text1
stringlengths
7
2.5k
labels
stringlengths
9
100
steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.
['T1005']
steals user files from local hard drives with file extensions that match a predefined list.
['T1005']
steals user files from network shared drives with file extensions and keywords that match a predefined list.
['T1039']
stores a configuration files in the startup directory to automatically execute commands in order to persist across reboots.
['T1547.001']
stores configuration values under the Registry key HKCU\Software\Microsoft\[dllname] and modifies Registry keys under HKCR\CLSID\...\InprocServer32with a path to the launcher.
['T1112']
stores information gathered from the endpoint in a file named 1.hwp.
['T1074']
stores itself in ~/Library/.DS_Stores/
['T1564.001']
stores output from command execution in a .dat file in the %TEMP% directory.
['T1074']
stores the encoded configuration file in the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentContorlSet\Control\WMI\Security.
['T1112']
supports execution from the command-line.
['T1059']
supports file encryption (AES with the key "lolomycin2017").
['T1027']
surveys a system upon check-in to discover active local network connections using the netstat -an, net use, net file, and net session commands.
['T1049']
surveys a system upon check-in to discover files in specific locations on the hard disk %TEMP% directory, the current user's desktop, and in the Program Files directory.
['T1083']
surveys a system upon check-in to discover information in the Windows Registry with the reg query command.
['T1012']
surveys a system upon check-in to discover network configuration details using the arp -a, nbtstat -n, and net config commands.
['T1016']
surveys a system upon check-in to discover operating system configuration details using the systeminfo and set commands.
['T1082']
surveys a system upon check-in to discover remote systems on a local network using the net view and net view /DOMAIN commands.
['T1018']
surveys a system upon check-in to discover the system time by using the net time command.
['T1124']
takes screenshots of the compromised system's desktop and saves them to C:\system\screenshot.bmp for exfiltration every 60 minutes.
['T1113']
terminates anti-malware processes if they’re found running on the system.
['T1562.001']
The 's Information Gathering Tool (IGT) includes PowerShell components.
['T1059.001']
The "SCOUT" variant of achieves persistence by adding itself to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.
['T1547.001']
The "tDiscoverer" variant of establishes a C2 channel by downloading resources from Web services like Twitter and GitHub. binaries contain an algorithm that generates a different Twitter handle for the malware to check for instructions every day.
['T1102']
The "Uploader" variant of visits a hard-coded server over HTTP/S to download the images uses to receive commands.
['T1071']
The "ZR" variant of will check to see if known host-based firewalls are installed on the infected systems. will attempt to establish a C2 channel, then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed.
['T1562.001']
The 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.
['T1547.009', 'T1547.001']
The backdoor compresses communications using the standard Zlib compression library.
['T1560']
The C2 channel uses an 11-byte XOR algorithm to hide data.
['T1573']
The C2 channel uses HTTP POST requests.
['T1071']
The C2 server response to a beacon sent by a variant of contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of use various XOR operations to encrypt C2 data.
['T1573']
The client has been signed by fake and invalid digital certificates.
['T1553.002']
The command and control protocol's data stream can be encrypted with AES-CBC.
['T1573']
The component KillDisk is capable of deleting Windows Event Logs.
['T1070']
The config file is encrypted with RC4.
['T1027']
The crimeware toolkit has refined its detection of sandbox analysis environments by inspecting the process list and Registry.
['T1518.001']
The discovery modules used with can collect information on accounts and permissions.
['T1087']
The discovery modules used with can collect information on network connections.
['T1049']
The discovery modules used with can collect information on process details.
['T1057']
The dropper can delete itself from the victim. Another variant has the capability to delete specified files.
['T1070.004']
The dropper copies the system file rundll32.exe to the install location for the malware, then uses the copy of rundll32.exe to load and execute the main component.
['T1218.011']
The dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file.
['T1036']
The dropper uses a function to obfuscate the name of functions and other parts of the malware.
['T1027']
The dropper uses Windows Management Instrumentation to extract information about the operating system and whether an anti-virus is active.
['T1047']
The executable version of has a module to log keystrokes.
['T1056']
The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by as a name for malware.
['T1036']
The group has been known to compress data before exfiltration.
['T1560']
The group has used other forms of obfuscation, include commingling legitimate traffic with communications traffic so that network streams appear legitimate. Some malware that has been used by also uses steganography to hide communication in PNG image files.
['T1001']
The group is known to utilize WMI for lateral movement.
['T1047']
The initial beacon packet for contains the operating system version and file system of the victim.
['T1082']
The initial beacon packet for contains the operating system version of the victim.
['T1082']
The installer loads a DLL using rundll32.
['T1218.011']
The loader implements itself with the name Security Support Provider, a legitimate Windows function. Various .exe files mimic legitimate file names used by Microsoft, Symantec, Kaspersky, Hewlett-Packard, and VMWare. also disguised malicious modules using similar filenames as custom network encryption software on victims.
['T1036']
The malware communicates through the use of events in Google Calendar.
['T1102']
The malware communicates to its command server using HTTP with an encrypted payload.
['T1071']
The malware platform can use ICMP to communicate between infected computers.
['T1095']
The malware platform can use Windows admin shares to move laterally.
['T1021.002']
The malware supports timestomping.
['T1070.006']
The net accounts and net accounts /domain commands with can be used to obtain password policy information.
['T1201']
The net time command can be used in to determine the local or remote system time.
['T1124']
The net user username \password and net user username \password \domain commands in can be used to create a local or domain account respectively.
['T1136']
The OsInfo function in collects a running process list.
['T1057']
The OsInfo function in collects the current running username.
['T1033']
The payload is stored in a hidden directory at /Users/Shared/.local/kextd.
['T1564.001']
The payload of is encrypted with simple XOR with a rotating key. The configuration file has been encrypted with RC4 keys.
['T1027']
The RAT has a keylogger.
['T1056']
The reconnaissance modules used with can collect information on network configuration.
['T1016']
There is a variant of that uses a PowerShell script instead of the traditional PE form.
['T1059.001']
The Ritsol backdoor trojan used by can download files onto a compromised host from a remote location.
['T1105']
The trojan supports file deletion.
['T1070.004']
The uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated.
['T1070.004']
To establish persistence, adds a Registry Run key with a value "TaskMgr" in an attempt to masquerade as the legitimate Windows Task Manager.
['T1036']
To establish persistence, identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start,” “Yahoo Talk,” “MSN Gaming Z0ne,” or “MSN Talk” shortcut.
['T1547.009', 'T1036', 'T1547.001']
tools attempt to spoof anti-virus processes as a means of self-defense.
['T1036']
tools contained an application to check performance of USB flash drives.
['T1120']
Traffic traversing the network will be forwarded to multiple nodes before exiting the network and continuing on to its intended destination.
['T1090.003']
transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.
['T1041']
transfers files from the compromised host via HTTP or HTTPS to a C2 server.
['T1071']
tries to add a Registry Run key under the name "Windows Update" to establish persistence.
['T1547.001']
tries to add a scheduled task to establish persistence.
['T1053.005']
TRINITY malware used by identifies payment card track data on the victim and then copies it to a local file in a subdirectory of C:\Windows\. Once the malware collects the data, actors compressed data and moved it to another staging system before exfiltration.
['T1074']
typically use ping and to enumerate systems.
['T1018']
uploads and downloads information.
['T1105']
uploads data in 2048-byte chunks.
['T1030']
uploads files and secondary payloads to the victim's machine.
['T1105']
used a cloud-based remote access software called LogMeIn for their attacks.
['T1219']
used a cron job for persistence on Mac devices.
['T1053']
used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username.
['T1033']
used a rootkit to modify typical server functionality.
['T1014']
used a SharePoint enumeration and data dumping tool known as spwebmember.
['T1213']
used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files.
['T1083']
used Base64 to encode C2 traffic.
['T1132']
used Base64 to obfuscate commands and the payload.
['T1027']
used batch scripts to enumerate network information, including information about trusts, zones, and the domain.
['T1016']
used batch scripts to enumerate users in the victim environment.
['T1087']
used cmd.exe to launch commands on the victim’s machine.
['T1059']
used command line for execution.
['T1059']
used legitimate services like Google Docs, Google Scripts, and Pastebin for C2.
['T1102']
used msxsl.exe to bypass AppLocker and to invoke Jscript code from an XSL file.
['T1220']
used PowerShell scripts for execution.
['T1059.001']
used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.
['T1018', 'T1046']