prompt
stringclasses
508 values
procedure
stringlengths
20
478
File and Directory Discovery
MobileOrder has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history.
File and Directory Discovery
MoonWind has a command to return a directory listing for a specified directory.
File and Directory Discovery
It has used malware that checked if the ProgramData folder had folders or files with the keywords "Kasper," "Panda," or "ESET."
File and Directory Discovery
It has searched the entire target system for DOC, DOCX, PPT, PPTX, XLS, XLSX, and PDF files.
File and Directory Discovery
NDiskMonitor can obtain a list of all files and directories as well as logical drives.
File and Directory Discovery
Nebulae can list files and directories on a compromised host.
File and Directory Discovery
NETEAGLE allows adversaries to enumerate and modify the infected host's file system. It supports searching for directories, creating directories, listing directory contents, reading and writing to files, retrieving file attributes, and retrieving volume information.
File and Directory Discovery
NETWIRE has the ability to search for files on the compromised host.
File and Directory Discovery
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and browse the victim file system.
File and Directory Discovery
NightClub can use a file monitor to identify .lnk, .doc, .docx, .xls, .xslx, and .pdf files.
File and Directory Discovery
njRAT can browse file systems using a file manager module.
File and Directory Discovery
NotPetya searches for files ending with dozens of different file extensions prior to encryption.
File and Directory Discovery
ObliqueRAT has the ability to recursively enumerate files on an infected endpoint.
File and Directory Discovery
OceanSalt can extract drive information from the endpoint and search files on the system.
File and Directory Discovery
Octopus can collect information on the Windows directory and searches for compressed RAR files on the host.
File and Directory Discovery
Okrum has used DriveLetterView to enumerate drive information.
File and Directory Discovery
During Operation CuckooBees, the threat actors used dir c:\\ to search for files.
File and Directory Discovery
During Operation Dream Job, It conducted word searches within documents on a compromised host in search of security and financial matters.
File and Directory Discovery
During Operation Honeybee, the threat actors used a malicious DLL to search for files with specific keywords.
File and Directory Discovery
During Operation Wocao, threat actors gathered a recursive directory listing to find files and directories of interest.
File and Directory Discovery
Orz can gather victim drive information.
File and Directory Discovery
OSX/Shlayer has used the command appDir="$(dirname $(dirname "$currentDir"))" and $(dirname "$(pwd -P)") to construct installation paths.
File and Directory Discovery
OutSteel can search for specific file extensions, including zipped files.
File and Directory Discovery
OwaAuth has a command to list its directory and logical drives.
File and Directory Discovery
P.A.S. Webshell has the ability to list files and file characteristics including extension, size, ownership, and permissions.
File and Directory Discovery
Pasam creates a backdoor through which remote attackers can retrieve lists of files.
File and Directory Discovery
A It payload has searched all fixed drives on the victim for files matching a specified list of extensions.
File and Directory Discovery
Penquin can use the command code do_vslist to send file names, size, and status to C2.
File and Directory Discovery
Peppy can identify specific files for exfiltration.
File and Directory Discovery
PinchDuke searches for files created within a certain timeframe and whose file extension matches a predefined list.
File and Directory Discovery
PingPull can enumerate storage volumes and folder contents of a compromised host.
File and Directory Discovery
Pisloader has commands to list drives on the victim machine and to list file information for a given directory.
File and Directory Discovery
PLEAD has the ability to list drives and files on the compromised host.
File and Directory Discovery
PlugX has a module to enumerate drives and find files recursively.
File and Directory Discovery
PoetRAT has the ability to list files upon receiving the ls command from C2.
File and Directory Discovery
POORAIM can conduct file browsing.
File and Directory Discovery
PoshC2 can enumerate files on the local file system and includes a module for enumerating recently accessed files.
File and Directory Discovery
PowerDuke has commands to get the current directory name as well as the size of a file. It also has commands to obtain information about logical drives, drive type, and free space.
File and Directory Discovery
POWRUNER may enumerate user directories on a victim.
File and Directory Discovery
Prestige can traverse the file system to discover files to encrypt by identifying specific extensions defined in a hardcoded list.
File and Directory Discovery
A module in Prikormka collects information about the paths, size, and creation time of files with specific file extensions, but not the actual content of the file.
File and Directory Discovery
Proxysvc lists files in directories.
File and Directory Discovery
Psylo has commands to enumerate all storage devices and to find all files that start with a particular string.
File and Directory Discovery
Pteranodon identifies files matching certain file extension and copies them to subdirectories it created.
File and Directory Discovery
Pupy can walk through directories and recursively search for strings in files.
File and Directory Discovery
QakBot can identify whether it has been run previously on a host by checking for a specified folder.
File and Directory Discovery
QuietSieve can search files on the target host by extension, including doc, docx, xls, rtf, odt, txt, jpg, pdf, rar, zip, and 7z.
File and Directory Discovery
RainyDay can use a file exfiltration tool to collect recently changed files with specific extensions.
File and Directory Discovery
Ramsay can collect directory and file lists.
File and Directory Discovery
RARSTONE obtains installer properties from Uninstall Registry Key entries to obtain information about installed applications and how to uninstall certain applications.
File and Directory Discovery
Rclone can list files and directories with the ls, lsd, and lsl commands.
File and Directory Discovery
RedLeaves can enumerate and search for files and directories.
File and Directory Discovery
Remcos can search for files on the infected machine.
File and Directory Discovery
Remexi searches for files on the system.
File and Directory Discovery
RemoteUtilities can enumerate files and directories on a target machine.
File and Directory Discovery
Remsec is capable of listing contents of folders on the victim. Remsec also searches for custom network encryption software on victims.
File and Directory Discovery
REvil has the ability to identify specific files and directories that are not to be encrypted.
File and Directory Discovery
Rising Sun can enumerate information about files from the infected system, including file size, attributes, creation time, last access time, and write time. Rising Sun can enumerate the compilation timestamp of Windows executable files.
File and Directory Discovery
ROKRAT has the ability to gather a list of files and directories on the infected system.
File and Directory Discovery
Rover automatically searches for files on local drives based on a predefined list of file extensions.
File and Directory Discovery
Royal can identify specific files and directories to exclude from the encryption process.
File and Directory Discovery
It can check for specific files and directories associated with virtualization and malware analysis.
File and Directory Discovery
Ryuk has enumerated files and folders on all mounted drives.
File and Directory Discovery
Saint Bot can search a compromised host for specific files.
File and Directory Discovery
It has enumerated files on a compromised host.
File and Directory Discovery
SDBbot has the ability to get directory listings or drive information on a compromised host.
File and Directory Discovery
Seasalt has the capability to identify the drive type on a victim.
File and Directory Discovery
SharpDisco can identify recently opened files by using an LNK format parser to extract the original file path from LNK files found in either %USERPROFILE%\Recent (Windows XP) or %APPDATA%\Microsoft\Windows\Recent (newer Windows versions) .
File and Directory Discovery
ShimRat can list directories.
File and Directory Discovery
SHOTPUT has a command to obtain a directory listing.
File and Directory Discovery
SideTwist has the ability to search for specific files.
File and Directory Discovery
It has used malware to collect information on files and directories.
File and Directory Discovery
SILENTTRINITY has several modules, such as ls.py, pwd.py, and recentFiles.py, to enumerate directories and files.
File and Directory Discovery
Siloscape searches for the Kubernetes config file and other related files using a regular expression.
File and Directory Discovery
Skidmap has checked for the existence of specific files including /usr/sbin/setenforce and /etc/selinux/config. It also has the ability to monitor the cryptocurrency miner file and process.
File and Directory Discovery
Sliver can enumerate files on a target system.
File and Directory Discovery
SLOTHFULMEDIA can enumerate files and directories.
File and Directory Discovery
Smoke Loader recursively searches through directories for files.
File and Directory Discovery
During the SolarWinds Compromise, It obtained information about the configured Exchange virtual directory using Get-WebServicesVirtualDirectory.
File and Directory Discovery
SombRAT can execute enum to enumerate files in storage on a compromised system.
File and Directory Discovery
SoreFang has the ability to list directories.
File and Directory Discovery
SOUNDBITE is capable of enumerating and manipulating files and directories.
File and Directory Discovery
It identified and extracted all Word documents on a server by using a command containing * .doc and *.docx. The actors also searched for documents based on a specific date range and attempted to identify all installed software on a victim.
File and Directory Discovery
SPACESHIP identifies files and directories for collection by searching for specific file extensions or file modification time.
File and Directory Discovery
StreamEx has the ability to enumerate drive types.
File and Directory Discovery
StrifeWater can enumerate files on a compromised host.
File and Directory Discovery
StrongPity can parse the hard drive on a compromised host to identify specific file extensions.
File and Directory Discovery
Stuxnet uses a driver to scan for specific filesystem driver objects.
File and Directory Discovery
SUGARDUMP can search for and collect data from specific Chrome, Opera, Microsoft Edge, and Firefox files, including any folders that have the string Profile in its name.
File and Directory Discovery
SUNBURST had commands to enumerate files and directories.
File and Directory Discovery
SUNSPOT enumerated the Orion software Visual Studio solution directory path.
File and Directory Discovery
SynAck checks its directory location in an attempt to avoid launching in a sandbox.
File and Directory Discovery
SysUpdate can search files on a compromised host.
File and Directory Discovery
Taidoor can search for specific files.
File and Directory Discovery
TAINTEDSCRIBE can use DirectoryList to enumerate files in a specified directory.
File and Directory Discovery
TajMahal has the ability to index files from drives, user profiles, and removable drives.
File and Directory Discovery
It has used a script that checks /proc/*/environ for environment variables related to AWS.
File and Directory Discovery
ThreatNeedle can obtain file and directory information.
File and Directory Discovery
TINYTYPHON searches through the drive containing the OS, then all drive letters C through to Z, for documents matching certain extensions.
File and Directory Discovery
TrickBot searches the system for all of the following file extensions: .avi, .mov, .mkv, .mpeg, .mpeg4, .mp4, .mp3, .wav, .ogg, .jpeg, .jpg, .png, .bmp, .gif, .tiff, .ico, .xlsx, and .zip. It can also obtain browsing history, cookies, and plug-in information.