prompt
stringclasses
508 values
procedure
stringlengths
20
478
Indicator Removal:Clear Windows Event Logs
It has used Cobalt Strike to empty log files.
Indicator Removal:Clear Windows Event Logs
KillDisk deletes Application, Security, Setup, and System Windows Event Logs.
Indicator Removal:Clear Windows Event Logs
Lucifer can clear and remove event logs.
Indicator Removal:Clear Windows Event Logs
Mafalda can delete Windows Event logs by invoking the OpenEventLogW and ClearEventLogW functions.
Indicator Removal:Clear Windows Event Logs
Meteor can use Wevtutil to remove Security, System and Application Event Viewer logs.
Indicator Removal:Clear Windows Event Logs
NotPetya uses wevtutil to clear the Windows event logs.
Indicator Removal:Clear Windows Event Logs
Olympic Destroyer will attempt to clear the System and Security event logs using wevtutil.
Indicator Removal:Clear Windows Event Logs
During Operation Wocao, the threat actors deleted all Windows system and security event logs using /Q /c wevtutil cl system and /Q /c wevtutil cl security.
Indicator Removal:Clear Windows Event Logs
Pupy has a module to clear event logs with PowerShell.
Indicator Removal:Clear Windows Event Logs
RunningRAT contains code to clear event logs.
Indicator Removal:Clear Windows Event Logs
SynAck clears event logs.
Indicator Removal:Clear Windows Event Logs
Wevtutil can be used to clear system and security event logs from the system.
Indicator Removal:Clear Windows Event Logs
ZxShell has a command to clear system event logs.
Indicator Removal:Clear Linux or Mac System Logs
MacMa can clear possible malware traces such as application logs.
Indicator Removal:Clear Linux or Mac System Logs
Proton removes logs from /var/logs and /Library/logs.
Indicator Removal:Clear Linux or Mac System Logs
It has cleared log files within the /var/log/ folder.
Indicator Removal:Clear Linux or Mac System Logs
It has removed system logs from /var/log/syslog.
Indicator Removal:Clear Command History
It attempted to remove evidence of some of its activity by deleting Bash histories.
Indicator Removal:Clear Command History
Hildegard has used history -c to clear script shell logs.
Indicator Removal:Clear Command History
Kobalos can remove all command history on compromised hosts.
Indicator Removal:Clear Command History
It has routinely deleted log files on a compromised router, including automatic log deletion through the use of the logrotate utility.
Indicator Removal:Clear Command History
It has removed mailbox export requests from compromised Exchange servers.
Indicator Removal:Clear Command History
It has used Wevtutil to remove PowerShell execution logs.
Indicator Removal:Clear Command History
It has cleared command history with history -c.
Indicator Removal:File Deletion
During the 2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself after FONTCACHE.DAT, rundll32.exe, and the associated .lnk file is delivered.
Indicator Removal:File Deletion
ADVSTORESHELL can delete files and directories.
Indicator Removal:File Deletion
Anchor can self delete its dropper after the malware is successfully deployed.
Indicator Removal:File Deletion
AppleJeus has deleted the MSI file after installation.
Indicator Removal:File Deletion
AppleSeed can delete files from a compromised host after they are exfiltrated.
Indicator Removal:File Deletion
It actors deleted tools and batch files from victim systems.
Indicator Removal:File Deletion
It has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.
Indicator Removal:File Deletion
It has used SDelete to remove artifacts from victim networks.
Indicator Removal:File Deletion
It has a tool that can delete files.
Indicator Removal:File Deletion
It's macOS backdoor can receive a "delete" command.
Indicator Removal:File Deletion
It has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process.
Indicator Removal:File Deletion
It has used malware to delete files after they are deployed on a compromised host.
Indicator Removal:File Deletion
It deleted files from the system.
Indicator Removal:File Deletion
It has deleted malicious executables from compromised machines.
Indicator Removal:File Deletion
Aria-body has the ability to delete files and directories on compromised hosts.
Indicator Removal:File Deletion
Attor’s plugin deletes the collected files and log files after exfiltration.
Indicator Removal:File Deletion
AuditCred can delete files from the system.
Indicator Removal:File Deletion
Azorult can delete files from victim machines.
Indicator Removal:File Deletion
BabyShark has cleaned up all files associated with the secondary payload execution.
Indicator Removal:File Deletion
BackConfig has the ability to remove files and folders related to previous infections.
Indicator Removal:File Deletion
Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim.
Indicator Removal:File Deletion
BADHATCH has the ability to delete PowerShell scripts from a compromised machine.
