prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Indicator Removal:File Deletion | RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system. |
Indicator Removal:File Deletion | RDFSNIFFER has the capability of deleting local files. |
Indicator Removal:File Deletion | Reaver deletes the original dropped file from the victim. |
Indicator Removal:File Deletion | RedLeaves can delete specified files. |
Indicator Removal:File Deletion | Remsec is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data. |
Indicator Removal:File Deletion | REvil can mark its binary code for deletion after reboot. |
Indicator Removal:File Deletion | Rising Sun can delete files and artifacts it creates. |
Indicator Removal:File Deletion | It has deleted files on infected machines. |
Indicator Removal:File Deletion | ROKRAT can request to delete files. |
Indicator Removal:File Deletion | It can delete all files created during its execution. |
Indicator Removal:File Deletion | RunningRAT contains code to delete files from the victim’s machine. |
Indicator Removal:File Deletion | S-Type has deleted files it has created on a compromised host. |
Indicator Removal:File Deletion | Saint Bot can run a batch script named del.bat to remove any Saint Bot payload-linked files from a compromise system if anti-analysis or locale checks fail. |
Indicator Removal:File Deletion | Some Sakula samples use cmd.exe to delete temporary files. |
Indicator Removal:File Deletion | SamSam has been seen deleting its own files and payloads to make analysis of the attack more difficult. |
Indicator Removal:File Deletion | It has used backdoors that can delete files used in an attack from an infected system. |
Indicator Removal:File Deletion | SDBbot has the ability to delete files from a compromised host. |
Indicator Removal:File Deletion | SDelete deletes data in a way that makes it unrecoverable. |
Indicator Removal:File Deletion | SeaDuke can securely delete files, including deleting itself from the victim. |
Indicator Removal:File Deletion | Seasalt has a command to delete a specified file. |
Indicator Removal:File Deletion | ServHelper has a module to delete itself from the infected machine. |
Indicator Removal:File Deletion | Shark can delete files downloaded to the compromised host. |
Indicator Removal:File Deletion | ShimRat can uninstall itself from compromised hosts, as well create and modify directories, delete, move, copy, and rename files. |
Indicator Removal:File Deletion | Sibot will delete itself if a certain server response is received. |
Indicator Removal:File Deletion | It has deleted artifacts, including scheduled tasks, communicates files from the C2 and other logs. |
Indicator Removal:File Deletion | SILENTTRINITY can remove files from the compromised host. |
Indicator Removal:File Deletion | SLOTHFULMEDIA has deleted itself and the 'index.dat' file on a compromised machine to remove recent Internet history from the system. |
Indicator Removal:File Deletion | During the SolarWinds Compromise, It routinely removed their tools, including custom backdoors, once remote access was achieved. |
Indicator Removal:File Deletion | SombRAT has the ability to run cancel or closeanddeletestorage to remove all files from storage and delete the storage temp file on a compromised host. |
Indicator Removal:File Deletion | SpeakUp deletes files to remove evidence on the machine. |
Indicator Removal:File Deletion | SQLRat has used been observed deleting scripts once used. |
Indicator Removal:File Deletion | StoneDrill has been observed deleting the temporary files once they fulfill their task. |
Indicator Removal:File Deletion | StrifeWater can self delete to cover its tracks. |
Indicator Removal:File Deletion | StrongPity can delete previously exfiltrated files from the compromised host. |
Indicator Removal:File Deletion | Stuxnet uses an RPC server that contains a routine for file deletion and also removes itself from the system through a DLL export by deleting specific files. |
Indicator Removal:File Deletion | SUNBURST had a command to delete files. |
Indicator Removal:File Deletion | Following the successful injection of SUNBURST, SUNSPOT deleted a temporary file it created named InventoryManager.bk after restoring the original SolarWinds Orion source code to the software library. |
Indicator Removal:File Deletion | SysUpdate can delete its configuration file from the targeted system. |
Indicator Removal:File Deletion | Taidoor can use DeleteFileA to remove files from infected hosts. |
Indicator Removal:File Deletion | TAINTEDSCRIBE can delete files from a compromised host. |
Indicator Removal:File Deletion | TDTESS creates then deletes log files during installation of itself as a service. |
Indicator Removal:File Deletion | It has used a payload that removes itself after running. It also has deleted locally staged files for collecting credentials or scan results for local IP addresses after exfiltrating them. |
Indicator Removal:File Deletion | It routinely deleted tools, logs, and other files after they were finished with them. |
Indicator Removal:File Deletion | It has the ability to delete its malware entirely from the target system. |
Indicator Removal:File Deletion | It has deleted existing logs and exfiltrated file archives from a victim. |
Indicator Removal:File Deletion | Trojan.Karagany has used plugins with a self-delete capability. |
Indicator Removal:File Deletion | It has deleted dropper files on an infected system using command scripts. |
Indicator Removal:File Deletion | TYPEFRAME can delete files off the system. |
Indicator Removal:File Deletion | Uroburos can run a Clear Agents Track command on an infected machine to delete Uroburos-related logs. |
Indicator Removal:File Deletion | Ursnif has deleted data staged in tmp files after exfiltration. |
Indicator Removal:File Deletion | USBStealer has several commands to delete files associated with the malware from the victim. |
Indicator Removal:File Deletion | VBShower has attempted to complicate forensic analysis by deleting all the files contained in %APPDATA%..\Local\Temporary Internet Files\Content.Word and %APPDATA%..\Local Settings\Temporary Internet Files\Content.Word\. |
