value
stringlengths 25
18k
⌀ | subtecnique
int64 0
1
| answer
stringclasses 2
values | id
stringlengths 5
9
| name
stringlengths 3
102
|
---|---|---|---|---|
Comnie establishes persistence via a .lnk file in the victim’s startup path. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. ;; Dragonfly 2.0 manipulated .lnk files to gather user credentials in conjunction with Forced Authentication. ;; Empire can persist by modifying a .LNK file to include a backdoor. ;; FELIXROOT creates a .LNK file for persistence. ;; Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe. ;; Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence. ;; Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions. ;; Helminth establishes persistence by creating a shortcut. ;; InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence. ;; Kazuar adds a .lnk file to the Windows startup folder. ;; A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence. ;; A Lazarus Group malware sample adds persistence on the system by creating a shortcut in the user’s Startup folder. ;; Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor. ;; Micropsia creates a shortcut to maintain persistence. ;; Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder. ;; Reaver creates a shortcut file and saves it in a Startup folder to establish persistence. ;; RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. ;; RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in. ;; S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk which points to the malicious msdtc.exe file already created in the %CommonFiles% directory. ;; SeaDuke is capable of persisting via a .lnk file stored in the Startup directory. ;; SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder. ;; SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder. ;; To establish persistence SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start ” “Yahoo Talk ” “MSN Gaming Z0ne ” or “MSN Talk” shortcut. ;; TinyZBot can create a shortcut in the Windows startup folder for persistence. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
Agent Tesla has the ability to extract credentials from configuration or support files. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
APT33 has used a variety of publicly available tools like LaZagne to gather credentials. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Azorult can steal credentials in files belonging to common software such as Skype Telegram and Steam. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs including The Bat! email client Outlook and Windows Credential Store. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Empire can use various modules to search for files containing passwords. | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Fox Kitten has accessed files to gain valid credentials. ;; Hildegard has searched for SSH keys Docker credentials and Kubernetes service tokens. ;; jRAT can capture passwords from common chat applications such as MSN Messenger AOL Instant Messenger and and Google Talk. ;; LaZagne can obtain credentials from chats databases mail and WiFi. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; MuddyWater has run a tool that steals passwords saved in victim email. ;; OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. ;; If an initial connectivity check fails pngdowner attempts to extract proxy details and credentials from Windows Protected Storage and from the IE Credentials Store. This allows the adversary to use the proxy credentials for subsequent requests if they enable outbound HTTP access. ;; PoshC2 contains modules for searching for passwords in local and remote files. ;; Pupy can use Lazagne for harvesting credentials. ;; Pysa has extracted credentials from the password database before encrypting the files. ;; QuasarRAT can obtain passwords from FTP clients. ;; Smoke Loader searches for files named logins.json to parse for credentials. ;; Stolen Pencil has used tools that are capable of obtaining credentials from saved mail. ;; TA505 has used malware to gather credentials from FTP clients and Outlook. ;; TrickBot can obtain passwords stored in files from several applications such as Outlook Filezilla OpenSSH OpenVPN and WinSCP. Additionally it searches for the .vnc.lnk" affix to steal VNC credentials. ;; XTunnel is capable of accessing locally stored passwords on victims." | 1 | accept | T1552.001 | Unsecured Credentials: Credentials In Files |
Limit communications with the container service to local Unix sockets or remote access via SSH. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
Require secure port access to communicate with the APIs over TLS by disabling unauthenticated access to the Docker API and Kubernetes API Server. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
Use the principle of least privilege for privileged accounts such as the service account in Kubernetes. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
An adversary may access the Docker API to collect logs that contain credentials to cloud, container, and various other resources in the environment. | 1 | accept | T1552.007 | Unsecured Credentials: Container Api |
Ensure containers are not running as root by default. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
Limit privileges of user accounts and remediate privilege escalation vectors so only authorized administrators can create container orchestration jobs. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
Threat actors can create clusters of containers to maintain persistence. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
Ransomware such as DarkMatter can utilize containers to schedule the execution of the encryption payload. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
APT23 abuses container creation programs such as Kubernetes to repeatedly execute malicious code. | 1 | accept | T1053.007 | Scheduled Task/Job: Container Orchestration Job |
