TechniqueRAG-Datasets / test /expert_fewshot_rankgpt_test.json
lekssays's picture
Upload folder using huggingface_hub
10d6b17 verified
[
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware operates on victims\u2019 systems as a svchost-based service and is capable of downloading executables, changing its own configuration, updating its own binaries, terminating its own processes, and activating and terminating denial-of-service attacks\n\t - T1543: Create or Modify System Process\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Run commands on Windows system remotely using Winexe: Winexe is a GNU/Linux-based application that allows users to execute commands remotely on WindowsNT/2000/XP/2003/Vista/7/8 systems. It installs a service on the remote system, executes the command, and uninstalls the service. Winexe allows execution of most of the windows shell commands\n\t - T1569.002: System Services - Service Execution\n- Text: The victims Data from Cadelle\u2019s C&C servers shows that a large number of Backdoor.Cadelspy infections affected individual users of Iranian internet service providers (ISPs) and hosting services\n\t - T1543: Create or Modify System Process\n\t - T1543.003: Create or Modify System Process - Windows Service\n",
"input": "\nThis next stage library copies itself into the System32 directory of the Windows folder after the hardcoded file name \u2014 either KBDLV2.DLL or AUTO.DLL, depending on the malware sample. Then the service is created for the service dll. Service names also can differ from version to version; we discovered the following names \u2014 DriverManage, WebService and WebClientManager. These functions assure malware persistence in a compromised OS between system reboots.",
"gold": "- T1543.003: Create or Modify System Process - Windows Service\n- T1543: Create or Modify System Process\n- T1569.002: System Services - Service Execution\n- T1036.005: Masquerading - Match Legitimate Name or Location\n- T1036.004: Masquerading - Masquerade Task or Service",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C server.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: 0x007CFABF video Desktop video recording 0x06E533C4 download Downloads executable and injects into new process 0x00684509 ammyy Ammyy Admin tool 0x07C6A8A5 update Updates self 0x0B22A5A7 Add/Update klgconfig (analysis incomplete) 0x0B77F949 httpproxy Starts HTTP proxy 0x07203363 killos Renders computer unbootable by wiping the MBR 0x078B9664 reboot Reboots the operating system 0x07BC54BC tunnel Creates a network tunnel 0x07B40571 adminka Adds new C2 server or proxy address for pseudo-HTTP protocol 0x079C9CC2 server Adds new C2 server for custom binary protocol 0x0007C9C2 user Creates or deletes Windows user account 0x000078B0 rdp Enables concurrent RDP (analysis incomplete) 0x079BAC85 secure Adds Notification Package (analysis incomplete) 0x00006ABC del Deletes file or service 0x0A89AF94 startcmd Adds command to the configuration file (see the Configuration section) 0x079C53BD runmem Downloads executable and injects directly into new process 0x0F4C3903 logonpasswords Send Windows accounts details to the C2 server 0x0BC205E4 screenshot Takes a screenshot of the desktop and sends it to the C2 server 0x007A2BC0 sleep Backdoor sleeps until specified date 0x0006BC6C dupl Unknown 0x04ACAFC3 Upload files to the C2 server 0x00007D43 vnc Runs VNC plugin 0x09C4D055 runfile Runs specified executable file 0x02032914 killbot Uninstalls backdoor 0x08069613 listprocess Returns list of running processes to the C2 server 0x073BE023 plugins Change C2 protocol used by plugins 0x0B0603B4 Download and execute shellcode from specified address 0x0B079F93 killprocess Terminates the first process found specified by name 0x00006A34 cmd Initiates a reverse shell to the C2 server 0x09C573C7 runplug Plugin control 0x08CB69DE autorun Updates backdoor Table 2: Supported Commands Configuration A configuration file resides in a file under the backdoor\u2019s installation directory with the .bin extension\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1105: Ingress Tool Transfer\n\t - T1008: Fallback Channels\n- Text: PoetRAT has used ftp for exfiltration.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n",
"input": "\nAfter executing all the commands given by the server, the bot sends a new request to the server. This request contains a complete log of executed commands. If any of the commands require the bot to send data to the server (i.e., SONIA), they are sent in separate HTTP requests preceding the log request. These requests can also be redirected do a different C&C, if specified in the command parameters.",
"gold": "- T1041: Exfiltration Over C2 Channel\n- T1071: Application Layer Protocol\n- T1071.001: Application Layer Protocol - Web Protocols\n- T1008: Fallback Channels\n- T1020: Automated Exfiltration\n- T1119: Automated Collection",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rancor has downloaded additional malware, including by using certutil.\n\t - T1105: Ingress Tool Transfer\n- Text: BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: The following command line is a service created by CobaltStrike and can be found in Windows Event Logs (event id 7045). It runs an encoded powershell command\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n",
"input": "\nIn a 2021 campaign, two weeks after PROPHET SPIDER ceased interactive operations, an unattributed actor downloaded a Cobalt Strike stager DLL from a remote IP address. When run with the argument 11985756, the DLL downloaded a Cobalt Strike payload. The adversary used ADFind to enumerate Active Directory, then moved laterally, using a compromised administrative account, and downloading additional Cobalt Strike Beacon payloads onto some systems, or using PSExec to run Cobalt Strike. The adversary further used PowerSploit to enumerate the victim environment. Before deploying ransomware, the adversary staged data in ZIP archives and likely exfiltrated these archives. Batch scripts subsequently deployed MountLocker across the victim environment.",
"gold": "- T1105: Ingress Tool Transfer\n- T1570: Lateral Tool Transfer\n- T1074: Data Staged\n- T1059: Command and Scripting Interpreter\n- T1005: Data from Local System\n- T1078.002: Valid Accounts - Domain Accounts",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TEMP.Veles has planted Web shells on Outlook Exchange servers.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: KOCTOPUS has used `cmd.exe` and batch files for execution.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: 1) Text file Drive.txt (SHA-256: 4f75622c2dd839fb5db7e37fb0528e38c4eb107690f51f00b5331e863dc645d1) is created and contains the decimal-decoded VBS content. Similarly, the VBA code then writes batch code to another text file - Audio.txt. The content of both files is shown in the appendix section of this report. Audio.bat continues by creating two scheduled tasks referencing two files that are yet to exist: dphc.exe will run every 10 minutes and Drive.vbs at 20 minute intervals. When Drive.vbs is eventually executed by the task scheduler, it will download the BackConfig executable payload. In the case of file 8892279f3. the remote location is http://185.203.119[.]184/Dropbox/request. and only continues if the file exists. 2) Text file Drive.txt (SHA-256: 4f75622c2dd839fb5db7e37fb0528e38c4eb107690f51f00b5331e863dc645d1) is created and contains the decimal-decoded VBS content. The content of both files is shown in the appendix section of this report. and only continues if the file exists\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n",
"input": "\nOn April 24, 2017, a fourth IP address, this one apparently in the United States, issued 61 commands to the TwoFace webshell. Like the previous set of commands issued in March 2017 from France, this IP address issued the command to obtain objects in the Exchange Trusted Subsystem group, and it appears the actor copied over yet another webshell named \u201cglobal.aspx\u201d and set the file\u2019s attributes to be hidden using the following command:",
"gold": "- T1083: File and Directory Discovery\n- T1105: Ingress Tool Transfer\n- T1564.001: Hide Artifacts - Hidden Files and Directories",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Implant directory contained in the malicious Flash file\n\t - T1083: File and Directory Discovery\n- Text: automatically collects files from the local system and removable drives based on a predefined list of file extensions on a regular timeframe.\n\t - T1119: Automated Collection\n- Text: They dumped specific hives from the Windows Registry, such as the SAM hive, which contains password hashes\n\t - T1005: Data from Local System\n",
"input": "\nOut of all the modules used in this attack, Filesystem.dll might be the only one whose code was actually written by the attackers themselves. The purpose of this module is to enumerate drives, folders and files on the infected system and write the final results to two text files: Drives.txt and Files.txt.",
"gold": "- T1083: File and Directory Discovery\n- T1074.001: Data Staged - Local Data Staging",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.\n\t - T1014: Rootkit\n\t - T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking\n- Text: TrickBot has the ability to capture RDP credentials by capturing the \"CredEnumerateA\" API\n\t - T1056.004: Input Capture - Credential API Hooking\n- Text: It also turns off the Windows Security Center service to prevent alerting the user about the disabled firewall\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n",
"input": "\nThe hooking of IofCallDriver is implemented in a relatively unconventional way. The hook unwinds the execution stack; if it finds any driver in the stack which is not in the rootkit\u2019s allowlist, and that driver attempts to read certain files, a fake \u201creading successful\u201d status is returned. However, the file is not actually read.",
"gold": "- T1057: Process Discovery\n- T1014: Rootkit\n- T1518.001: Software Discovery - Security Software Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The FunnyDream Keyrecord component can capture keystrokes.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Malware used by is capable of capturing keystrokes.\n\t - T1056: Input Capture\n- Text: Gold Dragon uses cmd.exe to execute commands for discovery.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n",
"input": "\nThis attacker utilized an additional keylogging utility named C:\\ProgramData\\psh\\console.exe. The keylogging utility was configured to capture and record keystrokes to C:\\ProgramData\\psh\\System32Log.txt.",
"gold": "- T1056: Input Capture\n- T1056.001: Input Capture - Keylogging\n- T1074.001: Data Staged - Local Data Staging\n- T1074: Data Staged",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT40 leverages exploits in their phishing operations, often weaponizing vulnerabilities within days of their disclosure\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Less than a week after Microsoft issued a patch for CVE-2017-11882 on Nov\n\t - T1203: Exploitation for Client Execution\n- Text: Chinese state-sponsored cyber actors have been observed exploiting Pulse Secure VPN appliances to view and extract valid user credentials and network information from the servers.\n\t - T1212: Exploitation for Credential Access\n",
"input": "\nOur Ramnit sample exploits both CVE-2013-3660 (by PlayBit) and CVE-2014-4113 (using the same exploit code originally found as a 0-Day). The original exploit for CVE-2014-4113 was part of an exploit framework in which the API passes a command-line argument, and that command is executed as SYSTEM. As that wasn\u2019t the original API for PlayBit\u2019s exploit, some adjustments were made and PlayBit\u2019s exploits were re-adjusted to receive a command-line argument to be executed once elevated.",
"gold": "- T1068: Exploitation for Privilege Escalation\n- T1203: Exploitation for Client Execution",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: S-Type may save itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: The weaponized Office documents were found to be hosted either on what appeared to be compromised legitimate websites, or on websites using domain names similar to legitimate domain names in appearance\n\t - T1036: Masquerading\n\t - T1102: Web Service\n- Text: Pony has attempted to lure targets into downloading an attached executable (ZIP, RAR, or CAB archives) or document (PDF or other MS Office format).\n\t - T1204.002: User Execution - Malicious File\n",
"input": "\nThis attack consisted of maldocs masquerading as internal government or military documents. For example, some of the maldocs discovered by Talos masquerade as Indian Air Publications (IAP) documents dictating safeguard procedures for the IT infrastructure of the Indian Air Force (IAF). These documents are aptly named:",
"gold": "- T1036: Masquerading",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Crutch has used the WinRAR utility to compress and encrypt stolen files.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: The malware will collect data from the victim machine and write this information to LOCALAPPDATA%\\MicroSoft Updatea\\uplog.tmp. The following information is collected from the victim\n\t - T1074.001: Data Staged - Local Data Staging\n",
"input": "\nMandiant observed this attacker dump the LSASS process using Task Manager to a file named lsass.DMP, and later, zip the dump into two files named lsass.zip and lsass2.zip located in the C:\\ProgramData\\psh\\ directory.",
"gold": "- T1003.001: OS Credential Dumping - LSASS Memory\n- T1560: Archive Collected Data\n- T1003: OS Credential Dumping\n- T1074.001: Data Staged - Local Data Staging\n- T1074: Data Staged\n- T1560.001: Archive Collected Data - Archive via Utility\n- T1003.004: OS Credential Dumping - LSA Secrets",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can perform process injection by using a reflective DLL.\n\t - T1055: Process Injection\n- Text: has a command to download an .exe and use process hollowing to inject it into a new process.\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: Sykipot injects itself into running instances of outlook.exe, iexplore.exe, or firefox.exe.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n",
"input": "\nThe main payload is encrypted and packed inside the .tls section of the second stage injector. It first gets decrypted and then unpacked with the aPLib compression library. As persistence method, the main payload copies the initial loader to the AppData folder and creates a Jscript file inside the Startup folder which points to it. The second stage injector injects the main payload inside a x86 instance of svchost and patches its API function calls with an obfuscation technique to make static and dynamic analysis of the malware more difficult.",
"gold": "- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1027.002: Obfuscated Files or Information - Software Packing\n- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- T1055: Process Injection\n- T1036: Masquerading\n- T1055.012: Process Injection - Process Hollowing\n- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Generate payloads in various formats: Format Architecture Short Name Android Package x86 & ARMv7 apk Linux Binary x86 lin_x86 Linux Binary x64 lin_x64 Linux Shared Object x86 so_x86 Linux Shared Object x64 so_x64 Windows PE Executable x86 exe_x86 Windows PE Executable x64 exe_x64 Windows DLL x86 dll_x86 Windows DLL x64 dll_x64 Python Script x86 & x64 py PyInstaller x86 & x64 pyinst Python Oneliner x86 & x64 py_oneliner Powershell x86 & x64 ps1 Powershell Oneliner x86 & x64 ps1_oneliner Ducky Script N/A rubber_ducky Deploy in memory from a single command line using python or powershell one-liners\n\t - T1106: Native API\n\t - T1010: Application Window Discovery\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Lazarus Group has abused the \"KernelCallbackTable\" to hijack process control flow and execute shellcode.\n\t - T1574.013: Hijack Execution Flow - KernelCallbackTable\n- Text: Zox has the ability to leverage local and remote exploits to escalate privileges.\n\t - T1068: Exploitation for Privilege Escalation\n",
"input": "\nAfter the bootstrap is finished, the exploit triggers a call to the NtGdiBitBlt syscall. This initiates a chain of events in the Windows kernel and eventually passes the flow back to our user-mode callback (DrvBitBlt()) registered by our UMPD. Here lies the heart of the exploit.",
"gold": "- T1068: Exploitation for Privilege Escalation\n- T1106: Native API",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ZIP archive contains a malicious portable executable (PE) file with embedded HTML application (HTA). The user has to unzip the archive and double-click the executable for the infection chain to continue. The PE file is a simple HTA script compiled into an executable. When the user double-clicks the executable, the malicious HTA file is extracted to %temp% and executed by mshta.exe\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1204.002: User Execution - Malicious File\n- Text: GoldenSpy's setup file installs initial executables under the folder \"%WinDir%\\System32\\PluginManager\".\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: The weaponized Office documents were found to be hosted either on what appeared to be compromised legitimate websites, or on websites using domain names similar to legitimate domain names in appearance\n\t - T1036: Masquerading\n\t - T1102: Web Service\n",
"input": "\nThe smartpss.exe file contained metadata describing itself as MSHTA.exe from Microsoft, a legitimate operating system component, but the MD5 hash was unknown. Disassembly analysis of the program showed it was a small application that loaded the IE COM object and launched the function RunHTMLApplication() against the command line argument provided. This functionality matched the behavior of the legitimate MSHTA.exe despite the hash discrepancy. Further analysis showed that the malware was based on a 2018 version of the binary (original hash: 5ced5d5b469724d9992f5e8117ecefb5) with only six bytes of data appended, as shown in Figure 4.",
"gold": "- T1036: Masquerading\n- T1218.005: System Binary Proxy Execution - Mshta\n- T1559.001: Inter-Process Communication - Component Object Model",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT3\u00a0(also known as UPS), the actors responsible for\u00a0Operation Clandestine Fox\u00a0has quietly continued to send waves of spearphishing messages over the past few months. This actor initiated their most recent campaign on November 19, 2014 targeting multiple organizations. The attacker leveraged multiple exploits, targeting both\u00a0CVE-2014-6332\u00a0and\u00a0CVE-2014-4113. CVE-2014-6332 was disclosed publicly on 2014-11-11 and is a Windows OLE Automation Array Remote Code Execution vulnerability. CVE-2014-4113 is a privilege escalation vulnerability that was\u00a0disclosed publicly on 2014-10-14.\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1566.003: Phishing - Spearphishing via Service\n\t - T1534: Internal Spearphishing\n- Text: CVE-2018-4878 was the second most commonly observed vulnerability and is the only Adobe Flash Player vulnerability on this year\u2019s top 10. Like CVE-2018-8174, this vulnerability was included in multiple exploit kits, most notably the Fallout exploit kit, which was used to distribute GandCrab ransomware. Fallout took its name and URI patterns from the now defunct Nuclear exploit kit, which had been associated with CVE-2015-7645, one of 2016\u2019s top 10 vulnerabilities. In 2018, Fallout was last selling for $300 a week and $1,100 a month, as seen below.\n\t - T1203: Exploitation for Client Execution\n\t - T1588.005: Obtain Capabilities - Exploits\n- Text: Volatile Cedar has targeted publicly facing web servers, with both automatic and manual vulnerability discovery.\n\t - T1190: Exploit Public-Facing Application\n",
"input": "\nIn this sense, APT3 crafted its own exploit from other exploits \u2013 a tactic very similar to one used by the Equation group. As this threat group also uses the name UPS team, we decided to name their version of the exploit bundle UPSynergy.",
"gold": "- T1068: Exploitation for Privilege Escalation\n- T1588.005: Obtain Capabilities - Exploits\n- T1587.004: Develop Capabilities - Exploits",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QakBot has a module that can proxy C2 communications.\n\t - T1090.002: Proxy - External Proxy\n- Text: Figure 5: Sample pseudo-HTTP beacon The pseudo-HTTP protocol uses any proxies discovered by the HTTP proxy monitoring thread or added by the adminka command\n\t - T1071: Application Layer Protocol\n\t - T1090: Proxy\n- Text: Cobalt Strike can be configured to have commands relayed over a peer-to-peer network of infected hosts. This can be used to limit the number of egress points, or provide access to a host without direct internet access.\n\t - T1090.001: Proxy - Internal Proxy\n",
"input": "\nWhen initiated, the Python code attempts to retrieve and use SOCKS/HTTP proxy settings from the victim\u2019s computer. The Python code then tries to initiate a reverse connection to the C2 server (139.59.46[.]154:3543) using a TCP protocol with RSA+AES traffic encryption and obfs3 transport using default keys from Pupy sources.",
"gold": "- T1573: Encrypted Channel\n- T1095: Non-Application Layer Protocol\n- T1090: Proxy\n- T1573.001: Encrypted Channel - Symmetric Cryptography\n- T1571: Non-Standard Port\n- T1090.001: Proxy - Internal Proxy\n- T1001: Data Obfuscation",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GreyEnergy has a module to inject a PE binary into a remote process.\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: The malicious DLL is also responsible for terminating the cliconfg.exe process and deleting the malicious NTWDBLIB.dll using: cmd /c taskkill /im cliconfg.exe /f /t && del /f /q NTWDBLIB.DLL All the following capabilities described are implemented by the malicious service DLL implant unless specified. Variant using North Korean Red Cross Another variant (hash: 9e2c0bd19a77d712055ccc0276fdc062e9351436) of the malicious Word dropper uses the same Base64-decoding scheme with a different custom key\n\t - T1055: Process Injection\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: Emissary injects its DLL file into a newly spawned Internet Explorer process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n",
"input": "\nRyuk uses a rather basic injection technique, whereby it first gets a handle on the target process using OpenProcess and allocates a buffer in its address space using VirtualAllocEx. The allocated buffer would have the size of the malware\u2019s image and would be required to be positioned at the same base address.",
"gold": "- T1106: Native API\n- T1055: Process Injection\n- T1055.002: Process Injection - Portable Executable Injection",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AADInternals can gather information about a tenant\u2019s domains using public Microsoft APIs.\n\t - T1590.001: Gather Victim Network Information - Domain Properties\n- Text: IndigoZebra has established domains, some of which were designed to look like official government domains, for their operations.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: Observed GoldMax C2 domains are high-reputation and high-prevalence, often acquired from domain resellers so that Whois records retain the creation date from their previous registration, or domains that may have been compromised. This tactic complements NOBELIUM\u2019s operational security strategy as these domains are more likely to be overlooked by security products and analysts based on their perceived long-lived domain ownership. Put simply, several domains we have shared as GoldMax C2 domains are only associated with NOBELIUM after the time they were re-sold or compromised \u2013 and Microsoft has provided that indicator context where it is available to us\n\t - T1584.001: Compromise Infrastructure - Domains\n",
