prompt
stringclasses
508 values
procedure
stringlengths
20
478
Indicator Removal:File Deletion
Gold Dragon deletes one of its files, 2.hwp, from the endpoint after establishing persistence.
Indicator Removal:File Deletion
GoldenSpy's uninstaller can delete registry entries, files and folders, and finally itself once these tasks have been completed.
Indicator Removal:File Deletion
Grandoreiro can delete .LNK files created in the Startup folder.
Indicator Removal:File Deletion
Green Lambert can delete the original executable after initial installation in addition to unused functions.
Indicator Removal:File Deletion
GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API.
Indicator Removal:File Deletion
GrimAgent can delete old binaries on a compromised host.
Indicator Removal:File Deletion
Malware used by It is capable of remotely deleting files from victims.
Indicator Removal:File Deletion
GuLoader can delete its executable from the AppData\Local\Temp directory on the compromised host.
Indicator Removal:File Deletion
HALFBAKED can delete a specified file.
Indicator Removal:File Deletion
Hancitor has deleted files using the VBA kill function.
Indicator Removal:File Deletion
HAWKBALL has the ability to delete files.
Indicator Removal:File Deletion
HermeticWiper has the ability to overwrite its own file with random bites.
Indicator Removal:File Deletion
Heyoka Backdoor has the ability to delete folders and files from a targeted system.
Indicator Removal:File Deletion
Hi-Zor deletes its RAT installer file as it executes its DLL payload file.
Indicator Removal:File Deletion
Hildegard has deleted scripts after execution.
Indicator Removal:File Deletion
HotCroissant has the ability to clean up installed files, delete files, and delete itself from the victim’s machine.
Indicator Removal:File Deletion
HTTPBrowser deletes its original installer file once installation is complete.
Indicator Removal:File Deletion
Hydraq creates a backdoor through which remote attackers can delete files.
Indicator Removal:File Deletion
HyperBro has the ability to delete a specified file.
Indicator Removal:File Deletion
IceApple can delete files and directories from targeted systems.
Indicator Removal:File Deletion
Imminent Monitor has deleted files related to its dynamic debugger feature.
Indicator Removal:File Deletion
InnaputRAT has a command to delete files.
Indicator Removal:File Deletion
InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers.
Indicator Removal:File Deletion
Ixeshe has a command to delete a file from the machine.
Indicator Removal:File Deletion
The JHUHUGIT dropper can delete itself from the victim. Another JHUHUGIT variant has the capability to delete specified files.
Indicator Removal:File Deletion
JPIN's installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running.
Indicator Removal:File Deletion
jRAT has a function to delete files from the victim’s machine.
Indicator Removal:File Deletion
Kazuar can delete files.
Indicator Removal:File Deletion
Kevin can delete files created on the victim's machine.
Indicator Removal:File Deletion
KEYMARBLE has the capability to delete files off the victim’s machine.
Indicator Removal:File Deletion
KillDisk has the ability to quit and delete itself.
Indicator Removal:File Deletion
It has deleted the exfiltrated data on disk after transmission. It has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk.
Indicator Removal:File Deletion
Kivars has the ability to uninstall malware from the infected host.
Indicator Removal:File Deletion
The Komplex trojan supports file deletion.
Indicator Removal:File Deletion
KONNI can delete files.
Indicator Removal:File Deletion
It malware has deleted files in various ways, including "suicide scripts" to delete malware binaries from the victim. It also uses secure file deletion to delete files from the victim.
Indicator Removal:File Deletion
LightNeuron has a function to delete files.
Indicator Removal:File Deletion
Linfo creates a backdoor through which remote attackers can delete files.
Indicator Removal:File Deletion
LiteDuke can securely delete files by first writing random data to the file.
Indicator Removal:File Deletion
LockerGoga has been observed deleting its original launcher after execution.
Indicator Removal:File Deletion
Lokibot will delete its dropped files after bypassing UAC.
Indicator Removal:File Deletion
LookBack removes itself after execution and can delete files on the system.
Indicator Removal:File Deletion
LoudMiner deleted installation files after completion.
Indicator Removal:File Deletion
Once a file is uploaded, It will delete it from the machine.
Indicator Removal:File Deletion
MacMa can delete itself from the compromised computer.
Indicator Removal:File Deletion
MacSpy deletes any temporary files it creates
Indicator Removal:File Deletion
It has deleted and overwrote files to cover tracks.
Indicator Removal:File Deletion
A It macro deletes files after it has decoded and decompressed them.
Indicator Removal:File Deletion
Once loaded into memory, MESSAGETAP deletes the keyword_parm.txt and parm.txt configuration files from disk.
Indicator Removal:File Deletion
It has quickly deleted cbd.exe from a compromised host following the successful deployment of their malware.
Indicator Removal:File Deletion
metaMain has deleted collected items after uploading the content to its C2 server.
Indicator Removal:File Deletion
Metamorfo has deleted itself from the system after execution.
