text
stringlengths
104
2.24k
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Since msxsl.exe is not installed by default, an adversary will likely need to package it with dropped files.### Assistant: T1220: XSL Script Processing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ZLib has the ability to obtain screenshots of the compromised system.### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may send phishing messages to gain access to victim systems.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.### Assistant: T1556: Modify Authentication Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Benign commands or other operations may also be used to delay malware execution.### Assistant: T1497: Virtualization/Sandbox Evasion
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Zeus Panda can download additional malware plug-in modules and execute them on the victim’s machine.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,DarkHydrus has obtained and used tools such as Mimikatz, Empire, and Cobalt Strike.### Assistant: T1588: Obtain Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,CosmicDuke steals user files from local hard drives with file extensions that match a predefined list.### Assistant: T1005: Data from Local System
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT29 routinely removed their tools, including custom backdoors, once remote access was achieved.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FIN6 has used fake job advertisements sent via LinkedIn to spearphish targets.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,DOGCALL can download and execute additional payloads.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dtrack’s can download and upload a file to the victim’s computer.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OSX/Shlayer also leveraged system links pointing to bash scripts in the downloaded DMG file to bypass Gatekeeper, a flaw patched in macOS 11.3 and later versions.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SombRAT can execute getinfo to identify the username on a compromised host.### Assistant: T1033: System Owner/User Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,It is becoming more common to see macOS malware perform checks for LittleSnitch and KnockKnock software.### Assistant: T1518: Software Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,When an adversary takes control of such a device, they may disable the dedicated hardware, for example, through use of Modify System Image, forcing the use of software to perform encryption on general processors.### Assistant: T1600: Weaken Encryption
### Human:Find the techniques and ID from MITRE ATT&CK framework.,to plist filenames, unlisting them from the Finder app and default Terminal directory listings.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Shared file list login items can be set using scripting languages such as AppleScript, whereas the Service Management Framework uses the API call SMLoginItemSetEnabled.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,It does so using either the HTTPS/HTTP or DNS channels, depending on which method is successful### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ursnif has used crypto key information stored in the Registry to decrypt Tor clients dropped to disk.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,There are multiple mechanisms that can be used with Office for persistence when an Office-based application is started; this can include the use of Office Template Macros and add-ins.### Assistant: T1137: Office Application Startup
### Human:Find the techniques and ID from MITRE ATT&CK framework.,* Malicious ads are paid for and served through legitimate ad providers.### Assistant: T1189: Drive-by Compromise
### Human:Find the techniques and ID from MITRE ATT&CK framework.,KONNI has used HTTP for C2.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Can capture all screen (“AllScreen”) or the active window (“ActiveWindow”) -ms Screenshot file name to save in Cache006 subdirectory, zipped with password from configuration### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lazarus Group malware IndiaIndia checks Registry keys within HKCU and HKLM to determine if certain applications are present, including SecureCRT, Terminal Services, RealVNC, TightVNC, UltraVNC, Radmin, mRemote, TeamViewer, FileZilla, pcAnyware, and Remote Desktop.### Assistant: T1012: Query Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials.### Assistant: T1003: OS Credential Dumping
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Many Misdat samples were programmed using Borland Delphi, which will mangle the default PE compile timestamp of a file.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PLEAD has the ability to steal saved passwords from Microsoft Outlook.### Assistant: T1555: Credentials from Password Stores
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Okrum was seen using a keylogger tool to capture keystrokes.### Assistant: T1056: Input Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dubbed ‘SpeakUp’, the new Trojan exploits known vulnerabilities in six different Linux distributions### Assistant: T1068: Exploitation for Privilege Escalation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,AppleJeus has deleted the MSI file after installation.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Figure 6 Hardcoded Google Drive URL used in RogueRobin sample When the modification_time for the first file changes, the Trojan downloads the contents from the first file uploaded to the Google Drive### Assistant: T1102: Web Service
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SharpStage has checked the system settings to see if Arabic is the configured language.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The discovery modules used with Duqu can collect information on open windows.### Assistant: T1010: Application Window Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,They temporarily replaced legitimate utilities with their own, executed their payload, and then restored the original file.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,UPPERCUT has the capability to gather the victim's proxy information.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,LoudMiner launched the QEMU services in the /Library/LaunchDaemons/ folder using launchctl.### Assistant: T1569: System Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PolyglotDuke can use a custom algorithm to decrypt strings used by the malware.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ryuk has injected itself into remote processes to encrypt files using a combination of VirtualAlloc, WriteProcessMemory, and CreateRemoteThread.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access or by administrators using the built-in assoc utility.### Assistant: T1546: Event Triggered Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The Registry of a remote system may be modified to aid in execution of files as part of lateral movement.### Assistant: T1112: Modify Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Leviathan has obtained valid accounts to gain initial access.### Assistant: T1078: Valid Accounts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Leviathan uses a backdoor known as BADFLICK that is is capable of generating a reverse shell, and has used multiple types of scripting for execution, including JavaScript and JavaScript Scriptlets in XML..### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Attackers can abuse this by looking through the file for potential credentials.### Assistant: T1552: Unsecured Credentials
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users.### Assistant: T1491: Defacement
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Windshift has used fake personas on social media to engage and target victims.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Smoke Loader recursively searches through directories for files.### Assistant: T1083: File and Directory Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Gazer can establish persistence by creating a scheduled task.### Assistant: T1053: Scheduled Task/Job
