prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Obtain Capabilities:Tool | It has relied on publicly-available software to gain footholds and establish persistence in victim environments. |
Obtain Capabilities:Tool | It has utilized publicly available tools such as Mimikatz, Impacket, PWdump7, ProcDump, Nmap, and Incognito V2 for targeting efforts. |
Obtain Capabilities:Tool | It has obtained and used a customized version of PsExec, as well as use other tools such as pwdump, SDelete, and Windows Credential Editor. |
Obtain Capabilities:Tool | It has obtained and used tools such as Mimikatz, Cobalt Strike, and AdFind. |
Obtain Capabilities:Tool | It has utilized a variety of tools such as Cobalt Strike, PowerSploit, and the remote management tool, Atera for targeting efforts. |
Obtain Capabilities:Tool | It has used open-source tools such as Impacket for targeting efforts. |
Obtain Capabilities:Tool | For Frankenstein, the threat actors obtained and used Empire. |
Obtain Capabilities:Tool | For FunnyDream, the threat actors used a modified version of the open source PcShare remote administration tool. |
Obtain Capabilities:Tool | It has used a variety of widely-available tools, which in some cases they modified to add functionality and/or subvert antimalware solutions. |
Obtain Capabilities:Tool | It has obtained and used tools such as QuasarRAT and Remcos. |
Obtain Capabilities:Tool | It has acquired, and sometimes customized, open source tools such as Mimikatz, Empire, VNC remote access software, and DIG.net. |
Obtain Capabilities:Tool | It has obtained and used open-source tools such as LaZagne. |
Obtain Capabilities:Tool | It has acquired open source tools such as NBTscan and Meterpreter for their operations. |
Obtain Capabilities:Tool | It has obtained and used tools such as Mimikatz. |
Obtain Capabilities:Tool | It has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec. |
Obtain Capabilities:Tool | It has obtained tools such as RVTools and AD Explorer for their operations. |
Obtain Capabilities:Tool | It has obtained a variety of tools for their operations, including Responder and PuTTy PSCP. |
Obtain Capabilities:Tool | It has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper. |
Obtain Capabilities:Tool | It has obtained an ARP spoofing tool from GitHub. |
Obtain Capabilities:Tool | It has obtained and used tools like Havij, sqlmap, Metasploit, Mimikatz, and Plink. |
Obtain Capabilities:Tool | It has used and modified open-source tools like Impacket, Mimikatz, and pwdump. |
Obtain Capabilities:Tool | It has used Microsoft's Console Debugger in some of their operations. |
Obtain Capabilities:Tool | It has used the commercial tool DiskCryptor. |
Obtain Capabilities:Tool | It has made use of legitimate tools ConnectWise and Remote Utilities to gain access to target environment. |
Obtain Capabilities:Tool | During Night Dragon, threat actors obtained and used tools such as gsecdump. |
Obtain Capabilities:Tool | For Operation CuckooBees, the threat actors obtained publicly-available JSP code that was used to deploy a webshell onto a compromised server. |
Obtain Capabilities:Tool | For Operation Dream Job, It obtained tools such as Wake-On-Lan, Responder, ChromePass, and dbxcli. |
Obtain Capabilities:Tool | For Operation Spalax, the threat actors obtained packers such as CyaX. |
Obtain Capabilities:Tool | For Operation Wocao, the threat actors obtained a variety of open source tools, including JexBoss, KeeThief, and BloodHound. |
Obtain Capabilities:Tool | It has obtained and used open-source tools such as QuasarRAT. |
Obtain Capabilities:Tool | It has obtained and used tools such as Mimikatz and gsecdump. |
Obtain Capabilities:Tool | It has obtained and used tools such as AirVPN and plink in their operations. |
Obtain Capabilities:Tool | It has acquired open-source tools for their operations, including Invoke-PSImage, which was used to establish an encrypted channel from a compromised host to It's C2 server in preparation for the 2018 Winter Olympics attack, as well as Impacket and RemoteExec, which were used in their 2022 Prestige operations. |
Obtain Capabilities:Tool | It has obtained and modified versions of publicly-available tools like Empire and PsExec. |
Obtain Capabilities:Tool | It has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations. |
Obtain Capabilities:Tool | It has used commodity remote access tools. |
Obtain Capabilities:Tool | It has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit. |
Obtain Capabilities:Tool | It has obtained and used tools such as Mimikatz and PsExec. |
Obtain Capabilities:Tool | It has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor. |
Obtain Capabilities:Tool | It has obtained and used tools such as Mimikatz and PsExec. |
Obtain Capabilities:Tool | It has obtained and customized publicly-available tools like Mimikatz. |
Obtain Capabilities:Tool | It has used customized versions of open-source tools for C2. |
Obtain Capabilities:Tool | It has obtained and used tools such as Mimikatz. |
Obtain Capabilities:Tool | It has obtained and used Empire for post-exploitation activities. |
Obtain Capabilities:Tool | It has utilized tools such as Empire, Cobalt Strike, Cobalt Strike, Rubeus, AdFind, BloodHound, Metasploit, Advanced IP Scanner, Nirsoft PingInfoView, and SoftPerfect Network Scanner for targeting efforts. |
Obtain Capabilities:Code Signing Certificates | It has used stolen code-signing certificates for its malicious payloads. |
Obtain Capabilities:Code Signing Certificates | It has stolen legitimate certificates to sign malicious payloads. |
Obtain Capabilities:Code Signing Certificates | It has used an expired open-source X.509 certificate for testing in the OpenSSL repository, to connect to actor-controlled C2 servers. |
Obtain Capabilities:Code Signing Certificates | MegaCortex has used code signing certificates issued to fake companies to bypass security controls. |
Obtain Capabilities:Code Signing Certificates | During Operation Dream Job, It used code signing certificates issued by Sectigo RSA for some of its malware and tools. |
Obtain Capabilities:Code Signing Certificates | It has obtained stolen valid certificates, including from VMProtect and the Chinese instant messaging application Youdu, for their operations. |
Obtain Capabilities:Code Signing Certificates | It has obtained code signing certificates signed by DigiCert, GlobalSign, and COMOOD for malware payloads. |
Obtain Capabilities:Digital Certificates | It has used valid, stolen digital certificates for some of their malware and tools. |
Obtain Capabilities:Digital Certificates | It has obtained SSL certificates for their C2 domains. |
Obtain Capabilities:Digital Certificates | It has used a valid digital certificate for some of their malware. |
Obtain Capabilities:Digital Certificates | For Operation Honeybee, the threat actors stole a digital signature from Adobe Systems to use with their MaoCheng dropper. |
Obtain Capabilities:Digital Certificates | It has obtained free Let's Encrypt SSL certificates for use on their phishing pages. |
Obtain Capabilities:Exploits | It has obtained exploit code for various CVEs. |
Obtain Capabilities:Vulnerabilities | In 2017, It conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport. |
Stage Capabilities | It has used servers under their control to validate tracking pixels sent to phishing victims. |
Stage Capabilities:Upload Malware | It has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting. |
Stage Capabilities:Upload Malware | It has registered domains to stage payloads. |
Stage Capabilities:Upload Malware | For C0010, UNC3890 actors staged malware on their infrastructure for direct download onto a compromised system. |
Stage Capabilities:Upload Malware | For C0011, It hosted malicious documents on domains registered by the group. |
Stage Capabilities:Upload Malware | For C0021, the threat actors uploaded malware to websites under their control. |
Stage Capabilities:Upload Malware | It has staged malware and malicious files on compromised web servers, GitHub, and Google Drive. |
Stage Capabilities:Upload Malware | It has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive. |
Stage Capabilities:Upload Malware | It has staged legitimate software, that was trojanized to contain an Atera agent installer, on Amazon S3. |
Stage Capabilities:Upload Malware | It has registered domains to stage payloads. |
Stage Capabilities:Upload Malware | It has staged malware on fraudulent websites set up to impersonate targeted organizations. |
Stage Capabilities:Upload Malware | It has used Blogspot to host malicious content such as beacons, file exfiltrators, and implants. |
Stage Capabilities:Upload Malware | It has hosted open-source remote access Trojans used in its operations in GitHub. |
Stage Capabilities:Upload Malware | It has hosted malicious payloads on Dropbox. |
Stage Capabilities:Upload Malware | It has hosted malicious payloads on DropBox including PlugX. |
Stage Capabilities:Upload Malware | During Night Dragon, threat actors uploaded commonly available hacker tools to compromised web servers. |
Stage Capabilities:Upload Malware | For Operation Dream Job, It used compromised servers to host malware. |
Stage Capabilities:Upload Malware | For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites. |
Stage Capabilities:Upload Malware | For Operation Spalax, the threat actors staged malware and malicious files in legitimate hosting services such as OneDrive or MediaFire. |
Stage Capabilities:Upload Malware | It has used compromised domains to host its malicious payloads. |
Stage Capabilities:Upload Malware | It has uploaded malware to various platforms including Google Drive, Pastetext, Sharetext, and GitHub. |
Stage Capabilities:Upload Malware | It has staged malware on actor-controlled domains. |
Stage Capabilities:Upload Malware | It has uploaded backdoored Docker images to Docker Hub. |
Stage Capabilities:Upload Malware | It has hosted malicious payloads on Dropbox. |
Stage Capabilities:Upload Tool | For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system. |
Stage Capabilities:Upload Tool | For Operation Dream Job, It used multiple servers to host malicious tools. |
Stage Capabilities:Upload Tool | It has staged tools, including gsecdump and WCE, on previously compromised websites. |
Stage Capabilities:Drive-by Target | It has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate, but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update. |
Stage Capabilities:Drive-by Target | For C0010, the threat actors compromised the login page of a legitimate Israeli shipping company and likely established a watering hole that collected visitor information. |
Stage Capabilities:Drive-by Target | It has compromised websites to redirect traffic and to host exploit kits. |
Stage Capabilities:Drive-by Target | It has compromised a digital product website and modified multiple download links to point to trojanized versions of offered digital products. |
Stage Capabilities:Drive-by Target | It has redirected compromised machines to an actor-controlled webpage through HTML injection. |
Stage Capabilities:Drive-by Target | It has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest. |
Stage Capabilities:Drive-by Target | It has set up websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools. |
Stage Capabilities:Link Target | It has created a link to a Dropbox file that has been used in their spear-phishing operations. |
Stage Capabilities:Link Target | It has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. It has also made use of a variety of URL shorteners for these staged websites. |
Content Injection | Disco has achieved initial access and execution through content injection into DNS, HTTP, and SMB replies to targeted hosts that redirect them to download malicious files. |
Content Injection | It has injected content into DNS, HTTP, and SMB replies to redirect specifically-targeted victims to a fake Windows Update page to download malware. |
Drive-by Compromise | It has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range. |
Drive-by Compromise | It performed a watering hole attack on forbes.com in 2014 to compromise targets. |
Drive-by Compromise | It has compromised targets via strategic web compromise utilizing custom exploit kits. |