prompt
stringclasses
508 values
procedure
stringlengths
20
478
Unsecured Credentials:Credentials In Files
If an initial connectivity check fails, pngdowner attempts to extract proxy details and credentials from Windows Protected Storage and from the IE Credentials Store. This allows the adversary to use the proxy credentials for subsequent requests if they enable outbound HTTP access.
Unsecured Credentials:Credentials In Files
PoshC2 contains modules for searching for passwords in local and remote files.
Unsecured Credentials:Credentials In Files
Pupy can use Lazagne for harvesting credentials.
Unsecured Credentials:Credentials In Files
Pysa has extracted credentials from the password database before encrypting the files.
Unsecured Credentials:Credentials In Files
QuasarRAT can obtain passwords from FTP clients.
Unsecured Credentials:Credentials In Files
Smoke Loader searches for files named logins.json to parse for credentials.
Unsecured Credentials:Credentials In Files
It has used malware to gather credentials from FTP clients and Outlook.
Unsecured Credentials:Credentials In Files
It has searched for unsecured AWS credentials and Docker API credentials.
Unsecured Credentials:Credentials In Files
TrickBot can obtain passwords stored in files from several applications such as Outlook, Filezilla, OpenSSH, OpenVPN and WinSCP. Additionally, it searches for the ".vnc.lnk" affix to steal VNC credentials.
Unsecured Credentials:Credentials In Files
XTunnel is capable of accessing locally stored passwords on victims.
Unsecured Credentials:Credentials in Registry
Agent Tesla has the ability to extract credentials from the Registry.
Unsecured Credentials:Credentials in Registry
It used Outlook Credential Dumper to harvest credentials stored in Windows registry.
Unsecured Credentials:Credentials in Registry
IceApple can harvest credentials from local and remote host registries.
Unsecured Credentials:Credentials in Registry
PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile, Get-Webconfig, Get-ApplicationHost, Get-SiteListPassword, Get-CachedGPPPassword, and Get-RegistryAutoLogon.
Unsecured Credentials:Credentials in Registry
Reg may be used to find credentials in the Windows Registry.
Unsecured Credentials:Credentials in Registry
TrickBot has retrieved PuTTY credentials by querying the Software\SimonTatham\Putty\Sessions registry key
Unsecured Credentials:Credentials in Registry
Valak can use the clientgrabber module to steal e-mail credentials from the Registry.
Unsecured Credentials:Bash History
Kinsing has searched bash_history for credentials.
Unsecured Credentials:Private Keys
AADInternals can gather encryption keys from Azure AD services such as ADSync and Active Directory Federated Services servers.
Unsecured Credentials:Private Keys
Ebury has intercepted unencrypted private keys as well as private key pass-phrases.
Unsecured Credentials:Private Keys
Empire can use modules like Invoke-SessionGopher to extract private key and session information.
Unsecured Credentials:Private Keys
FoggyWeb can retrieve token signing certificates and token decryption certificates from a compromised AD FS server.
Unsecured Credentials:Private Keys
Hildegard has searched for private keys in .ssh.
Unsecured Credentials:Private Keys
jRAT can steal keys for VPNs and cryptocurrency wallets.
Unsecured Credentials:Private Keys
Kinsing has searched for private keys.
Unsecured Credentials:Private Keys
It has scanned and looked for cryptographic keys and certificate file extensions.
Unsecured Credentials:Private Keys
Mafalda can collect a Chrome encryption key used to protect browser cookies.
Unsecured Credentials:Private Keys
Mimikatz's CRYPTO::Extract module can extract keys by interacting with Windows cryptographic application programming interface (API) functions.
Unsecured Credentials:Private Keys
During Operation Wocao, threat actors used Mimikatz to dump certificates and private keys from the Windows certificate store.
Unsecured Credentials:Private Keys
It has used SSH private keys on the infected machine to spread its coinminer throughout a network.
Unsecured Credentials:Private Keys
During the SolarWinds Compromise, It obtained PKI keys, certificate files, and the private encryption key from an Active Directory Federation Services (AD FS) container to decrypt corresponding SAML signing certificates.
Unsecured Credentials:Private Keys
It has searched for unsecured SSH keys.
Unsecured Credentials:Cloud Instance Metadata API
Hildegard has queried the Cloud Instance Metadata API for cloud credentials.
Unsecured Credentials:Cloud Instance Metadata API
Peirates can query the query AWS and GCP metadata APIs for secrets.
Unsecured Credentials:Cloud Instance Metadata API
It has queried the AWS instance metadata service for credentials.
Unsecured Credentials:Group Policy Preferences
It has used a variety of publicly available tools like Gpppassword to gather credentials.
Unsecured Credentials:Group Policy Preferences
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences.
Unsecured Credentials:Group Policy Preferences
SILENTTRINITY has a module that can extract cached GPP passwords.
Unsecured Credentials:Group Policy Preferences
It has used PowerShell cmdlets Get-GPPPassword and Find-GPOPassword to find unsecured credentials in a compromised network group policy.
Unsecured Credentials:Container API
Peirates can query the Kubernetes API for secrets.
Unsecured Credentials:Chat Messages
It has targeted various collaboration tools like Slack, Teams, JIRA, Confluence, and others to hunt for exposed credentials to support privilege escalation and lateral movement.