TeamTNT relies on users to download and execute malicious Docker images. | 1 | accept | T1204.003 | User Execution: Malicious Image |
TigerDownloader can be modified to be executed once a user is tricked into downloading a malicious AWS image. | 1 | accept | T1204.003 | User Execution: Malicious Image |
DarkSide ransomware can be executed once a user downloads a malicious GCP image. | 1 | accept | T1204.003 | User Execution: Malicious Image |
Persistence can be maintained via backdoor installations through the medium of malicious docker images. | 1 | accept | T1204.003 | User Execution: Malicious Image |
REvil ransomware can install itself once a user downloads an image that has been modified to contain malicious functionality. | 1 | accept | T1204.003 | User Execution: Malicious Image |
APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
APT33 has used password spraying to gain access to target systems. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Lazarus Group malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames which center around permutations of the username Administrator and weak passwords. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
MailSniper can be used for password spraying against Exchange and Office 365. ;; Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets. | 1 | accept | T1110.003 | Brute Force: Password Spraying |
Chimera has used credential stuffing against victim's remote services to obtain valid accounts. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
TrickBot uses brute-force attack against RDP with rdpscanDll module. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
APT22 uses credential stuffing to enumerate the number of compromised accounts they can access. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
Skimmers, such as those utilised by Magecart, will often use credential stuffing to access multiple user accounts across multiple ecommerce websites. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
Credential stuffing is a technique often used by threat actors to gain access to new accounts which they can then abuse the trust of to assist in social engineering attacks. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
Ransomware such as REvil can credential stuff to gain access to more valid accounts before moving laterally and vertically within the network. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
Threat actors can credential stuff to gain access to users accounts if they reuse passwords. | 1 | accept | T1110.004 | Brute Force: Credential Stuffing |
HyperStack can use default credentials to connect to IPC$ shares on remote machines. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
Stuxnet infected WinCC machines via a hardcoded database server password. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
Threat actors targeting government sectors will abuse default guest and administrator accounts on older windows OS to gain initial access. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
APT40 abuses default administrator accounts for initial access. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
Certain CobaltStrike beacons can maintain persistence via access to default administrator accounts. | 1 | accept | T1078.001 | Valid Accounts: Default Accounts |
APT32 has used legitimate local admin account credentials. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
Emotet can brute force a local admin password then use it to facilitate lateral movement. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
FIN10 has moved laterally using the Local Administrator account. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
Operation Wocao has used local account credentials found during the intrusion for lateral movement and privilege escalation. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
PROMETHIUM has created admin accounts on a compromised host. ;; Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP. ;; Tropic Trooper has used known administrator account credentials to execute the backdoor directly. ;; Turla has abused local accounts that have the same password across the victim’s network. ;; Umbreon creates valid local users to provide access to the system. | 1 | accept | T1078.003 | Valid Accounts: Local Accounts |
admin@338 has sent emails with malicious Microsoft Office documents attached. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
The primary delivered mechaism for Agent Tesla is through email phishing messages. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
Ajax Security Team has used personalized spearphishing attachments. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT1 has sent spearphishing emails containing malicious attachments. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT12 has sent emails with malicious Microsoft Office documents and PDFs attached. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments. ;; APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims. ;; APT30 has used spearphishing emails with malicious DOC attachments. ;; APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet. ;; APT33 has sent spearphishing e-mails with archive attachments. ;; APT37 delivers malware using spearphishing emails with malicious HWP attachments. ;; APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims. ;; APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims. ;; BlackTech has used spearphishing e-mails with malicious documents to deliver malware. ;; BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents. ;; BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims. ;; Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf .doc .xls archives containing LNK files and password protected archives containing .exe and .scr executables. ;; Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments. ;; DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the “attachedTemplate” technique to load a