prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Indicator Removal:Clear Windows Event Logs | It has used Cobalt Strike to empty log files. |
Indicator Removal:Clear Windows Event Logs | KillDisk deletes Application, Security, Setup, and System Windows Event Logs. |
Indicator Removal:Clear Windows Event Logs | Lucifer can clear and remove event logs. |
Indicator Removal:Clear Windows Event Logs | Mafalda can delete Windows Event logs by invoking the OpenEventLogW and ClearEventLogW functions. |
Indicator Removal:Clear Windows Event Logs | Meteor can use Wevtutil to remove Security, System and Application Event Viewer logs. |
Indicator Removal:Clear Windows Event Logs | NotPetya uses wevtutil to clear the Windows event logs. |
Indicator Removal:Clear Windows Event Logs | Olympic Destroyer will attempt to clear the System and Security event logs using wevtutil. |
Indicator Removal:Clear Windows Event Logs | During Operation Wocao, the threat actors deleted all Windows system and security event logs using /Q /c wevtutil cl system and /Q /c wevtutil cl security. |
Indicator Removal:Clear Windows Event Logs | Pupy has a module to clear event logs with PowerShell. |
Indicator Removal:Clear Windows Event Logs | RunningRAT contains code to clear event logs. |
Indicator Removal:Clear Windows Event Logs | SynAck clears event logs. |
Indicator Removal:Clear Windows Event Logs | Wevtutil can be used to clear system and security event logs from the system. |
Indicator Removal:Clear Windows Event Logs | ZxShell has a command to clear system event logs. |
Indicator Removal:Clear Linux or Mac System Logs | MacMa can clear possible malware traces such as application logs. |
Indicator Removal:Clear Linux or Mac System Logs | Proton removes logs from /var/logs and /Library/logs. |
Indicator Removal:Clear Linux or Mac System Logs | It has cleared log files within the /var/log/ folder. |
Indicator Removal:Clear Linux or Mac System Logs | It has removed system logs from /var/log/syslog. |
Indicator Removal:Clear Command History | It attempted to remove evidence of some of its activity by deleting Bash histories. |
Indicator Removal:Clear Command History | Hildegard has used history -c to clear script shell logs. |
Indicator Removal:Clear Command History | Kobalos can remove all command history on compromised hosts. |
Indicator Removal:Clear Command History | It has routinely deleted log files on a compromised router, including automatic log deletion through the use of the logrotate utility. |
Indicator Removal:Clear Command History | It has removed mailbox export requests from compromised Exchange servers. |
Indicator Removal:Clear Command History | It has used Wevtutil to remove PowerShell execution logs. |
Indicator Removal:Clear Command History | It has cleared command history with history -c. |
Indicator Removal:File Deletion | During the 2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself after FONTCACHE.DAT, rundll32.exe, and the associated .lnk file is delivered. |
Indicator Removal:File Deletion | ADVSTORESHELL can delete files and directories. |
Indicator Removal:File Deletion | Anchor can self delete its dropper after the malware is successfully deployed. |
Indicator Removal:File Deletion | AppleJeus has deleted the MSI file after installation. |
Indicator Removal:File Deletion | AppleSeed can delete files from a compromised host after they are exfiltrated. |
Indicator Removal:File Deletion | It actors deleted tools and batch files from victim systems. |
Indicator Removal:File Deletion | It has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner. |
Indicator Removal:File Deletion | It has used SDelete to remove artifacts from victim networks. |
Indicator Removal:File Deletion | It has a tool that can delete files. |
Indicator Removal:File Deletion | It's macOS backdoor can receive a "delete" command. |
Indicator Removal:File Deletion | It has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process. |
Indicator Removal:File Deletion | It has used malware to delete files after they are deployed on a compromised host. |
Indicator Removal:File Deletion | It deleted files from the system. |
Indicator Removal:File Deletion | It has deleted malicious executables from compromised machines. |
Indicator Removal:File Deletion | Aria-body has the ability to delete files and directories on compromised hosts. |
Indicator Removal:File Deletion | Attor’s plugin deletes the collected files and log files after exfiltration. |
Indicator Removal:File Deletion | AuditCred can delete files from the system. |
Indicator Removal:File Deletion | Azorult can delete files from victim machines. |
Indicator Removal:File Deletion | BabyShark has cleaned up all files associated with the secondary payload execution. |
Indicator Removal:File Deletion | BackConfig has the ability to remove files and folders related to previous infections. |
Indicator Removal:File Deletion | Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim. |
Indicator Removal:File Deletion | BADHATCH has the ability to delete PowerShell scripts from a compromised machine. |
Indicator Removal:File Deletion | Bandook has a command to delete a file. |
Indicator Removal:File Deletion | Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system. |
