prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Software Discovery:Security Software Discovery | The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list, the dropper will exit. |
Software Discovery:Security Software Discovery | Crimson contains a command to collect information about anti-virus software on the victim. |
Software Discovery:Security Software Discovery | It has searched for anti-malware strings and anti-virus processes running on the system. |
Software Discovery:Security Software Discovery | DarkTortilla can check for the Kaspersky Anti-Virus suite. |
Software Discovery:Security Software Discovery | DarkWatchman can search for anti-virus products on the system. |
Software Discovery:Security Software Discovery | down_new has the ability to detect anti-virus products and processes on a compromised host. |
Software Discovery:Security Software Discovery | DustySky checks for the existence of anti-virus. |
Software Discovery:Security Software Discovery | Empire can enumerate antivirus software on the target. |
Software Discovery:Security Software Discovery | Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them. |
Software Discovery:Security Software Discovery | EvilBunny has been observed querying installed antivirus software. |
Software Discovery:Security Software Discovery | EVILNUM can search for anti-virus products on the system. |
Software Discovery:Security Software Discovery | Felismus checks for processes associated with anti-virus vendors. |
Software Discovery:Security Software Discovery | FELIXROOT checks for installed security software like antivirus and firewall. |
Software Discovery:Security Software Discovery | Ferocious has checked for AV software as part of its persistence process. |
Software Discovery:Security Software Discovery | It has used Registry keys to detect and avoid executing in potential sandboxes. |
Software Discovery:Security Software Discovery | FinFisher probes the system to check for antimalware processes. |
Software Discovery:Security Software Discovery | Flame identifies security software such as antivirus through the Security module. |
Software Discovery:Security Software Discovery | FlawedAmmyy will attempt to detect anti-virus products during the initial infection. |
Software Discovery:Security Software Discovery | During Frankenstein, the threat actors used WMI queries to determine if analysis tools were running on a compromised system. |
Software Discovery:Security Software Discovery | FunnyDream can identify the processes for Bkav antivirus. |
Software Discovery:Security Software Discovery | Gelsemium can check for the presence of specific security products. |
Software Discovery:Security Software Discovery | Gold Dragon checks for anti-malware products and processes. |
Software Discovery:Security Software Discovery | Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections. |
Software Discovery:Security Software Discovery | InvisiMole can check for the presence of network sniffers, AV, and BitDefender firewall. |
Software Discovery:Security Software Discovery | JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them. |
Software Discovery:Security Software Discovery | jRAT can list security software, such as by using WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details. |
Software Discovery:Security Software Discovery | Kasidet has the ability to identify any anti-virus installed on the infected system. |
Software Discovery:Security Software Discovery | It has checked for the presence of antivirus software with powershell Get-CimInstance -Namespace root/securityCenter2 – classname antivirusproduct. |
Software Discovery:Security Software Discovery | LiteDuke has the ability to check for the presence of Kaspersky security software. |
Software Discovery:Security Software Discovery | LitePower can identify installed AV software. |
Software Discovery:Security Software Discovery | Lizar can search for processes associated with an anti-virus product from list. |
Software Discovery:Security Software Discovery | Mafalda can search for a variety of security software programs, EDR systems, and malware analysis tools. |
Software Discovery:Security Software Discovery | MarkiRAT can check for running processes on the victim’s machine to look for Kaspersky and Bitdefender antivirus products. |
Software Discovery:Security Software Discovery | Metamorfo collects a list of installed antivirus software from the victim’s system. |
Software Discovery:Security Software Discovery | Meteor has the ability to search for Kaspersky Antivirus on a victim's machine. |
Software Discovery:Security Software Discovery | Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI. |
Software Discovery:Security Software Discovery | MoleNet can use WMI commands to check the system for firewall and antivirus software. |
Software Discovery:Security Software Discovery | More_eggs can obtain information on installed anti-malware programs. |
Software Discovery:Security Software Discovery | Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system. |
Software Discovery:Security Software Discovery | It has used malware to check running processes against a hard-coded list of security tools often used by malware researchers. |
Software Discovery:Security Software Discovery | It uses commands such as netsh advfirewall firewall to discover local firewall settings. |
Software Discovery:Security Software Discovery | netsh can be used to discover system firewall settings. |
Software Discovery:Security Software Discovery | Netwalker can detect and terminate active security software-related processes on infected systems. |
Software Discovery:Security Software Discovery | NotPetya determines if specific antivirus programs are running on an infected host machine. |
Software Discovery:Security Software Discovery | During Operation Wocao, threat actors used scripts to detect security software. |
Software Discovery:Security Software Discovery | Pacu can enumerate AWS security services, including WAF rules and GuardDuty detectors. |
Software Discovery:Security Software Discovery | It scanned the "Program Files" directories for a directory with the string "Total Security" (the installation path of the "360 Total Security" antivirus tool). |
Software Discovery:Security Software Discovery | PipeMon can check for the presence of ESET and Kaspersky security software. |
Software Discovery:Security Software Discovery | POWERSTATS has detected security tools. |
Software Discovery:Security Software Discovery | POWRUNER may collect information on the victim's anti-virus software. |