Indicator Removal:File Deletion
Bandook has a command to delete a file.
Indicator Removal:File Deletion
Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system.
Indicator Removal:File Deletion
Bazar can delete its loader using a batch file in the Windows temporary folder.
Indicator Removal:File Deletion
BBSRAT can delete files and directories.
Indicator Removal:File Deletion
Bisonal will delete its dropper and VBS scripts from the victim’s machine.
Indicator Removal:File Deletion
BLACKCOFFEE has the capability to delete files.
Indicator Removal:File Deletion
BLINDINGCAN has deleted itself and associated artifacts from victim machines.
Indicator Removal:File Deletion
BLUELIGHT can uninstall itself.
Indicator Removal:File Deletion
The It uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated.
Indicator Removal:File Deletion
Bumblebee can uninstall its loader through the use of a Sdl command.
Indicator Removal:File Deletion
Calisto has the capability to use rm -rf to remove folders and files from the victim's machine.
Indicator Removal:File Deletion
It has a command to delete files.
Indicator Removal:File Deletion
Cardinal RAT can uninstall itself, including deleting its executable.
Indicator Removal:File Deletion
CARROTBAT has the ability to delete downloaded files from a compromised host.
Indicator Removal:File Deletion
ccf32 can delete files and folders from compromised machines.
Indicator Removal:File Deletion
CharmPower can delete created files from a compromised system.
Indicator Removal:File Deletion
Recent versions of Cherry Picker delete files and registry keys created by the malware.
Indicator Removal:File Deletion
It has performed file deletion to evade detection.
Indicator Removal:File Deletion
cmd can be used to delete files from the file system.
Indicator Removal:File Deletion
It deleted the DLL dropper from the victim’s machine to cover their tracks.
Indicator Removal:File Deletion
Crimson has the ability to delete files from a compromised host.
Indicator Removal:File Deletion
Cryptoistic has the ability delete files from a compromised host.
Indicator Removal:File Deletion
CSPY Downloader has the ability to self delete.
Indicator Removal:File Deletion
Cuba can use the command cmd.exe /c del to delete its artifacts from the system.
Indicator Removal:File Deletion
DanBot can delete its configuration file after installation.
Indicator Removal:File Deletion
DarkWatchman has been observed deleting its original launcher after installation.
Indicator Removal:File Deletion
Denis has a command to delete files from the victim’s machine.
Indicator Removal:File Deletion
Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes.
Indicator Removal:File Deletion
It has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.
Indicator Removal:File Deletion
Drovorub can delete specific files from a compromised host.
Indicator Removal:File Deletion
Dtrack can remove its persistence and delete itself.
Indicator Removal:File Deletion
DustySky can delete files it creates from the infected system.
Indicator Removal:File Deletion
ECCENTRICBANDWAGON can delete log files generated from the malware stored at C:\windows\temp\tmp0207.
Indicator Removal:File Deletion
Elise is capable of launching a remote shell on the host to delete itself.
Indicator Removal:File Deletion
Epic has a command to delete a file from the machine.
Indicator Removal:File Deletion
EvilBunny has deleted the initial dropper after running through the environment checks.
Indicator Removal:File Deletion
It has deleted files used during infection.
Indicator Removal:File Deletion
Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file.
Indicator Removal:File Deletion
FALLCHILL can delete malware and associated artifacts from the victim.
Indicator Removal:File Deletion
FatDuke can secure delete its DLL.
Indicator Removal:File Deletion
FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components.
Indicator Removal:File Deletion
Ferocious can delete files from a compromised host.
Indicator Removal:File Deletion
It has used batch scripts and scheduled tasks to delete critical system files.
Indicator Removal:File Deletion
It uses SDelete to clean up the environment and attempt to prevent detection.
Indicator Removal:File Deletion
It has removed files from victim machines.
Indicator Removal:File Deletion
It has deleted tmp and prefetch files during post compromise cleanup activities. It has also deleted PowerShell scripts to evade detection on compromised machines.
Indicator Removal:File Deletion
FlawedAmmyy can execute batch scripts to delete files.
Indicator Removal:File Deletion
FruitFly will delete files on the system.
Indicator Removal:File Deletion
FunnyDream can delete files including its dropper component.
Indicator Removal:File Deletion
Fysbis has the ability to delete files.
Indicator Removal:File Deletion
It tools can delete files used during an operation.
Indicator Removal:File Deletion
Gazer has commands to delete files and persistence mechanisms from the victim.
Indicator Removal:File Deletion
Gelsemium can delete its dropper component from the targeted system.
Indicator Removal:File Deletion
gh0st RAT has the capability to to delete files.