Account Discovery
It has enumerated all users and their roles from a victim's main treasury system.
Account Discovery
ShimRatReporter listed all non-privileged and privileged accounts available on the machine.
Account Discovery
During the SolarWinds Compromise, It obtained a list of users and their roles from an Exchange server using Get-ManagementRoleAssignment.
Account Discovery
Woody RAT can identify administrator accounts on an infected machine.
Account Discovery
XCSSET attempts to discover accounts from various locations such as a user's Evernote, AppleID, Telegram, Skype, and WeChat data.
Account Discovery:Local Account
It actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download
Account Discovery:Local Account
Agent Tesla can collect account information from the victim’s machine.
Account Discovery:Local Account
It used the commands net localgroup,net user, and net group to find accounts on the system.
Account Discovery:Local Account
It has used a tool that can obtain info about local and global group users, power users, and administrators.
Account Discovery:Local Account
It enumerated administrative users using the commands net localgroup administrators.
Account Discovery:Local Account
Bankshot gathers domain and account names/information through process monitoring.
Account Discovery:Local Account
Bazar can identify administrator accounts on an infected host.
Account Discovery:Local Account
BitPaymer can enumerate the sessions for each user logged onto the infected host.
Account Discovery:Local Account
BloodHound can identify users with local administrator rights.
Account Discovery:Local Account
It has used net user for account discovery.
Account Discovery:Local Account
Comnie uses the net user command.
Account Discovery:Local Account
The discovery modules used with Duqu can collect information on accounts and permissions.
Account Discovery:Local Account
Elise executes net user after initial communication is made to the remote server.
Account Discovery:Local Account
Empire can acquire local and domain user account information.
Account Discovery:Local Account
Epic gathers a list of all user accounts, privilege classes, and time of last logon.
Account Discovery:Local Account
It has accessed ntuser.dat and UserClass.dat on compromised hosts.
Account Discovery:Local Account
GeminiDuke collects information on local user accounts from the victim.
Account Discovery:Local Account
HyperStack can enumerate all account names on a remote share.
Account Discovery:Local Account
InvisiMole has a command to list account information on the victim’s machine.
Account Discovery:Local Account
Kazuar gathers information on local groups and members on the victim’s machine.
Account Discovery:Local Account
It performs account discovery using commands such as net localgroup administrators and net group "REDACTED" /domain on specific permissions groups.
Account Discovery:Local Account
Kwampirs collects a list of accounts with the command net users.
Account Discovery:Local Account
Milan has run C:\Windows\system32\cmd.exe /c cmd /c dir c:\users\ /s 2>&1 to discover local accounts.
Account Discovery:Local Account
Mis-Type may create a file containing the results of the command cmd.exe /c net user {Username}.
Account Discovery:Local Account
It has collected the administrator username from a compromised host.
Account Discovery:Local Account
MURKYTOP has the capability to retrieve information about users on remote hosts.
Account Discovery:Local Account
Commands under net user can be used in Net to gather information about and manipulate user accounts.
Account Discovery:Local Account
It has run net user, net user /domain, net group "domain admins" /domain, and net group "Exchange Trusted Subsystem" /domain to get account listings on a victim.
Account Discovery:Local Account
During Operation CuckooBees, the threat actors used the net user command to gather account information.
Account Discovery:Local Account
OSInfo enumerates local and domain users
Account Discovery:Local Account
P.A.S. Webshell can display the /etc/passwd file on a compromised host.
Account Discovery:Local Account
Pony has used the NetUserEnum function to enumerate local accounts.
Account Discovery:Local Account
It searches for administrator accounts on both the local victim machine and the network.
Account Discovery:Local Account
PoshC2 can enumerate local and domain user account information.
Account Discovery:Local Account
PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token.
Account Discovery:Local Account
POWERSTATS can retrieve usernames from compromised hosts.
Account Discovery:Local Account
PUNCHBUGGY can gather user names.
Account Discovery:Local Account
Pupy uses PowerView and Pywerview to perform discovery commands such as net user, net group, net local group, etc.
Account Discovery:Local Account
RATANKBA uses the net user command.
Account Discovery:Local Account
Remsec can obtain a list of users.
Account Discovery:Local Account
S-Type has run the command net user on a victim.
Account Discovery:Local Account
SHOTPUT has a command to retrieve information about connected users.
Account Discovery:Local Account
SMOKEDHAM has used net.exe user and net.exe users to enumerate local accounts on a compromised host.
Account Discovery:Local Account
SoreFang can collect usernames from the local system via net.exe user.
Account Discovery:Local Account
Stuxnet enumerates user accounts of the local host.
Account Discovery:Local Account
It has used net user to conduct internal discovery of systems.
Account Discovery:Local Account
TrickBot collects the users of the system.
Account Discovery:Local Account
It has used net user to enumerate local accounts on the system.
Account Discovery:Local Account
USBferry can use net user to gather information about local accounts.
Account Discovery:Local Account
Valak has the ability to enumerate local admin accounts.
Account Discovery:Domain Account
AdFind can enumerate domain users.
Account Discovery:Domain Account
Bankshot gathers domain and account names/information through process monitoring.
Account Discovery:Domain Account
Bazar has the ability to identify domain administrator accounts.
Account Discovery:Domain Account
BlackCat can utilize net use commands to identify domain users.