prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Resource Hijacking
|
It has distributed cryptomining malware.
|
Resource Hijacking
|
Skidmap is a kernel-mode rootkit used for cryptocurrency mining.
|
Resource Hijacking
|
It has deployed XMRig Docker images to mine cryptocurrency. It has also infected Docker containers and Kubernetes clusters with XMRig, and used RainbowMiner and lolMiner for mining cryptocurrency.
|
Service Stop
|
Avaddon looks for and attempts to stop database processes.
|
Service Stop
|
AvosLocker has terminated specific processes before encryption.
|
Service Stop
|
Babuk can stop specific services related to backups.
|
Service Stop
|
BlackCat has the ability to stop VM services on compromised networks.
|
Service Stop
|
Clop can kill several processes and services related to backups and security solutions.
|
Service Stop
|
Conti can stop up to 146 Windows services related to security, backup, database, and email solutions through the use of net stop.
|
Service Stop
|
Cuba has a hardcoded list of services and processes to terminate.
|
Service Stop
|
Diavol will terminate services using the Service Control Manager (SCM) API.
|
Service Stop
|
EKANS stops database, data backup solution, antivirus, and ICS-related processes.
|
Service Stop
|
HermeticWiper has the ability to stop the Volume Shadow Copy service.
|
Service Stop
|
HotCroissant has the ability to stop services on the infected host.
|
Service Stop
|
It has used PsExec to stop services prior to the execution of ransomware.
|
Service Stop
|
Industroyer’s data wiper module writes zeros into the registry keys in SYSTEM\CurrentControlSet\Services to render a system inoperable.
|
Service Stop
|
KillDisk terminates various processes to get the user to reboot the victim machine.
|
Service Stop
|
It has shut down virtual machines from within a victim's on-premise VMware ESXi infrastructure.
|
Service Stop
|
It has stopped the MSExchangeIS service to render Exchange contents inaccessible to users.
|
Service Stop
|
LookBack can kill processes and delete services.
|
Service Stop
|
Maze has stopped SQL services to ensure it can encrypt any database.
|
Service Stop
|
MegaCortex can stop and disable services on the system.
|
Service Stop
|
Meteor can disconnect all network adapters on a compromised host using powershell -Command "Get-WmiObject -class Win32_NetworkAdapter | ForEach { If ($.NetEnabled) { $.Disable() } }" > NUL.
|
Service Stop
|
Netwalker can terminate system processes and services, some of which relate to backup software.
|
Service Stop
|
Olympic Destroyer uses the API call ChangeServiceConfigW to disable all services on the affected system.
|
Service Stop
|
Pay2Key can stop the MS SQL service at the end of the encryption process to release files locked by the service.
|
Service Stop
|
Prestige has attempted to stop the MSSQL Windows service to ensure successful encryption using C:\Windows\System32\net.exe stop MSSQLSERVER.
|
Service Stop
|
Pysa can stop services and processes.
|
Service Stop
|
Ragnar Locker has attempted to stop services associated with business applications and databases to release the lock on files used by these applications so they may be encrypted.
|
Service Stop
|
REvil has the capability to stop services and kill processes.
|
Service Stop
|
RobbinHood stops 181 Windows services on the system before beginning the encryption process.
|
Service Stop
|
Royal can use RmShutDown to kill applications and services using the resources that are targeted for encryption.
|
Service Stop
|
Ryuk has called kill.bat for stopping services, disabling services and killing processes.
|
Service Stop
|
SLOTHFULMEDIA has the capability to stop processes and services.
|
Service Stop
|
WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores.
|
Service Stop
|
It has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.
|
System Shutdown
|
It has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR.
|
System Shutdown
|
It has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR.
|
System Shutdown
|
AvosLocker’s Linux variant has terminated ESXi virtual machines.
|
System Shutdown
|
DCSrv has a function to sleep for two hours before rebooting the system.
|
System Shutdown
|
HermeticWiper can initiate a system shutdown.
|
System Shutdown
|
KillDisk attempts to reboot the machine by terminating specific processes.
|
System Shutdown
|
It has rebooted systems after destroying files and wiping the MBR on infected systems.
|
System Shutdown
|
LockerGoga has been observed shutting down infected systems.
|
System Shutdown
|
LookBack can shutdown and reboot the victim machine.
|
System Shutdown
|
Maze has issued a shutdown command on a victim machine that, upon reboot, will run the ransomware within a VM.
|
System Shutdown
|
NotPetya will reboot the system one hour after infection.
|
System Shutdown
|
Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings.
|
System Shutdown
|
Shamoon will reboot the infected system once the wiping functionality has been completed.
|
System Shutdown
|
WhisperGate can shutdown a compromised host through execution of ExitWindowsEx with the EXW_SHUTDOWN flag.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.