"input": "\nThe most recent change to the argos-tracking.co[.]uk domain was on the 22nd February 2017 to suspend it. This example highlights the lengths the actors will go to in their reconnaissance of their victims in order to increase their changes of successful compromise.",
"gold": "- T1583.001: Acquire Infrastructure - Domains",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: These keystrokes would run PowerShell commands that downloaded and installed various malware strains that acted as backdoors for the attackers into the victims\u2019 networks\n\t - T1091: Replication Through Removable Media\n- Text: HALFBAKED can delete a specified file.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Despite the simplicity of most of their tools, the Gamaredon group also is capable of deploying some novelty, such as their Outlook VBA module. However, as it is far from stealthy, in the long run it is no match for a capable organization. The variety of tools Gamaredon has at its disposal can be very effective at fingerprinting a machine and understanding what sensitive data is available, then spreading throughout the network\n\t - T1025: Data from Removable Media\n",
"input": "\nWhen Gauss infects an USB memory stick, it sets a certain flag to 30. This TTL (time to live) flag is decremented every time the payload is executed from the stick. Once it reaches 0, the data stealing payload cleans itself from the USB stick. This makes sure that sticks with Gauss infections do not survive ItW for long enough to results in detection.",
"gold": "- T1091: Replication Through Removable Media\n- T1070.004: Indicator Removal - File Deletion\n- T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n- T1052: Exfiltration Over Physical Medium",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ConnectWise can be used to execute PowerShell commands on target machines.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: Exaramel for Linux uses HTTPS for C2 communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n",
"input": "\nRemcos is a RAT that is offered for sale by a company called Breaking Security. While the company says it will only sell the software for legitimate uses as described in comments in response to the article here and will revoke the licenses for users not following their EULA, the sale of the RAT gives attackers everything they need to establish and run a potentially illegal botnet. Remcos has the functionalities that are typical of a RAT. It is capable of hiding in the system and using malware techniques that make it difficult for the typical user to detect the existence of Remcos. It is written in C++ and is relatively small for the rich functionality it contains. The Remcos payload included by the PowerShell loader is the latest version 2.5.0. Talos has created a decoder that allows simple extraction of Remcos configurations. Cisco Umbrella shows an increase in requests for the default C2 domain dfgdgertdvdf.xyz of the sample around the time we found the initial PowerShell loader. DNS activity for the default C2 domain of the Remcos payload.",
"gold": "- T1059.001: Command and Scripting Interpreter - PowerShell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mustang Panda has used a customized PlugX variant which could spread through USB connections.\n\t - T1091: Replication Through Removable Media\n- Text: Most modifications of Trojan.Win32.Waldek are distributed via removable media and include functionality to collect information on infected systems and send it to the attackers. Based on the system data collected, the attackers create packages of additional malware to be installed on the infected system using the relevant Waldek functionality.\n\t - T1025: Data from Removable Media\n\t - T1543: Create or Modify System Process\n\t - T1005: Data from Local System\n\t - T1091: Replication Through Removable Media\n- Text: Sidewinder has used LNK files to download remote files to the victim's network.\n\t - T1105: Ingress Tool Transfer\n",
"input": "\nUSB Worm -> this is the USBWorm component developed for stealing files from removable drives, spread across systems by infecting removable media, and download and execute the \u201cThin Client\u201d component from a remote Crimson server.",
"gold": "- T1091: Replication Through Removable Media\n- T1105: Ingress Tool Transfer\n- T1025: Data from Removable Media\n- T1570: Lateral Tool Transfer\n- T1005: Data from Local System",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NDiskMonitor can download and execute a file from given URL.\n\t - T1105: Ingress Tool Transfer\n- Text: From our analysis, stealing keystrokes is the main function of RunningRat; however, the DLL has code for more extensive functionality\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1056: Input Capture\n- Text: Next, the buffer is encrypted using the RC4 algorithm with the 50-byte key (also stored in the backdoor\u2019s body)\n\t - T1027: Obfuscated Files or Information\n",
"input": "\nThe second file is downloaded from\u00a0hxxp://checkin.travelsanignacio[.]com/static/20160204.jpg. The C2 response is RC5 decrypted with the key \u201cwsprintfA\u201d and then XORed with\u00a00x74,\u00a0before it is saved as\u00a0C:\\Windows\\System32\\wcnapi.mui.",
"gold": "- T1105: Ingress Tool Transfer\n- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1573: Encrypted Channel\n- T1036: Masquerading\n- T1036.005: Masquerading - Match Legitimate Name or Location\n- T1001: Data Obfuscation",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: From the attacks observed by Volexity, what is most notable is that Patchwork has pivoted its targeting and has launched attacks directly against US-based think tanks. Volexity has also found that, in addition to sending malware lures, the Patchwork threat actors are leveraging unique tracking links in their e-mails for the purpose of identifying which recipients opened their e-mail messages. If the exploit is successful, the threat actors will attempt to drop and execute QuasarRAT. While the use of e-mail recipient tracking, a linked RTF document, and a final payload (QuasarRAT variant) remained the same, certain elements differed across campaigns observed. Exploitation and Malware Execution . Upon opening the above attachments, the recipient will be presented with a document that is a direct copy of a blog post or report released by the think tank organization being impersonated. When the malicious RTF document is opened, two things happen that allow the attacker malware to run. Its called the \"packager trick\" because any file embedded in an RTF file using packager will be automatically dropped to the %tmp% folder (c:\\Users\\%username%\\AppData\\Local\\Temp) when the RTF document is opened. Second, the threat actors exploit CVE-2017-8570 to achieve code execution via a malicious \"scriptlet\" file, or .sct file, which is also embedded in the malicious RTF document. The contents of the malicious scriptlet file (displayed below) clearly show the threat actor executing the initial \"qrat.exe\" dropper from the current user's %tmp% directory. The Patchwork threat actors also appear to have adopted a technique seen from other APT groups where they are now tracking the effectiveness of their campaigns by recording which recipients have opened the phishing message\n\t - T1203: Exploitation for Client Execution\n- Text: APT3\u00a0(also known as UPS), the actors responsible for\u00a0Operation Clandestine Fox\u00a0has quietly continued to send waves of spearphishing messages over the past few months. This actor initiated their most recent campaign on November 19, 2014 targeting multiple organizations. The attacker leveraged multiple exploits, targeting both\u00a0CVE-2014-6332\u00a0and\u00a0CVE-2014-4113. CVE-2014-6332 was disclosed publicly on 2014-11-11 and is a Windows OLE Automation Array Remote Code Execution vulnerability. CVE-2014-4113 is a privilege escalation vulnerability that was\u00a0disclosed publicly on 2014-10-14.\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1566.003: Phishing - Spearphishing via Service\n\t - T1534: Internal Spearphishing\n- Text: CVE-2018-4878 was the second most commonly observed vulnerability and is the only Adobe Flash Player vulnerability on this year\u2019s top 10. Like CVE-2018-8174, this vulnerability was included in multiple exploit kits, most notably the Fallout exploit kit, which was used to distribute GandCrab ransomware. Fallout took its name and URI patterns from the now defunct Nuclear exploit kit, which had been associated with CVE-2015-7645, one of 2016\u2019s top 10 vulnerabilities. In 2018, Fallout was last selling for $300 a week and $1,100 a month, as seen below.\n\t - T1203: Exploitation for Client Execution\n\t - T1588.005: Obtain Capabilities - Exploits\n",
"input": "\nThe embedded SWF decrypted contains ActionScript that attempts to exploit a vulnerability. The purpose of aforementioned version check is to make sure that the correct malicious ActionScript is executed to exploit a vulnerability that the Flash player is vulnerable to. Table 1 shows the range of Flash player versions within DealersChoice.A, the embedded SWF file loaded and the associated vulnerability exploited by the loaded SWF.",
"gold": "- T1203: Exploitation for Client Execution\n- T1068: Exploitation for Privilege Escalation",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can gather browser usernames and passwords.\n\t - T1003: OS Credential Dumping\n- Text: Windows Credential Editor can dump credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: As shown in Figure 11, after compromising an initial victim's system (patient 0), the threat actors use the Baidu search engine to search for the victim's organization name. They then identify the Exchange server and attempt to install the OwaAuth web shell. If the OwaAuth web shell is ineffective because the victim uses two-factor authentication for webmail, the adversaries identify other externally accessible servers and deploy ChinaChopper web shells. Within six hours of entering the environment, the threat actors compromised multiple systems and stole credentials for the entire domain\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n",
"input": "\nThe cheat sheet includes examples of commands needed for persistence, network reconnaissance, pivoting, credential dumping, general system and network data gathering, as well as data exfiltration and commands to configure the system to allow remote desktop protocol (RDP) sessions. The commands provide insight into the techniques the actors will use after compromising a system, as well as the tools used to achieve their objectives. The commands also suggest that the threat group heavily relies on RDP to interact with compromised hosts, likely using secure shell (SSH) tunnels created with the Plink tool between the infected system and an actor-controlled domain. Also, the command examples show the threat group seeks to move across an infiltrated network to target additional devices, making it a greater threat to organizations once infected. According to these commands, the actor would likely make these pivots to other systems by performing credential dumping from the Windows registry and process memory.",
"gold": "- T1105: Ingress Tool Transfer\n- T1021.001: Remote Services - Remote Desktop Protocol\n- T1570: Lateral Tool Transfer\n- T1018: Remote System Discovery\n- T1021: Remote Services\n- T1049: System Network Connections Discovery\n- T1041: Exfiltration Over C2 Channel\n- T1021.004: Remote Services - SSH\n- T1016: System Network Configuration Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QuasarRAT has a built-in keylogger.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Confucius has sent malicious links to victims through email campaigns.\n\t - T1566.002: Phishing - Spearphishing Link\n",
"input": "\nCisco Talos has observed a new malware campaign operated by the Kimsuky APT group since June 2021. Kimsuky, also known as Thallium and Black Banshee, is a North Korean state-sponsored advanced persistent threat (APT) group active since 2012. This campaign utilizes malicious blogs hosted on Blogspot to deliver three types of preliminary malicious content: beacons, file exfiltrators and implant deployment scripts. The implant deployment scripts, in turn, can infect the endpoint with additional implants such as system information-stealers, keyloggers and credential stealers. These implants are derivatives of the Gold Dragon/Brave Prince family of malware operated by Kimsuky since at least 2017 \u2014 now forked into three separate modules. This campaign targets South Korea-based think tanks whose research focuses on political, diplomatic and military topics pertaining to North Korea, China, Russia and the U.S.",
"gold": "- T1082: System Information Discovery\n- T1189: Drive-by Compromise",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Silence has used VBS scripts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: ZxxZ has relied on victims to open a malicious attachment delivered via email.\n\t - T1204.002: User Execution - Malicious File\n- Text: APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway.\n\t - T1566.001: Phishing - Spearphishing Attachment\n",
"input": "\nNemucod malware is mostly deployed using weaponized documents where the malicious VBA macro code is responsible for constructing and executing a malicious encoded JScript file that carries out further activities including registering victims with the actors before downloading payloads, which in this case included a credential stealing Trojan executable component.",
"gold": "- T1027: Obfuscated Files or Information\n- T1059: Command and Scripting Interpreter\n- T1204.002: User Execution - Malicious File\n- T1059.005: Command and Scripting Interpreter - Visual Basic\n- T1059.007: Command and Scripting Interpreter - JavaScript\n- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Consent - Details - [#IABV2SETTINGS#] - About This website uses cookies . We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you\u2019ve provided to them or that they\u2019ve collected from your use of their services. This is beneficial for the website, in order to make valid reports on the use of their website.Expiry: PersistentType: HTMLrc::cThis cookie is used to distinguish between humans and bots. Expiry: SessionType: HTMLKaspersky Lab2Learn more about this providertest [x2]Used to detect if the visitor has accepted the marketing category in the cookie banner. This is used in context with the email marketing service Marketo.com, which allows the website to target visitors via email. Kaspersky Lab products detect the different artifacts used in this campaign with the following verdicts: Trojan.Win32.Generic, Trojan-Downloader.Win32.Upatre and Backdoor.Win32.HyperBro. Due to tools and tactics in use we attribute the campaign to LuckyMouse Chinese-speaking actor (also known as EmissaryPanda and APT27). Also the C2 domain update.iaacstudio[.]com was previously used in their campaigns. Regarding Metasploit\u2019s shikata_ga_nai encoder \u2013 although it\u2019s available for everyone and couldn\u2019t be the basis for attribution, we know this encoder has been used by LuckyMouse previously. Even when we observed LuckyMouse using weaponized documents with CVE-2017-11882 (Microsoft Office Equation Editor, widely used by Chinese-speaking actors since December 2017), we can\u00b4t prove they were related to this particular attack. The main C2 used in this campaign is bbs.sonypsps[.]com, which resolved to IP-address, that belongs to the Ukrainian ISP network, held by a Mikrotik router using firmware version 6.34.4 (from March 2016) with SMBv1 on board\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: The compressed_data field is compressed using the common ZLIB compression algorithm. Additionally, in the event data is being sent via HTTP rather than HTTPS, the following additional encryption algorithm is applied to the POST data\n\t - T1560.002: Archive Collected Data - Archive via Library\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: communicates using HTTPS and uses a custom encryption cipher to encrypt the HTTPS message body.\n\t - T1573: Encrypted Channel\n",
"input": "\nUnlike previously identified RedDelta PlugX samples, this one uses a legitimate Avast Proxy executable for the second DLL side-loading phase rather than the legitimate Adobe executable used in previously analyzed samples. When loaded into memory, the PlugX payload uses www.systeminfor[.]com for command and control \u2014 the same domain used across the Catholic church-themed PlugX samples. Across all four newly analyzed samples, the first stage DLL loader files share an identical, uncommon import hash and rich header with previously observed first stage RedDelta PlugX DLLs. The loaded PlugX payload also matches the custom RedDelta PlugX variant previously described, using RC4 encryption for C2 communications with the same hardcoded RC4 passphrase and configuration block decoding function.",
"gold": "- T1573: Encrypted Channel\n- T1574.002: Hijack Execution Flow - DLL Side-Loading\n- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1036.005: Masquerading - Match Legitimate Name or Location\n- T1036: Masquerading\n- T1104: Multi-Stage Channels",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OwaAuth is a Web shell that appears to be exclusively used by Threat Group-3390. It is installed as an ISAPI filter on Exchange servers and shares characteristics with the China Chopper Web shell.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Night Dragon has used HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: communicates over HTTP for C2.\n\t - T1071: Application Layer Protocol\n",
"input": "\nThe TwoFace loader parses the HTTP POST requests issued by the actor and references data at specific locations, more specifically at certain indexes within the posted data (C# \u201cRequest.Forms\u201d) that the shell will use to determine the functionality the actor wishes to execute. While we did not have logs of HTTP requests for the loader shell, we were able to determine some of the indexes that the webshell will specifically access within the data. Table 2 shows the known indexes within the HTTP POST data that TwoFace references.",
"gold": "- T1071: Application Layer Protocol\n- T1071.001: Application Layer Protocol - Web Protocols\n- T1105: Ingress Tool Transfer",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In our case study, approximately two minutes after Cobalt Strike activity started, a tool to enumerate an AD environment appeared on the infected host at C:\\ProgramData\\AdFind.exe.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1595: Active Scanning\n- Text: TeamTNT has scanned specific lists of target IP addresses.\n\t - T1595.001: Active Scanning - Scanning IP Blocks\n- Text: Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands.\n\t - T1059: Command and Scripting Interpreter\n",
"input": "\nThe attack itself is performed in an infinite loop. The IP addresses used for scanning are generated randomly using the rand() function and the GetTickCount() results as a random seed. The only filter rule for an IP address is that it cannot start with 127, 172 or 192. A separate thread is created to communicate with each IP address.",
"gold": "- T1046: Network Service Discovery\n- T1106: Native API",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUNSPOT only replaces SolarWinds Orion source code if the MD5 checksums of both the original source code file and backdoored replacement source code match hardcoded values.\n\t - T1480: Execution Guardrails\n- Text: Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Command_Update_Server: This command passes the string \u201cGh0st Update\u201d to the malware sample before running the sample again. When the sample restarts, it detects the \u201cGh0st Update\u201d command line arg, and connects to the server in order to update the sample. Command_Clean_Event: This command locates and deletes all of the event logs on the system\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1059: Command and Scripting Interpreter\n\t - T1070: Indicator Removal\n\t - T1102: Web Service\n",
"input": "\nIn addition, DoppelPaymer is designed to run only after a specific command line argument is provided. The malware computes a CRC32 checksum of the first argument passed on the command line and adds it with a constant value that is hard-coded in the binary. The malware then adds the instruction pointer address to this result, which becomes the destination for a jmp used to continue the malware execution. The hard-coded constant value is unique to each build. In the sampled analyzed, this value was 0x672e6eb7, as shown below in Figure 6.",
"gold": "- T1480: Execution Guardrails",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) User must open the Microsoft Word email attachment 2) User must scroll to page three of the document, which will run the DealersChoice Flash object 3) The Flash object must contact an active C2 server to download an additional Flash object containing exploit code 4) The initial Flash object must contact the same C2 server to download a secondary payload 5) Victim host must have a vulnerable version of Flash installed\n\t - T1203: Exploitation for Client Execution\n- Text: has used CVE-2015-4902 to bypass security features.\n\t - T1211: Exploitation for Defense Evasion\n- Text: Dubbed \u2018SpeakUp\u2019, the new Trojan exploits known vulnerabilities in six different Linux distributions\n\t - T1068: Exploitation for Privilege Escalation\n",
"input": "\nIn February 2019, Unit 42 found that a yet-to-be-known threat actor \u2014 unbeknownst to the infosec community \u2014 discovered that the second unpatched vulnerability can not only exploit VirtualBox VBoxDrv.sys driver v1.6.2, but also all other versions up to v3.0.0. Furthermore, our research shows that this unknown actor exploited VirtualBox driver version 2.2.0 to target at least two different Russian organizations in 2017, which we are revealing for the first time. We anticipate this was done because the driver version 2.2.0 wasn\u2019t known to be vulnerable and thus most likely is not on the radar of security companies being exploited. Since no other victims have been found, we believe this is a very rare malware used in targeted attacks only.",
"gold": "- T1068: Exploitation for Privilege Escalation\n- T1203: Exploitation for Client Execution\n- T1588.006: Obtain Capabilities - Vulnerabilities\n- T1211: Exploitation for Defense Evasion\n- T1588.005: Obtain Capabilities - Exploits",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n- Text: Peirates can dump the contents of AWS S3 buckets. It can also retrieve service account tokens from kOps buckets in Google Cloud Storage or S3.\n\t - T1530: Data from Cloud Storage\n- Text: creates folders to store output from batch scripts prior to sending the information to its C2 server.\n\t - T1074: Data Staged\n",
"input": "\n2.\u00a0\u00a0\u00a0\u00a0\u00a0 The \u201cset key\u201d handler is used for accepting the victim ID, a random string with six characters, assigned by the C&C server. It will be attached in each of commands sent from the server and will also be used as the folder name on a cloud storage service to save the stolen data. The victim ID will be stored in the \u201cbps.key\u201d file.",
"gold": "- T1041: Exfiltration Over C2 Channel\n- T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ROKRAT can check for debugging tools.\n\t - T1622: Debugger Evasion\n- Text: Trickbot is the most common malware distributed by Emotet, but it is not the only one. Qakbot is another type of malware frequently dropped on Emotet-infected Windows hosts.\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: APT28 has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key \"HKCU\\Software\\Microsoft\\Office test\\Special\\Perf\" to execute code.\n\t - T1137.002: Office Application Startup - Office Test\n",
