prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Archive Collected Data:Archive via Custom Method | It has used RC4 encryption before exfil. |
Archive Collected Data:Archive via Custom Method | A It malware sample encrypts data using a simple byte based XOR operation prior to exfiltration. |
Archive Collected Data:Archive via Custom Method | It's collected data is encrypted with AES before exfiltration. |
Archive Collected Data:Archive via Custom Method | MESSAGETAP has XOR-encrypted and stored contents of SMS messages that matched its target list. |
Archive Collected Data:Archive via Custom Method | metaMain has used XOR-based encryption for collected files before exfiltration. |
Archive Collected Data:Archive via Custom Method | It has encrypted documents with RC4 prior to exfiltration. |
Archive Collected Data:Archive via Custom Method | NETWIRE has used a custom encryption algorithm to encrypt collected data. |
Archive Collected Data:Archive via Custom Method | Okrum has used a custom implementation of AES encryption to encrypt collected data. |
Archive Collected Data:Archive via Custom Method | OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server. |
Archive Collected Data:Archive via Custom Method | OSX_OCEANLOTUS.D has used AES in CBC mode to encrypt collected data when saving that data to disk. |
Archive Collected Data:Archive via Custom Method | OwaAuth DES-encrypts captured credentials using the key 12345678 before writing the credentials to a log file. |
Archive Collected Data:Archive via Custom Method | Ramsay can store collected documents in a custom container after encrypting and compressing them using RC4 and WinRAR. |
Archive Collected Data:Archive via Custom Method | RawPOS encodes credit card data it collected from the victim with XOR. |
Archive Collected Data:Archive via Custom Method | Reaver encrypts collected data with an incremental XOR key prior to exfiltration. |
Archive Collected Data:Archive via Custom Method | RGDoor encrypts files with XOR before sending them back to the C2 server. |
Archive Collected Data:Archive via Custom Method | Rising Sun can archive data using RC4 encryption and Base64 encoding prior to exfiltration. |
Archive Collected Data:Archive via Custom Method | SombRAT has encrypted collected data with AES-256 using a hardcoded key. |
Archive Collected Data:Archive via Custom Method | Data SPACESHIP copies to the staging area is compressed with zlib. Bytes are rotated by four positions and XOR'ed with 0x23. |
Archive Collected Data:Archive via Custom Method | Squirrelwaffle has encrypted collected data using a XOR-based algorithm. |
Archive Collected Data:Archive via Custom Method | StrongPity can compress and encrypt archived files into multiple .sft files with a repeated xor encryption scheme. |
Archive Collected Data:Archive via Custom Method | Stuxnet encrypts exfiltrated data via C2 with static 31-byte long XOR keys. |
Archive Collected Data:Archive via Custom Method | SUGARDUMP has encrypted collected data using AES CBC mode and encoded it using Base64. |
Archive Collected Data:Archive via Custom Method | T9000 encrypts collected data using a single byte XOR key. |
Audio Capture | It has used an audio capturing utility known as SOUNDWAVE that captures microphone input. |
Audio Capture | Attor's has a plugin that is capable of recording audio using available input sound devices. |
Audio Capture | Bandook has modules that are capable of capturing audio. |
Audio Capture | Cadelspy has the ability to record audio from the compromised host. |
Audio Capture | Cobian RAT has a feature to perform voice recording on the victim’s machine. |
Audio Capture | Crimson can perform audio surveillance using microphones. |
Audio Capture | DarkComet can listen in to victims' conversations through the system’s microphone. |
Audio Capture | Derusbi is capable of performing audio captures. |
Audio Capture | DOGCALL can capture microphone data from the victim's machine. |
Audio Capture | EvilGrab has the capability to capture audio from a victim machine. |
Audio Capture | Flame can record audio using any existing hardware recording devices. |
Audio Capture | Imminent Monitor has a remote microphone monitoring capability. |
Audio Capture | InvisiMole can record sound using input audio devices. |
Audio Capture | Janicab captured audio and sent it out to a C2 server. |
Audio Capture | jRAT can capture microphone recordings. |
Audio Capture | It captures audio from the computer’s microphone. |
Audio Capture | MacMa has the ability to record audio. |
Audio Capture | MacSpy can record the sounds from microphones on a computer. |
Audio Capture | Micropsia can perform microphone recording. |
Audio Capture | NanoCore can capture audio feeds from the system. |
Audio Capture | NightClub can load a module to leverage the LAME encoder and mciSendStringW to control and capture audio. |
Audio Capture | PowerSploit's Get-MicrophoneAudio Exfiltration module can record system microphone audio. |
Audio Capture | Pupy can record sound with the microphone. |
Audio Capture | Remcos can capture data from the system’s microphone. |
Audio Capture | Revenge RAT has a plugin for microphone interception. |
Audio Capture | ROKRAT has an audio capture and eavesdropping module. |
Audio Capture | T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype. |
Audio Capture | TajMahal has the ability to capture VoiceIP application audio on an infected host. |
Audio Capture | VERMIN can perform audio capture. |
Automated Collection | AppleSeed has automatically collected data from USB drives, keystrokes, and screen images before exfiltration. |
Automated Collection | It used a batch script to perform a series of discovery techniques and saves it to a text file. |
Automated Collection | It used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks. |
Automated Collection | Attor has automatically collected data about the compromised system. |
Automated Collection | BADNEWS monitors USB devices and copies files with certain extensions to a predefined directory. |
Automated Collection | Bankshot recursively generates a list of files within a directory and sends them back to the control server. |
Automated Collection | ccf32 can be used to automatically collect files from a compromised host. |
