prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
File and Directory Discovery | It has used a file stealer that checks the Document, Downloads, Desktop, and Picture folders for documents and images with specific extensions. |
File and Directory Discovery | Conti can discover files on a local system. |
File and Directory Discovery | CookieMiner has looked for files in the user's home directory with "wallet" in their name using find. |
File and Directory Discovery | CORALDECK searches for specified files. |
File and Directory Discovery | CosmicDuke searches attached and mounted drives for file extensions and keywords that match a predefined list. |
File and Directory Discovery | CrackMapExec can discover specified filetypes and log files on a targeted system. |
File and Directory Discovery | CreepyDrive can specify the local file path to upload files from. |
File and Directory Discovery | Crimson contains commands to list files and directories, as well as search for files matching certain extensions from a defined list. |
File and Directory Discovery | CrossRAT can list all files on a system. |
File and Directory Discovery | Cryptoistic can scan a directory to identify files for deletion. |
File and Directory Discovery | Cuba can enumerate files by using a variety of functions. |
File and Directory Discovery | Cyclops Blink can use the Linux API statvfs to enumerate the current working directory. |
File and Directory Discovery | Dacls can scan directories on a compromised host. |
File and Directory Discovery | It collected file listings of all default Windows directories. |
File and Directory Discovery | It has used malware that searched for files with specific patterns. |
File and Directory Discovery | DarkWatchman has the ability to enumerate file and folder names. |
File and Directory Discovery | DDKONG lists files on the victim’s machine. |
File and Directory Discovery | DEATHRANSOM can use loop operations to enumerate directories on a compromised host. |
File and Directory Discovery | Denis has several commands to search directories for files. |
File and Directory Discovery | Derusbi is capable of obtaining directory, file, and drive listings. |
File and Directory Discovery | Diavol has a command to traverse the files and directories in a given path. |
File and Directory Discovery | Doki has resolved the path of a process PID to use as a script argument. |
File and Directory Discovery | down_new has the ability to list the directories on a compromised host. |
File and Directory Discovery | It has used a batch script to gather folder and file names from victim hosts. |
File and Directory Discovery | DropBook can collect the names of all files and folders in the Program Files directories. |
File and Directory Discovery | Dtrack can list files on available disk volumes. |
File and Directory Discovery | DustySky scans the victim for files that contain certain keywords and document types including PDF, DOC, DOCX, XLS, and XLSX, from a list that is obtained from the C2 as a text file. It can also identify logical drives for the infected machine. |
File and Directory Discovery | Ebury can list directory entries. |
File and Directory Discovery | A variant of Elise executes dir C:\progra~1 when initially run. |
File and Directory Discovery | ELMER is capable of performing directory listings. |
File and Directory Discovery | Empire includes various modules for finding files of interest on hosts and network shares. |
File and Directory Discovery | Epic recursively searches for all .doc files on the system and collects a directory listing of the Desktop, %TEMP%, and %WINDOWS%\Temp directories. |
File and Directory Discovery | FALLCHILL can search files on a victim. |
File and Directory Discovery | FatDuke can enumerate directories on target machines. |
File and Directory Discovery | It has used the Windows dir command to enumerate files and directories in a victim's network. |
File and Directory Discovery | FinFisher enumerates directories and scans for certain files. |
File and Directory Discovery | FIVEHANDS has the ability to enumerate files on a compromised host in order to encrypt files with specific extensions. |
File and Directory Discovery | FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system and removable media. |
File and Directory Discovery | FoggyWeb's loader can check for the FoggyWeb backdoor .pri file on a compromised AD FS server. |
File and Directory Discovery | Forfiles can be used to locate certain types of files/directories in a system.(ex: locate all files with a specific extension, name, and/or age) |
File and Directory Discovery | It has used WizTree to obtain network files and directory listings. |
File and Directory Discovery | FruitFly looks for specific files and file types. |
File and Directory Discovery | FunnyDream can identify files with .doc, .docx, .ppt, .pptx, .xls, .xlsx, and .pdf extensions and specific timestamps for collection. |
File and Directory Discovery | FYAnti can search the C:\Windows\Microsoft.NET\ directory for files of a specified size. |
File and Directory Discovery | Fysbis has the ability to search for files. |
File and Directory Discovery | It macros can scan for Microsoft Word and Excel files to inject with additional malicious macros. It has also used its backdoors to automatically list interesting files (such as Office documents) found on a system. |
File and Directory Discovery | Gelsemium can retrieve data from specific Windows directories, as well as open random files as part of Virtualization/Sandbox Evasion. |
File and Directory Discovery | GeminiDuke collects information from the victim, including installed drivers, programs previously executed by users, programs and services configured to automatically run at startup, files and folders present in any user's home folder, files and folders present in any user's My Documents, programs installed to the Program Files folder, and recently accessed files, folders, and programs. |
File and Directory Discovery | Gold Dragon lists the directories for Desktop, program files, and the user’s recently accessed files. |
File and Directory Discovery | GoldenSpy has included a program "ExeProtector", which monitors for the existence of GoldenSpy on the infected system and redownloads if necessary. |
File and Directory Discovery | GravityRAT collects the volumes mapped on the system, and also steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf. |