"input": "\nThe ultimate purpose of the aforementioned components is to install and execute the Komplex payload. The dropper component saves the payload to \u201c/Users/Shared/.local/kextd\u201d (SHA256: 227b7fe495ad9951aebf0aae3c317c1ac526cdd255953f111341b0b11be3bbc5) and ultimately executes the payload. The payload begins by conducting an anti-debugging check to see if it is being debugged before proceeding with executing its main functionality, which can be seen in the \u201cAmIBeingDebugged\u201d function in Figure 6. The \u201cAmIBeingDebugged\u201d function uses the \u201csysctl\u201d function to check to see if a specific \u201cP_TRACED\u201d flag is set, which signifies that the process is being debugged. A particularly interesting part of this function is that it is very similar to the function provided by Apple to its developers in a guide created in 2004 titled \u201cDetecting the Debugger\u201d. This is not the first time the Sofacy group\u2019s malware authors have obtained techniques from publicly available sources, as demonstrated in the use of the Office Test Persistence Method that they obtained from a blog posted in 2014.",
"gold": "- T1587.001: Develop Capabilities - Malware\n- T1622: Debugger Evasion",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: In past attacks, the Ragnar Locker group has used exploits of managed service providers or attacks on Windows Remote Desktop Protocol (RDP) connections to gain a foothold on targeted networks\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: The victims Data from Cadelle\u2019s C&C servers shows that a large number of Backdoor.Cadelspy infections affected individual users of Iranian internet service providers (ISPs) and hosting services\n\t - T1543: Create or Modify System Process\n\t - T1543.003: Create or Modify System Process - Windows Service\n",
"input": "\nAfterwards, it uses CreateServiceA to add svchost.exe as a service named \u201cEYService\u201d, and it will then start the service and exit. This service, as we will explain soon, is the core component in the flow and is responsible for processing the commands sent by the attacker.",
"gold": "- T1569.002: System Services - Service Execution\n- T1106: Native API\n- T1543: Create or Modify System Process\n- T1569: System Services",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ferocious Kitten has conducted spearphishing campaigns containing malicious documents to lure victims to open the attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Tonto Team has relied on user interaction to open their malicious RTF documents.\n\t - T1204.002: User Execution - Malicious File\n- Text: has attempted to get victims to open malicious files sent via email as part of spearphishing campaigns.\n\t - T1204: User Execution\n",
"input": "\nIn recent OilRig attacks, the threat actors purport to be legitimate service providers offering service and technical troubleshooting as a social engineering theme in their spear-phishing attacks. Earlier OilRig attacks appear to use fake job offers as a social engineering theme. The campaign appears highly targeted and delivers a backdoor we have called \u2018Helminth\u2019. Over the course of the attack campaign, we have observed two different variations of the Helminth backdoor, one written in VBScript and PowerShell that was delivered via a macro within Excel spreadsheets and the other a standalone Windows executable.",
"gold": "- T1598.003: Phishing for Information - Spearphishing Link\n- T1598.002: Phishing for Information - Spearphishing Attachment\n- T1566.002: Phishing - Spearphishing Link\n- T1566: Phishing\n- T1566.001: Phishing - Spearphishing Attachment\n- T1598.001: Phishing for Information - Spearphishing Service\n- T1036: Masquerading",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: From a code perspective, little has changed between Ryuk binaries compiled in March and those compiled in September. The functionality has remained overall static since introducing features for targeting hosts on a local area network (LAN). The most notable change to Ryuk is the introduction of code obfuscation. The code obfuscations appear to be designed to slow down the reverse engineering process by using anti-disassembly and code transformation obfuscation techniques\n\t - T1027: Obfuscated Files or Information\n- Text: packs a plugin with UPX.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n",
"input": "\nAro.dat is, in fact, an encrypted and compressed PlugX payload. The decryption routine within Aro.dat closely resembles that of older PlugX variants (see Figure 3 below) in that it involves multiple decryption keys and bit shift operations. Once decrypted, it gets decompressed via the Windows API RtlDecompressBuffer into a Windows module (DLL). The compression algorithm is LZ compression (COMPRESSION_FORMAT_LZNT1).",
"gold": "- T1140: Deobfuscate/Decode Files or Information\n- T1027: Obfuscated Files or Information\n- T1106: Native API\n- T1027.002: Obfuscated Files or Information - Software Packing",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has leveraged multiple types of spearphishing in order to attempt to get a user to open links and attachments.\n\t - T1204: User Execution\n- Text: WarzoneRAT has relied on a victim to open a malicious attachment within an email for execution.\n\t - T1204.002: User Execution - Malicious File\n- Text: This module intercepts HWP documents on an infected computer. The HWP file format is similar to Microsoft Word documents, but supported by Hangul, a South Korean word processing application from the Hancom Office bundle. Hancom Office is widely used in South Korea. The account is hardcoded in the module along with the master\u2019s e-mail to which it sends intercepted documents. It is interesting that the module does not search for all the HWP files on infected computer, but reacts only to those that are opened by the user and steals them. This behavior is very unusual for a document-stealing component and we do not see it in other malicious toolkits\n\t - T1566.001: Phishing - Spearphishing Attachment\n",
"input": "\nThe two variants of Helminth do require different delivery methods, with the script variant relying on an Excel spreadsheet for delivery, while the executable variant is more traditional in the fact that it can be installed without a delivery document. We speculate that the executable variant involves threat actors socially engineering the victim into running the payload, rather than installing the payload as the result of successful exploitation of a vulnerability. The multiple delivery methods suggest this threat group is capable of adapting their procedures to suit the current operation in the overarching campaign.",
"gold": "- T1204: User Execution\n- T1204.002: User Execution - Malicious File\n- T1204.001: User Execution - Malicious Link",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used their own web shells, as well as those previously placed on target systems by other threat actors, for reconnaissance and lateral movement.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: LockBit 2.0 is known for its extortion tactics, encrypting devices and demanding a ransom.\n\t - T1486: Data Encrypted for Impact\n- Text: Analysis of the threat actor\u2019s indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) indicates a correlation with the group known by the names, Pioneer Kitten and UNC757. This threat actor has been observed exploiting several publicly known Common Vulnerabilities and Exposures (CVEs) dealing with Pulse Secure virtual private network (VPN), Citrix NetScaler, and F5 vulnerabilities. This threat actor used these vulnerabilities to gain initial access to targeted networks and then maintained access within the successfully exploited networks for several months using multiple means of persistence\n\t - T1190: Exploit Public-Facing Application\n",
"input": "\nWe observed another campaign targeting an organisation located in Lebanon. While our first case describes a targeted campaign with the goal to exfiltrate data affecting internal servers, this one is the opposite: an auxiliary public web site compromised by several attackers for different purposes. We identified actors trying to deploy ransomware on the vulnerable server using China Chopper. The first attempt was Sodinokibi ransomware:",
"gold": "- T1102: Web Service\n- T1584.006: Compromise Infrastructure - Web Services\n- T1584.004: Compromise Infrastructure - Server",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TEMP.Veles has used a publicly-available PowerShell-based tool, WMImplant. The group has also used PowerShell to perform Timestomping.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Unlike previous RDAT samples, this particular sample only uses DNS tunneling for its C2 communications with no HTTP fallback channel. This RDAT sample can only use TXT queries in its DNS tunnel and will issue queries structured like the following\n\t - T1071.004: Application Layer Protocol - DNS\n\t - T1008: Fallback Channels\n- Text: Chimera has encapsulated Cobalt Strike's C2 protocol in DNS and HTTPS.\n\t - T1572: Protocol Tunneling\n",
"input": "\nWhile investigating the activity, we found a CASHY200 PowerShell-based payload that communicated with windows64x[.]com. We analyzed this PowerShell script and found that its DNS tunneling protocol matched the outbound DNS requests at the Kuwait organization which were blocked by DNS Security. We will provide an analysis of CASHY200 and its DNS tunneling protocol in a later section of this blog.",
"gold": "- T1071.004: Application Layer Protocol - DNS\n- T1572: Protocol Tunneling\n- T1583.002: Acquire Infrastructure - DNS Server\n- T1059: Command and Scripting Interpreter",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 has used Web shells to maintain access to victim websites.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: HAWKBALL is a backdoor that attackers can use to collect information from the victim, as well as to deliver payloads. HAWKBALL is capable of surveying the host, creating a named pipe to execute native Windows commands, terminating processes, creating, deleting and uploading files, searching for files, and enumerating drives\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Command_Update_Server: This command passes the string \u201cGh0st Update\u201d to the malware sample before running the sample again. When the sample restarts, it detects the \u201cGh0st Update\u201d command line arg, and connects to the server in order to update the sample. Command_Clean_Event: This command locates and deletes all of the event logs on the system\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1059: Command and Scripting Interpreter\n\t - T1070: Indicator Removal\n\t - T1102: Web Service\n",
"input": "\nWhile investigating a recent security incident, Unit 42 found a webshell that we believe was used by the threat actor to remotely access the network of a targeted Middle Eastern organization. The construction of the webshell was interesting by itself, as it was actually two separate webshells: an initial webshell that was responsible for saving and loading the second fully functional webshell. It is this second webshell that enabled the threat actor to run a variety of commands on the compromised server. Due to these two layers, we use the name TwoFace to track this webshell.",
"gold": "- T1505.003: Server Software Component - Web Shell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Generate payloads in various formats: Format Architecture Short Name Android Package x86 & ARMv7 apk Linux Binary x86 lin_x86 Linux Binary x64 lin_x64 Linux Shared Object x86 so_x86 Linux Shared Object x64 so_x64 Windows PE Executable x86 exe_x86 Windows PE Executable x64 exe_x64 Windows DLL x86 dll_x86 Windows DLL x64 dll_x64 Python Script x86 & x64 py PyInstaller x86 & x64 pyinst Python Oneliner x86 & x64 py_oneliner Powershell x86 & x64 ps1 Powershell Oneliner x86 & x64 ps1_oneliner Ducky Script N/A rubber_ducky Deploy in memory from a single command line using python or powershell one-liners\n\t - T1106: Native API\n\t - T1010: Application Window Discovery\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: 1) If the malware was executed with the \"install\" command-line argument, which uses .NET Framwork\u2019s InstallHelper method to install the malware as a service. 3) If no arguments are provided and the malware determines it is running in a Windows environment, it saves a DLL to the system that it injects into the explorer.exe process. The injected DLL executable loads the malware\u2019s executable and runs it within memory of the explorer.exe process\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Sibot has executed downloaded DLLs with \"rundll32.exe\".\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n",
"input": "\nThis artifact is interesting as the shellcode executed relies on Windows APIs and the payload installed is a Windows DLL that would not run on OSX. This flag does suggest that the threat actors do consider the OSX operating system when developing their malicious exploit code in cross platform file types, such as Flash SWF files. While we cannot confirm this, it is possible that the threat actors could use DealersChoice.A to exploit and load an OSX Trojan if prepared with the appropriate shellcode.",
"gold": "- T1106: Native API",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Web shells are heavily relied on for nearly all stages of the attack lifecycle\n\t - T1505.003: Server Software Component - Web Shell\n- Text: PLEAD also uses CVE-2017-7269, a buffer overflow vulnerability Microsoft Internet Information Services (IIS) 6.0 to compromise the victim\u2019s server. This is another way for them to establish a new C&C or HTTP server\n\t - T1190: Exploit Public-Facing Application\n- Text: ALL tim nha Chi Ngoc Canada: The shell script containing the main malicious routines - configureDefault.def: The word file displayed during execution\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n",
"input": "\nSince PROPHET SPIDER gains access via web servers or other public-facing servers, they will often initially compromise a Linux-based system. Once initial access is obtained on a Linux system, PROPHET SPIDER typically deploys a webshell, reverse shell binary or a perl reverse shell script (commonly named bc.pl) as their initial persistence mechanism.",
"gold": "- T1505.003: Server Software Component - Web Shell\n- T1059: Command and Scripting Interpreter\n- T1059.004: Command and Scripting Interpreter - Unix Shell\n- T1190: Exploit Public-Facing Application",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has renamed malware to legitimate names such as \"ESTCommon.dll\" or \"patch.dll\".\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: APT41 used compiled HTML (.chm) files for targeting.\n\t - T1218.001: System Binary Proxy Execution - Compiled HTML File\n- Text: can be used to subvert controls and possibly conceal command execution by not directly invoking .\n\t - T1202: Indirect Command Execution\n",
"input": "\nThe execution of the modified Mshta file resulted in the creation of a HTM file called loubSi78Vgb9[1].htm that was written to a temporary INetCache directory. Mandiant was not able to acquire this file at the time of writing; however, Mandiant was able to recover partial contents of the file.",
"gold": "- T1036.005: Masquerading - Match Legitimate Name or Location",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Siloscape has leveraged a vulnerability in Windows containers to perform an Escape to Host.\n\t - T1068: Exploitation for Privilege Escalation\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n",
"input": "\nIn this blog we show that CVE-2017-0005, a Windows Local-Privilege-Escalation (LPE) vulnerability that was attributed to a Chinese APT, was replicated based on an Equation Group exploit for the same vulnerability that the APT was able to access. \u201cEpMe\u201d, the Equation Group exploit for CVE-2017-0005, is one of 4 different LPE exploits included in the DanderSpritz attack framework. EpMe dates back to at least 2013 \u2013 four years before APT31 was caught exploiting this vulnerability in the wild.",
"gold": "- T1068: Exploitation for Privilege Escalation\n- T1587.004: Develop Capabilities - Exploits\n- T1588.005: Obtain Capabilities - Exploits",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Figure 11 Embedded BMP file containing encrypted string data RC4 is used to decrypt this data using a 16-byte key that is stored within the BMP file at offset 0x502\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: As mentioned, the registry key (HKLM\\SOFTWARE\\Microsoft\\DRM) is where the malicious payload is stored. In this case, this is the Pillowmint Trojan. Pillowmint is stored and compressed in the registry key\n\t - T1027: Obfuscated Files or Information\n- Text: Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n",
"input": "\nNow that we have the decrypted AES key, we can decrypt the actual payload. The Flash downloader uses a custom initialization vector (IV) for the AES algorithm which can be found at offset 0x44 in the encrypted blob and is 16 bytes long:",
"gold": "- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ThiefQuest uses the \"CGEventTap\" functions to perform keylogging.\n\t - T1056.001: Input Capture - Keylogging\n- Text: GALLIUM dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN.\n\t - T1105: Ingress Tool Transfer\n- Text: BUBBLEWRAP collects system information, including the operating system version and hostname.\n\t - T1082: System Information Discovery\n",
"input": "\nThe BackConfig custom trojan has a flexible plug-in architecture for components offering various features, including the ability to gather system and keylog information and to upload and execute additional payloads.",
"gold": "- T1105: Ingress Tool Transfer\n- T1082: System Information Discovery\n- T1119: Automated Collection",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor. The group has also moved laterally using the Local Administrator account.\n\t - T1078: Valid Accounts\n- Text: Enabling the macros starts a multi-stage infection chain that eventually downloads and executes a Cobalt Strike beacon, providing the attackers with a foothold inside the target organization.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: Flagpro has been used to execute \"net view\" on a targeted system.\n\t - T1018: Remote System Discovery\n",
"input": "\nManaged Defense, utilizing FireEye Endpoint Security technology, detected and responded to the threat activity identified within the customer\u2019s environment. The subsequent investigation revealed FIN6 was in the initial phase of an intrusion using stolen credentials, Cobalt Strike, Metasploit, and publicly available tools such as Adfind and 7-Zip to conduct internal reconnaissance, compress data, and aid their overall mission.",
"gold": "- T1105: Ingress Tool Transfer\n- T1078: Valid Accounts",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: decrypts and extracts a copy of its main DLL payload when executing.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Overall the code is very well written and designed to execute quickly to encrypt the defined files in the configuration of the ransomware. The embedded configuration file has some interesting options which we will highlight further in this article\n\t - T1027: Obfuscated Files or Information\n- Text: Invoke-PSImage can be used to embed payload data within a new image file.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n",
"input": "\nOnce the decrypted payload runs in memory, it exhibits the same behaviors as previous PlugX implant variants. It starts by decrypting the embedded PlugX hardcoded configuration settings. The decryption algorithm and XOR keys are fairly consistent across multiple PlugX implants. Code behavior closely resembles that of the RedDelta PlugX that\u2019s been reported by Insikt Group. One noticeable difference with this sample compared to all the other known PlugX malware families is the magic number check performed during the initialization of the PlugX plugins. Historically, that number has always been 0x504C5547, which corresponds to the PLUG value in ASCII encoding. In this sample, the magic number is 0x54484F52, corresponding to the THOR value in ASCII encoding.",
"gold": "- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attackers like to use spear-fishing email with password protected RAR attachment to avoid being detected by the email gateway. Decryption password is provided in the mail body and inside the attachment it is a MHTML macro based document with the .doc suffix. Its purpose is to implant Imminent backdoor and gain a foothold into the target network which may make the follow up lateral movement easier to implement\n\t - T1027: Obfuscated Files or Information\n- Text: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n- Text: can execute commands from its C2 server.\n\t - T1059: Command and Scripting Interpreter\n",
"input": "\nDeathStalker hides strings in Word embedded shape and object (OLE packages) properties, like the \u201chyperlink\u201d property, to obfuscate the malicious execution workflow, as well as reconstruct and execute commands or scripts.",
"gold": "- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1036: Masquerading",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: IceApple is an IIS post-exploitation framework, consisting of 18 modules that provide several functionalities.\n\t - T1505.004: Server Software Component - IIS Components\n- Text: Emissary injects its DLL file into a newly spawned Internet Explorer process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Actors executed malicious payloads via loading shared modules. The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths.\n\t - T1129: Shared Modules\n",
"input": "\nWe confirmed RGDoor installed correctly into IIS by checking the HTTP Modules display in IIS Manager. Figure 2 shows the RGDoor DLL (HTTPParser.dll) was loaded into IIS using the module name HTTPParser.",
"gold": "- T1036: Masquerading\n- T1036.005: Masquerading - Match Legitimate Name or Location\n- T1505.004: Server Software Component - IIS Components",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After collecting files and logs from the victim, encrypts some collected data with Blowfish.\n\t - T1486: Data Encrypted for Impact\n- Text: Less than a week after Microsoft issued a patch for CVE-2017-11882 on Nov\n\t - T1203: Exploitation for Client Execution\n- Text: CVE-2018-4878 was the second most commonly observed vulnerability and is the only Adobe Flash Player vulnerability on this year\u2019s top 10. Like CVE-2018-8174, this vulnerability was included in multiple exploit kits, most notably the Fallout exploit kit, which was used to distribute GandCrab ransomware. Fallout took its name and URI patterns from the now defunct Nuclear exploit kit, which had been associated with CVE-2015-7645, one of 2016\u2019s top 10 vulnerabilities. In 2018, Fallout was last selling for $300 a week and $1,100 a month, as seen below.\n\t - T1203: Exploitation for Client Execution\n\t - T1588.005: Obtain Capabilities - Exploits\n",
"input": "\nUnlike the common ransomware, systematically distributed via massive spam campaigns and exploit kits, Ryuk is used exclusively for tailored attacks. In fact, its encryption scheme is intentionally built for small-scale operations, such that only crucial assets and resources are infected in each targeted network with its infection and distribution carried out manually by the attackers.",
"gold": "- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: attempts to hide its payloads using legitimate filenames.\n\t - T1036: Masquerading\n- Text: Pupy can migrate into another process using reflective DLL injection.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Egregor has used DLL side-loading to execute its payload.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n",
"input": "\nBut these are not the only differences between the two versions: while the Filesystem.dll module was dropped by all the known variants of gpUpdates.exe, it was not always used in the same manner.",