### Human:Find the techniques and ID from MITRE ATT&CK framework.,By default, the passphrase for the keychain is the user’s logon credentials.### Assistant: T1555: Credentials from Password Stores
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,With these outputs, FIN6 was able to identify user accounts that could access additional hosts in the domain### Assistant: T1087: Account Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV.” WannaCry creates the service "mssecsvc2.0" with the display name "Microsoft Security Center Service."### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT3 places scripts in the startup folder for persistence.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The PowerShell script collects all possible information on the user and the network, including snapshots, computer and user names, emails from registry, tasks in task scheduler, system information, AVs registered in the system, privileges, domain and workgroup information### Assistant: T1087: Account Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Process injection helps the malware avoid detection; however, review of active network connections show notepad.exe communicating to 185### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Okrum was seen using modified Quarks PwDump to perform credential dumping.### Assistant: T1003: OS Credential Dumping
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of “YHCRA” and bit rotation between each XOR operation.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Catchamas gathers the Mac address, IP address, and the network adapter information from the victim’s machine.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sidewinder has sent e-mails with malicious attachments often crafted for specific targets.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The shellcode retrieves an additional payload by connecting to the following C2 server using DNS: aaa.stage.14919005.www1.proslr3[.]com Once a successful reply is received from the command and control (C2) server, the PowerShell script executes the embedded Cobalt Strike shellcode### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Astaroth collects the external IP address from the system.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ObliqueRAT has gained execution on targeted systems through luring users to click on links to malicious URLs.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Gallmaker attempted to exploit Microsoft’s DDE protocol in order to gain access to victim machines and for execution.### Assistant: T1559: Inter-Process Communication
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT32 likely used COVID-19-themed malicious attachments against Chinese speaking targets.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ke3chang gathered information and files from local directories for exfiltration.### Assistant: T1005: Data from Local System
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Nomadic Octopus has targeted victims with spearphishing emails containing malicious attachments.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may also purchase information from less-reputable sources such as dark web or cybercrime blackmarkets.### Assistant: T1597: Search Closed Sources
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GPP are tools that allow administrators to create domain policies with embedded credentials.### Assistant: T1552: Unsecured Credentials
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sidewinder has added paths to executables in the Registry to establish persistence.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PowerDuke hides many of its backdoor payloads in an alternate data stream .### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a .js file.### Assistant: T1189: Drive-by Compromise
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An adversary can send an attachment to a user through spearphishing that contains a resource link to an external server controlled by the adversary Template Injection, or place a specially crafted file on navigation path for privileged accounts or on a publicly accessible share to be accessed by victim.### Assistant: T1187: Forced Authentication
### Human:Find the techniques and ID from MITRE ATT&CK framework.,NativeZone has checked if Vmware or VirtualBox VM is running on a compromised host.### Assistant: T1497: Virtualization/Sandbox Evasion
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SUNBURST removed IFEO values to clean up traces of execution.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Malicious component firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks.### Assistant: T1542: Pre-OS Boot
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager.### Assistant: T1555: Credentials from Password Stores
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If any of these programs store passwords in clear text or password hashes in memory, these values can then be harvested for either usage or brute force attacks, respectively.### Assistant: T1003: OS Credential Dumping
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Hildegard has downloaded additional scripts that build and run Monero cryptocurrency miners.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Octopus can download additional files and tools onto the victim’s machine.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT29 used WMI to steal credentials and execute backdoors at a future time.### Assistant: T1047: Windows Management Instrumentation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Calisto has the capability to upload and download files to the victim's machine.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Linfo creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.### Assistant: T1029: Scheduled Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sandworm Team has created new domain accounts on an ICS access server.### Assistant: T1136: Create Account
### Human:Find the techniques and ID from MITRE ATT&CK framework.,A wide variety of virtualization technologies exist that allow for the emulation of a computer or computing environment.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This information may help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy .### Assistant: T1201: Password Policy Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ROKRAT checks for debugging tools.### Assistant: T1518: Software Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SynAck gathers computer names, OS version info, and also checks installed keyboard layouts to estimate if it has been launched from a certain list of countries.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ferocious Kitten has used right-to-left override to reverse executables’ names to make them appear to have different file extensions, rather than their real ones.### Assistant: T1036: Masquerading
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Often Valid Accounts are required, along with access to the remote system's SMB/Windows Admin Shares for RPC communication.### Assistant: T1112: Modify Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Chimera has used net share and net view to identify network shares of interest.### Assistant: T1135: Network Share Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Deep Panda uses Web shells on publicly accessible Web servers to access victim networks.### Assistant: T1505: Server Software Component
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT34 has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.### Assistant: T1046: Network Service Scanning
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Wiarp creates a backdoor through which remote attackers can open a command line interface.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TA459 has a VBScript for execution.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may utilize email rules within a compromised user's mailbox to delete and/or move emails to less noticeable folders.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Goopy has impersonated the legitimate goopdate.dll, which was dropped on the target system with a legitimate GoogleUpdate.exe.### Assistant: T1036: Masquerading
### Human:Find the techniques and ID from MITRE ATT&CK framework.,HARDRAIN uses FakeTLS to communicate with its C2 server.### Assistant: T1001: Data Obfuscation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Elise injects DLL files into iexplore.exe.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sometimes these credentials are used for automatic logons.### Assistant: T1552: Unsecured Credentials
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Thrip has obtained and used tools such as Mimikatz and PsExec.### Assistant: T1588: Obtain Capabilities