File and Directory Discovery | GrimAgent has the ability to enumerate files and directories on a compromised host. |
File and Directory Discovery | It has searched file contents on a compromised host. |
File and Directory Discovery | HermeticWiper can enumerate common folders such as My Documents, Desktop, and AppData. |
File and Directory Discovery | Heyoka Backdoor has the ability to search the compromised host for files. |
File and Directory Discovery | HOPLIGHT has been observed enumerating system drives and partitions. |
File and Directory Discovery | HotCroissant has the ability to retrieve a list of files in a given directory as well as drives and drive types. |
File and Directory Discovery | HTTPBrowser is capable of listing files, folders, and drives on a victim. |
File and Directory Discovery | Hydraq creates a backdoor through which remote attackers can check for the existence of files, including its own components, as well as retrieve a list of logical drives. |
File and Directory Discovery | The IceApple Directory Lister module can list information about files and directories including creation time, last write time, name, and size. |
File and Directory Discovery | Imminent Monitor has a dynamic debugging feature to check whether it is located in the %TEMP% directory, otherwise it copies itself there. |
File and Directory Discovery | It used a file listing plugin to collect information about file and directories both on local and remote drives. |
File and Directory Discovery | Industroyer’s data wiper component enumerates specific files on all the Windows drives. |
File and Directory Discovery | InnaputRAT enumerates directories and obtains file attributes on a system. |
File and Directory Discovery | InvisiMole can list information about files in a directory and recently opened or used documents. InvisiMole can also search for specific files by supplied file mask. |
File and Directory Discovery | Ixeshe can list file and directory information. |
File and Directory Discovery | JPIN can enumerate drives and their types. It can also change file permissions using cacls.exe. |
File and Directory Discovery | jRAT can browse file systems. |
File and Directory Discovery | Kasidet has the ability to search for a given filename on a victim. |
File and Directory Discovery | Kazuar finds a specified directory, lists the files and metadata about those files. |
File and Directory Discovery | It uses command-line interaction to search files and directories. |
File and Directory Discovery | KeyBoy has a command to launch a file browser or explorer on the system. |
File and Directory Discovery | KEYMARBLE has a command to search for files on the victim’s machine. |
File and Directory Discovery | KGH_SPY can enumerate files and directories on a compromised host. |
File and Directory Discovery | KillDisk has used the FindNextFile command as part of its file deletion process. |
File and Directory Discovery | It has the ability to enumerate all files and directories on an infected system. |
File and Directory Discovery | Kinsing has used the find command to search for specific files. |
File and Directory Discovery | Kivars has the ability to list drives on the infected host. |
File and Directory Discovery | Koadic can obtain a list of directories. |
File and Directory Discovery | A version of KONNI searches for filenames created with a previous version of the malware, suggesting different versions targeted the same victims and the versions may work together. |
File and Directory Discovery | Kwampirs collects a list of files and directories in C:\ with the command dir /s /a c:\ >> "C:\windows\TEMP[RANDOM].tmp". |
File and Directory Discovery | It malware can use a common function to identify target files by their extension, and some also enumerate files and directories, including a Destover-like variant that lists files and gathers information for all drives. |
File and Directory Discovery | It used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files. |
File and Directory Discovery | Linfo creates a backdoor through which remote attackers can list contents of drives and search for files. |
File and Directory Discovery | Lokibot can search for specific files on an infected host. |
File and Directory Discovery | LookBack can retrieve file listings from the victim machine. |
File and Directory Discovery | It has used malware that scans for files in the Documents, Desktop, and Download folders and in other drives. |
File and Directory Discovery | It produces file listings in order to search for files to be exfiltrated. |
File and Directory Discovery | MacMa can search for a specific file on the compromised computer and can enumerate files in Desktop, Downloads, and Documents folders. |
File and Directory Discovery | Mafalda can search for files and directories. |
File and Directory Discovery | It malware can list a victim's logical drives and the type, as well the total/free space of the fixed devices. Other malware can list a directory's contents. |
File and Directory Discovery | MarkiRAT can look for files carrying specific extensions such as: .rtf, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pps, .ppsx, .txt, .gpg, .pkr, .kdbx, .key, and .jpb. |
File and Directory Discovery | MegaCortex can parse the available drives and directories to determine which files to encrypt. |
File and Directory Discovery | It has searched compromised systems for folders of interest including those related to HR, audit and expense, and meeting memos. |
File and Directory Discovery | MESSAGETAP checks for the existence of two configuration files (keyword_parm.txt and parm.txt) and attempts to read the files every 30 seconds. |
File and Directory Discovery | metaMain can recursively enumerate files in an operator-provided directory. |
File and Directory Discovery | Metamorfo has searched the Program Files directories for specific folders and has searched for strings related to its mutexes. |
File and Directory Discovery | Micropsia can perform a recursive directory listing for all volume drives available on the victim's machine and can also fetch specific files by their paths. |
File and Directory Discovery | MiniDuke can enumerate local drives. |
File and Directory Discovery | Misdat is capable of running commands to obtain a list of files and directories, as well as enumerating logical drives. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.