template from a remote server. ;; Dragonfly 2.0 used spearphishing with Microsoft Office attachments to target victims. ;; Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments. ;; Emotet has been delivered by phishing emails containing attachments. ;; FIN4 has used spearphishing emails containing attachments (which are often stolen legitimate documents sent from compromised accounts) with embedded malicious macros. ;; FIN6 has targeted victims with e-mails containing malicious attachments. ;; FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached. ;; FIN8 has distributed targeted emails containing Word documents with embedded malicious macros. ;; Frankenstein has used spearphishing emails to send trojanized Microsoft Word documents. ;; Gallmaker sent emails with malicious Microsoft Office documents attached. ;; Gamaredon Group has delivered spearphishing emails with malicious attachments to targets. ;; Gorgon Group sent emails to victims with malicious Microsoft Office documents attached. ;; Hancitor has been delivered via phishing emails with malicious attachments. ;; Higaisa has sent spearphishing emails containing malicious attachments. ;; IcedID has been delivered via phishing e-mails with malicious attachments. ;; Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise. ;; Javali has been delivered as malicious e-mail attachments. ;; Kerrdown has been distributed through malicious e-mail attachments. ;; Kimsuky has used emails containing Word Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns. ;; Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents. ;; Leviathan has sent spearphishing emails with malicious attachments including .rtf .doc and .xls files. ;; Machete has delivered spearphishing emails that contain a zipped file with malicious contents. ;; menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents. ;; Metamorfo has been delivered to victims via emails containing malicious HTML attachments. ;; Mofang delivered spearphishing emails with malicious documents PDFs or Excel files attached. ;; Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments. ;; MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients. ;; Mustang Panda has used spearphishing attachments to deliver initial access payloads. ;; Naikon has used malicious e-mail attachments to deliver malware. ;; NETWIRE has been spread via e-mail campaigns utilizing malicious attachments. ;; OceanSalt has been delivered via spearphishing emails with Microsoft Office attachments. ;; OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts. ;; Patchwork has used spearphishing with an attachment to deliver files with exploits to initial victims. ;; PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector. ;; PoetRAT was distributed via malicious Word documents. ;; Pony has been delivered via spearphishing attachments. ;; Ramsay has been distributed through spearphishing emails with malicious attachments. ;; Rancor has attached a malicious document to an email to gain initial access. ;; REvil has been distributed via malicious e-mail attachments including MS Word Documents. ;; Rifdoor has been distributed in e-mails with malicious Excel or Word documents. ;; RTM has been delivered via spearphishing attachments disguised as PDF documents. ;; RTM has used spearphishing attachments to distribute its malware. ;; Sandworm Team has delivered malicious Microsoft Office attachments via spearphishing emails. ;; Sharpshooter has sent malicious attachments via emails to targets. ;; Sidewinder has sent e-mails with malicious attachments often crafted for specific targets. ;; Silence has sent emails with malicious DOCX CHM LNK and ZIP attachments. ;; TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments. ;; TA505 has used spearphishing emails with malicious attachments to initially compromise victims. ;; TA551 has sent spearphishing attachments with password protected ZIP files. ;; The White Company has sent phishing emails with malicious Microsoft Word attachments to victims. ;; TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware ;; Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments. ;; Valak has been delivered via spearphishing e-mails with password protected ZIP files. ;; Windshift has sent spearphishing emails with attachment to harvest credentials and deliver malware. ;; Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet Bokbot TrickBot or Bazar. | 1 | accept | T1566.001 | Phishing: Spearphishing Attachment |
AppleJeus has waited a specified time before downloading a second stage payload. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
Bazar can use a timer to delay execution of core functionality. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
Egregor can perform a long sleep (greater than or equal to 3 minutes) to evade detection. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
FatDuke can turn itself on or off at random intervals. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
GoldMax has set an execution trigger date and time stored as an ASCII Unix/Epoch time value. ;; Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API and checking whether the time has been accelerated. ;; Pony has delayed execution using a built-in function to avoid detection and analysis. ;; After initial installation Raindrop runs a computation to delay execution. ;; SUNBURST remained dormant after initial access for a period of up to two weeks. ;; ThiefQuest invokes time call to check the system's time executes a sleep command invokes a second time call and then compares the time difference between the two time calls and the amount of time the system slept to identify the sandbox. ;; Ursnif has used a 30 minute delay after execution to evade sandbox monitoring tools. | 1 | accept | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
Hildegard has queried the Cloud Instance Metadata API for cloud credentials. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
