prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Indicator Removal:File Deletion | Gold Dragon deletes one of its files, 2.hwp, from the endpoint after establishing persistence. |
Indicator Removal:File Deletion | GoldenSpy's uninstaller can delete registry entries, files and folders, and finally itself once these tasks have been completed. |
Indicator Removal:File Deletion | Grandoreiro can delete .LNK files created in the Startup folder. |
Indicator Removal:File Deletion | Green Lambert can delete the original executable after initial installation in addition to unused functions. |
Indicator Removal:File Deletion | GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API. |
Indicator Removal:File Deletion | GrimAgent can delete old binaries on a compromised host. |
Indicator Removal:File Deletion | Malware used by It is capable of remotely deleting files from victims. |
Indicator Removal:File Deletion | GuLoader can delete its executable from the AppData\Local\Temp directory on the compromised host. |
Indicator Removal:File Deletion | HALFBAKED can delete a specified file. |
Indicator Removal:File Deletion | Hancitor has deleted files using the VBA kill function. |
Indicator Removal:File Deletion | HAWKBALL has the ability to delete files. |
Indicator Removal:File Deletion | HermeticWiper has the ability to overwrite its own file with random bites. |
Indicator Removal:File Deletion | Heyoka Backdoor has the ability to delete folders and files from a targeted system. |
Indicator Removal:File Deletion | Hi-Zor deletes its RAT installer file as it executes its DLL payload file. |
Indicator Removal:File Deletion | Hildegard has deleted scripts after execution. |
Indicator Removal:File Deletion | HotCroissant has the ability to clean up installed files, delete files, and delete itself from the victim’s machine. |
Indicator Removal:File Deletion | HTTPBrowser deletes its original installer file once installation is complete. |
Indicator Removal:File Deletion | Hydraq creates a backdoor through which remote attackers can delete files. |
Indicator Removal:File Deletion | HyperBro has the ability to delete a specified file. |
Indicator Removal:File Deletion | IceApple can delete files and directories from targeted systems. |
Indicator Removal:File Deletion | Imminent Monitor has deleted files related to its dynamic debugger feature. |
Indicator Removal:File Deletion | InnaputRAT has a command to delete files. |
Indicator Removal:File Deletion | InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers. |
Indicator Removal:File Deletion | Ixeshe has a command to delete a file from the machine. |
Indicator Removal:File Deletion | The JHUHUGIT dropper can delete itself from the victim. Another JHUHUGIT variant has the capability to delete specified files. |
Indicator Removal:File Deletion | JPIN's installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running. |
Indicator Removal:File Deletion | jRAT has a function to delete files from the victim’s machine. |
Indicator Removal:File Deletion | Kazuar can delete files. |
Indicator Removal:File Deletion | Kevin can delete files created on the victim's machine. |
Indicator Removal:File Deletion | KEYMARBLE has the capability to delete files off the victim’s machine. |
Indicator Removal:File Deletion | KillDisk has the ability to quit and delete itself. |
Indicator Removal:File Deletion | It has deleted the exfiltrated data on disk after transmission. It has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk. |
Indicator Removal:File Deletion | Kivars has the ability to uninstall malware from the infected host. |
Indicator Removal:File Deletion | The Komplex trojan supports file deletion. |
Indicator Removal:File Deletion | KONNI can delete files. |
Indicator Removal:File Deletion | It malware has deleted files in various ways, including "suicide scripts" to delete malware binaries from the victim. It also uses secure file deletion to delete files from the victim. |
Indicator Removal:File Deletion | LightNeuron has a function to delete files. |
Indicator Removal:File Deletion | Linfo creates a backdoor through which remote attackers can delete files. |
Indicator Removal:File Deletion | LiteDuke can securely delete files by first writing random data to the file. |
Indicator Removal:File Deletion | LockerGoga has been observed deleting its original launcher after execution. |
Indicator Removal:File Deletion | Lokibot will delete its dropped files after bypassing UAC. |
Indicator Removal:File Deletion | LookBack removes itself after execution and can delete files on the system. |
Indicator Removal:File Deletion | LoudMiner deleted installation files after completion. |
Indicator Removal:File Deletion | Once a file is uploaded, It will delete it from the machine. |
Indicator Removal:File Deletion | MacMa can delete itself from the compromised computer. |
Indicator Removal:File Deletion | MacSpy deletes any temporary files it creates |
Indicator Removal:File Deletion | It has deleted and overwrote files to cover tracks. |
Indicator Removal:File Deletion | A It macro deletes files after it has decoded and decompressed them. |
Indicator Removal:File Deletion | Once loaded into memory, MESSAGETAP deletes the keyword_parm.txt and parm.txt configuration files from disk. |
Indicator Removal:File Deletion | It has quickly deleted cbd.exe from a compromised host following the successful deployment of their malware. |
Indicator Removal:File Deletion | metaMain has deleted collected items after uploading the content to its C2 server. |
Indicator Removal:File Deletion | Metamorfo has deleted itself from the system after execution. |
