prompt
stringclasses
508 values
procedure
stringlengths
20
478
Indicator Removal:File Deletion
RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system.
Indicator Removal:File Deletion
RDFSNIFFER has the capability of deleting local files.
Indicator Removal:File Deletion
Reaver deletes the original dropped file from the victim.
Indicator Removal:File Deletion
RedLeaves can delete specified files.
Indicator Removal:File Deletion
Remsec is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data.
Indicator Removal:File Deletion
REvil can mark its binary code for deletion after reboot.
Indicator Removal:File Deletion
Rising Sun can delete files and artifacts it creates.
Indicator Removal:File Deletion
It has deleted files on infected machines.
Indicator Removal:File Deletion
ROKRAT can request to delete files.
Indicator Removal:File Deletion
It can delete all files created during its execution.
Indicator Removal:File Deletion
RunningRAT contains code to delete files from the victim’s machine.
Indicator Removal:File Deletion
S-Type has deleted files it has created on a compromised host.
Indicator Removal:File Deletion
Saint Bot can run a batch script named del.bat to remove any Saint Bot payload-linked files from a compromise system if anti-analysis or locale checks fail.
Indicator Removal:File Deletion
Some Sakula samples use cmd.exe to delete temporary files.
Indicator Removal:File Deletion
SamSam has been seen deleting its own files and payloads to make analysis of the attack more difficult.
Indicator Removal:File Deletion
It has used backdoors that can delete files used in an attack from an infected system.
Indicator Removal:File Deletion
SDBbot has the ability to delete files from a compromised host.
Indicator Removal:File Deletion
SDelete deletes data in a way that makes it unrecoverable.
Indicator Removal:File Deletion
SeaDuke can securely delete files, including deleting itself from the victim.
Indicator Removal:File Deletion
Seasalt has a command to delete a specified file.
Indicator Removal:File Deletion
ServHelper has a module to delete itself from the infected machine.
Indicator Removal:File Deletion
Shark can delete files downloaded to the compromised host.
Indicator Removal:File Deletion
ShimRat can uninstall itself from compromised hosts, as well create and modify directories, delete, move, copy, and rename files.
Indicator Removal:File Deletion
Sibot will delete itself if a certain server response is received.
Indicator Removal:File Deletion
It has deleted artifacts, including scheduled tasks, communicates files from the C2 and other logs.
Indicator Removal:File Deletion
SILENTTRINITY can remove files from the compromised host.
Indicator Removal:File Deletion
SLOTHFULMEDIA has deleted itself and the 'index.dat' file on a compromised machine to remove recent Internet history from the system.
Indicator Removal:File Deletion
During the SolarWinds Compromise, It routinely removed their tools, including custom backdoors, once remote access was achieved.
Indicator Removal:File Deletion
SombRAT has the ability to run cancel or closeanddeletestorage to remove all files from storage and delete the storage temp file on a compromised host.
Indicator Removal:File Deletion
SpeakUp deletes files to remove evidence on the machine.
Indicator Removal:File Deletion
SQLRat has used been observed deleting scripts once used.
Indicator Removal:File Deletion
StoneDrill has been observed deleting the temporary files once they fulfill their task.
Indicator Removal:File Deletion
StrifeWater can self delete to cover its tracks.
Indicator Removal:File Deletion
StrongPity can delete previously exfiltrated files from the compromised host.
Indicator Removal:File Deletion
Stuxnet uses an RPC server that contains a routine for file deletion and also removes itself from the system through a DLL export by deleting specific files.
Indicator Removal:File Deletion
SUNBURST had a command to delete files.
Indicator Removal:File Deletion
Following the successful injection of SUNBURST, SUNSPOT deleted a temporary file it created named InventoryManager.bk after restoring the original SolarWinds Orion source code to the software library.
Indicator Removal:File Deletion
SysUpdate can delete its configuration file from the targeted system.
Indicator Removal:File Deletion
Taidoor can use DeleteFileA to remove files from infected hosts.
Indicator Removal:File Deletion
TAINTEDSCRIBE can delete files from a compromised host.
Indicator Removal:File Deletion
TDTESS creates then deletes log files during installation of itself as a service.
Indicator Removal:File Deletion
It has used a payload that removes itself after running. It also has deleted locally staged files for collecting credentials or scan results for local IP addresses after exfiltrating them.
Indicator Removal:File Deletion
It routinely deleted tools, logs, and other files after they were finished with them.
Indicator Removal:File Deletion
It has the ability to delete its malware entirely from the target system.
Indicator Removal:File Deletion
It has deleted existing logs and exfiltrated file archives from a victim.
Indicator Removal:File Deletion
Trojan.Karagany has used plugins with a self-delete capability.
Indicator Removal:File Deletion
It has deleted dropper files on an infected system using command scripts.
Indicator Removal:File Deletion
TYPEFRAME can delete files off the system.
Indicator Removal:File Deletion
Uroburos can run a Clear Agents Track command on an infected machine to delete Uroburos-related logs.
Indicator Removal:File Deletion
Ursnif has deleted data staged in tmp files after exfiltration.
Indicator Removal:File Deletion
USBStealer has several commands to delete files associated with the malware from the victim.
