceal PowerShell windows. |
Hide Artifacts:Hidden Window | It has been known to use -WindowStyle Hidden to conceal PowerShell windows. |
Hide Artifacts:Hidden Window | It has used the WindowStyle parameter to conceal PowerShell windows. |
Hide Artifacts:Hidden Window | Astaroth loads its module with the XSL script parameter vShow set to zero, which opens the application with a hidden window. |
Hide Artifacts:Hidden Window | AsyncRAT can hide the execution of scheduled tasks using ProcessWindowStyle.Hidden. |
Hide Artifacts:Hidden Window | AvosLocker has hidden its console window by using the ShowWindow API function. |
Hide Artifacts:Hidden Window | BONDUPDATER uses -windowstyle hidden to conceal a PowerShell window that downloads a payload. |
Hide Artifacts:Hidden Window | It has used -w hidden and -windowstyle hidden to conceal PowerShell windows. |
Hide Artifacts:Hidden Window | Cuba has executed hidden PowerShell windows. |
Hide Artifacts:Hidden Window | It has used -WindowStyle Hidden to conceal PowerShell windows. |
Hide Artifacts:Hidden Window | It has used -w hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. |
Hide Artifacts:Hidden Window | It has used hidcon to run batch files in a hidden console window. |
Hide Artifacts:Hidden Window | It has used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. |
Hide Artifacts:Hidden Window | HAMMERTOSS has used -WindowStyle hidden to conceal PowerShell windows. |
Hide Artifacts:Hidden Window | It used a payload that creates a hidden window. |
Hide Artifacts:Hidden Window | HotCroissant has the ability to hide the window for operations performed on a given file. |
Hide Artifacts:Hidden Window | InvisiMole has executed legitimate tools in hidden windows. |
Hide Artifacts:Hidden Window | Kevin can hide the current window from the targeted user via the ShowWindow API function. |
Hide Artifacts:Hidden Window | KeyBoy uses -w Hidden to conceal a PowerShell window that downloads a payload. |
Hide Artifacts:Hidden Window | It has used an information gathering module that will hide an AV software window from the victim. |
Hide Artifacts:Hidden Window | Kivars has the ability to conceal its activity through hiding active windows. |
Hide Artifacts:Hidden Window | Koadic has used the command Powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden to hide its window. |
Hide Artifacts:Hidden Window | KOCTOPUS has used -WindowsStyle Hidden to hide the command window. |
Hide Artifacts:Hidden Window | It malware has a function to determine whether the C2 server wishes to execute the newly dropped file in a hidden window. |
Hide Artifacts:Hidden Window | MCMD can modify processes to prevent them from being visible on the desktop. |
Hide Artifacts:Hidden Window | Metamorfo has hidden its GUI using the ShowWindow() WINAPI call. |
Hide Artifacts:Hidden Window | Meteor can hide its console window upon execution to decrease its visibility to a victim. |
Hide Artifacts:Hidden Window | It executed PowerShell in a hidden window. |
Hide Artifacts:Hidden Window | PowerShower has added a registry key so future powershell.exe instances are spawned with coordinates for a window position off-screen by default. |
Hide Artifacts:Hidden Window | QuasarRAT can hide process windows and make web requests invisible to the compromised user. Requests marked as invisible have been sent with user-agent string Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A though QuasarRAT can only be run on Windows systems. |
Hide Artifacts:Hidden Window | QUIETCANARY can execute processes in a hidden window. |
Hide Artifacts:Hidden Window | QuietSieve has the ability to execute payloads in a hidden window. |
Hide Artifacts:Hidden Window | SharpDisco can hide windows using ProcessWindowStyle.Hidden. |
Hide Artifacts:Hidden Window | SILENTTRINITY has the ability to set its window state to hidden. |
Hide Artifacts:Hidden Window | Snip3 can execute PowerShell scripts in a hidden window. |
Hide Artifacts:Hidden Window | StrongPity has the ability to hide the console window for its document search module from the user. |
Hide Artifacts:Hidden Window | Ursnif droppers have used COM properties to execute malware in hidden windows. |
Hide Artifacts:Hidden Window | WindTail can instruct the OS to execute an application without a dock icon or menu. |
Hide Artifacts:NTFS File Attributes | Anchor has used NTFS to hide files. |
Hide Artifacts:NTFS File Attributes | It used NTFS alternate data streams to hide their payloads. |
Hide Artifacts:NTFS File Attributes | Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads. |
Hide Artifacts:NTFS File Attributes | BitPaymer has copied itself to the :bin alternate data stream of a newly created file. |
Hide Artifacts:NTFS File Attributes | The DEADEYE.EMBED variant of DEADEYE can embed its payload in an alternate data stream of a local file. |
Hide Artifacts:NTFS File Attributes | esentutl can be used to read and write alternate data streams. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.