"gold": "- T1036: Masquerading",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As discussed in the delivery document analysis above, depending on the OS architecture either of the embedded KerrDown DLLs will be dropped in the victim machine. The DLL is dropped in the directory location \u2018Users\\Administrator\\AppData\\Roaming\\\u2019 as \u2018main_background.png\u2019. The DLL retrieves the payload from the URL, decrypts it by using DES algorithm and execute it in the memory. Therefore, it is observed that only the KerrDown DLL downloader is saved in the system and the payload directly gets executed in the memory without being written in the system. Table 1 shows the URL the downloader will attempt to download the payload from depending on the OS architecture of the victim machine\n\t - T1105: Ingress Tool Transfer\n- Text: Command Number \u2013 a running index number to keep track of executed commands. If set to any number other than -1, the backdoor should proceed to execute the command, according to the Command ID. Command ID \u2013 can be one of the following commands: 101 \u2013 Shell Command: execute the Shell command attached in the {Arg1} argument. 102 \u2013 Download File: Downloads a file that can be found on the {Arg2} path on the server, and saves it on the disk with the {Arg1} name. 104 \u2013 Shell Command (duplicate): execute the Shell command attached in the {Arg1} argument. 101 \u2013 Shell Command: execute the Shell command attached in the {Arg1} argument. 102 \u2013 Download File: Downloads a file that can be found on the {Arg2} path on the server, and saves it on the disk with the {Arg1} name. 104 \u2013 Shell Command (duplicate): execute the Shell command attached in the {Arg1} argument\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: has used an RSS feed on Livejournal to update a list of encrypted C2 server names.\n\t - T1102: Web Service\n",
"input": "\nLater payloads would write batch scripts to disk as well as wget binaries. The batch scripts would use the wget binaries to download and execute additional executables. The scripts would also use wget to send POST requests to command and control (C2) servers that would contain information about the compromised system. Some of these payloads included decoy documents that would open when the malware is executed.",
"gold": "- T1105: Ingress Tool Transfer\n- T1059: Command and Scripting Interpreter\n- T1041: Exfiltration Over C2 Channel\n- T1082: System Information Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KeyBoy uses PowerShell commands to download and execute payloads.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n",
"input": "\nThe cheat sheet is separated into several sections, based on the purpose of the example commands. Fortunately, the commands listed in the cheat sheet provides us with a great deal of insight into some of the tools and techniques the actors will possibly use after compromising the end system. The cheat sheet shows significant batch and PowerShell scripting and a preference for using RDP, as well as the following tools not provided natively in Windows (i.e. thc-hydra, Plink, Mimikatz, Powercat, ProcDump, SharpHound/BloodHound and PowerSploit). Table 1 shows the headers and a description of each section within the cheat sheet.",
"gold": "- T1059.001: Command and Scripting Interpreter - PowerShell\n- T1059: Command and Scripting Interpreter\n- T1219: Remote Access Software\n- T1021: Remote Services\n- T1083: File and Directory Discovery\n- T1057: Process Discovery\n- T1082: System Information Discovery\n- T1003.001: OS Credential Dumping - LSASS Memory\n- T1059.003: Command and Scripting Interpreter - Windows Command Shell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Strider has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: menuPass has used a global service provider's IP as a proxy for C2 traffic from a victim.\n\t - T1090.002: Proxy - External Proxy\n- Text: WarzoneRAT has the capability to act as a reverse proxy.\n\t - T1090: Proxy\n",
"input": "\nEach target country is assigned its own operator, who is able to take advantage of local cultural features \u2013 for example, the tendency to use personal email accounts for work. They also made use of a specific proxy server within a country\u2019s borders, to manage connections to infected computers and transfer data to the attackers\u2019 Command-and-Control (C2) servers.",
"gold": "- T1090: Proxy\n- T1090.002: Proxy - External Proxy",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Similar to RIPTIDE campaigns, APT12 infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye observed APT12 deliver these exploit documents via phishing emails in multiple cases. Based on past APT12 activity, we expect the threat group to continue to utilize phishing as a malware delivery method\n\t - T1203: Exploitation for Client Execution\n- Text: is used to automate SQL injection.\n\t - T1190: Exploit Public-Facing Application\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n",
"input": "\nThe exploit also contains an additional check that ATMFD.dll is of the exact version \u201c5.0.2.227\u201d. As the Houston Disk exploit supported additional versions, we aren\u2019t fully sure why the version range was narrowed down in DanderSpritz. Compared to ElEi, there is no indicative patch check, which may be because the DanderSpritz files are dated to mid-2013, which is prior to the patch that was identified by Kaspersky and is dated to October 2013.",
"gold": "- T1203: Exploitation for Client Execution\n- T1518: Software Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ryuk has stopped services related to anti-virus.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Each targeted file is opened, read, encrypted in memory, and then written to a new file in the malware\u2019s working directory using the filename format <random number>.WNCRYT. The files are then renamed to their original filename followed by the .WINCRY extension and moved to their original directory. The taskdl.exe process launched by the malware periodically deletes the remaining WINCRYT temporary files. The encryption process does not directly overwrite file data, so forensic recovery of file contents may be possible depending on the environment. The entire contents of the file are encrypted and saved with a custom header (see Figure 7\n\t - T1489: Service Stop\n- Text: To do this, Tick uses a number of publicly available hacktools such as Mimikatz, GSecdump, and Windows Credential Editor\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n",
"input": "\nIn several instances, UNC215 used the same exact file against multiple victims and frequently shared infrastructure across victims. This lack of compartmentalization is not uncommon, but does show that UNC215 is relatively less concerned about the ability for their compromises to be linked to each other. C2 servers used by UNC215 frequently reuse the same SSL certificate, as described in Team Cymru\u2019s research in 2020. On one network, between April 2019 and April 2020, an operator repeatedly and infrequently revisited a compromised network whenever an Endpoint Detection and Response (EDR) tool detected or quarantined tools like HYPERBRO and Mimikatz. After several months of repeated detections, UNC215 deployed an updated version of HYPERBRO and a tool called \u201canti.exe\u201d to stop Windows Update service and terminate EDR and Antivirus related services.",
"gold": "- T1102: Web Service\n- T1518.001: Software Discovery - Security Software Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During the defense evasion phase, anti-malware and monitoring software is often disabled. Firewall rules have occasionally been seen being disabled as well.\n\t - T1489: Service Stop\n\t - T1489: Service Stop\n- Text: TrickBot can disable Windows Defender.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Zeus Panda checks processes on the system and if they meet the necessary requirements, it injects into that process.\n\t - T1055.002: Process Injection - Portable Executable Injection\n",
"input": "\nIn order to terminate some of these processes and services, DopplePaymer uses an interesting technique that leverages ProcessHacker, a legitimate open-source administrative utility. This application is bundled with a kernel driver that can be used to terminate processes and services. DoppelPaymer is bundled with six portable executable (PE) files that are encrypted and compressed in the malware\u2019s sdata section. These PE files contain 32-bit and 64-bit versions of the following:",
"gold": "- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1489: Service Stop\n- T1562.001: Impair Defenses - Disable or Modify Tools",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Moving the (malicious) application into the /Users/user/Library/ directory 2) Executing this persisted copy, via the open command 3) Decrypting embedded strings that relate to file extensions of (likely) interest\n\t - T1036: Masquerading\n- Text: Rocke has used shell scripts which download mining executables and saves them with the filename \"java\".\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Services may be created with administrator privileges but are executed under system privileges, so an adversary can also use a service to escalate privileges from Administrator to System. They can also directly start services through Service Execution. 29],[30(link is external)] - During the STOLEN PENCIL operation in May 2018, Kimsuky used the GREASE malware. 32(link is external)] Kimsuky also targets Microsoft Office users by formatting their documents in a .docx file rather than .hwp and will tailor their macros accordingly\n\t - T1036.004: Masquerading - Masquerade Task or Service\n",
"input": "\nWe were able to link most of the decoy contents back to the original contents published on the internet by their initial authors, meaning DeathStalker did not craft them, but instead picked out appropriate ready-made material that was available on the internet. One of the decoy components impersonated a legitimate travel agent but included altered contact details.",
"gold": "- T1588.001: Obtain Capabilities - Malware\n- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT38 have enumerated files and directories, or searched in specific locations within a compromised host.\n\t - T1083: File and Directory Discovery\n- Text: Dtrack can remove its persistence and delete itself.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: EnvyScout can use hidden directories and files to hide malicious executables.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n",
"input": "\nIt also searches for directories with names \u201c.Backup0D\u201d \u2013 \u201c.Backup0M\u201d, and for each directory, removes contained files named \u201ctarget.lnk\u201d and \u201cdesktop.ini\u201d and the directory itself. These directories are also created during the Gauss USB infection.",
"gold": "- T1083: File and Directory Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Speaking on the vulnerability leveraged by this attack, while we spotted the attack performed via Office 2007 running on Windows XP, this is actually a fault existing in a TIFF-processing component shipped with Microsoft Office. Therefore, not only are Office 2007 with Windows XP vulnerable to this attack, but also more environments are affected by this vulnerability. In addition, our later research showed this exploit also works on Office 2007 running on Windows 7. The Labs has been actively working on getting every piece of details of this exploit, we may share our additional findings in the near future\n\t - T1203: Exploitation for Client Execution\n- Text: Based on the use of the relatively unique PLAINTEE malware, the malware\u2019s use of the same file paths on in each cluster, and the similar targeting, we have grouped these attacks together under the RANCOR campaign moniker. Interestingly, the delivery document borrowed a technique which was publicized in late 2017 as being used by the Sofacy threat actors, embedding the main malicious code in a EXIF metadata property of the document. By doing so, the main content of the macro itself (Figure 2) can be kept relatively simple, and the malicious\u2019 codes small footprint can help enable evasion of automated detection mechanisms based on macro content\n\t - T1204.002: User Execution - Malicious File\n- Text: Throughout the years, Kimsuky has been using an array of malware in their operations. The infrastructure of some of the malware used by Kimsuky can be tracked using pattern analysis of the URI structures used by some of their tools. The following table maps commonly observed URI patterns to their respective malware\n\t - T1566.001: Phishing - Spearphishing Attachment\n",
"input": "\n\u201cMicrosoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka \u201cExcel Featheader Record Memory Corruption Vulnerability.\u201d .",
"gold": "- T1203: Exploitation for Client Execution",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Earth Lusca used the command `move [file path] c:\\windows\\system32\\spool\\prtprocs\\x64\\spool.dll` to move and register a malicious DLL name as a Windows print processor, which eventually was loaded by the Print Spooler service.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Lazarus Group has renamed system utilities such as \"wscript.exe\" and \"mshta.exe\".\n\t - T1036.003: Masquerading - Rename System Utilities\n- Text: Figure 2: Textbox inside DOC The combined script from Word textbox drops the following components: \\Users\\[user_name]\\Intel\\58d2a83f7778d5.36783181.vbs \\Users\\[user_name]\\Intel\\58d2a83f777942.26535794.ps1 \\Users\\[user_name]\\Intel\\58d2a83f777908.23270411.vbs Also, the script creates a named schedule task for persistence to launch \u201c58d2a83f7778d5.36783181.vbs\u201d every 25 minutes\n\t - T1033: System Owner/User Discovery\n\t - T1036: Masquerading\n\t - T1087: Account Discovery\n\t - T1064: Scripting\n\t - T1204: User Execution\n",
"input": "\n8. Copy \u201cwinrestore.dll\u201d to the directory set in step 6 or 7a with the filename \u201cMSO1234.win\u201d .",
"gold": "- T1036: Masquerading\n- T1036.005: Masquerading - Match Legitimate Name or Location",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: JSS Loader can download and execute JavaScript files.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n- Text: has used Daniel Bohannon\u2019s Invoke-Obfuscation framework. The group also used files with base64 encoded PowerShell commands.\n\t - T1027: Obfuscated Files or Information\n- Text: If installing itself as a service fails, instead writes itself as a file named svchost.exe saved in %APPDATA%\\Microsoft\\Network.\n\t - T1036: Masquerading\n",
"input": "\nAssuming the weaponized document\u2019s macro code has executed the encoded, heavily obfuscated JScript code will be saved to disk and executed. One of the first behaviours observed is that of a fake error message box, such as the example in Figure 25. Message text varies but follows a theme of reporting something seemingly legitimate failed to run \u2013 another false sense of security for the victim.",
"gold": "- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1036: Masquerading\n- T1204.002: User Execution - Malicious File\n- T1204: User Execution\n- T1059.007: Command and Scripting Interpreter - JavaScript",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If the system is a 64-bit version of Windows, it downloads and executes a specific 64-bit version of the malware thanks to a powershell script\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Peppy has the ability to execute shell commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n",
"input": "\nDeathStalker has leveraged several malware strains and delivery chains over the years, from the Python- and VisualBasic-based Janicab to the PowerShell-based Powersing and the JavaScript-based Evilnum. The actor consistently used what we call \u201cdead-drop resolvers\u201d (DDRs), which is obfuscated content hosted on major public web services like YouTube, Twitter or Reddit; once decoded by malware this content reveals a command-and-control (C2) server address. DeathStalker also consistently leveraged anti-detection and antivirus evasion techniques, as well as intricate delivery chains that drop lots of files to the target\u2019s filesystems. To kick-start an infection, DeathStalker usually relies on spear-phishing emails with attachments, or links to public file sharing services, as well as script execution based on Windows shortcuts. We have identified how DeathStalker\u2019s malware compromises in clusters or targets various types of entities in all parts of the world, with a possible focus on law and consultancy offices, as well as FINTECH companies, but without a clearly identifiable or consistent interest. The targeting does not seem to be politically or strategically defined and doesn\u2019t appear to be the usual financially motived crime. Because of this, we conclude that DeathStalker is a cyber-mercenary organization.",
"gold": "- T1027: Obfuscated Files or Information\n- T1102: Web Service\n- T1566.001: Phishing - Spearphishing Attachment\n- T1059: Command and Scripting Interpreter\n- T1598.002: Phishing for Information - Spearphishing Attachment\n- T1598.003: Phishing for Information - Spearphishing Link\n- T1566.002: Phishing - Spearphishing Link\n- T1059.005: Command and Scripting Interpreter - Visual Basic\n- T1204.002: User Execution - Malicious File\n- T1059.007: Command and Scripting Interpreter - JavaScript\n- T1204.001: User Execution - Malicious Link\n- T1204: User Execution\n- T1566.003: Phishing - Spearphishing via Service\n- T1059.006: Command and Scripting Interpreter - Python\n- T1566: Phishing\n- T1588.001: Obtain Capabilities - Malware\n- T1059.001: Command and Scripting Interpreter - PowerShell\n- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Winnti for Windows can add a service named \"wind0ws\" to the Registry to achieve persistence after reboot.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: FELIXROOT deletes the Registry key \"HKCU\\Software\\Classes\\Applications\\rundll32.exe\\shell\\open\".\n\t - T1112: Modify Registry\n- Text: Misdat has created registry keys for persistence, including `HKCU\\Software\\dnimtsoleht\\StubPath`, `HKCU\\Software\\snimtsOleht\\StubPath`, `HKCU\\Software\\Backtsaleht\\StubPath`, `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed. Components\\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}`, and `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components\\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}`.\n\t - T1547: Boot or Logon Autostart Execution\n",
"input": "\nTo make sure the malware is executed after reboot, Ryuk uses a straight forward persistence technique, whereby it writes itself to the Run registry key using the following command:",
"gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- T1112: Modify Registry\n- T1547: Boot or Logon Autostart Execution",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Revenge RAT uses mshta.exe to run malicious scripts on the system.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: PLATINUM has transferred files using the Intel\u00ae Active Management Technology (AMT) Serial-over-LAN (SOL) channel.\n\t - T1105: Ingress Tool Transfer\n- Text: FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n",
"input": "\nThe services simply call mshta.exe to download an HTML application that downloads and runs the same cryptominer loader.",
"gold": "- T1218.005: System Binary Proxy Execution - Mshta\n- T1105: Ingress Tool Transfer",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.\n\t - T1203: Exploitation for Client Execution\n- Text: Bumblebee has relied upon a user opening an ISO file to enable execution of malicious shortcut files and DLLs.\n\t - T1204.002: User Execution - Malicious File\n- Text: APT30 has used spearphishing emails with malicious DOC attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n",
"input": "\nThe remainder of this section focuses largely on Object Linking and Embedding (OLE) Microsoft Excel documents, as they are most commonly used by the Hangover group, at least when it comes to the BackConfig malware. Through infrastructure analysis however, Unit 42 was able to find a BackConfig PE sample (SHA256: e28f1bc0b0910757b25b2146ad02798ee6b206a5fe66ce68a28f4ab1538d6a1f; first seen 10/24/2019) using the C2 domain matissues[.]com and dropped by the weaponised Rich Text Format (RTF) file (SHA256: 752c173555edb49a2e1f18141859f22e39155f33f78ea70a3fbe9e2599af3d3f) from the same day. The RTF used the CVE-2017-11882 exploit against equation editor vulnerabilities in Office applications to execute the PE sample which was a unique exploitation method compared to all other samples analyzed.",
"gold": "- T1203: Exploitation for Client Execution\n- T1068: Exploitation for Privilege Escalation",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Nerex creates a Registry subkey that registers a new service.\n\t - T1112: Modify Registry\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: KOCTOPUS will attempt to delete or disable all Registry keys and scheduled tasks related to Microsoft Security Defender and Security Essentials.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Koadic can obtain the OS version and build, computer name, and processor architecture from a compromised host.\n\t - T1082: System Information Discovery\n",
"input": "\nGauss highly modular architecture reminds us of Duqu \u2014 it uses an encrypted registry setting to store information on which plugins to load; is designed to stay under the radar, avoid security and monitoring programs and performs highly detailed system monitoring functions. In addition, Gauss contains a 64-bit payload, together with Firefox-compatible browser plugins designed to steal and monitor data from the clients of several Lebanese banks: Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. In addition, it targets users of Citibank and PayPal.",
"gold": "- T1082: System Information Discovery\n- T1005: Data from Local System\n- T1033: System Owner/User Discovery\n- T1119: Automated Collection\n- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1176: Browser Extensions",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Exploited Vulnerabilities: Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash\n\t - T1068: Exploitation for Privilege Escalation\n- Text: KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user.\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: The malware then grants itself debugging privileges by modifying its security token to add SeDebugPrivilege. This step is a prerequisite for the remainder of SUNSPOT\u2019s execution, which involves reading other processes\u2019 memory\n\t - T1134: Access Token Manipulation\n",
"input": "\nIn the initial versions of the earlier exploits, such as the exploit for CVE-2013-3660 and some versions of CVE-2015-0057, the exploit caused the kernel to execute a token-swapping shellcode stored in user-mode.",
"gold": "- T1134: Access Token Manipulation\n- T1134.002: Access Token Manipulation - Create Process with Token\n- T1134.001: Access Token Manipulation - Token Impersonation/Theft",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The \u201cDocuments,\u201d \u201cDownloads,\u201d \u201cDesktop,\u201d and \u201cPictures\u201d folders of every user are checked. The DLL file also examines drives other than C\n\t - T1083: File and Directory Discovery\n- Text: hcdLoader provides command-line access to the compromised system.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Open interactive python shells with auto-completion on the all-in-memory remote python interpreter\n\t - T1059: Command and Scripting Interpreter\n",
"input": "\nThe next program sent to victims enumerates all the drives on the infected system and executes the following command on them:",
"gold": "- T1082: System Information Discovery\n- T1083: File and Directory Discovery\n- T1135: Network Share Discovery\n- T1105: Ingress Tool Transfer",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Duqu can track key presses with a keylogger module.\n\t - T1056.001: Input Capture - Keylogging\n- Text: RCSession can capture screenshots from a compromised host.\n\t - T1113: Screen Capture\n- Text: During Operation Honeybee, the threat actors collected data from compromised hosts.\n\t - T1005: Data from Local System\n",
