prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Resource Hijacking | It has distributed cryptomining malware. |
Resource Hijacking | Skidmap is a kernel-mode rootkit used for cryptocurrency mining. |
Resource Hijacking | It has deployed XMRig Docker images to mine cryptocurrency. It has also infected Docker containers and Kubernetes clusters with XMRig, and used RainbowMiner and lolMiner for mining cryptocurrency. |
Service Stop | Avaddon looks for and attempts to stop database processes. |
Service Stop | AvosLocker has terminated specific processes before encryption. |
Service Stop | Babuk can stop specific services related to backups. |
Service Stop | BlackCat has the ability to stop VM services on compromised networks. |
Service Stop | Clop can kill several processes and services related to backups and security solutions. |
Service Stop | Conti can stop up to 146 Windows services related to security, backup, database, and email solutions through the use of net stop. |
Service Stop | Cuba has a hardcoded list of services and processes to terminate. |
Service Stop | Diavol will terminate services using the Service Control Manager (SCM) API. |
Service Stop | EKANS stops database, data backup solution, antivirus, and ICS-related processes. |
Service Stop | HermeticWiper has the ability to stop the Volume Shadow Copy service. |
Service Stop | HotCroissant has the ability to stop services on the infected host. |
Service Stop | It has used PsExec to stop services prior to the execution of ransomware. |
Service Stop | Industroyer鈥檚 data wiper module writes zeros into the registry keys in SYSTEM\CurrentControlSet\Services to render a system inoperable. |
Service Stop | KillDisk terminates various processes to get the user to reboot the victim machine. |
Service Stop | It has shut down virtual machines from within a victim's on-premise VMware ESXi infrastructure. |
Service Stop | It has stopped the MSExchangeIS service to render Exchange contents inaccessible to users. |
Service Stop | LookBack can kill processes and delete services. |
Service Stop | Maze has stopped SQL services to ensure it can encrypt any database. |
Service Stop | MegaCortex can stop and disable services on the system. |
Service Stop | Meteor can disconnect all network adapters on a compromised host using powershell -Command "Get-WmiObject -class Win32_NetworkAdapter | ForEach { If ($.NetEnabled) { $.Disable() } }" > NUL. |
Service Stop | Netwalker can terminate system processes and services, some of which relate to backup software. |
Service Stop | Olympic Destroyer uses the API call ChangeServiceConfigW to disable all services on the affected system. |
Service Stop | Pay2Key can stop the MS SQL service at the end of the encryption process to release files locked by the service. |
Service Stop | Prestige has attempted to stop the MSSQL Windows service to ensure successful encryption using C:\Windows\System32\net.exe stop MSSQLSERVER. |
Service Stop | Pysa can stop services and processes. |
Service Stop | Ragnar Locker has attempted to stop services associated with business applications and databases to release the lock on files used by these applications so they may be encrypted. |
Service Stop | REvil has the capability to stop services and kill processes. |
Service Stop | RobbinHood stops 181 Windows services on the system before beginning the encryption process. |
Service Stop | Royal can use RmShutDown to kill applications and services using the resources that are targeted for encryption. |
Service Stop | Ryuk has called kill.bat for stopping services, disabling services and killing processes. |
Service Stop | SLOTHFULMEDIA has the capability to stop processes and services. |
Service Stop | WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores. |
Service Stop | It has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption. |
System Shutdown | It has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR. |
System Shutdown | It has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR. |
System Shutdown | AvosLocker鈥檚 Linux variant has terminated ESXi virtual machines. |
System Shutdown | DCSrv has a function to sleep for two hours before rebooting the system. |
System Shutdown | HermeticWiper can initiate a system shutdown. |
System Shutdown | KillDisk attempts to reboot the machine by terminating specific processes. |
System Shutdown | It has rebooted systems after destroying files and wiping the MBR on infected systems. |
System Shutdown | LockerGoga has been observed shutting down infected systems. |
System Shutdown | LookBack can shutdown and reboot the victim machine. |
System Shutdown | Maze has issued a shutdown command on a victim machine that, upon reboot, will run the ransomware within a VM. |
System Shutdown | NotPetya will reboot the system one hour after infection. |
System Shutdown | Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings. |
System Shutdown | Shamoon will reboot the infected system once the wiping functionality has been completed. |
System Shutdown | WhisperGate can shutdown a compromised host through execution of ExitWindowsEx with the EXW_SHUTDOWN flag. |