Indicator Removal:File Deletion | Bazar can delete its loader using a batch file in the Windows temporary folder. |
Indicator Removal:File Deletion | BBSRAT can delete files and directories. |
Indicator Removal:File Deletion | Bisonal will delete its dropper and VBS scripts from the victim’s machine. |
Indicator Removal:File Deletion | BLACKCOFFEE has the capability to delete files. |
Indicator Removal:File Deletion | BLINDINGCAN has deleted itself and associated artifacts from victim machines. |
Indicator Removal:File Deletion | BLUELIGHT can uninstall itself. |
Indicator Removal:File Deletion | The It uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated. |
Indicator Removal:File Deletion | Bumblebee can uninstall its loader through the use of a Sdl command. |
Indicator Removal:File Deletion | Calisto has the capability to use rm -rf to remove folders and files from the victim's machine. |
Indicator Removal:File Deletion | It has a command to delete files. |
Indicator Removal:File Deletion | Cardinal RAT can uninstall itself, including deleting its executable. |
Indicator Removal:File Deletion | CARROTBAT has the ability to delete downloaded files from a compromised host. |
Indicator Removal:File Deletion | ccf32 can delete files and folders from compromised machines. |
Indicator Removal:File Deletion | CharmPower can delete created files from a compromised system. |
Indicator Removal:File Deletion | Recent versions of Cherry Picker delete files and registry keys created by the malware. |
Indicator Removal:File Deletion | It has performed file deletion to evade detection. |
Indicator Removal:File Deletion | cmd can be used to delete files from the file system. |
Indicator Removal:File Deletion | It deleted the DLL dropper from the victim’s machine to cover their tracks. |
Indicator Removal:File Deletion | Crimson has the ability to delete files from a compromised host. |
Indicator Removal:File Deletion | Cryptoistic has the ability delete files from a compromised host. |
Indicator Removal:File Deletion | CSPY Downloader has the ability to self delete. |
Indicator Removal:File Deletion | Cuba can use the command cmd.exe /c del to delete its artifacts from the system. |
Indicator Removal:File Deletion | DanBot can delete its configuration file after installation. |
Indicator Removal:File Deletion | DarkWatchman has been observed deleting its original launcher after installation. |
Indicator Removal:File Deletion | Denis has a command to delete files from the victim’s machine. |
Indicator Removal:File Deletion | Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes. |
Indicator Removal:File Deletion | It has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots. |
Indicator Removal:File Deletion | Drovorub can delete specific files from a compromised host. |
Indicator Removal:File Deletion | Dtrack can remove its persistence and delete itself. |
Indicator Removal:File Deletion | DustySky can delete files it creates from the infected system. |
Indicator Removal:File Deletion | ECCENTRICBANDWAGON can delete log files generated from the malware stored at C:\windows\temp\tmp0207. |
Indicator Removal:File Deletion | Elise is capable of launching a remote shell on the host to delete itself. |
Indicator Removal:File Deletion | Epic has a command to delete a file from the machine. |
Indicator Removal:File Deletion | EvilBunny has deleted the initial dropper after running through the environment checks. |
Indicator Removal:File Deletion | It has deleted files used during infection. |
Indicator Removal:File Deletion | Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file. |
Indicator Removal:File Deletion | FALLCHILL can delete malware and associated artifacts from the victim. |
Indicator Removal:File Deletion | FatDuke can secure delete its DLL. |
Indicator Removal:File Deletion | FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components. |
Indicator Removal:File Deletion | Ferocious can delete files from a compromised host. |
Indicator Removal:File Deletion | It has used batch scripts and scheduled tasks to delete critical system files. |
Indicator Removal:File Deletion | It uses SDelete to clean up the environment and attempt to prevent detection. |
Indicator Removal:File Deletion | It has removed files from victim machines. |
Indicator Removal:File Deletion | It has deleted tmp and prefetch files during post compromise cleanup activities. It has also deleted PowerShell scripts to evade detection on compromised machines. |
Indicator Removal:File Deletion | FlawedAmmyy can execute batch scripts to delete files. |
Indicator Removal:File Deletion | FruitFly will delete files on the system. |
Indicator Removal:File Deletion | FunnyDream can delete files including its dropper component. |
Indicator Removal:File Deletion | Fysbis has the ability to delete files. |
Indicator Removal:File Deletion | It tools can delete files used during an operation. |
Indicator Removal:File Deletion | Gazer has commands to delete files and persistence mechanisms from the victim. |
Indicator Removal:File Deletion | Gelsemium can delete its dropper component from the targeted system. |
Indicator Removal:File Deletion | gh0st RAT has the capability to to delete files. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.