"input": "\nThe back door program used in the APT-C-06 organization's early APT operation was Lucker. It is a set of self-developed and customized modular Trojans. The set of Trojans is powerful, with keyboard recording, voice recording, screen capture, file capture and U disk operation functions, etc. The Lucker \u2018s name comes from the PDB path of this type of Trojan, because most of the backdoor's function use the LK abbreviation. In the middle to late period we have discovered its evolution and two different types of backdoor programs. We have named them Retro and Collector by the PDB path extracted from the program. The Retro backdoor is an evolution of the Lucker backdoor and it actives in a series of attacks from 2016 till now. The name comes from the pdb path of this type of Trojan with the label Retro, and also has the word Retro in the initial installer.",
"gold": "- T1113: Screen Capture\n- T1083: File and Directory Discovery\n- T1005: Data from Local System\n- T1123: Audio Capture",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: To run persistently on the system, the Trojan will first create a VBScript file:SpecialFolder.CommonApplicationData\\srvResesponded.vbs that contains:CreateObject(\u201cWScript.Shell\u201d).Run(\u201c%app%\u201d) The Trojan replaces the %app% string in the above VBScript with the path to its executable\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: can download additional encrypted backdoors onto the victim via GIF files.\n\t - T1105: Ingress Tool Transfer\n",
"input": "\nThis investigation illustrates an attacker using multiple tools and techniques to implement their full attack chain. A variety of infection artifacts are utilized ranging from bespoke tools (IndigoDrop) to customizable adversarial tools (Cobalt Strike beacons). The attackers also use a combination of public and private servers to host their malicious payloads with a growing trend towards the sole usage of public servers. The use of military-themed maldocs (lures) indicates that government and military organizations in South Asia may be the targets of this threat actor. The maldocs contain bonafide content and are most likely weaponized copies of benign documents known to peek the interests of their targets. The attack variants discovered over time show us that the threat actor can evolve their TTPs in a short period of time. The earliest observable campaigns of this actor date back to April 2018 and continue to operate today along with the most recent evolutions of the attacks. Evidence of rapid ideation, testing and production of new and diversified modules and IndigoDrop iterations indicates highly motivated and agile adversaries. The use of adversarial frameworks like Cobalt Strike suggests that the attackers are looking to expand their malicious arsenal at a significant rate with self-authored and customizable artifacts. Modern-day malware attack chains consist of multiple stages and operational entities. These artifacts and entities may be hosted locally or on remote servers. For example, this attack consists of multiple shellcodes hosted on remote locations downloaded by a local component (IndigoDrop) during runtime to instrument the attack chain. Thus, while network-based detection is important, it should be complemented with system behavior analysis and endpoint protections.",
"gold": "- T1588.001: Obtain Capabilities - Malware\n- T1036: Masquerading\n- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Although the developers attempt to use a denylist of files and directories to skip, it was observed encrypting core Windows operating system files, which caused the operating system to become unstable and crash. This was observed when running the ransomware on a Windows 2012 machine\n\t - T1486: Data Encrypted for Impact\n- Text: network loader encrypts C2 traffic with RSA and RC6.\n\t - T1573: Encrypted Channel\n- Text: Amadey has used HTTP for C2 communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n",
"input": "\nThe execution flow of GandCrab 2 is inherited from GandCrab 1 (pictured), and can be roughly divided into three parts: housekeeping (appears in the diagram as teal), C&C Communication (green), actual encryption (yellow) and final housekeeping (teal again). This execution flow proceeds as follows:",
"gold": "- T1486: Data Encrypted for Impact",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After we decrypted the additional shellcode, we determined that the functional shellcode is part of the Metasploit Framework, specifically using the block_api.asm code to resolve API function names and the block_reverse_http.asm code to obtain additional shellcode to execute on the system\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1105: Ingress Tool Transfer\n- Text: APT28 has harvested user's login credentials.\n\t - T1589.001: Gather Victim Identity Information - Credentials\n- Text: Denis can launch a remote shell to execute arbitrary commands on the victim\u2019s machine.\n\t - T1059: Command and Scripting Interpreter\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n",
"input": "\nThe TwoFace payload shell requires a password that is sent within HTTP POST data or within the HTTP Cookie, specifically with a field with a name \u201cpwd\u201d. The \u201cpwd\u201d field is used for authentication as a password, which the payload will generate the SHA1 hash and compare it with a hash that is hardcoded within the payload. We extracted the SHA1 hashes used for authentication from the known TwoFace shells, as seen in Table 4 and were able to find the associated password string for three of them. One of the passwords, \u201cRamdanAlKarim12\u201d contains a phrase that means \u201cRamadan the generous\u201d in Arabic (\u0631\u0645\u0636\u0627\u0646 \u0627\u0644\u0643\u0631\u064a\u0645). Another known password is \u201cFreeMe!\u201d, while the last known password contains what may be an acronym of a middle eastern energy organization followed by \u201cpass\u201d. It is possible that the actor chose this acronym based on the targeted organization, but we cannot confirm this.",
"gold": "- T1071.001: Application Layer Protocol - Web Protocols",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Drovorub can use kernel modules to establish persistence.\n\t - T1547.006: Boot or Logon Autostart Execution - Kernel Modules and Extensions\n- Text: can terminate a specific process by its process id.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk.\n\t - T1547.008: Boot or Logon Autostart Execution - LSASS Driver\n",
"input": "\nThe platform is started by the kernel mode driver component (\u201cmsndsrv.sys\u201d on Windows 2000 or above and \u201cmssvc32.vxd\u201d on Windows 9x). The driver then waits for the system to start and initiates execution of the user-mode loader \u201cmscfg32.exe\u201d. The loader then starts the platform\u2019s central module (an orchestrator) from the \u201cmscfg32.dll\u201d module. Additional drivers and libraries may be loaded by different components of the platform, either built-in or auxiliary.",
"gold": "- T1543.003: Create or Modify System Process - Windows Service\n- T1106: Native API",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FALLCHILL encrypts C2 data with RC4 encryption.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Molerats decompresses ZIP files once on the victim machine.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: uses RC4 encryption to obfuscate HTTP traffic.\n\t - T1573: Encrypted Channel\n",
"input": "\nIf an encrypted command arrives from the C&C, it is decrypted using RC4. The source domain name is used as the decryption key. Once the C&C command has been executed, a [Tasks] section will be created in config.ini; this is a logall actions performed by the bot.",
"gold": "- T1140: Deobfuscate/Decode Files or Information\n- T1027: Obfuscated Files or Information\n- T1573: Encrypted Channel\n- T1573.001: Encrypted Channel - Symmetric Cryptography",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Throughout 2017 and 2018 Unit 42 has been tracking and observing a series of highly targeted attacks focused in South East Asia, building on our research into the KHRAT Trojan. Based on the evidence, these attacks appear to be conducted by the same set of attackers using previously unknown malware families. In addition, these attacks appear to be highly targeted in their distribution of the malware used, as well as the targets chosen. We believe this group is previously unidentified and therefore have we have dubbed it \u201cRANCOR\u201d. The Rancor group\u2019s attacks use two primary malware families which we describe in depth later in this blog and are naming DDKONG and PLAINTEE. DDKONG is used throughout the campaign and PLAINTEE appears to be new addition to these attackers\u2019 toolkit. Countries Unit 42 has identified as targeted by Rancor with these malware families include, but are not limited to\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n\t - T1105: Ingress Tool Transfer\n- Text: Exaramel for Linux has a command to execute a shell command on the system.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: ZxShell has a feature to perform SYN flood attack on a host.\n\t - T1499: Endpoint Denial of Service\n",
"input": "\nThe following figure shows the content of the downloaded shell script sh. Upon execution, the sh script downloads different architectures of DDoS bot, and runs the downloaded binaries. None of the malwares was available on Virustotal at the time of our discovery, however many of them were uploaded to Virustotal not long after. More and more attack traffic are being detected at the time of writing, indicating that many devices are probably infected already.",
"gold": "- T1059: Command and Scripting Interpreter\n- T1059.004: Command and Scripting Interpreter - Unix Shell\n- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: To install a malicious shim database, the attacker invokes a Microsoft utility called sdbinst.exe through a PowerShell script\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: CISA also observed the threat actor using open-source tools such as Plink and TightVNC for lateral movement. CISA observed the threat actor using the techniques identified in table 8 for lateral movement within the victim environment\n\t - T1090: Proxy\n\t - T1021.004: Remote Services - SSH\n\t - T1572: Protocol Tunneling\n",
"input": "\nWhile we do not have telemetry showing how the CASHY200 PowerShell backdoor was delivered, in September 2019 we observed a host based in Kuwait beaconing to the windows64x[.]com domain using the same DNS tunneling protocol as the CASHY200 payload. Fortunately, the beaconing to this domain was blocked by our DNS security service, so the adversary was no longer able to communicate with their payload using this DNS tunnel. By analyzing the lineage of this tool, we found that actors may have used CASHY200 when targeting Kuwait government organizations starting in the spring of 2018 and continuing throughout 2019, according to our open source collection efforts.",
"gold": "- T1572: Protocol Tunneling\n- T1071: Application Layer Protocol\n- T1071.004: Application Layer Protocol - DNS",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The payload then sets EIP to the entry point of the newly injected code using the SetThreadContext API, and finally calls the NtAlertResumeThread API function to run the injected code\n\t - T1106: Native API\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: is obfuscated using the open source ConfuserEx protector. also obfuscates the name of created files/folders/mutexes and encrypts debug messages written to log files using the Rijndael cipher.\n\t - T1027: Obfuscated Files or Information\n- Text: uses reflective DLL injection to inject the malicious library and execute the RAT.\n\t - T1055: Process Injection\n",
"input": "\nThe very first stage of the implant\u2019s code is a custom loader written by APT3, which extracts an encrypted version of DoublePulsar code from incoming SMB packets, and decrypts and executes it. This is in fact a self-modifying piece of code, i.e. before it actually handles any of the aforementioned functionalities, it must decrypt subsequent parts of itself. The code is wrapped in 2 layers using simple crypters, so the first crypter decodes the second, and the latter decodes the actual loader code.",
"gold": "- T1140: Deobfuscate/Decode Files or Information\n- T1027: Obfuscated Files or Information\n- T1105: Ingress Tool Transfer\n- T1027.002: Obfuscated Files or Information - Software Packing\n- T1620: Reflective Code Loading\n- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wingbird performs multiple process injections to hijack system processes and execute malicious code.\n\t - T1055: Process Injection\n- Text: Nefilim removes itself from the target systems after infection with the following code: del C:\\Users\\admin\\AppData\\Local\\Temp\\<ransomware_file_name>.exe\" /s /f /q\"\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Uses encoded PowerShell commands.\n\t - T1027: Obfuscated Files or Information\n",
"input": "\nIn March 2017, Kasperksy released a report that compared DROPSHOT (which they call Stonedrill) with the most recent variant of SHAMOON (referred to as Shamoon 2.0). They stated that both wipers employ anti-emulation techniques and were used to target organizations in Saudi Arabia, but also mentioned several differences. For example, they stated DROPSHOT uses more advanced anti-emulation techniques, utilizes external scripts for self-deletion, and uses memory injection versus external drivers for deployment. Kaspersky also noted the difference in resource language sections: SHAMOON embeds Arabic-Yemen language resources while DROPSHOT embeds Farsi (Persian) language resources.",
"gold": "- T1070.004: Indicator Removal - File Deletion\n- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.\n\t - T1489: Service Stop\n- Text: Clambling can enumerate processes on a targeted system.\n\t - T1057: Process Discovery\n- Text: MuddyWater can disable the system's local proxy settings.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n",
"input": "\nThis is another aspect that has stayed unmodified in GandCrab 2. Once the information collection phase is over, GandCrab moves to terminate a wide range of processes that might be running on the victim machine and might be holding write access to files. This technique has been previously documented as a part of the Cerber ransomware, and prevents a scenario where GandCrab will attempt to encrypt a file and fail to obtain write access to the file because it is already open in another application. Process termination is done by the standard method of invoking the CreateToolhelp32Snapshot windows API and then iterating over the processes with Process32First and Process32Next. The list shares enough common processes with the one used by Cerber that it\u2019s probable to assume the list was based on the one used in Cerber originally. The list of targeted processes is constant throughout both versions of GandCrab:",
"gold": "- T1057: Process Discovery\n- T1106: Native API",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Magic Hound has attempted to lure victims into opening malicious email attachments.\n\t - T1204.002: User Execution - Malicious File\n- Text: Earth Lusca used VBA scripts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: MuddyWater has used a Word Template, Normal.dotm, for persistence.\n\t - T1137.001: Office Application Startup - Office Template Macros\n",
"input": "\nSome malicious documents that we managed to retrieve contained a social engineering banner asking users to enable macros execution. This explains how the malicious logic from the macro-based delivery chain could actually be triggered when macros are disabled by default on most modern Office settings.",
"gold": "- T1204.002: User Execution - Malicious File\n- T1204: User Execution",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: downloads and uploads files on the victim\u2019s machine.\n\t - T1105: Ingress Tool Transfer\n- Text: extracts and decrypts stage 3 malware, which is stored in encrypted resources.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: InnaputRAT uses an 8-byte XOR key to obfuscate API names and other strings contained in the payload.\n\t - T1027: Obfuscated Files or Information\n",
"input": "\nFigure 6 shows our testing of the download command within RGDoor, specifically a command \u201cdownload$c:\\windows\\temp\\test.txt\u201d that downloads the file uploaded in our previous test. We chose to use the key \u201c89\u201d (0x89) in this test to showcase RGDoor\u2019s ability to use any hexadecimal byte as a key, which resulted in an encoded command string of \u201c7eb+5+Xm6O2t6rPV/uDn7eb++tX97OT51f3s+v2n/fH9\u201d. RGDoor responds to this command with the encoded string \u201c/ez6/eDn7ri7uoM=\u201d, which when decrypted with the \u201c89\u201d key results in the string \u2018testing123\\n\u2019, which is the contents of the \u201ctest.txt\u201d file.",
"gold": "- T1105: Ingress Tool Transfer\n- T1140: Deobfuscate/Decode Files or Information\n- T1132: Data Encoding",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ServHelper has the ability to execute a PowerShell script to get information from the infected host.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: TeamTNT has searched for unsecured AWS credentials and Docker API credentials.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n",
"input": "\nTo gather credentials and facilitate lateral movement, ransomware deployment, the operators used PowerShell to recursively search the file system for logon credentials stored in text files and spreadsheets. The PowerShell tool \"SessionGopher\", capable of extracting session information from remote access tools, such as WinSCP, PuTTY, FileZilla and more, was also used enabling RDP and the Microsoft Sysinternals utility PsExec to allow lateral movement.",
"gold": "- T1003: OS Credential Dumping\n- T1555: Credentials from Password Stores\n- T1021.001: Remote Services - Remote Desktop Protocol\n- T1059.001: Command and Scripting Interpreter - PowerShell\n- T1021: Remote Services\n- T1005: Data from Local System\n- T1552.001: Unsecured Credentials - Credentials In Files",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RogueRobin decodes an embedded executable using base64 and decompresses it.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The last query is to the subdomain ihc[.]stage[.]12019683[.]ns2[.]true-deals[.]com): The delivered second stage shellcode is encrypted: METERPRETER: After decryption of the second stage shellcode, the shellcode deletes the \u2018MZ\u2019 prefix from within a very important part of the shellcode\n\t - T1064: Scripting\n\t - T1027: Obfuscated Files or Information\n- Text: Capabilities of the NETWIRE backdoor include key logging, reverse shell, and password theft. The backdoor uses a custom encryption algorithm to encrypt data and then writes it to a file created in the ./LOGS directory\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n",
"input": "\nDuring the execution of subsequent instructions, a call to the 0x10001D9A function is made. This function has a loop located at offset 0x10001E4D and performs several operations. One of these operations is a 1-byte XOR instruction (xor byte ptr [esi+ecx], al) located at offset 0x10001E4D. Its purpose is to decrypt a total of 110591 bytes of the executable\u2019s resource data where the PE binary data is stored. The final result is an in-memory reconstructed executable file. In Figure 19, the encrypted and decrypted data in the process\u2019s memory can be seen.",
"gold": "- T1140: Deobfuscate/Decode Files or Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remote desktop available via VNC. Hidden Remote desktop available via RDPWrap. Privilege escalation (even for the latest Win10 updates) Remote WebCam control. Remote Shell. Remote desktop available via VNC. Hidden Remote desktop available via RDPWrap. Remote Shell. Remote desktop available via VNC. Hidden Remote desktop available via RDPWrap. Privilege escalation (even for the latest Win10 updates) - Remote WebCam control\n\t - T1021.005: Remote Services - VNC\n- Text: Operation Wocao has used a VBScript to conduct reconnaissance on targeted systems.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: While the most recent samples observed still use batch scripts and SFX files, the Gamaredon Group has moved away from applications like wget, Remote Manipulator Tool, VNC and ChkFlsh.exe. Instead of using wget the attackers are distributing custom developed downloaders, and instead of Remote Manipulator or VNC the malware is using a custom developed remote access implant\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n",
"input": "\nThe path configured in the VNC configuration file across all implants employing VNC (UltraVNC.ini) is \u201cY:\\\u041f\u0420\u041e\u0411\u0410\\\u0421\u043e\u0437\u0434\u0430\u043d\u0438\u0435 \u0442\u0440\u043e\u044f\u043d\u043e\u0432\\\u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0435 RMS\\vnc\u201d. This isn\u2019t the only place hardcoded Cyrillic file paths are used by implants. Many of the batch scripts also use hardcoded paths such as \u201c\u0413\u043b\u0430\u0432\u043d\u043e\u0435 \u043c\u0435\u043d\u044e\\\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b\\\u0410\u0432\u0442\u043e\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430\u201d. Many payloads also include a VBS script which raises a dialog box to the users asking them to run the malware again. It reads, \u201c\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u0440\u0438 \u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f (0xc0000005). \u041f\u043e\u0432\u0442\u043e\u0440\u0438\u0442\u044c \u043f\u043e\u043f\u044b\u0442\u043a\u0443 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u044f \u0444\u0430\u0439\u043b\u0430?\u201d (English Translation from Russian: Application failed to initialize (0xc0000005). Try to open the file again?).",
"gold": "- T1059: Command and Scripting Interpreter\n- T1059.003: Command and Scripting Interpreter - Windows Command Shell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n- Text: BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros.\n\t - T1137.001: Office Application Startup - Office Template Macros\n- Text: Pteranodon can use a malicious VBS file for execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n",
"input": "\nMalicious macros already embedded, ready to execute. Malicious macro downloaded as part of an externally linked template that is then injected into the original lure maldoc.",
"gold": "- T1027.009: Obfuscated Files or Information - Embedded Payloads",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NotPetya has the capability to exploit SMBv1 via the well known EternalBlue exploit. Once the exploit is launched, the shellcode will end up writing the file and executing the malware on the target machine.\n\t - T1203: Exploitation for Client Execution\n- Text: OilRig has used VBSscipt macros for execution on compromised hosts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: SECOND STAGE JAVASCRIPT INTO POWERSHELL: The second stage JavaScript creates a PowerShell file with the same name in the same directory\n\t - T1064: Scripting\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n",