Indicator Removal:File Deletion | Meteor will delete the folder containing malicious scripts if it detects the hostname as PIS-APP, PIS-MOB, WSUSPROXY, or PIS-DB. |
Indicator Removal:File Deletion | Milan can delete files via C:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 1 -w 3000 > Nul & rmdir /s /q. |
Indicator Removal:File Deletion | Misdat is capable of deleting the backdoor file. |
Indicator Removal:File Deletion | MoonWind can delete itself or specified files. |
Indicator Removal:File Deletion | More_eggs can remove itself from a system. |
Indicator Removal:File Deletion | Mori can delete its DLL file and related files by Registry value. |
Indicator Removal:File Deletion | Mosquito deletes files using DeleteFileW API call. |
Indicator Removal:File Deletion | MURKYTOP has the capability to delete local files. |
Indicator Removal:File Deletion | It will delete their tools and files, and kill processes after their objectives are reached. |
Indicator Removal:File Deletion | NanHaiShu launches a script to delete their original decoy file to cover tracks. |
Indicator Removal:File Deletion | Nebulae has the ability to delete files and directories. |
Indicator Removal:File Deletion | njRAT is capable of deleting files. |
Indicator Removal:File Deletion | NOKKI can delete files to cover tracks. |
Indicator Removal:File Deletion | OceanSalt can delete files from the system. |
Indicator Removal:File Deletion | It has deleted files associated with their payload after execution. |
Indicator Removal:File Deletion | Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers. |
Indicator Removal:File Deletion | OopsIE has the capability to delete files and scripts from the victim's machine. |
Indicator Removal:File Deletion | During Operation Dream Job, It removed all previously delivered files from a compromised computer. |
Indicator Removal:File Deletion | During Operation Honeybee, the threat actors used batch files that reduced their fingerprint on a compromised system by deleting malware-related files. |
Indicator Removal:File Deletion | During Operation Wocao, the threat actors consistently removed traces of their activity by first overwriting a file using /c cd /d c:\windows\temp\ & copy \\<IP ADDRESS>\c$\windows\system32\devmgr.dll \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1 /y and then deleting the overwritten file using /c cd /d c:\windows\temp\ & del \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1. |
Indicator Removal:File Deletion | OSX_OCEANLOTUS.D has a command to delete a file from the system. OSX_OCEANLOTUS.D deletes the app bundle and dropper after execution. |
Indicator Removal:File Deletion | OutSteel can delete itself following the successful execution of a follow-on payload. |
Indicator Removal:File Deletion | P.A.S. Webshell can delete scripts from a subdirectory of /tmp after they are run. |
Indicator Removal:File Deletion | Pasam creates a backdoor through which remote attackers can delete files. |
Indicator Removal:File Deletion | It removed certain files and replaced them so they could not be retrieved. |
Indicator Removal:File Deletion | Pay2Key can remove its log file from disk. |
Indicator Removal:File Deletion | PcShare has deleted its files and components from a compromised host. |
Indicator Removal:File Deletion | Penquin can delete downloaded executables after running them. |
Indicator Removal:File Deletion | Pillowmint has deleted the filepath %APPDATA%\Intel\devmonsrv.exe. |
Indicator Removal:File Deletion | PLEAD has the ability to delete files on the compromised host. |
Indicator Removal:File Deletion | pngdowner deletes content from C2 communications that was saved to the user's temporary directory. |
Indicator Removal:File Deletion | PoetRAT has the ability to overwrite scripts and delete itself if a sandbox environment is detected. |
Indicator Removal:File Deletion | Pony has used scripts to delete itself after execution. |
Indicator Removal:File Deletion | PowerDuke has a command to write random data across a file and delete it. |
Indicator Removal:File Deletion | PowerShower has the ability to remove all files created during the dropper process. |
Indicator Removal:File Deletion | POWERSTATS can delete all files on the C:\, D:\, E:\ and, F:\ drives using PowerShell Remove-Item commands. |
Indicator Removal:File Deletion | After encrypting its own log files, the log encryption module in Prikormka deletes the original, unencrypted files from the host. |
Indicator Removal:File Deletion | ProLock can remove files containing its payload after they are executed. |
Indicator Removal:File Deletion | Proton removes all files in the /tmp directory. |
Indicator Removal:File Deletion | Proxysvc can delete files indicated by the attacker and remove itself from disk using a batch file. |
Indicator Removal:File Deletion | Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes. |
Indicator Removal:File Deletion | PUNCHBUGGY can delete files written to disk. |
Indicator Removal:File Deletion | PyDCrypt will remove all created artifacts such as dropped executables. |
Indicator Removal:File Deletion | Pysa has deleted batch files after execution. |
Indicator Removal:File Deletion | QakBot can delete folders and files including overwriting its executable with legitimate programs. |
Indicator Removal:File Deletion | QUADAGENT has a command to delete its Registry key and scheduled task. |
Indicator Removal:File Deletion | RainyDay has the ability to uninstall itself by deleting its service and files. |
Indicator Removal:File Deletion | RCSession can remove files from a targeted system. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.