Indicator Removal:File Deletion | VERMIN can delete files on the victim’s machine. |
Indicator Removal:File Deletion | Volgmer can delete files and itself after infection to avoid analysis. |
Indicator Removal:File Deletion | It has run rd /S to delete their working directories and files. |
Indicator Removal:File Deletion | WhisperGate can delete tools from a compromised host after execution. |
Indicator Removal:File Deletion | WINDSHIELD is capable of file deletion along with other file system interaction. |
Indicator Removal:File Deletion | WindTail has the ability to receive and execute a self-delete command. |
Indicator Removal:File Deletion | Wingbird deletes its payload along with the payload's parent process after it finishes copying files. |
Indicator Removal:File Deletion | Winnti for Windows can delete the DLLs for its various components from a compromised host. |
Indicator Removal:File Deletion | It has used file deletion to remove some modules and configurations from an infected host after use. |
Indicator Removal:File Deletion | Woody RAT has the ability to delete itself from disk by creating a suspended notepad process and writing shellcode to delete a file into the suspended process using NtWriteVirtualMemory. |
Indicator Removal:File Deletion | XAgentOSX contains the deletFileFromPath function to delete a specified file using the NSFileManager:removeFileAtPath method. |
Indicator Removal:File Deletion | Zebrocy has a command to delete files and directories. |
Indicator Removal:File Deletion | Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track. |
Indicator Removal:File Deletion | zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots. |
Indicator Removal:File Deletion | ZxShell can delete files from the system. |
Indicator Removal:Network Share Connection Removal | InvisiMole can disconnect previously connected remote drives. |
Indicator Removal:Network Share Connection Removal | The net use \system\share /delete command can be used in Net to remove an established connection to a network share. |
Indicator Removal:Network Share Connection Removal | RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y. |
Indicator Removal:Network Share Connection Removal | It has detached network shares after exfiltrating files, likely to evade detection. |
Indicator Removal:Timestomp | 3PARA RAT has a command to set certain attributes such as creation/modification timestamps on files. |
Indicator Removal:Timestomp | It has performed timestomping on victim files. |
Indicator Removal:Timestomp | It has used timestomping to alter the Standard Information timestamps on their web shells to match other files in the same directory. |
Indicator Removal:Timestomp | It has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, It has used a random value to modify the timestamp of the file storing the clientID. |
Indicator Removal:Timestomp | It has modified data timestamps to mimic files that are in the same folder on a compromised host. |
Indicator Removal:Timestomp | Attor has manipulated the time of last access to files and registry keys after they have been created or modified. |
Indicator Removal:Timestomp | Bankshot modifies the time of a file as specified by the control server. |
Indicator Removal:Timestomp | BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool. |
Indicator Removal:Timestomp | BLINDINGCAN has modified file and directory timestamps. |
Indicator Removal:Timestomp | It has used a Windows version of the Linux touch command to modify the date and time stamp on DLLs. |
Indicator Removal:Timestomp | China Chopper's server component can change the timestamp of files. |
Indicator Removal:Timestomp | Cobalt Strike can timestomp any files or payloads placed on a target machine to help them blend in. |
Indicator Removal:Timestomp | Cyclops Blink has the ability to use the Linux API function utime to change the timestamps of modified firmware update images. |
Indicator Removal:Timestomp | The Derusbi malware supports timestomping. |
Indicator Removal:Timestomp | Elise performs timestomping of a CAB file it creates. |
Indicator Removal:Timestomp | Empire can timestomp any files or payloads placed on a target machine to help them blend in. |
Indicator Removal:Timestomp | EVILNUM has changed the creation date of files. |
Indicator Removal:Timestomp | FALLCHILL can modify file or directory timestamps. |
Indicator Removal:Timestomp | For early Gazer versions, the compilation timestamp was faked. |
Indicator Removal:Timestomp | Gelsemium has the ability to perform timestomping of files on targeted systems. |
Indicator Removal:Timestomp | InvisiMole samples were timestomped by the authors by setting the PE timestamps to all zero values. InvisiMole also has a built-in command to modify file times. |
Indicator Removal:Timestomp | KeyBoy time-stomped its DLL in order to evade detection. |
Indicator Removal:Timestomp | It has manipulated timestamps for creation or compilation dates to defeat anti-forensics. |
Indicator Removal:Timestomp | Kobalos can modify timestamps of replaced files, such as ssh with the added credential stealer or sshd used to deploy Kobalos. |
Indicator Removal:Timestomp | Several It malware families use timestomping, including modifying the last write timestamp of a specified Registry key to a random date, as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files. |
Indicator Removal:Timestomp | MacMa has the capability to create and modify file timestamps. |
Indicator Removal:Timestomp | metaMain can change the CreationTime, LastAccessTime, and LastWriteTime file time attributes when executed with SYSTEM privileges. |
Indicator Removal:Timestomp | Many Misdat samples were programmed using Borland Delphi, which will mangle the default PE compile timestamp of a file. |
Indicator Removal:Timestomp | NightClub can modify the Creation, Access, and Write timestamps for malicious DLLs to match those of the genuine Windows DLL user32.dll. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.