"input": "\nThe lure documents captured in this attack are in Yiddish[1] The attackers exploit office with OLE autolink objects (CVE-2017-0199) to embed the documents onto malicious websites. All the exploits and malicious payload were uploaded through remote servers. [1]The language is automatically identified by Google Translate _Notification in the pop-up window: _ Links to this document may reference other files. Do you want to update this document with the data in the linked file? Once victims opened the lure document, Word will firstly visit a remote website of IE vbscript 0day (CVE-2018-8174) to trigger the exploit. Afterwards, Shellcode will be running to send several requests to get payload from remote servers. The payload will then be decrypted for further attack. While the payload is running, Word will release three DLL backdoors locally. The backdoors will be installed and executed through PowerShell and rundll32. UAC bypass was used in this process, as well as file steganography and memory reflection uploading, in order to bypass traffic detection and to complete loading without any files. The main process of the attack is shown in the following figure:",
"gold": "- T1203: Exploitation for Client Execution\n- T1140: Deobfuscate/Decode Files or Information\n- T1059: Command and Scripting Interpreter\n- T1027: Obfuscated Files or Information\n- T1102: Web Service\n- T1204.002: User Execution - Malicious File\n- T1036: Masquerading\n- T1204: User Execution\n- T1059.001: Command and Scripting Interpreter - PowerShell\n- T1204.001: User Execution - Malicious Link\n- T1218.011: System Binary Proxy Execution - Rundll32\n- T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 deployed a Monero cryptocurrency mining tool in a victim\u2019s environment.\n\t - T1496: Resource Hijacking\n- Text: During Operation Wocao, threat actors used PowerShell to add and delete rules in the Windows firewall.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: Grandoreiro can modify the binary ACL to prevent security tools from running.\n\t - T1222.001: File and Directory Permissions Modification - Windows File and Directory Permissions Modification\n",
"input": "\nAn actor successfully tested China Chopper on a second server and stopped the activity. However, we also found another Monero cryptocurrency miner just as we found commodity malware on other systems compromised with China Chopper. The actors first reset the Access Control List for the Windows temporary files folder and take ownership of the folder. They then allow the miner executable through the Windows Firewall and finally launch the mining payload.",
"gold": "- T1562.004: Impair Defenses - Disable or Modify System Firewall\n- T1496: Resource Hijacking\n- T1222.001: File and Directory Permissions Modification - Windows File and Directory Permissions Modification",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It then downloads and decrypts a PNG file\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: LazyScripter has leveraged the BatchEncryption tool to perform advanced batch obfuscation and encoding techniques.\n\t - T1027: Obfuscated Files or Information\n- Text: Agent.btz attempts to download an encrypted binary from a specified domain.\n\t - T1105: Ingress Tool Transfer\n",
"input": "\nThis \u201ctransfer\u201d decryption routine returns a URL that is concatenated with the other variables, resulting in\u201dhXXp://www.hotinfonews.com/news/dailynews2.php?id=&t=win\u201d. It is this content that is written to disk and executed on the victim\u2019s machine. A description of that downloader follows. It is most interesting that this exploit/php combination\u2019s encryption routine is different from the obfuscation commonly used throughout Red October modules. It further suggests that potentially this limited use package was developed separately from the rest for a specific target.",
"gold": "- T1105: Ingress Tool Transfer",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Emotet occasionally takes a break from delivering malicious emails. Emotet's longest absence from the threat landscape occurred in early February 2020 and lasted more than five months. Emotet resumed operations in mid-July 2020, and it quickly surpassed other threats in sheer volume of malicious spam.\n\t - T1098.002: Account Manipulation - Additional Email Delegate Permissions\n\t - T1566: Phishing\n- Text: TrickBot has been delivered via malicious links in phishing e-mails.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Magic Hound has used SMS and email messages with links designed to steal credentials.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n",
"input": "\nThroughout January 2020, FireEye has continued to observe multiple targeted phishing campaigns designed to download and deploy a backdoor we track as MINEBRIDGE. The campaigns primarily targeted financial services organizations in the United States, though targeting is likely more widespread than those we\u2019ve initially observed in our FireEye product telemetry. At least one campaign targeted South Korean organizations, including a marketing agency.",
"gold": "- T1105: Ingress Tool Transfer\n- T1598.002: Phishing for Information - Spearphishing Attachment\n- T1598.003: Phishing for Information - Spearphishing Link\n- T1566.002: Phishing - Spearphishing Link",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments.\n\t - T1018: Remote System Discovery\n- Text: In an uninhibited Emotet infection, it\u2019s likely the malware would have then attempted to move laterally to other machines in the environment. Malwarebytes has some good analyses of Emotet if you\u2019re looking for further reading\n\t - T1210: Exploitation of Remote Services\n- Text: TEMP.Veles has used compromised VPN accounts.\n\t - T1078: Valid Accounts\n",
"input": "\nTo enable lateral movement, the adversary uses ping and nslookup commands, in addition to scanning the environment for Windows systems listening on port 445. This is done using a simple port scanning binary unique to PROPHET SPIDER, typically named pscan or pscan2. For example, process logging may reveal similar commands to the below. Note the commands are executed by the oracle user account, which is the user that runs WebLogic. In multiple PROPHET SPIDER cases, CrowdStrike observed a reverse shell binary located at /var/tmp/[filename], which launches bash as a child; and the pscan2 command is a child to bash. The reverse shell is a child to PID 1, which indicates it was either executed via an init script created for persistence, or its parent was terminated causing it to become a zombie process that was reaped by the init daemon.",
"gold": "- T1018: Remote System Discovery\n- T1059: Command and Scripting Interpreter\n- T1049: System Network Connections Discovery\n- T1059.004: Command and Scripting Interpreter - Unix Shell\n- T1046: Network Service Discovery\n- T1021.002: Remote Services - SMB/Windows Admin Shares",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Daserf hides collected data in password-protected .rar archives.\n\t - T1560: Archive Collected Data\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: The encrypted file contains a config file of 0x78 bytes. The data is decrypted with an 0xD9 XOR operation.\n\t - T1027: Obfuscated Files or Information\n- Text: MuddyWater has used the native Windows cabinet creation tool, makecab.exe, likely to compress stolen data to be uploaded.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n",
"input": "\nThere are multiple web inject files. One contains all of the target URL and hostname data, and the second contains regex patterns, as well as the code to inject. These files are both RC4-encrypted and compressed.",
"gold": "- T1027: Obfuscated Files or Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dubbed \u2018SpeakUp\u2019, the new Trojan exploits known vulnerabilities in six different Linux distributions\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Chinese state-sponsored cyber actors have been observed exploiting Pulse Secure VPN appliances to view and extract valid user credentials and network information from the servers.\n\t - T1212: Exploitation for Credential Access\n- Text: The exploit used, named EternalBlue, exploits a vulnerability in the Server Message Block (SMB) protocol which allows the malware to spread to all unpatched Windows systems from XP to 2016 on a network that have this protocol enabled. This vulnerability allows remote code execution over SMB v1. WannaCry utilizes this exploit by crafting a custom SMB session request with hard-coded values based on the target system\n\t - T1210: Exploitation of Remote Services\n",
"input": "\nExploitation of CVE-2016-0167 a Microsoft Windows Privilege Escalation vulnerability to gain SYSTEM level privileges. Earlier versions of Shifu exploited CVE-2015-0003 to achieve the same goal. Use of a Windows atom to identify if the host is already infected with Shifu in addition to the mutex used by previous versions. Use of \u201cpush-calc-ret\u201d API obfuscation to hide function calls from malware analysts. Use of alternative Namecoin .bit domains.",
"gold": "- T1068: Exploitation for Privilege Escalation\n- T1106: Native API",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TA505 has registered domains to impersonate services such as Dropbox to distribute malware.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: Hancitor has been delivered via phishing emails which contained malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Last week, Unit 42 released a blog on a newly named threat group called DarkHydrus that we observed targeting government entities in the Middle East. The attack that we discussed in our previous publication involved spear-phishing to deliver a PowerShell payload we call RogueRobin; however, we are aware of DarkHydrus carrying out a credential harvesting attack in June 2018. It also appears that this an ongoing campaign, as we have evidence of previous credential harvesting attempts using the same infrastructure dating back to the Fall of 2017. The credential harvesting attacks used spear-phishing emails that contained malicious Microsoft Office documents that leveraged the \u201cattachedTemplate\u201d technique to load a template from a remote server. When attempting to load this remote template, Microsoft Office will display an authentication dialog box to ask the user to provide login credentials. When entered, these credentials are then sent to the C2 server, which allows DarkHydrus to collect the user account credentials. Based on Unit 42\u2019s analysis, DarkHydrus used the open-source Phishery tool to create two of the known Word documents used in these credential harvesting attacks. As discussed in our previous blog, this further strengthens DarkHydrus\u2019 use of the open source for their attack tools. A phishing attack to steal credentials like this is not new: US-CERT warned of the same technique by a different threat group in 2017. Based on this, we can reasonably presume this group will continue to carry out attacks against these kinds of targets in the Middle East in the near-future\n\t - T1566.001: Phishing - Spearphishing Attachment\n",
"input": "\nAPT33 registered multiple domains that masquerade as Saudi Arabian aviation companies and Western organizations that together have partnerships to provide training, maintenance and support for Saudi\u2019s military and commercial fleet. Based on observed targeting patterns, APT33 likely used these domains in spear phishing emails to target victim organizations.",
"gold": "- T1598.003: Phishing for Information - Spearphishing Link\n- T1566: Phishing\n- T1583.001: Acquire Infrastructure - Domains\n- T1036.005: Masquerading - Match Legitimate Name or Location\n- T1598: Phishing for Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If the victim is using PowerShell 3.0 or later, POWERSOURCE writes its decoded payload to an Alternate Data Stream (ADS) named kernel32.dll that is saved in \"%PROGRAMDATA%\\Windows\\\".\n\t - T1027: Obfuscated Files or Information\n- Text: Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt replies to the implant.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: During Operation Wocao, threat actors encrypted IP addresses used for \"Agent\" proxy hops with RC4.\n\t - T1001: Data Obfuscation\n",
"input": "\nComnie Malware Family Comnie uses the RC4 algorithm in multiple locations both to obfuscate strings used by the malware, as well as for network communication. Additionally, the malware looks for multiple security products on victim machines and sometimes alters its behavior depending on the products present. More information about how Comnie handles identified security products may be found in the technical analysis in the Appendix. These security products included those that are known to be most widely used within South Korea and Taiwan. Comnie is able to achieve persistence via a .lnk file that is stored within the victim\u2019s startup path. When originally run, Comnie will convert itself from an executable file to a DLL and will write this newly created DLL to the host machine\u2019s %APPDATA% directory. The built-in Windows utility rundll32.exe is then used to load this DLL by the original .lnk file. Unit 42 has observed a total of two variants of Comnie. One of the ways the variants differ is in how they obtain their command and control (C2) information. Both variants make use of third-party online services in an attempt to prevent DNS based blocking of their first stage communications. However, the obfuscation mechanism varies slightly. In older variants, Comnie was found to look for the \u2018++a++\u2019 markers. The example C2s used by older variants of Comnie demonstrates this:",
"gold": "- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- T1104: Multi-Stage Channels\n- T1057: Process Discovery\n- T1518.001: Software Discovery - Security Software Discovery\n- T1573: Encrypted Channel\n- T1071.004: Application Layer Protocol - DNS\n- T1071: Application Layer Protocol\n- T1001: Data Obfuscation",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a tool that can copy files to remote machines.\n\t - T1105: Ingress Tool Transfer\n- Text: Doki has used a script that gathers information from a hardcoded list of IP addresses and uploads to an Ngrok URL.\n\t - T1020: Automated Exfiltration\n- Text: is capable of taking screenshots.\n\t - T1113: Screen Capture\n",
"input": "\nCapturing screenshots at a configurable interval and uploading them to the attacker. Downloading and executing additional files. Executing arbitrary commands on the system.",
"gold": "- T1105: Ingress Tool Transfer\n- T1113: Screen Capture\n- T1041: Exfiltration Over C2 Channel\n- T1005: Data from Local System\n- T1119: Automated Collection",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GALLIUM used a modified version of HTRAN to redirect connections between networks.\n\t - T1090.002: Proxy - External Proxy\n- Text: Hikit supports peer connections.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: can function as a proxy to create a serve that relays communication between the client and C&C server.\n\t - T1090: Proxy\n",
"input": "\nUNC215 made technical modifications to their tools to limit outbound network traffic and used other victim networks to proxy their C2 instructions, likely to minimize the risk of detection and blend in with normal network traffic. The following are examples of HYPERBRO and FOCUSFJORD samples capable of acting as proxies to relay communications to their C2 servers. We do not have enough context about the following samples to attribute all of them to UNC215, though they are representative of activity we have seen from the group.",
"gold": "- T1090: Proxy\n- T1090.001: Proxy - Internal Proxy\n- T1090.002: Proxy - External Proxy\n- T1090.003: Proxy - Multi-hop Proxy",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The updated module is called tvncDLL and allows the threat actor to monitor the victim and collect information that would enable pivoting to valuable systems on the network\n\t - T1021.005: Remote Services - VNC\n- Text: Internal Reconnaissance APT40 uses compromised credentials to log on to other connected systems and conduct reconnaissance\n\t - T1021: Remote Services\n- Text: DownPaper uses the command line.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n",
"input": "\nFinally, the Phorpiex VNC worm executes several scripts on a victim\u2019s machine by simulating keyboard input using VNC protocol. First it enters Win+R to open the \u201cRun program\u201d window. Then it \u201centers\u201d the script contents by sending the corresponding VNC packets:",
"gold": "- T1059: Command and Scripting Interpreter\n- T1021.005: Remote Services - VNC\n- T1059.003: Command and Scripting Interpreter - Windows Command Shell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Egregor has used DLL side-loading to execute its payload.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: Dridex contains a module for VNC.\n\t - T1219: Remote Access Software\n- Text: The backdoor installer will drop a normal sidebar.exe file (a Windows Gadget tool, a feature already discontinued by Windows), a malicious loader (in \"C:\\ProgramData\\Apple\\Update\\wab32res.dll\"), and an encrypted configuration file\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n",
"input": "\nThe end result is a legitimate, though outdated (version 11, compiled on September 17, 2018, at 10:30:12 UTC), TeamViewer instance hijacked by a malicious sideloaded DLL (MINEBRIDGE).",
"gold": "- T1036.005: Masquerading - Match Legitimate Name or Location\n- T1036: Masquerading\n- T1574.002: Hijack Execution Flow - DLL Side-Loading\n- T1219: Remote Access Software\n- T1588.002: Obtain Capabilities - Tool\n- T1055.001: Process Injection - Dynamic-link Library Injection",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the first campaign, the email (Figure 1) purported to be from FinCERT [8] with the subject \u201c\u041f\u0430\u043c\u044f\u0442\u043a\u0430 \u043f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u201d (Information Security Notice) and contained a Microsoft Word attachment named \u201c\u0441\u0432\u043e\u0434\u043a\u04301705.doc\u201d (report1705) (Figure 3). - Another email (Figure 2) purported to be from Security Support for PCI-DSS [3] at a major credit card company with the subject line \u201c\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u201d (security) and a Microsoft Word attachment (Figure 4) \u201c\u0422\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.doc\u201d (Safety requirements\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: BazarLoader is Windows-based malware spread through various methods involving email\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1534: Internal Spearphishing\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566: Phishing\n- Text: In December 2019, another version of the AppleJeus malware was identified on Twitter by a cybersecurity company based on many similarities to the original AppleJeus malware. In contrast, open-source reporting stated that the Windows version might have been downloaded via instant messaging service Telegram, as it was found in a \u201cTelegram Downloads\u201d folder on an unnamed victim\n\t - T1566.002: Phishing - Spearphishing Link\n",
"input": "\nWe observed previous, somewhat similar spearphishing scenarios with an archive containing .LNK, .docx, and base64 encoded executable code, delivering offensive Finfisher objects in separate intrusion activity clusters. This activity was not Sofacy, but the spearphishing techniques were somewhat similar \u2013 the layered powershell script attachment technique is not the same, but not altogether new.",
"gold": "- T1566.001: Phishing - Spearphishing Attachment\n- T1598.002: Phishing for Information - Spearphishing Attachment\n- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MSTIC has observed NICKEL actors using exploits against unpatched systems to compromise remote access services and appliances. Upon successful intrusion, they have used credential dumpers or stealers to obtain legitimate credentials, which they used to gain access to victim accounts. NICKEL actors created and deployed custom malware that allowed them to maintain persistence on victim networks over extended periods of time. MSTIC has also observed NICKEL perform frequent and scheduled data collection and exfiltration from victim networks\n\t - T1016: System Network Configuration Discovery\n\t - T1119: Automated Collection\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1078: Valid Accounts\n- Text: Our analysis shows that the Crimson RAT malware is compiled as a .NET binary with minimal obfuscation. This could indicate that the cybercriminal group behind this campaign is possibly not well-funded.\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1001: Data Obfuscation\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n- Text: For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.\n\t - T1608.001: Stage Capabilities - Upload Malware\n",
"input": "\nZebrocy activity is a known subset of Sofacy activity. We predicted that they would continue to innovate within their malware development after observing past behavior, developing with Delphi, AutoIT, .Net C#, Powershell, and now \u201cGo\u201d languages. Their continued targeting, phishing techniques, infrastructure setup, technique and malware innovation, and previously known backdoors help provide strong confidence that this activity continues to be Zebrocy.",
"gold": "- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SpeakUp attempts to exploit the following vulnerabilities in order to execute its malicious script: CVE-2012-0874, CVE-2010-1871, CVE-2017-10271, CVE-2018-2894, CVE-2016-3088, JBoss AS 3/4/5/6, and the Hadoop YARN ResourceManager.\n\t - T1203: Exploitation for Client Execution\n- Text: These privilege escalation modules are the ones we caught when we queried for Jian\u2019s global configuration table. We also found a couple of more Local Privilege Escalation exploits from the NtElevation series\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Vulnerabilities such as ProxyShell (CVE-2021-34473) and improper SQL sanitization (CVE-2021-20028) have been observed being utilized as footholds into the environment.\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1190: Exploit Public-Facing Application\n",
"input": "\nAs this is a NULL-Deref vulnerability, we can immediately rule out CVE-2017-0005, as the stack trace shown in Microsoft\u2019s blog has nothing to do with the NULL page. This means that this is possibly another vulnerability found and exploited by Equation Group in 2013. With that out of the way, it is time to understand what triggers this NULL-Deref vulnerability.",
"gold": "- T1068: Exploitation for Privilege Escalation\n- T1587.004: Develop Capabilities - Exploits",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Winnti for Windows can add a service named \"wind0ws\" to the Registry to achieve persistence after reboot.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The malware sets information like the C2 server, ID, the downloaded payload, and the decoded project.aspx in a registry key under \u201cHKCU\\Software\\ApplicationContainer\\Appsw64\u201d. These keys will be used in the second stage\n\t - T1112: Modify Registry\n- Text: Aside from the aforementioned executables, the droppers also contained a remote access Trojan (RAT). The RAT executable allows criminals to perform various operations on a host, such as uploading/downloading, executing files, etc\n\t - T1105: Ingress Tool Transfer\n\t - T1547: Boot or Logon Autostart Execution\n",
"input": "\nThe persistence is guaranteed by a method that is called when the program is closing. It checks if the malware directory exists as specified in an embedded configuration and then copies the malware executable inside it. It also creates a registry key under \u201cHKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\u201d to execute the worm automatically.",
"gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- T1547: Boot or Logon Autostart Execution",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We named Lazarus the most active group of 2020. We\u2019ve observed numerous activities by this notorious APT group targeting various industries. The group has changed target depending on the primary objective. Google TAG has recently published a post about a campaign by Lazarus targeting security researchers. We have seen Lazarus attack various industries using this malware cluster before. In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group\u2019s other campaigns\n\t - T1005: Data from Local System\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1204.002: User Execution - Malicious File\n- Text: Sidewinder has lured targets to click on malicious links to gain execution in the target environment.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Proofpoint researchers frequently observe Silent Librarian\u2019s phishing attempts originating from a university unrelated to their current target using a separate, unrelated university\u2019s URL shortening service. This short URL links to a phishing landing page either directly or via one or more third-party sites that eventually lands the user on a clone of a login portal hosted on an actor-controlled server\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1598.003: Phishing for Information - Spearphishing Link\n\t - T1608.005: Stage Capabilities - Link Target\n",
"input": "\nOne of the maldocs disclosed here was referred to by a Bit.ly-shortened URL (created Jan. 23, 2020) \u2014 hxxp://bit[.]ly/iaf-guidelines \u2014 which redirects to hxxp://tecbeck[.]com/IAP39031[.]docx. It is highly likely that the attackers hosted the maldocs on a public server and distributed the direct or Bit.ly links to the targets in the form of spear-phishing emails. This may be done to bypass detection systems that scan email attachments for malware.",
"gold": "- T1598.003: Phishing for Information - Spearphishing Link\n- T1566.002: Phishing - Spearphishing Link",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NBTscan can list active users on the system.\n\t - T1033: System Owner/User Discovery\n- Text: POWRUNER may collect process information by running \"tasklist\" on a victim.\n\t - T1057: Process Discovery\n- Text: In the PuTTY sample discovered on VirusTotal, the malicious code was inserted into the ssh2_userauth_process_queue function (source file: putty-0.77\\ssh\\userauth2-client.c). The code resides in the part of the function responsible for performing password authentication, as opposed to other methods such as keyboard-interactive authentication or public key. Once the user establishes a connection and enters their username and password, the malicious code is executed regardless of the authentication result.\n\t - T1480: Execution Guardrails\n",
"input": "\nFirst, the module checks if it is running in a target process name and (if specified) by the target username. If the module or user names do not match, the thread terminates.",
"gold": "- T1033: System Owner/User Discovery\n- T1057: Process Discovery\n- T1087: Account Discovery\n- T1480: Execution Guardrails",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1584\n- Text: Magic Hound has registered fraudulent domains such as \"mail-newyorker.com\" and \"news12.com.recover-session-service.site\" to target specific victims with phishing attacks.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: txt,log} and is also a \"cryptojacker,\" which is a tool that uses a victim\u2019s computer to mine cryptocurrency\n\t - T1056.001: Input Capture - Keylogging\n\t - T1557: Adversary-in-the-Middle\n",
"input": "\nIn one part of guide.txt, an example target appears to be provided, with a corresponding adversary IP (185.162.235[.]106) for the legitimate domain to be redirected to. Analysis of this IP provides several interesting data points, including possible relationships to previously observed OilRig infrastructure. Examining the hosting provider shows that the IP is associated with an Iranian hosting provider called NovinVPS. The autonomous system name of the IP shows that the allocation is controlled by Serverius Holding B.V., which is an autonomous system name we have previously seen associated with the OilRig group. In fact, examining the Class C IP block of 185.162.235[.]0/24 shows at least two other IPs we have previously identified as in use by the OilRig group for C2 servers. 185.162.235[.]29 and 185.162.235[.]121 and their associated domains, office365-management[.]com and msoffice-cdn[.]com respectively. Office365-management[.]com was first identified in October 2017 as a C2 servers for OilRig operations delivering the ISMInjector backdoor. Later in February 2018 we were able to link the entire grouping of infrastructure to another campaign delivering the OopsIE backdoor via the reuse of WHOIS registrant artifacts, shared SSL certificates, and a shared Class C IP block. Figure 17 shows the relationship between the files related to DNS hijacking and known infrastructure associated with OilRig.",
"gold": "- T1036.005: Masquerading - Match Legitimate Name or Location",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During C0015, the threat actors used Base64-encoded strings.\n\t - T1027: Obfuscated Files or Information\n- Text: Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n- Text: Bazar can hash then resolve API calls at runtime.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n",
"input": "\nIn total, we observed three variations of CMSTAR in these recent attacks against Belarusian targets. The biggest change observed between them looks to be minor modifications made to the string obfuscation routine. A very simple modification to the digit used in subtraction was modified between the variants, as shown below:",
"gold": "- T1027: Obfuscated Files or Information\n- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sibot is a dual-purpose malware implemented in VBScript. It is designed to achieve persistence on the infected machine then download and execute a payload from a remote C2 server. The VBScript file is given a name that impersonates legitimate Windows tasks and is either stored in the registry of the compromised system or in an obfuscated format on disk\n\t - T1105: Ingress Tool Transfer\n- Text: APT28 uses cmd.exe to execute commands and custom backdoors.\n\t - T1059: Command and Scripting Interpreter\n- Text: A technical relevant fact about this campaign is the use of Python embedded into Windows executables of the malware. There is no multi-platform support as the code is heavily Windows-oriented (use of libraries). However, we discovered several clues that the attackers prepared the infrastructure for Mac OS X and Unix victims as well. In addition to Windows components, we also found a mobile (Android) component\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1059.006: Command and Scripting Interpreter - Python\n",
"input": "\nDuring the C2 interactions, PyMICROPSIA downloads two additional samples that are dropped and executed on the victim\u2019s system, running additional functionality. These payloads are not Python / PyInstaller based.",
"gold": "- T1105: Ingress Tool Transfer",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Unpacking routine for SWF exploit The exploit is a memory corruption vulnerability that exists in the \u201ccom.adobe.tvsdk.mediacore.BufferControlParameters\u201d class. If the exploit is successful, it will gain arbitrary read / write operations within memory, thus allowing it to execute a second stage shellcode\n\t - T1068: Exploitation for Privilege Escalation\n\t - T1203: Exploitation for Client Execution\n- Text: In a recent wave of attacks during February 2019, Elfin attempted to exploit a known vulnerability (CVE-2018-20250) in WinRAR, the widely used file archiving and compression utility capable of creating self-extracting archive files. The exploit was used against one target in the chemical sector in Saudi Arabia. If successfully exploited on an unpatched computer, the vulnerability could permit an attacker to install any file on the computer, which effectively permits code execution on the targeted computer\n\t - T1203: Exploitation for Client Execution\n- Text: During Operation CuckooBees, the threat actors exploited multiple vulnerabilities in externally facing servers.\n\t - T1190: Exploit Public-Facing Application\n",
"input": "\nAnother important conclusion we drew from analyzing the exploited vulnerability is that we now know for sure that EpMe exploits CVE-2017-0005. On top of our analysis of both the Equation Group and APT31 exploits, the EpMe exploit aligns perfectly with the details reported in Microsoft\u2019s blog on CVE-2017-0005. And if that wasn\u2019t enough, the exploit indeed stopped working after Microsoft\u2019s March 2017 patch, the patch that addressed the said vulnerability.",
"gold": "- T1587.004: Develop Capabilities - Exploits\n- T1588.006: Obtain Capabilities - Vulnerabilities\n- T1588.005: Obtain Capabilities - Exploits\n- T1499.004: Endpoint Denial of Service - Application or System Exploitation",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BitPaymer has attempted to install itself as a service to maintain persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: identifies and kills anti-malware processes.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: These vulnerabilities include:CVE-2015-6585: Hangul Word Processor VulnerabilityCVE-2015-8651: Adobe Flash Player 18.0.0.324 and 19.x VulnerabilityCVE-2016-0034: Microsoft Silverlight 5.1.41212.0 VulnerabilityCVE-2016-1019: Adobe Flash Player 21.0.0.197 VulnerabilityCVE-2016-4117: Adobe Flash Player 21.0.0.226 VulnerabilityDHS recommends that organizations upgrade these applications to the latest version and patch level\n\t - T1068: Exploitation for Privilege Escalation\n\t - T1203: Exploitation for Client Execution\n",
"input": "\nBut even more curious were the names of malicious drivers in this list, which if found could indicate that the target system has already been compromised by another attacker, and would then warn the operators to \u201cpull back\u201d. Another pivotal component in the Equation Group\u2019s arsenal that is in charge of such checks is called \u201cTerritorial Dispute\u201d, or \u201cTeDi\u201d.",
"gold": "- T1083: File and Directory Discovery\n- T1082: System Information Discovery\n- T1480: Execution Guardrails",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Loads the image resource with name `T__6541957882` into memory. 3) Adds `0xEE` to the bytes to decode the DLL. 4) Reflectively loads decoded DLL into memory and executes it\n\t - T1620: Reflective Code Loading\n- Text: Rocke's miner, \"TermsHost.exe\", evaded defenses by injecting itself into Windows processes, including Notepad.exe.\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: Taidoor can perform DLL loading.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n",
"input": "\nHere is the script hosted on Pastebin: Reflective loader downloaded from pastebin.com The script executes a hardcoded PE file located \u2014 Gandcrab \u2014at the end of the script using a reflective DLL-loading technique. In addition to the ransomware, we identified another actor trying to execute a Monero miner on the vulnerable server with China Chopper:",
"gold": "- T1102: Web Service\n- T1620: Reflective Code Loading",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used Meterpreter to enumerate users on remote systems.\n\t - T1033: System Owner/User Discovery\n- Text: FunnyDream can stage collected information including screen captures and logged keystrokes locally.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: searches the local system and gathers data.\n\t - T1005: Data from Local System\n",
"input": "\nThen, it reads user-related info from the file sqlxmlx.inc in the same folder (we can see strings referencing to \u201cUserID\u201d commentary in this part of the code). But this file was never created. As you recall, there is a function that should have collected this data and should have saved it into this sqlxmlx.inc file. However, on the first launch, the collected user information is saved into \u201cxmlrwbin.inc\u201d. This effectively means that the malware writer mistakenly coded the bot to save user information into the wrong file. There is a chance for the mistaken code to still work \u2014 user information could be copied into the send information heap. But not in this case \u2013 at the time of writing, the gathered user information variable which should point to the xmlrwbin.inc filename has not yet been initialized, causing the file write to fail. We see that sqlxmlx.inc is not created to store user information.",
"gold": "- T1033: System Owner/User Discovery\n- T1119: Automated Collection\n- T1074: Data Staged\n- T1074.001: Data Staged - Local Data Staging\n- T1087: Account Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has obfuscated code using base64 and gzip compression.\n\t - T1027: Obfuscated Files or Information\n- Text: Dtrack has used a dropper that embeds an encrypted payload as extra data.\n\t - T1027: Obfuscated Files or Information\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n- Text: Gelsemium can use junk code to hide functions and evade detection.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n",
"input": "\nThe encrypted payload has a slightly lower entropy of 7.990713 out of 8. Looking at the embedded binary in a hex editor reveals multiple occurrences of the byte pattern 51 36 94 A4 26 5B 0F 19, as seen in Figure 4. As this pattern occurs multiple times in a row in the middle of the encrypted data and ECB mode is being used, an educated guess is that the plaintext is supposed to be 00 00 00 00 00 00 00 00.",
"gold": "- T1027: Obfuscated Files or Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DarkWatchman has used the \"csc.exe\" tool to compile a C# executable.\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n- Text: Chaes has used VBscript to execute malicious code.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Cobalt Strike has the ability to use an Excel Workbook to execute additional code by enabling Office to trust macros and execute code without user permission.\n\t - T1137.001: Office Application Startup - Office Template Macros\n",
"input": "\nFigure 3 Portion of malicious macro responsible for compiling and executing embedded source code .",
"gold": "- T1027.004: Obfuscated Files or Information - Compile After Delivery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TeamTNT has checked for running containers with \"docker ps\" and for specific container names with \"docker inspect\". TeamTNT has also searched for Kubernetes pods running in a local network.\n\t - T1613: Container and Resource Discovery\n- Text: Kinsing was run through a deployed Ubuntu container.\n\t - T1610: Deploy Container\n- Text: No matching sample found for T1612\n",
"input": "\nOf interest is the script file docker.container.local.spread.txt, which lists the name of a local Docker image, as shown in Figure 8. The Docker image is a local Docker image, meaning it is not hosted and downloaded from an external docker repository such as Docker Hub. Researchers did search Docker Hub for the presence of this Docker image and none were found.",
"gold": "- T1610: Deploy Container",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Helminth establishes persistence by creating a shortcut.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: The Bazar loader has used dual-extension executable files such as PreviewReport.DOC.exe.\n\t - T1036.007: Masquerading - Double File Extension\n- Text: Tonto Team has relied on user interaction to open their malicious RTF documents.\n\t - T1204.002: User Execution - Malicious File\n",
"input": "\nThis infection chain is based on a Windows shortcut file, with a misleading .docx.lnk double extension, and constitutes a more modular approach to PowerPepper delivery.",
"gold": "- T1036: Masquerading\n- T1204.002: User Execution - Malicious File\n- T1036.007: Masquerading - Double File Extension",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has compromised social media accounts to conduct social engineering attacks.\n\t - T1586.001: Compromise Accounts - Social Media Accounts\n- Text: Lazarus Group has created new LinkedIn and Twitter accounts to conduct social engineering against potential victims.\n\t - T1585.001: Establish Accounts - Social Media Accounts\n- Text: APT3\u00a0(also known as UPS), the actors responsible for\u00a0Operation Clandestine Fox\u00a0has quietly continued to send waves of spearphishing messages over the past few months. This actor initiated their most recent campaign on November 19, 2014 targeting multiple organizations. The attacker leveraged multiple exploits, targeting both\u00a0CVE-2014-6332\u00a0and\u00a0CVE-2014-4113. CVE-2014-6332 was disclosed publicly on 2014-11-11 and is a Windows OLE Automation Array Remote Code Execution vulnerability. CVE-2014-4113 is a privilege escalation vulnerability that was\u00a0disclosed publicly on 2014-10-14.\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1566.003: Phishing - Spearphishing via Service\n\t - T1534: Internal Spearphishing\n",
"input": "\nThe NewsBeef APT previously engaged in long-term, elaborate social engineering schemes that take advantage of popular social network platforms. Previous analysis of the NewsBeef APT indicates that the group focuses on Saudi Arabian (SA) and Western targets, and lacks advanced offensive technology development capabilities.",
"gold": "- T1585.001: Establish Accounts - Social Media Accounts",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group malware SHARPKNOT overwrites and deletes the Master Boot Record (MBR) on the victim's machine and has possessed MBR wiper malware since at least 2009.\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n- Text: Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes.\n\t - T1486: Data Encrypted for Impact\n- Text: It was used to overwrite data by the BE2 actor, destroying data stored on hard drives by overwriting file contents. While its use may be intended to cover their tracks, it is heavy handed to use this type of tool to cover one\u2019s tracks in a network. Most likely it is a tool of sabotage, much like the Destover wiper seen on Sony Pictures Entertainment\u2019s networks. Instead of re-using the commercial EldoS RawDisk drivers in their malware, the BE2 developers wrote their own low-level disk and file destruction routines\n\t - T1485: Data Destruction\n",
"input": "\nThe second functionality enabled in this sample that had not been observed in previous Thanos variants involved the ability to overwrite the master boot record (MBR). Once the code checks to see if the operating system version is not \u201cWindows 10\u201d or \u201cWindows 8,\u201d the code will attempt to open \u201c\\\\.\\PhysicalDrive0\u201d and write a 512-byte string to offset 0. The byte array that is written to offset 0 of \u201c\\\\.\\PhysicalDrive0\u201d initially has a ransom message of \u201cYour files are encrypted. Contact us at: get-my-data@protonmail.com\u2026\u201d, but the code will replace this string with the following string before writing to disk:",
"gold": "- T1485: Data Destruction\n- T1561.002: Disk Wipe - Disk Structure Wipe\n- T1082: System Information Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remcos uses Python scripts.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: menuPass has been seen changing malicious files to appear legitimate.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: This file is written to the following file path: % TEMP%\\Update.~tmp After the file is written, it is then copied to a filename of \u2019winhelp.cpl\u2019 in the directory that was initially chosen\n\t - T1070.006: Indicator Removal - Timestomp\n\t - T1036: Masquerading\n\t - T1074: Data Staged\n",
"input": "\nTools such as XHide Process Faker, which can hide or change the name of Linux processes and PyInstaller, which can convert Python scripts into executables.",
"gold": "- T1036.005: Masquerading - Match Legitimate Name or Location\n- T1036: Masquerading\n- T1027: Obfuscated Files or Information\n- T1027.005: Obfuscated Files or Information - Indicator Removal from Tools",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mapping of TG-3390's interactions with web shells during an intrusion responded to by CTU researchers\n\t - T1505.003: Server Software Component - Web Shell\n- Text: HAFNIUM has exploited CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 to compromise on-premises versions of Microsoft Exchange Server, enabling access to email accounts and installation of additional malware.\n\t - T1190: Exploit Public-Facing Application\n- Text: uses the command-line interface.\n\t - T1059: Command and Scripting Interpreter\n",
"input": "\nWe first discussed ShaggyPanther, a previously unseen malware and intrusion set targeting Taiwan and Malaysia, in a private report in January 2018. Related activities date back to more than a decade ago, with similar code maintaining compilation timestamps from 2004. Since then, ShaggyPanther activity has been detected in several more locations: most recently in Indonesia in July, and \u2013 somewhat surprisingly \u2013 in Syria in March. The newer 2018 and 2019 backdoor code maintains a new layer of obfuscation and no longer maintains clear-text C2 strings. Since our original release, we have identified an initial server-side infection vector from this actor, using SinoChopper/ChinaChopper, a commonly used web shell shared by multiple Chinese-speaking actors. SinoChopper not only performs host identification and backdoor delivery but also email archive theft and additional activity. Although not all incidents can be traced back to server-side exploitation, we did detect a couple of cases and obtained information about their staged install process. In 2019, we observed ShaggyPanther targeting Windows servers.",
"gold": "- T1027: Obfuscated Files or Information\n- T1505.003: Server Software Component - Web Shell\n- T1048: Exfiltration Over Alternative Protocol",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This folder is used as a temporary location to copy all files from a newly connected logical drive to and upload them to the C2 server. The files are transferred to the hardcoded C2 server \"195.62.52.93\" one by one via HTTP POST method. The following request is used which also includes information about the victim, the file to be transferred as well as the source drive\n\t - T1083: File and Directory Discovery\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: LOWBALL uses the Dropbox API to request two files, one of which is the same file as the one dropped by the malicious email attachment. This is most likely meant to be a mechanism to update the compromised host with a new version of the LOWBALL malware.\n\t - T1105: Ingress Tool Transfer\n- Text: The encrypted message is then Base64 encoded, replacing all the \u2018/\u2019 and \u2018+\u2019 characters with the \u2018.\u2019 and \u2018-\u2019 characters, respectively\n\t - T1027: Obfuscated Files or Information\n\t - T1132: Data Encoding\n",
"input": "\nThe DEWMODE web shell (Figure 4) extracts a list of available files from a MySQL database on the FTA and lists those files and corresponding metadata\u2014file ID, path, filename, uploader, and recipient\u2014on an HTML page. UNC2546 then uses the presented list to download files through the DEWMODE web shell. Download requests are captured in the FTA\u2019s web logs, which will contain requests to the DEWMODE web shell with encrypted and encoded URL parameters, where dwn is the file path and fn is the requested file name (Figure 5). The encrypted file path and name values visible in web logs can be decrypted using key material obtained from the database used by the targeted FTA. Given the complex nature of this process, if your organization needs assistance reviewing relevant logs, please contact Mandiant or Accellion.",
"gold": "- T1027: Obfuscated Files or Information\n- T1505.003: Server Software Component - Web Shell\n- T1573: Encrypted Channel\n- T1005: Data from Local System\n- T1119: Automated Collection\n- T1074: Data Staged\n- T1074.001: Data Staged - Local Data Staging",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attor monitors the free disk space on the system.\n\t - T1082: System Information Discovery\n- Text: Cardinal RAT can execute commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: BackdoorDiplomacy has copied files of interest to the main drive's recycle bin.\n\t - T1074.001: Data Staged - Local Data Staging\n",