Indicator Removal:File Deletion
VBShower has attempted to complicate forensic analysis by deleting all the files contained in %APPDATA%..\Local\Temporary Internet Files\Content.Word and %APPDATA%..\Local Settings\Temporary Internet Files\Content.Word\.
Indicator Removal:File Deletion
VERMIN can delete files on the victim’s machine.
Indicator Removal:File Deletion
Volgmer can delete files and itself after infection to avoid analysis.
Indicator Removal:File Deletion
It has run rd /S to delete their working directories and files.
Indicator Removal:File Deletion
WhisperGate can delete tools from a compromised host after execution.
Indicator Removal:File Deletion
WINDSHIELD is capable of file deletion along with other file system interaction.
Indicator Removal:File Deletion
WindTail has the ability to receive and execute a self-delete command.
Indicator Removal:File Deletion
Wingbird deletes its payload along with the payload's parent process after it finishes copying files.
Indicator Removal:File Deletion
Winnti for Windows can delete the DLLs for its various components from a compromised host.
Indicator Removal:File Deletion
It has used file deletion to remove some modules and configurations from an infected host after use.
Indicator Removal:File Deletion
Woody RAT has the ability to delete itself from disk by creating a suspended notepad process and writing shellcode to delete a file into the suspended process using NtWriteVirtualMemory.
Indicator Removal:File Deletion
XAgentOSX contains the deletFileFromPath function to delete a specified file using the NSFileManager:removeFileAtPath method.
Indicator Removal:File Deletion
Zebrocy has a command to delete files and directories.
Indicator Removal:File Deletion
Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track.
Indicator Removal:File Deletion
zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots.
Indicator Removal:File Deletion
ZxShell can delete files from the system.
Indicator Removal:Network Share Connection Removal
InvisiMole can disconnect previously connected remote drives.
Indicator Removal:Network Share Connection Removal
The net use \system\share /delete command can be used in Net to remove an established connection to a network share.
Indicator Removal:Network Share Connection Removal
RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y.
Indicator Removal:Network Share Connection Removal
It has detached network shares after exfiltrating files, likely to evade detection.
Indicator Removal:Timestomp
3PARA RAT has a command to set certain attributes such as creation/modification timestamps on files.
Indicator Removal:Timestomp
It has performed timestomping on victim files.
Indicator Removal:Timestomp
It has used timestomping to alter the Standard Information timestamps on their web shells to match other files in the same directory.
Indicator Removal:Timestomp
It has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, It has used a random value to modify the timestamp of the file storing the clientID.
Indicator Removal:Timestomp
It has modified data timestamps to mimic files that are in the same folder on a compromised host.
Indicator Removal:Timestomp
Attor has manipulated the time of last access to files and registry keys after they have been created or modified.
Indicator Removal:Timestomp
Bankshot modifies the time of a file as specified by the control server.
Indicator Removal:Timestomp
BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool.
Indicator Removal:Timestomp
BLINDINGCAN has modified file and directory timestamps.
Indicator Removal:Timestomp
It has used a Windows version of the Linux touch command to modify the date and time stamp on DLLs.
Indicator Removal:Timestomp
China Chopper's server component can change the timestamp of files.
Indicator Removal:Timestomp
Cobalt Strike can timestomp any files or payloads placed on a target machine to help them blend in.
Indicator Removal:Timestomp
Cyclops Blink has the ability to use the Linux API function utime to change the timestamps of modified firmware update images.
Indicator Removal:Timestomp
The Derusbi malware supports timestomping.
Indicator Removal:Timestomp
Elise performs timestomping of a CAB file it creates.
Indicator Removal:Timestomp
Empire can timestomp any files or payloads placed on a target machine to help them blend in.
Indicator Removal:Timestomp
EVILNUM has changed the creation date of files.
Indicator Removal:Timestomp
FALLCHILL can modify file or directory timestamps.
Indicator Removal:Timestomp
For early Gazer versions, the compilation timestamp was faked.
Indicator Removal:Timestomp
Gelsemium has the ability to perform timestomping of files on targeted systems.
Indicator Removal:Timestomp
InvisiMole samples were timestomped by the authors by setting the PE timestamps to all zero values. InvisiMole also has a built-in command to modify file times.
Indicator Removal:Timestomp
KeyBoy time-stomped its DLL in order to evade detection.
Indicator Removal:Timestomp
It has manipulated timestamps for creation or compilation dates to defeat anti-forensics.
Indicator Removal:Timestomp
Kobalos can modify timestamps of replaced files, such as ssh with the added credential stealer or sshd used to deploy Kobalos.
Indicator Removal:Timestomp
Several It malware families use timestomping, including modifying the last write timestamp of a specified Registry key to a random date, as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files.
Indicator Removal:Timestomp
MacMa has the capability to create and modify file timestamps.
Indicator Removal:Timestomp
metaMain can change the CreationTime, LastAccessTime, and LastWriteTime file time attributes when executed with SYSTEM privileges.
Indicator Removal:Timestomp
Many Misdat samples were programmed using Borland Delphi, which will mangle the default PE compile timestamp of a file.
Indicator Removal:Timestomp
NightClub can modify the Creation, Access, and Write timestamps for malicious DLLs to match those of the genuine Windows DLL user32.dll.