TeamTNT has queried the AWS instance metadata service for credentials. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
APT33 will query Cloud Instance APIs to harvest insecurely stored credentials that can then be used for user enumeration. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
In addition to credential harvesting, other valuable data can be extracted by threat actors via the AWS instance if it is not properly secured. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
APT25 can harvest credentials from Cloud Instance APIs, then use those credentials to gain access to systems. | 1 | accept | T1552.005 | Unsecured Credentials: Cloud Instance Metadata Api |
Backdoor.Oldrea collects address book information from Outlook. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Emotet has been observed leveraging a module that can scrape email addresses from Outlook. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Grandoreiro can parse Outlook .pst files to extract e-mail addresses. | 1 | accept | T1087.003 | Account Discovery: Email Account |
MailSniper can be used to obtain account names from Exchange and Office 365 using the Get-GlobalAddressList cmdlet. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Ruler can be used to enumerate Exchange users and dump the GAL. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Sandworm Team used malware to enumerate email settings including usernames and passwords from the M.E.Doc application. | 1 | accept | T1087.003 | Account Discovery: Email Account |
TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server. | 1 | accept | T1087.003 | Account Discovery: Email Account |
TrickBot collects email addresses from Outlook.;;Threat actors will often attempt to gather more targets by using tools that lists of users from memory, and combine this with a company’s email naming convention to create a target list of email addresses. ;; Some actors use open-source malware and tools to target and steal email account credentials from popular email clients such as, Apple Mail, Gmail, and Outlook. ;; Spearphising is used by the most advanced threat groups in the world, which shows the potential value that skilled threat actors can extract by discovering which email addresses to target. ;; Malware can used by actors to automate email account discovery. ;; Actors can exploit vulnerabilities, such as Log4Shell, to move into different directories to quickly locate email addresses. | 1 | accept | T1087.003 | Account Discovery: Email Account |
Threat actors will attempt to gather cloud accounts and their appropriate groups in attempts to find weak or default settings to exploit for malicious purposes. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
Identifying cloud groups and cloud permissions can be accomplished by various commands, such as: ‘az ad user get-member-groups’ to get groups associated to a user account in Azure. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
Some actors and malware will attempt to launch commands, via PowerShell for example (among others), to gather cloud group user settings and permissions for Google with the command: ‘GET https://cloudidentity.googleapis.com/v1/groups’. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
As more organizations utilize cloud services, more actors and malware will attempt to engage in malicious activity by locating cloud groups and their corresponding cloud user settings. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
Targeting an access control list (ACL) could grant actors the ability to discover cloud account users and settings, for Amazon Web Services (AWS) this can be done with the ‘GetBucketAcl’ command. | 1 | accept | T1069.003 | Permission Groups Discovery: Cloud Groups |
Drovorub can use kernel modules to establish persistence. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Threat actors can leverage malicious loadable kernel modules (LKMs) to gain Rootkit level access on an affected machine. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Actors are always looking for ways keep control of an infected machine, one way this can be done is through malicious kernel modules to covertly escalate privileges and maintain persistence. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
LKMs used by actors and malware are often loaded into the ‘/lib/modules/’ with a .ko extension on Linux systems. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Malware trying to get kernel access may run commands before loading a malicious module, and some of these include ‘modprobe’, ‘insmod’, ‘lsmod’, ‘rmmod’, and ‘modinfo’. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Some malware will attempt to load Kexts into the kernel, which create new rows in KextPolicy tables. | 1 | accept | T1547.006 | Boot or Logon Autostart Execution: Kernel Modules And Extensions |
Dok persists via a plist login item. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
LoudMiner used plists to execute shell scripts and maintain persistence on boot. LoudMiner also added plist files in /Library/LaunchDaemons with KeepAlive set to true which would restart the process if stopped. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
NETWIRE can persist via startup options for Login items. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
Property list (plist) files can be manipulated by malware to execute their own malicious executables. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
Some malware will create property list files (.plist) to download and execute code as part of maintaining persistence. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
macOs malware may try to use the ‘plist’ command to manipulate keys in property list (plist) files to elevate privileges or establish persistence. | 1 | accept | T1547.011 | Boot or Logon Autostart Execution: Plist Modification |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.