Software Discovery:Security Software Discovery | A module in Prikormka collects information from the victim about installed anti-virus software. |
Software Discovery:Security Software Discovery | PUNCHBUGGY can gather AVs registered in the system. |
Software Discovery:Security Software Discovery | QakBot can identify the installed antivirus product on a targeted system. |
Software Discovery:Security Software Discovery | Remsec has a plugin detect security products via active drivers. |
Software Discovery:Security Software Discovery | It used scripts which detected and uninstalled antivirus software. |
Software Discovery:Security Software Discovery | RogueRobin enumerates running processes to search for Wireshark and Windows Sysinternals suite. |
Software Discovery:Security Software Discovery | It can obtain information about security software on the victim. |
Software Discovery:Security Software Discovery | It uses a loader DLL file to collect AV product names from an infected host. |
Software Discovery:Security Software Discovery | It has used the Windows service winmgmts:\.\root\SecurityCenter2 to check installed antivirus products. |
Software Discovery:Security Software Discovery | SILENTTRINITY can determine if an anti-virus product is installed through the resolution of the service's virtual SID. |
Software Discovery:Security Software Discovery | Skidmap has the ability to check if /usr/sbin/setenforce exists. This file controls what mode SELinux is in. |
Software Discovery:Security Software Discovery | SpicyOmelette can check for the presence of 29 different antivirus tools. |
Software Discovery:Security Software Discovery | StoneDrill can check for antivirus and antimalware programs. |
Software Discovery:Security Software Discovery | StreamEx has the ability to scan for security tools such as firewalls and antivirus tools. |
Software Discovery:Security Software Discovery | StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload. |
Software Discovery:Security Software Discovery | Stuxnet enumerates the currently running processes related to a variety of security products. |
Software Discovery:Security Software Discovery | SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution. |
Software Discovery:Security Software Discovery | T9000 performs checks for various antivirus and security products during installation. |
Software Discovery:Security Software Discovery | It has used tools to search victim systems for security products such as antivirus and firewall software. |
Software Discovery:Security Software Discovery | TajMahal has the ability to identify which anti-virus products, firewalls, and anti-spyware products are in use. |
Software Discovery:Security Software Discovery | Tasklist can be used to enumerate security software currently running on a system by process name of known products. |
Software Discovery:Security Software Discovery | It has searched for security products on infected machines. |
Software Discovery:Security Software Discovery | It has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET. |
Software Discovery:Security Software Discovery | ThiefQuest uses the kill_unwanted function to get a list of running processes, compares each process with an encrypted list of "unwanted" security related programs, and kills the processes for security related programs. |
Software Discovery:Security Software Discovery | It can search for anti-virus software running on the system. |
Software Discovery:Security Software Discovery | It has obtained information on security software, including security logging information that may indicate whether their malware has been detected. |
Software Discovery:Security Software Discovery | Valak can determine if a compromised host has security products installed. |
Software Discovery:Security Software Discovery | VERMIN uses WMI to check for anti-virus software installed on the system. |
Software Discovery:Security Software Discovery | Waterbear can find the presence of a specific security software. |
Software Discovery:Security Software Discovery | WhisperGate can recognize the presence of monitoring tools on a target system. |
Software Discovery:Security Software Discovery | It has used malware to identify installed AV and commonly used forensic and malware analysis tools. |
Software Discovery:Security Software Discovery | Wingbird checks for the presence of Bitdefender security software. |
Software Discovery:Security Software Discovery | It has used WMI to identify anti-virus products installed on a victim's machine. |
Software Discovery:Security Software Discovery | Woody RAT can detect Avast Software, Doctor Web, Kaspersky, AVG, ESET, and Sophos antivirus programs. |
Software Discovery:Security Software Discovery | xCaon has checked for the existence of Kaspersky antivirus software on the system. |
Software Discovery:Security Software Discovery | XCSSET searches firewall configuration files located in /Library/Preferences/ and uses csrutil status to determine if System Integrity Protection is enabled. |
Software Discovery:Security Software Discovery | YAHOYAH checks for antimalware solution processes on the system. |
Software Discovery:Security Software Discovery | Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment. |
Software Discovery:Security Software Discovery | ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus. |
System Information Discovery | 4H RAT sends an OS version identifier in its beacons. |
System Information Discovery | Action RAT has the ability to collect the hostname, OS version, and OS architecture of an infected host. |
System Information Discovery | It actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: ver >> %temp%\download systeminfo >> %temp%\download |
System Information Discovery | ADVSTORESHELL can run Systeminfo to gather information about the victim. |
System Information Discovery | Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system. |
System Information Discovery | Amadey has collected the computer name and OS version from a compromised machine. |
System Information Discovery | Anchor can determine the hostname and linux version on a compromised host. |
System Information Discovery | AppleJeus has collected the victim host information after infection. |
System Information Discovery | AppleSeed can identify the OS version of a targeted system. |
System Information Discovery | It can collect system information from the victim’s machine. |
System Information Discovery | It collected system architecture information. It used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.