prompt
stringclasses
508 values
procedure
stringlengths
20
478
Software Discovery:Security Software Discovery
The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list, the dropper will exit.
Software Discovery:Security Software Discovery
Crimson contains a command to collect information about anti-virus software on the victim.
Software Discovery:Security Software Discovery
It has searched for anti-malware strings and anti-virus processes running on the system.
Software Discovery:Security Software Discovery
DarkTortilla can check for the Kaspersky Anti-Virus suite.
Software Discovery:Security Software Discovery
DarkWatchman can search for anti-virus products on the system.
Software Discovery:Security Software Discovery
down_new has the ability to detect anti-virus products and processes on a compromised host.
Software Discovery:Security Software Discovery
DustySky checks for the existence of anti-virus.
Software Discovery:Security Software Discovery
Empire can enumerate antivirus software on the target.
Software Discovery:Security Software Discovery
Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them.
Software Discovery:Security Software Discovery
EvilBunny has been observed querying installed antivirus software.
Software Discovery:Security Software Discovery
EVILNUM can search for anti-virus products on the system.
Software Discovery:Security Software Discovery
Felismus checks for processes associated with anti-virus vendors.
Software Discovery:Security Software Discovery
FELIXROOT checks for installed security software like antivirus and firewall.
Software Discovery:Security Software Discovery
Ferocious has checked for AV software as part of its persistence process.
Software Discovery:Security Software Discovery
It has used Registry keys to detect and avoid executing in potential sandboxes.
Software Discovery:Security Software Discovery
FinFisher probes the system to check for antimalware processes.
Software Discovery:Security Software Discovery
Flame identifies security software such as antivirus through the Security module.
Software Discovery:Security Software Discovery
FlawedAmmyy will attempt to detect anti-virus products during the initial infection.
Software Discovery:Security Software Discovery
During Frankenstein, the threat actors used WMI queries to determine if analysis tools were running on a compromised system.
Software Discovery:Security Software Discovery
FunnyDream can identify the processes for Bkav antivirus.
Software Discovery:Security Software Discovery
Gelsemium can check for the presence of specific security products.
Software Discovery:Security Software Discovery
Gold Dragon checks for anti-malware products and processes.
Software Discovery:Security Software Discovery
Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections.
Software Discovery:Security Software Discovery
InvisiMole can check for the presence of network sniffers, AV, and BitDefender firewall.
Software Discovery:Security Software Discovery
JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.
Software Discovery:Security Software Discovery
jRAT can list security software, such as by using WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details.
Software Discovery:Security Software Discovery
Kasidet has the ability to identify any anti-virus installed on the infected system.
Software Discovery:Security Software Discovery
It has checked for the presence of antivirus software with powershell Get-CimInstance -Namespace root/securityCenter2 – classname antivirusproduct.
Software Discovery:Security Software Discovery
LiteDuke has the ability to check for the presence of Kaspersky security software.
Software Discovery:Security Software Discovery
LitePower can identify installed AV software.
Software Discovery:Security Software Discovery
Lizar can search for processes associated with an anti-virus product from list.
Software Discovery:Security Software Discovery
Mafalda can search for a variety of security software programs, EDR systems, and malware analysis tools.
Software Discovery:Security Software Discovery
MarkiRAT can check for running processes on the victim’s machine to look for Kaspersky and Bitdefender antivirus products.
Software Discovery:Security Software Discovery
Metamorfo collects a list of installed antivirus software from the victim’s system.
Software Discovery:Security Software Discovery
Meteor has the ability to search for Kaspersky Antivirus on a victim's machine.
Software Discovery:Security Software Discovery
Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI.
Software Discovery:Security Software Discovery
MoleNet can use WMI commands to check the system for firewall and antivirus software.
Software Discovery:Security Software Discovery
More_eggs can obtain information on installed anti-malware programs.
Software Discovery:Security Software Discovery
Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system.
Software Discovery:Security Software Discovery
It has used malware to check running processes against a hard-coded list of security tools often used by malware researchers.
Software Discovery:Security Software Discovery
It uses commands such as netsh advfirewall firewall to discover local firewall settings.
Software Discovery:Security Software Discovery
netsh can be used to discover system firewall settings.
Software Discovery:Security Software Discovery
Netwalker can detect and terminate active security software-related processes on infected systems.
Software Discovery:Security Software Discovery
NotPetya determines if specific antivirus programs are running on an infected host machine.
Software Discovery:Security Software Discovery
During Operation Wocao, threat actors used scripts to detect security software.
Software Discovery:Security Software Discovery
Pacu can enumerate AWS security services, including WAF rules and GuardDuty detectors.
Software Discovery:Security Software Discovery
It scanned the "Program Files" directories for a directory with the string "Total Security" (the installation path of the "360 Total Security" antivirus tool).
Software Discovery:Security Software Discovery
PipeMon can check for the presence of ESET and Kaspersky security software.
Software Discovery:Security Software Discovery
POWERSTATS has detected security tools.