Automated Collection | It has used custom DLLs for continuous retrieval of data from memory. |
Automated Collection | Comnie executes a batch script to store discovery information in %TEMP%\info.dat and then uploads the temporarily file to the remote C2 server. |
Automated Collection | It has used a file stealer to steal documents and images with the following extensions: txt, pdf, png, jpg, doc, xls, xlm, odp, ods, odt, rtf, ppt, xlsx, xlsm, docx, pptx, and jpeg. |
Automated Collection | Crutch can automatically monitor removable drives in a loop and copy interesting files. |
Automated Collection | Empire can automatically gather the username, domain name, machine name, and other information from a compromised system. |
Automated Collection | It scans processes on all victim systems in the environment and uses automated scripts to pull back the results. |
Automated Collection | It has used a script to iterate through a list of compromised PoS systems, copy and remove data to a log file, and to bind to events from the submit payment button. |
Automated Collection | During Frankenstein, the threat actors used Empire to automatically gather the username, domain name, machine name, and other system information. |
Automated Collection | FunnyDream can monitor files for changes and automatically collect them. |
Automated Collection | It has deployed scripts on compromised systems that automatically scan for interesting documents. |
Automated Collection | GoldFinder logged and stored information related to the route or hops a packet took from a compromised machine to a hardcoded C2 server, including the target C2 URL, HTTP response/status code, HTTP response headers and values, and data received from the C2 node. |
Automated Collection | A Helminth VBScript receives a batch script to execute a set of commands in a command prompt. |
Automated Collection | InvisiMole can sort and collect specific documents as well as generate a list of all files on a newly inserted drive and store them in an encrypted file. |
Automated Collection | It has performed frequent and scheduled data collection from victim networks. |
Automated Collection | LightNeuron can be configured to automatically collect files under a specified directory. |
Automated Collection | It has used the Csvde tool to collect Active Directory files and data. |
Automated Collection | MESSAGETAP checks two files, keyword_parm.txt and parm.txt, for instructions on how to target and save data parsed and extracted from SMS message data from the network traffic. If an SMS message contained either a phone number, IMSI number, or keyword that matched the predefined list, it is saved to a CSV file for later theft by the threat actor. |
Automated Collection | Metamorfo has automatically collected mouse clicks, continuous screenshots on the machine, and set timers to collect the contents of the clipboard and website browsing. |
Automated Collection | Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (.xls, .xlsx, .csv, .odt, .doc, .docx, .ppt, .pptx, .pdf, .mdb, .accdb, .accde, *.txt). |
Automated Collection | It used custom batch scripts to collect files automatically from a targeted system. |
Automated Collection | Mythic supports scripting of file downloads from agents. |
Automated Collection | NETWIRE can automatically archive collected data. |
Automated Collection | It has used automated collection. |
Automated Collection | During Operation Wocao, threat actors used a script to collect information about the infected system. |
Automated Collection | OutSteel can automatically scan for and collect files with specific extensions. |
Automated Collection | Pacu can automatically collect data, such as CloudFormation templates, EC2 user data, AWS Inspector reports, and IAM credential reports. |
Automated Collection | It developed a file stealer to search C:\ and collect files with certain extensions. It also executed a script to enumerate all drives, store them as a list, and upload generated files to the C2 server. |
Automated Collection | PoetRAT used file system monitoring to track modification and enable automatic exfiltration. |
Automated Collection | PoshC2 contains a module for recursively parsing through files and directories to gather valid credit card numbers. |
Automated Collection | Proxysvc automatically collects data about the victim and sends it to the control server. |
Automated Collection | Ramsay can conduct an initial scan for Microsoft Word documents on the local system, removable media, and connected network drives, before tagging and collecting them. It can continue tagging documents to collect with follow up scans. |
Automated Collection | ROADTools automatically gathers data from Azure AD environments using the Azure Graph API. |
Automated Collection | Depending on the Linux distribution, RotaJakiro executes a set of commands to collect device information and sends the collected information to the C2 server. |
Automated Collection | Rover automatically collects files from the local system and removable drives based on a predefined list of file extensions on a regular timeframe. |
Automated Collection | It monitors browsing activity and automatically captures screenshots if a victim browses to a URL matching one of a list of strings. |
Automated Collection | ShimRatReporter gathered information automatically, without instruction from a C2, related to the user and host machine that is compiled into a report and sent to the operators. |
Automated Collection | It has used tools to automatically collect system and network configuration information. |
Automated Collection | StrongPity has a file searcher component that can automatically collect and archive files based on a predefined list of file extensions. |
Automated Collection | T9000 searches removable storage devices for files with a pre-defined list of file extensions (e.g. * .doc, .ppt, .xls, .docx, .pptx, *.xlsx). Any matching files are encrypted and written to a local user directory. |
Automated Collection | TajMahal has the ability to index and compress files into a send queue for exfiltration. |
Automated Collection | It ran a command to compile an archive of file types of interest from the victim user's directories. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.