prompt
stringclasses
508 values
procedure
stringlengths
20
478
Obtain Capabilities:Tool
It has relied on publicly-available software to gain footholds and establish persistence in victim environments.
Obtain Capabilities:Tool
It has utilized publicly available tools such as Mimikatz, Impacket, PWdump7, ProcDump, Nmap, and Incognito V2 for targeting efforts.
Obtain Capabilities:Tool
It has obtained and used a customized version of PsExec, as well as use other tools such as pwdump, SDelete, and Windows Credential Editor.
Obtain Capabilities:Tool
It has obtained and used tools such as Mimikatz, Cobalt Strike, and AdFind.
Obtain Capabilities:Tool
It has utilized a variety of tools such as Cobalt Strike, PowerSploit, and the remote management tool, Atera for targeting efforts.
Obtain Capabilities:Tool
It has used open-source tools such as Impacket for targeting efforts.
Obtain Capabilities:Tool
For Frankenstein, the threat actors obtained and used Empire.
Obtain Capabilities:Tool
For FunnyDream, the threat actors used a modified version of the open source PcShare remote administration tool.
Obtain Capabilities:Tool
It has used a variety of widely-available tools, which in some cases they modified to add functionality and/or subvert antimalware solutions.
Obtain Capabilities:Tool
It has obtained and used tools such as QuasarRAT and Remcos.
Obtain Capabilities:Tool
It has acquired, and sometimes customized, open source tools such as Mimikatz, Empire, VNC remote access software, and DIG.net.
Obtain Capabilities:Tool
It has obtained and used open-source tools such as LaZagne.
Obtain Capabilities:Tool
It has acquired open source tools such as NBTscan and Meterpreter for their operations.
Obtain Capabilities:Tool
It has obtained and used tools such as Mimikatz.
Obtain Capabilities:Tool
It has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec.
Obtain Capabilities:Tool
It has obtained tools such as RVTools and AD Explorer for their operations.
Obtain Capabilities:Tool
It has obtained a variety of tools for their operations, including Responder and PuTTy PSCP.
Obtain Capabilities:Tool
It has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.
Obtain Capabilities:Tool
It has obtained an ARP spoofing tool from GitHub.
Obtain Capabilities:Tool
It has obtained and used tools like Havij, sqlmap, Metasploit, Mimikatz, and Plink.
Obtain Capabilities:Tool
It has used and modified open-source tools like Impacket, Mimikatz, and pwdump.
Obtain Capabilities:Tool
It has used Microsoft's Console Debugger in some of their operations.
Obtain Capabilities:Tool
It has used the commercial tool DiskCryptor.
Obtain Capabilities:Tool
It has made use of legitimate tools ConnectWise and Remote Utilities to gain access to target environment.
Obtain Capabilities:Tool
During Night Dragon, threat actors obtained and used tools such as gsecdump.
Obtain Capabilities:Tool
For Operation CuckooBees, the threat actors obtained publicly-available JSP code that was used to deploy a webshell onto a compromised server.
Obtain Capabilities:Tool
For Operation Dream Job, It obtained tools such as Wake-On-Lan, Responder, ChromePass, and dbxcli.
Obtain Capabilities:Tool
For Operation Spalax, the threat actors obtained packers such as CyaX.
Obtain Capabilities:Tool
For Operation Wocao, the threat actors obtained a variety of open source tools, including JexBoss, KeeThief, and BloodHound.
Obtain Capabilities:Tool
It has obtained and used open-source tools such as QuasarRAT.
Obtain Capabilities:Tool
It has obtained and used tools such as Mimikatz and gsecdump.
Obtain Capabilities:Tool
It has obtained and used tools such as AirVPN and plink in their operations.
Obtain Capabilities:Tool
It has acquired open-source tools for their operations, including Invoke-PSImage, which was used to establish an encrypted channel from a compromised host to It's C2 server in preparation for the 2018 Winter Olympics attack, as well as Impacket and RemoteExec, which were used in their 2022 Prestige operations.
Obtain Capabilities:Tool
It has obtained and modified versions of publicly-available tools like Empire and PsExec.
Obtain Capabilities:Tool
It has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.
Obtain Capabilities:Tool
It has used commodity remote access tools.
Obtain Capabilities:Tool
It has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.
Obtain Capabilities:Tool
It has obtained and used tools such as Mimikatz and PsExec.
Obtain Capabilities:Tool
It has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor.
Obtain Capabilities:Tool
It has obtained and used tools such as Mimikatz and PsExec.
Obtain Capabilities:Tool
It has obtained and customized publicly-available tools like Mimikatz.
Obtain Capabilities:Tool
It has used customized versions of open-source tools for C2.
Obtain Capabilities:Tool
It has obtained and used tools such as Mimikatz.
Obtain Capabilities:Tool
It has obtained and used Empire for post-exploitation activities.
Obtain Capabilities:Tool
It has utilized tools such as Empire, Cobalt Strike, Cobalt Strike, Rubeus, AdFind, BloodHound, Metasploit, Advanced IP Scanner, Nirsoft PingInfoView, and SoftPerfect Network Scanner for targeting efforts.
Obtain Capabilities:Code Signing Certificates
It has used stolen code-signing certificates for its malicious payloads.
Obtain Capabilities:Code Signing Certificates
It has stolen legitimate certificates to sign malicious payloads.
Obtain Capabilities:Code Signing Certificates
It has used an expired open-source X.509 certificate for testing in the OpenSSL repository, to connect to actor-controlled C2 servers.
Obtain Capabilities:Code Signing Certificates
MegaCortex has used code signing certificates issued to fake companies to bypass security controls.
Obtain Capabilities:Code Signing Certificates
During Operation Dream Job, It used code signing certificates issued by Sectigo RSA for some of its malware and tools.
Obtain Capabilities:Code Signing Certificates
It has obtained stolen valid certificates, including from VMProtect and the Chinese instant messaging application Youdu, for their operations.
Obtain Capabilities:Code Signing Certificates
It has obtained code signing certificates signed by DigiCert, GlobalSign, and COMOOD for malware payloads.
Obtain Capabilities:Digital Certificates
It has used valid, stolen digital certificates for some of their malware and tools.
Obtain Capabilities:Digital Certificates
It has obtained SSL certificates for their C2 domains.
Obtain Capabilities:Digital Certificates
It has used a valid digital certificate for some of their malware.
Obtain Capabilities:Digital Certificates
For Operation Honeybee, the threat actors stole a digital signature from Adobe Systems to use with their MaoCheng dropper.
Obtain Capabilities:Digital Certificates
It has obtained free Let's Encrypt SSL certificates for use on their phishing pages.
Obtain Capabilities:Exploits
It has obtained exploit code for various CVEs.
Obtain Capabilities:Vulnerabilities
In 2017, It conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport.
Stage Capabilities
It has used servers under their control to validate tracking pixels sent to phishing victims.
Stage Capabilities:Upload Malware
It has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting.
Stage Capabilities:Upload Malware
It has registered domains to stage payloads.
Stage Capabilities:Upload Malware
For C0010, UNC3890 actors staged malware on their infrastructure for direct download onto a compromised system.
Stage Capabilities:Upload Malware
For C0011, It hosted malicious documents on domains registered by the group.
Stage Capabilities:Upload Malware
For C0021, the threat actors uploaded malware to websites under their control.
Stage Capabilities:Upload Malware
It has staged malware and malicious files on compromised web servers, GitHub, and Google Drive.
Stage Capabilities:Upload Malware
It has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive.
Stage Capabilities:Upload Malware
It has staged legitimate software, that was trojanized to contain an Atera agent installer, on Amazon S3.
Stage Capabilities:Upload Malware
It has registered domains to stage payloads.
Stage Capabilities:Upload Malware
It has staged malware on fraudulent websites set up to impersonate targeted organizations.
Stage Capabilities:Upload Malware
It has used Blogspot to host malicious content such as beacons, file exfiltrators, and implants.
Stage Capabilities:Upload Malware
It has hosted open-source remote access Trojans used in its operations in GitHub.
Stage Capabilities:Upload Malware
It has hosted malicious payloads on Dropbox.
Stage Capabilities:Upload Malware
It has hosted malicious payloads on DropBox including PlugX.
Stage Capabilities:Upload Malware
During Night Dragon, threat actors uploaded commonly available hacker tools to compromised web servers.
Stage Capabilities:Upload Malware
For Operation Dream Job, It used compromised servers to host malware.
Stage Capabilities:Upload Malware
For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.
Stage Capabilities:Upload Malware
For Operation Spalax, the threat actors staged malware and malicious files in legitimate hosting services such as OneDrive or MediaFire.
Stage Capabilities:Upload Malware
It has used compromised domains to host its malicious payloads.
Stage Capabilities:Upload Malware
It has uploaded malware to various platforms including Google Drive, Pastetext, Sharetext, and GitHub.
Stage Capabilities:Upload Malware
It has staged malware on actor-controlled domains.
Stage Capabilities:Upload Malware
It has uploaded backdoored Docker images to Docker Hub.
Stage Capabilities:Upload Malware
It has hosted malicious payloads on Dropbox.
Stage Capabilities:Upload Tool
For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system.
Stage Capabilities:Upload Tool
For Operation Dream Job, It used multiple servers to host malicious tools.
Stage Capabilities:Upload Tool
It has staged tools, including gsecdump and WCE, on previously compromised websites.
Stage Capabilities:Drive-by Target
It has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate, but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update.
Stage Capabilities:Drive-by Target
For C0010, the threat actors compromised the login page of a legitimate Israeli shipping company and likely established a watering hole that collected visitor information.
Stage Capabilities:Drive-by Target
It has compromised websites to redirect traffic and to host exploit kits.
Stage Capabilities:Drive-by Target
It has compromised a digital product website and modified multiple download links to point to trojanized versions of offered digital products.
Stage Capabilities:Drive-by Target
It has redirected compromised machines to an actor-controlled webpage through HTML injection.
Stage Capabilities:Drive-by Target
It has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.
Stage Capabilities:Drive-by Target
It has set up websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.
Stage Capabilities:Link Target
It has created a link to a Dropbox file that has been used in their spear-phishing operations.
Stage Capabilities:Link Target
It has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. It has also made use of a variety of URL shorteners for these staged websites.
Content Injection
Disco has achieved initial access and execution through content injection into DNS, HTTP, and SMB replies to targeted hosts that redirect them to download malicious files.
Content Injection
It has injected content into DNS, HTTP, and SMB replies to redirect specifically-targeted victims to a fake Windows Update page to download malware.
Drive-by Compromise
It has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range.
Drive-by Compromise
It performed a watering hole attack on forbes.com in 2014 to compromise targets.
Drive-by Compromise
It has compromised targets via strategic web compromise utilizing custom exploit kits.