Software Discovery:Security Software Discovery
POWRUNER may collect information on the victim's anti-virus software.
Software Discovery:Security Software Discovery
A module in Prikormka collects information from the victim about installed anti-virus software.
Software Discovery:Security Software Discovery
PUNCHBUGGY can gather AVs registered in the system.
Software Discovery:Security Software Discovery
QakBot can identify the installed antivirus product on a targeted system.
Software Discovery:Security Software Discovery
Remsec has a plugin detect security products via active drivers.
Software Discovery:Security Software Discovery
It used scripts which detected and uninstalled antivirus software.
Software Discovery:Security Software Discovery
RogueRobin enumerates running processes to search for Wireshark and Windows Sysinternals suite.
Software Discovery:Security Software Discovery
It can obtain information about security software on the victim.
Software Discovery:Security Software Discovery
It uses a loader DLL file to collect AV product names from an infected host.
Software Discovery:Security Software Discovery
It has used the Windows service winmgmts:\.\root\SecurityCenter2 to check installed antivirus products.
Software Discovery:Security Software Discovery
SILENTTRINITY can determine if an anti-virus product is installed through the resolution of the service's virtual SID.
Software Discovery:Security Software Discovery
Skidmap has the ability to check if /usr/sbin/setenforce exists. This file controls what mode SELinux is in.
Software Discovery:Security Software Discovery
SpicyOmelette can check for the presence of 29 different antivirus tools.
Software Discovery:Security Software Discovery
StoneDrill can check for antivirus and antimalware programs.
Software Discovery:Security Software Discovery
StreamEx has the ability to scan for security tools such as firewalls and antivirus tools.
Software Discovery:Security Software Discovery
StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload.
Software Discovery:Security Software Discovery
Stuxnet enumerates the currently running processes related to a variety of security products.
Software Discovery:Security Software Discovery
SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.
Software Discovery:Security Software Discovery
T9000 performs checks for various antivirus and security products during installation.
Software Discovery:Security Software Discovery
It has used tools to search victim systems for security products such as antivirus and firewall software.
Software Discovery:Security Software Discovery
TajMahal has the ability to identify which anti-virus products, firewalls, and anti-spyware products are in use.
Software Discovery:Security Software Discovery
Tasklist can be used to enumerate security software currently running on a system by process name of known products.
Software Discovery:Security Software Discovery
It has searched for security products on infected machines.
Software Discovery:Security Software Discovery
It has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.
Software Discovery:Security Software Discovery
ThiefQuest uses the kill_unwanted function to get a list of running processes, compares each process with an encrypted list of "unwanted" security related programs, and kills the processes for security related programs.
Software Discovery:Security Software Discovery
It can search for anti-virus software running on the system.
Software Discovery:Security Software Discovery
It has obtained information on security software, including security logging information that may indicate whether their malware has been detected.
Software Discovery:Security Software Discovery
Valak can determine if a compromised host has security products installed.
Software Discovery:Security Software Discovery
VERMIN uses WMI to check for anti-virus software installed on the system.
Software Discovery:Security Software Discovery
Waterbear can find the presence of a specific security software.
Software Discovery:Security Software Discovery
WhisperGate can recognize the presence of monitoring tools on a target system.
Software Discovery:Security Software Discovery
It has used malware to identify installed AV and commonly used forensic and malware analysis tools.
Software Discovery:Security Software Discovery
Wingbird checks for the presence of Bitdefender security software.
Software Discovery:Security Software Discovery
It has used WMI to identify anti-virus products installed on a victim's machine.
Software Discovery:Security Software Discovery
Woody RAT can detect Avast Software, Doctor Web, Kaspersky, AVG, ESET, and Sophos antivirus programs.
Software Discovery:Security Software Discovery
xCaon has checked for the existence of Kaspersky antivirus software on the system.
Software Discovery:Security Software Discovery
XCSSET searches firewall configuration files located in /Library/Preferences/ and uses csrutil status to determine if System Integrity Protection is enabled.
Software Discovery:Security Software Discovery
YAHOYAH checks for antimalware solution processes on the system.
Software Discovery:Security Software Discovery
Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.
Software Discovery:Security Software Discovery
ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.
System Information Discovery
4H RAT sends an OS version identifier in its beacons.
System Information Discovery
Action RAT has the ability to collect the hostname, OS version, and OS architecture of an infected host.
System Information Discovery
It actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: ver >> %temp%\download systeminfo >> %temp%\download
System Information Discovery
ADVSTORESHELL can run Systeminfo to gather information about the victim.
System Information Discovery
Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system.
System Information Discovery
Amadey has collected the computer name and OS version from a compromised machine.
System Information Discovery
Anchor can determine the hostname and linux version on a compromised host.
System Information Discovery
AppleJeus has collected the victim host information after infection.
System Information Discovery
AppleSeed can identify the OS version of a targeted system.
System Information Discovery
It can collect system information from the victim’s machine.
System Information Discovery
It collected system architecture information. It used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine.