text
stringlengths
104
2.24k
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The Ke3chang group has been known to compress data before exfiltration.### Assistant: T1560: Archive Collected Data
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This could enable someone to move from unprivileged or user level permissions to SYSTEM or root permissions depending on the component that is vulnerable.### Assistant: T1068: Exploitation for Privilege Escalation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The main function of the Trojan interacts with its configured C2 server to obtain additional code to execute### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,as thousands of similar API functions exist for various system operations.### Assistant: T1106: Native API
### Human:Find the techniques and ID from MITRE ATT&CK framework.,C2 traffic from ADVSTORESHELL is encrypted, then encoded with Base64 encoding.### Assistant: T1132: Data Encoding
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An adversary may create a new instance or virtual machine within the compute service of a cloud account to evade defenses.### Assistant: T1578: Modify Cloud Compute Infrastructure
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The same code snippets are combined into a second stage JavaScript in “C:\Users\<User Name>\”### Assistant: T1033: System Owner/User Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Pillowmint has stored its malicious payload in the registry key HKLM\SOFTWARE\Microsoft\DRM.### Assistant: T1112: Modify Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Industroyer’s 61850 payload component enumerates connected network adapters and their corresponding IP addresses.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,InvisiMole has exploited CVE-2007-5633 vulnerability in the speedfan.sys driver to obtain kernel mode privileges.### Assistant: T1068: Exploitation for Privilege Escalation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,RogueRobin can save a new file to the system from the C2 server.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SDBbot has the ability to identify the user on a compromised host.### Assistant: T1033: System Owner/User Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Netwalker's PowerShell script can decode and decrypt multiple layers of obfuscation, leading to the Netwalker DLL being loaded into memory.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,exploits a known Windows privilege escalation vulnerability ( ) on unpatched computers.### Assistant: T1068: Exploitation for Privilege Escalation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Melcoz can use DLL hijacking to bypass security controls.### Assistant: T1574: Hijack Execution Flow
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If the language is found in the list, the process terminates.### Assistant: T1614: System Location Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SideTwist has the ability to collect the domain name on a compromised host.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,XCSSET uses ps aux with the grep command to enumerate common browsers and system processes potentially impacting XCSSET's exfiltration capabilities.### Assistant: T1518: Software Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Private WHOIS services display alternative information, such as their own company data, rather than the owner of the domain.### Assistant: T1583: Acquire Infrastructure
### Human:Find the techniques and ID from MITRE ATT&CK framework.,These attacks do not need to exhaust the actual resources on a system since they can simply exhaust the limits that an OS self-imposes to prevent the entire system from being overwhelmed by excessive demands on its capacity.### Assistant: T1499: Endpoint Denial of Service
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SLOTHFULMEDIA has created a service on victim machines named "TaskFrame" to establish persistence.### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may send spearphishing messages with a malicious attachment to elicit sensitive information that can be used during targeting.### Assistant: T1598: Phishing for Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Wizard Spider has collected and staged credentials and network enumeration information, using the networkdll and psfin TrickBot modules.### Assistant: T1074: Data Staged
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Kimsuky has signed files with the name EGIS CO,.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sykipot may use net group "domain admins" /domain to display accounts in the "domain admins" permissions group and net localgroup "administrators" to list local system administrator group membership.### Assistant: T1087: Account Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The tool dumps process memory, then harvests passwords and hashes by looking for text strings and regex patterns for how given applications such as Gnome Keyring, sshd, and Apache use memory to store such authentication artifacts.### Assistant: T1003: OS Credential Dumping
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Darkhotel used embedded iframes on hotel login portals to redirect selected victims to download malware.### Assistant: T1189: Drive-by Compromise
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Honeybee uses a batch file to load a DLL into the svchost.exe process.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may leverage these mechanisms to execute malicious content.### Assistant: T1569: System Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,CHOPSTICK provides access to the Windows Registry, which can be used to gather information.### Assistant: T1012: Query Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,After decryption, these 34 commands are plain text with parameters that are space delimited much like a command line### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ServHelper will attempt to enumerate Windows version and system architecture.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may hijack SIP and trust provider components to mislead operating system and application control tools to classify malicious code as signed by: * Modifying the Dll and FuncName Registry values in HKLM\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllGetSignedDataMsg\{SIP_GUID} that point to the dynamic link library providing a SIP’s CryptSIPDllGetSignedDataMsg function, which retrieves an encoded digital certificate from a signed file.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,gh0st RAT has the capability to to delete files.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Figure 5 Remote template document requesting the user to click “Enable Content” to run macro Clustering The delivery documents used in the October and November waves shared a large number of similarities, as seen in Table 1, which allowed us to cluster the activity together### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Queued APC functions are executed when the thread enters an alterable state.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This history file is available to all sessions and contains all past history since the file is not deleted when the session ends.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,UNC2452 added their own devices as allowed IDs for active sync using Set-CASMailbox, allowing it to obtain copies of victim mailboxes.### Assistant: T1098: Account Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Javali can monitor processes for open browsers and custom banking applications.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Wizard Spider has exfiltrated victim information using FTP.### Assistant: T1048: Exfiltration Over Alternative Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,After decoding their C2 server IP addresses, from obfuscated strings, both trojans will attempt to collect host information and send it to the C2 server.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,For efficiency, many protocols use symmetric cryptography once a connection is established, but use asymmetric cryptography to establish or transmit a key.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,XCSSET uses RC4 encryption over TCP to communicate with its C2 server.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.### Assistant: T1005: Data from Local System
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dark Caracal took screenshots using their Windows malware.### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Denis encodes the data sent to the server in Base64.### Assistant: T1132: Data Encoding
### Human:Find the techniques and ID from MITRE ATT&CK framework.,By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making.### Assistant: T1565: Data Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The actors also deleted specific Registry keys.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Netwalker can add the following registry entry: HKEY_CURRENT_USER\SOFTWARE\{8 random characters}.### Assistant: T1112: Modify Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Backdoor.Oldrea collects information about the Internet adapter configuration.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,A new registry entry is created at HKEY_CURRENT_USERS\Software\Microsoft\Windows\CurrentVersion\Run\Graphics with a value of “C:\ ProgramData \ Initech \Initech.exe” /run.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Keychain files are located in ~/Library/Keychains/,/Library/Keychains/, and /Network/Library/Keychains/.### Assistant: T1555: Credentials from Password Stores
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BlackEnergy is capable of taking screenshots.### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,WEBC2 can download and execute a file.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Tropic Trooper has used Windows command scripts.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,zwShell can obtain the victim IP address.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,HELLOKITTY can delete volume shadow copies on compromised hosts.### Assistant: T1490: Inhibit System Recovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,HAWKBALL has the ability to delete files.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,MAGIC HOUND TOOLSET The Magic Hound attacks did not rely on exploit code to compromise targeted systems, instead relying on executables and Microsoft Office documents, specifically Excel and Word documents containing malicious macros### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Stealth Falcon malware uses WMI to script data collection and command execution on the victim.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Resource forks have been deprecated and replaced with the application bundle structure.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FALLCHILL has been installed as a Windows service.### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TYPEFRAME can gather the disk volume information.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SideTwist can decode and decrypt messages received from C2.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Astaroth encodes data using Base64 before sending it to the C2 server.### Assistant: T1132: Data Encoding
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Inveigh ### Assistant: T1557: Adversary-in-the-Middle
### Human:Find the techniques and ID from MITRE ATT&CK framework.,* Kerberos: Preferred for mutual client-server domain authentication in Windows 2000 and later.### Assistant: T1003: OS Credential Dumping
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The credential harvesting attacks used spear-phishing emails that contained malicious Microsoft Office documents that leveraged the “attachedTemplate” technique to load a template from a remote server### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,They achieve this by restricting traffic types to enforce organizational policy in an attempt to reduce the risk inherent in such connections.### Assistant: T1599: Network Boundary Bridging
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Higaisa used a function to gather the current time.### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Invoke-Obfuscation calls the variable obfuscation technique used by the actors to obfuscate this script Random Case + {} + Ticks, which changes all variables in the script to have randomly cased characters, to be surrounded in curly braces and to include the tick (`) character, which is ignored in by PowerShell### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Azorult can collect the username from the victim’s machine.### Assistant: T1033: System Owner/User Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dragonfly 2.0 used the command query user on victim hosts.### Assistant: T1033: System Owner/User Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,In these websites they hosted malware that was digitally signed with a valid, likely stolen code signing certificate Based on VirusTotal uploads, malicious documents content, and known victims – other targeted organisations are located in Turkey, Qatar, Kuwait, United Arab Emirates, Saudi Arabia, and Lebanon### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Helminth samples have been signed with legitimate, compromised code signing certificates owned by software company AI Squared.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute.### Assistant: T1053: Scheduled Task/Job
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may also use stolen password hashes to "overpass the hash."### Assistant: T1550: Use Alternate Authentication Material
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BADCALL collects the computer name and host name on the compromised system.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Interactive command shells may be in use, and common functionality within cmd may be used to gather information.### Assistant: T1039: Data from Network Shared Drive
### Human:Find the techniques and ID from MITRE ATT&CK framework.,CopyKittens uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Two of them are MacOS X User-Agents and the third is a hashed string: Mozilla/5.0 (iPad; U; CPU OS 3_2_1 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Mobile/BADDAD Mozilla/5.0 (iPad; U; CPU OS 3_2_1 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Mobile/7B405 E9BC3BD76216AFA560BFB5ACAF5731A3 Figure 5: SpeakUp `s requests are encrypted with the salted base64 and include the unique User-Agent At the moment SpeakUp serves XMRig miners to its listening infected servers### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,DOGCALL is capable of leveraging cloud storage APIs such as Cloud, Box, Dropbox, and Yandex for C2.### Assistant: T1102: Web Service
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The APT1 group is known to have used RDP during operations.### Assistant: T1021: Remote Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Zeus Panda collects the current system time and sends it back to the C2 server.### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Webshell has the ability to modify file permissions.### Assistant: T1222: File and Directory Permissions Modification
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GrimAgent has the ability to download and execute additional payloads.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,DarkVishnya performed port scanning to obtain the list of active services.### Assistant: T1046: Network Service Scanning
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SYSCON has been executed by luring victims to open malicious e-mail attachments.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Generally, the links will be accompanied by social engineering text and require the user to actively click or copy and paste a URL into a browser, leveraging User Execution.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,More_eggs has the capability to gather the OS version and computer name.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Bisonal's DLL file and non-malicious decoy file are encrypted with RC4.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,menuPass has used certutil in a macro to decode base64-encoded content contained in a dropper document attached to an email.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If a search order-vulnerable program is configured to run at a higher privilege level, then the adversary-controlled DLL that is loaded will also be executed at the higher level.### Assistant: T1574: Hijack Execution Flow
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Brave Prince lists the running processes.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,On macOS 10.10 Yosemite and higher, AppleScript has the ability to execute Native APIs, which otherwise would require compilation and execution in a mach-O binary file format..### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,While invoking API functions, adversaries may also attempt to bypass defensive tools .### Assistant: T1106: Native API
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dridex contains a module for VNC.### Assistant: T1219: Remote Access Software
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Tools may be placed on infrastructure that was previously purchased/rented by the adversary or was otherwise compromised by them .### Assistant: T1608: Stage Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Elise executes net user after initial communication is made to the remote server.### Assistant: T1087: Account Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Chimera has used the NtdsAudit utility to collect information related to accounts and passwords.### Assistant: T1201: Password Policy Discovery