Indicator Removal:File Deletion
Meteor will delete the folder containing malicious scripts if it detects the hostname as PIS-APP, PIS-MOB, WSUSPROXY, or PIS-DB.
Indicator Removal:File Deletion
Milan can delete files via C:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 1 -w 3000 > Nul & rmdir /s /q.
Indicator Removal:File Deletion
Misdat is capable of deleting the backdoor file.
Indicator Removal:File Deletion
MoonWind can delete itself or specified files.
Indicator Removal:File Deletion
More_eggs can remove itself from a system.
Indicator Removal:File Deletion
Mori can delete its DLL file and related files by Registry value.
Indicator Removal:File Deletion
Mosquito deletes files using DeleteFileW API call.
Indicator Removal:File Deletion
MURKYTOP has the capability to delete local files.
Indicator Removal:File Deletion
It will delete their tools and files, and kill processes after their objectives are reached.
Indicator Removal:File Deletion
NanHaiShu launches a script to delete their original decoy file to cover tracks.
Indicator Removal:File Deletion
Nebulae has the ability to delete files and directories.
Indicator Removal:File Deletion
njRAT is capable of deleting files.
Indicator Removal:File Deletion
NOKKI can delete files to cover tracks.
Indicator Removal:File Deletion
OceanSalt can delete files from the system.
Indicator Removal:File Deletion
It has deleted files associated with their payload after execution.
Indicator Removal:File Deletion
Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers.
Indicator Removal:File Deletion
OopsIE has the capability to delete files and scripts from the victim's machine.
Indicator Removal:File Deletion
During Operation Dream Job, It removed all previously delivered files from a compromised computer.
Indicator Removal:File Deletion
During Operation Honeybee, the threat actors used batch files that reduced their fingerprint on a compromised system by deleting malware-related files.
Indicator Removal:File Deletion
During Operation Wocao, the threat actors consistently removed traces of their activity by first overwriting a file using /c cd /d c:\windows\temp\ & copy \\<IP ADDRESS>\c$\windows\system32\devmgr.dll \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1 /y and then deleting the overwritten file using /c cd /d c:\windows\temp\ & del \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1.
Indicator Removal:File Deletion
OSX_OCEANLOTUS.D has a command to delete a file from the system. OSX_OCEANLOTUS.D deletes the app bundle and dropper after execution.
Indicator Removal:File Deletion
OutSteel can delete itself following the successful execution of a follow-on payload.
Indicator Removal:File Deletion
P.A.S. Webshell can delete scripts from a subdirectory of /tmp after they are run.
Indicator Removal:File Deletion
Pasam creates a backdoor through which remote attackers can delete files.
Indicator Removal:File Deletion
It removed certain files and replaced them so they could not be retrieved.
Indicator Removal:File Deletion
Pay2Key can remove its log file from disk.
Indicator Removal:File Deletion
PcShare has deleted its files and components from a compromised host.
Indicator Removal:File Deletion
Penquin can delete downloaded executables after running them.
Indicator Removal:File Deletion
Pillowmint has deleted the filepath %APPDATA%\Intel\devmonsrv.exe.
Indicator Removal:File Deletion
PLEAD has the ability to delete files on the compromised host.
Indicator Removal:File Deletion
pngdowner deletes content from C2 communications that was saved to the user's temporary directory.
Indicator Removal:File Deletion
PoetRAT has the ability to overwrite scripts and delete itself if a sandbox environment is detected.
Indicator Removal:File Deletion
Pony has used scripts to delete itself after execution.
Indicator Removal:File Deletion
PowerDuke has a command to write random data across a file and delete it.
Indicator Removal:File Deletion
PowerShower has the ability to remove all files created during the dropper process.
Indicator Removal:File Deletion
POWERSTATS can delete all files on the C:\, D:\, E:\ and, F:\ drives using PowerShell Remove-Item commands.
Indicator Removal:File Deletion
After encrypting its own log files, the log encryption module in Prikormka deletes the original, unencrypted files from the host.
Indicator Removal:File Deletion
ProLock can remove files containing its payload after they are executed.
Indicator Removal:File Deletion
Proton removes all files in the /tmp directory.
Indicator Removal:File Deletion
Proxysvc can delete files indicated by the attacker and remove itself from disk using a batch file.
Indicator Removal:File Deletion
Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes.
Indicator Removal:File Deletion
PUNCHBUGGY can delete files written to disk.
Indicator Removal:File Deletion
PyDCrypt will remove all created artifacts such as dropped executables.
Indicator Removal:File Deletion
Pysa has deleted batch files after execution.
Indicator Removal:File Deletion
QakBot can delete folders and files including overwriting its executable with legitimate programs.
Indicator Removal:File Deletion
QUADAGENT has a command to delete its Registry key and scheduled task.
Indicator Removal:File Deletion
RainyDay has the ability to uninstall itself by deleting its service and files.
Indicator Removal:File Deletion
RCSession can remove files from a targeted system.