"input": "\nGather all system information using the \"systeminfo\" command and record to a file:\u00a0cmd.exe /c systeminfo >>\"%s\" where %s = <file_path>.",
"gold": "- T1082: System Information Discovery\n- T1074.001: Data Staged - Local Data Staging\n- T1074: Data Staged\n- T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- T1059: Command and Scripting Interpreter",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The new domain names follow the same pattern as previously reported, except that they swap the top level domain name for another. We know that the threat actor has used the \u201c.me\u201d TLD in their past campaigns against some academic intuitions and this is still the case, along side \u201c.tk\u201d and \u201c.cf\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: APT29 has compromised domains to use for C2.\n\t - T1584.001: Compromise Infrastructure - Domains\n- Text: Finally, the threat actors shut down VMs, terminate all related processes, and encrypt Vmware-related files (.log, .vmdk, .vmem, .vswp and .vmsn).\n\t - T1486: Data Encrypted for Impact\n",
"input": "\nInterestingly, this IP address also had some associated domain names, as shown in the zoomed-in box as well, including letstrade-bit[.]com, lesbtc[.]com (and mail.lesbtc[.]com) and secure-trade24[.]com with the former two domains being registered December 20th and the latter on December 14th. All three domains mention trading or Bitcoins (BTC) but from the samples analysed, it is not clear how these subdomains are being used, however such terms are indicative of contemporary ransomware that requests ransom payments using BTC.",
"gold": "- T1583.001: Acquire Infrastructure - Domains",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BADFLICK has delayed communication to the actor-controlled IP address by 5 minutes.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: After execution of every task, the malware sleeps for one minute before executing the next task\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n",
"input": "\nThe module sets a timer with a callback function to be executed every 900 seconds and starts a Windows message loop.",
"gold": "- T1106: Native API",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Bazar loader is used to download and execute the Bazar backdoor.\n\t - T1104: Multi-Stage Channels\n- Text: The authors of Black Lambert included a couple of very interesting details in the sample, which read as the following: toolType=wl, build=132914, versionName = 2.0.0. Looking for similar samples, we were able to identify another generation of related tools which we called White Lambert. While Black Lambert connects directly to its C&C for instructions, White Lambert is a fully passive, network-driven backdoor.\n\t - T1587.001: Develop Capabilities - Malware\n- Text: Trickbot is the most common malware distributed by Emotet, but it is not the only one. Qakbot is another type of malware frequently dropped on Emotet-infected Windows hosts.\n\t - T1588.001: Obtain Capabilities - Malware\n",
"input": "\nWe uncovered two new espionage backdoors associated with Operation Earth Kitsune: agfSpy and dneSpy. This post provides details about these malware types, including the relationship between them and their command and control (C&C) servers .",
"gold": "- T1588.001: Obtain Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carberp has collected the operating system version from the infected system.\n\t - T1082: System Information Discovery\n- Text: POORAIM can perform screen capturing.\n\t - T1113: Screen Capture\n- Text: This simple backdoor is likely used as a second-chance backdoor to maintain access to the system, even if the primary malware is removed. It could also be used as a second-stage dropper to infect the system with additional malware\n\t - T1105: Ingress Tool Transfer\n",
"input": "\nAgent ORM began circulating alongside Sekur in campaigns throughout the second half of 2015. The malware collects basic system information and is able to take screenshots of victim systems. It is used to download next-stage payloads when systems of interest are identified. It is strongly suspected that Agent ORM has been deprecated in favor of script-based first-stage implants (VB Flash, JS Flash, and Bateleur).",
"gold": "- T1105: Ingress Tool Transfer\n- T1113: Screen Capture\n- T1082: System Information Discovery\n- T1119: Automated Collection\n- T1059.005: Command and Scripting Interpreter - Visual Basic\n- T1059.007: Command and Scripting Interpreter - JavaScript\n- T1005: Data from Local System",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: njRAT can download files to the victim\u2019s machine.\n\t - T1105: Ingress Tool Transfer\n- Text: Threat Group-3390 has exploited CVE-2018-0798 in Equation Editor.\n\t - T1203: Exploitation for Client Execution\n- Text: The Bazar loader is used to download and execute the Bazar backdoor.\n\t - T1104: Multi-Stage Channels\n",
"input": "\nThe second stage of the attack is downloaded from \u201chttp://www.hotinfonews.com/news/dailynews2.php\u201dand executed by the payload of the Java exploit. It acts as a downloader for the next stage of the attack.",
"gold": "- T1105: Ingress Tool Transfer\n- T1203: Exploitation for Client Execution",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Derusbi is capable of performing screen captures.\n\t - T1113: Screen Capture\n- Text: Avenger has the ability to use Tasklist to identify running processes.\n\t - T1057: Process Discovery\n- Text: SUPERNOVA contained Base64-encoded strings.\n\t - T1027: Obfuscated Files or Information\n",
"input": "\nDuring our analysis, we identified follow on POST requests containing screenshots of the compromised desktop and process activity lists which were encrypted and appended to a false JPEG header as described previously.",
"gold": "- T1113: Screen Capture\n- T1140: Deobfuscate/Decode Files or Information\n- T1057: Process Discovery\n- T1071.001: Application Layer Protocol - Web Protocols",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This said macro executes a command to download the first stage payload using msiexec.exe, a Microsoft Installer tool that can download and run a Windows Installer file. The first stage payload is an MSI Installer that was created using an EXE to MSI converter\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n- Text: Bazar can launch cmd.exe to perform reconnaissance commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Another component used by this group is a variant of TerraTV. It runs a legitimate TeamViewer application but hides its user interface elements, so that the operators of the malware can connect to the compromised computer undetected\n\t - T1219: Remote Access Software\n",
"input": "\nOne such self-extracting archive (ca87eb1a21c6d4ffd782b225b178ba65463f73de6f4c736eb135be5864f556dc) was first observed around April of 2014.\u00a0 The password (reused by many of the password protected SFX payloads) it used to extract itself is \u201c1234567890__\u201d. The files included in this SFX file we observed include a batch file named \u201c123.cmd\u201d and another SFX named \u201csetting.exe\u201d. This second SFX contains a .MSI installer package which installs Remote Manipulator System and a batch script which handles the installation.",
"gold": "- T1140: Deobfuscate/Decode Files or Information\n- T1027: Obfuscated Files or Information\n- T1059: Command and Scripting Interpreter\n- T1059.003: Command and Scripting Interpreter - Windows Command Shell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Through manual reverse engineering, we were able to extract the main malicious Python modules from the Xbash executables and decompile them successfully. Therefore, in the later sections of this analysis, we show the Python source code.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: Cobalt Strike was also used to continuously communicate with the main command-and-control (C&C) server.\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1583.004: Acquire Infrastructure - Server\n",
"input": "\nZebrocy has continued adding new tools to its arsenal using various kinds of programming languages. We found Zebrocy deploying a compiled Python script, which we call PythocyDbg, within a Southeast Asian foreign affairs organization. This module primarily provides for the stealthy collection of network proxy and communications debug capabilities. In early 2019, Zebrocy shifted its development efforts with the use of Nimrod/Nim, a programming language with syntax resembling both Pascal and Python that can be compiled down to JavaScript or C targets. Both the Nim downloaders that the group mainly uses for spear phishing, and other Nim backdoor code, are currently being produced by Zebrocy and delivered alongside updated compiled AutoIT scripts, Go, and Delphi modules. In September, Zebrocy spear-phished multiple NATO and alliance partners throughout Europe, attempting to gain access to email communications, credentials and sensitive documents. This campaign is similar to past Zebrocy activity, with target-relevant content used within emails, and ZIP attachments containing harmless documents alongside executables with altered icons and identical filenames. The group also makes use of remote Word templates pulling contents from the legitimate Dropbox file-sharing site. In this campaign, Zebrocy targeted defense and diplomatic targets located throughout Europe and Asia with its Go backdoor and Nimcy variants.",
"gold": "- T1566.001: Phishing - Spearphishing Attachment\n- T1036: Masquerading\n- T1119: Automated Collection\n- T1204: User Execution\n- T1587.001: Develop Capabilities - Malware\n- T1204.002: User Execution - Malicious File\n- T1598.002: Phishing for Information - Spearphishing Attachment\n- T1059.006: Command and Scripting Interpreter - Python\n- T1027.009: Obfuscated Files or Information - Embedded Payloads\n- T1027.002: Obfuscated Files or Information - Software Packing\n- T1059.007: Command and Scripting Interpreter - JavaScript",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We named Lazarus the most active group of 2020. We\u2019ve observed numerous activities by this notorious APT group targeting various industries. The group has changed target depending on the primary objective. Google TAG has recently published a post about a campaign by Lazarus targeting security researchers. We have seen Lazarus attack various industries using this malware cluster before. In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group\u2019s other campaigns\n\t - T1005: Data from Local System\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1204.002: User Execution - Malicious File\n- Text: We observed a number of phishing emails that reference an invoice, as seen in Figure 1. The attachment in these emails is a weaponized Microsoft Office document containing a malicious macro that \u2013 when enabled \u2013 leads to the download of Hancitor\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: NETWIRE has been executed through use of VBScripts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n",
"input": "\nCardinal RAT is deployed using an interesting technique of compiling and executing a downloader via a malicious macro embedded within a Microsoft Excel file. The Excel files themselves contain lures that have financial themes. This threat has had a low volume of samples in the past two years, with 11 instances of Carp Downloader and 27 instances of Cardinal RAT observed. Palo Alto Networks customers are protected by these threats in the following ways:",
"gold": "- T1105: Ingress Tool Transfer\n- T1204: User Execution\n- T1204.002: User Execution - Malicious File\n- T1203: Exploitation for Client Execution",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GreyEnergy uses PsExec locally in order to execute rundll32.exe at the highest privileges (NTAUTHORITY\\SYSTEM).\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: modules are written in and executed via .\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: menuPass has used a script (atexec.py) to execute a command on a target machine via Task Scheduler.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n",
"input": "\nThe ability to launch a .exe or .dll file in memory. The ability to leverage schtasks.exe to add or modify task schedules. The ability to launch custom PowerShell commands. The ability to leverage a standalone executable to load the DLL if the attacker otherwise has no way of doing so.",
"gold": "- T1053.005: Scheduled Task/Job - Scheduled Task\n- T1053: Scheduled Task/Job\n- T1059.001: Command and Scripting Interpreter - PowerShell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Emotet has been observed injecting in to Explorer.exe and other processes.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: From the main function, the malware invokes a function named eiht_get_update. This function attempts to read a remote file (ret.txt) from andrewka6.pythonanywhere.com that contained the address of the remote command and control server. If that failed, the malware would default to using the hard-coded (albeit encrypted) IP address 167.71.237.219. In order to gather information about the infected host, it invokes a function named: ei_get_host_info \u2026which in turn invokes various macOS APIs such as getlogin and gethostname\n\t - T1620: Reflective Code Loading\n- Text: Grants system privileges via Windows services - Uses DLL sideloading technique to evade security solutions - Starts and injects code to a new svchost process to prevent tracking\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1055: Process Injection\n",
"input": "\nThe evolution of the reflective DLL injection technique can be found from the relevant PDB paths, and there are a lot of variants of this series of backdoors.",
"gold": "- T1055: Process Injection\n- T1055.001: Process Injection - Dynamic-link Library Injection\n- T1620: Reflective Code Loading",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can download additional encrypted backdoors onto the victim via GIF files.\n\t - T1105: Ingress Tool Transfer\n- Text: Mustang Panda has used DropBox URLs to deliver variants of PlugX.\n\t - T1102: Web Service\n- Text: (Source: Dell SecureWorks) Table 4 lists the OwaAuth web shell commands available to the adversary\n\t - T1059: Command and Scripting Interpreter\n\t - T1505.003: Server Software Component - Web Shell\n",
"input": "\nIn June of 2015 a custom downloader used by many newer samples was first seen in the wild and is often included in SFX implants with the name \u201cLocalSMS.dll\u201d. This downloader makes requests to adobe.update-service[.]net (hardcoded in the sample) and is further discussed in Appendix A.",
"gold": "- T1036: Masquerading\n- T1036.005: Masquerading - Match Legitimate Name or Location\n- T1027.002: Obfuscated Files or Information - Software Packing\n- T1105: Ingress Tool Transfer",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CreepySnail can use PowerShell for execution, including the cmdlets `Invoke-WebRequst` and `Invoke-Expression`.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic.\n\t - T1090.004: Proxy - Domain Fronting\n- Text: It then executes a new instance of itself in a new process. Also, it will remove the original file via the following command that is executed in a batch script named 'date.bat\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n",
"input": "\nAfter the execution of qnxfhfim.cmdline, PowerShell initiated the first connection to the fronted domain lumiahelptipsmscdnqa[.]microsoft[.]com used by SMOKEDHAM.",
"gold": "- T1059.001: Command and Scripting Interpreter - PowerShell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1596.001\n- Text: No matching sample found for T1590.002\n- Text: In November 2018, Cisco Talos published research on an attack campaign named DNSpionage. It involved attacks using malware to compromise individual endpoints, but most interestingly described an effort to specifically hijack DNS entries of government organizations to redirect visitors to likely malicious, adversary operated systems. Both FireEye and Crowdstrike followed up with their own assessments for the DNS hijacking efforts, and described operations extending back to January 2017. No attribution to any known adversary groups was provided, other than that the target radius was primarily in the Middle East and the adversary was also likely operating out of that region. \n\t - T1584.002: Compromise Infrastructure - DNS Server\n\t - T1583.002: Acquire Infrastructure - DNS Server\n\t - T1496: Resource Hijacking\n\t - T1189: Drive-by Compromise\n",
"input": "\nDuring the course of our investigations, we noticed that the PowerPepper C2 name servers were actually open DNS resolvers that always resolved arbitrary hostnames with the same IP addresses: 128.49.4.4 (a US Navy-owned server), 91.214.6.100 and 91.214.6.101 (HSBC UK-owned servers). Using this fact and historical reverse DNS resolutions data, we have been able to preemptively identify the PowerPepper C2 domains.",
"gold": "- T1583.002: Acquire Infrastructure - DNS Server",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GrimAgent has used Rotate on Right (RoR) and Rotate on Left (RoL) functionality to encrypt strings.\n\t - T1027: Obfuscated Files or Information\n- Text: GoldenSpy's setup file installs initial executables under the folder \"%WinDir%\\System32\\PluginManager\".\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: The weaponized Office documents were found to be hosted either on what appeared to be compromised legitimate websites, or on websites using domain names similar to legitimate domain names in appearance\n\t - T1036: Masquerading\n\t - T1102: Web Service\n",
"input": "\nThe global reach of the January 2017 campaign which we analyzed in this post is a marked departure from previous Dimnie targeting tactics. Multiple factors have contributed to Dimnie\u2019s relatively long-lived existence. By masking upload and download network traffic as innocuous user activity, Dimnie has taken advantage of defenders\u2019 assumptions about what normal traffic looks like. This blending in tactic, combined with a prior penchant for targeting systems used by Russian speakers, likely allowed Dimnie to remain relatively unknown.",
"gold": "- T1105: Ingress Tool Transfer\n- T1132: Data Encoding\n- T1027: Obfuscated Files or Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT18 obfuscates strings in the payload.\n\t - T1027: Obfuscated Files or Information\n- Text: Earth Lusca required users to click on a malicious file for the loader to activate.\n\t - T1204.002: User Execution - Malicious File\n- Text: HiddenWasp adds itself to the LD_PRELOAD path and sets a series of environment variables.\n\t - T1055: Process Injection\n",
"input": "\nThe main Trojan body is encrypted \u201cXOR 0xDE\u201d and stored as hex text inside the RTF file. The shellcode simply writes the main dropper to a file named \u201cmsmx21.exe\u201d in the %TEMP% folder and runs it. It also extracts a fake document which is shown to the victim if the exploit has been successful.",
"gold": "- T1140: Deobfuscate/Decode Files or Information\n- T1027: Obfuscated Files or Information\n- T1036: Masquerading",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: JHUHUGIT performs code injection injecting its own functions to browser processes.\n\t - T1055: Process Injection\n- Text: Emissary injects its DLL file into a newly spawned Internet Explorer process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: We have rounded up 220 samples of the CARBANAK backdoor and compiled a table that highlights some interesting details that we were able to extract. It should be noted that in most of these cases the backdoor was embedded as a packed payload in another executable or in a weaponized document file of some kind. The MD5 hash is for the original executable file that eventually launches CARBANAK, but the details of each sample were extracted from memory during execution. This data provides us with a unique insight into the operational aspect of CARBANAK and can be downloaded here\n\t - T1055.002: Process Injection - Portable Executable Injection\n",
"input": "\nBokBot has several executable modules that can be downloaded and injected into a svchost.exe child process. Once the relevant DAT file is decoded using RC4, no additional decoding or decompression is necessary for the executable module DAT files. The executable module header contains information necessary to ID the module:",
"gold": "- T1055: Process Injection\n- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1055.003: Process Injection - Thread Execution Hijacking",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fox Kitten has exploited known vulnerabilities in Fortinet, PulseSecure, and Palo Alto VPN appliances.\n\t - T1190: Exploit Public-Facing Application\n- Text: Mettle: A malicious campaign based on IP addresses in Vietnam (C2 210.245.26.180:4441, scanner 118.70.80.143) and mettle open source control module.. Hajime: This round of update from Hajime also includes GPON exploits.. Two Mirai variants: At least two malicious campaigns are actively exploiting this vulnerability to propagate mirai variants. The second one is already known as Omni.. Imgay: This looks like a botnet under development. We only observe its download behavior and no more follow-up actions.\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1203: Exploitation for Client Execution\n\t - T1595.002: Active Scanning - Vulnerability Scanning\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n",
"input": "\nVesta Control Panel command injection is one of the several newly included exploits. The version released on May 18 also included Python versions of EternalBlue (CVE-2017-0144) and EternalRomance (CVE-2017-0147) exploits with a Windows download command line as the payload. The addition of new exploits shows that the actor is actively developing new methods of spreading and following the latest vulnerabilities with published PoCs. In the newest instances discovered on May 22, the bot improved its ability to supply credentials for SMB but excluded it from the main exploit function. The usernames and passwords are now in a separate two arrays and extended to include many other usernames and passwords. The exploitation function of this sample does not contain EternalBlue and EternalRomance but attempts to connect over SMB (port 445) and create a service remotely to download and run the main bot file. This latest sample is a pyinstaller-generated sample but is PE file rather than ELF, which was seen previously.",
"gold": "- T1068: Exploitation for Privilege Escalation\n- T1203: Exploitation for Client Execution\n- T1210: Exploitation of Remote Services\n- T1059: Command and Scripting Interpreter\n- T1021: Remote Services\n- T1570: Lateral Tool Transfer\n- T1021.002: Remote Services - SMB/Windows Admin Shares\n- T1543.003: Create or Modify System Process - Windows Service",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: IcedID has been executed through Word documents with malicious embedded macros.\n\t - T1204.002: User Execution - Malicious File\n- Text: has attempted to get victims to open malicious Microsoft Word attachment sent via spearphishing.\n\t - T1204: User Execution\n- Text: OLDBAIT installs itself in \"%ALLUSERPROFILE%\\\\Application Data\\Microsoft\\MediaPlayer\\updatewindws.exe\"; the directory name is missing a space and the file name is missing the letter \"o.\"\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n",
"input": "\nThis Zip archive contained a file named [redacted]-ITsoftwareUpdate.exe (SHA256: 5f42deb792d8d6f347c58ddbf634a673b3e870ed9977fdd88760e38088cd7336), which is a variant of the OopsIE Trojan we described in detail in a blog we published in September 2018. This suggests that the server displayed in the VPS control panel may have indeed been in use by the OilRig threat actors at the time of attack. In addition, two of the other IPs listed in this panel, 185.161.209[.]57 and 185.161.210[.]25 are in the same 185.161.208[.]0/22 range as an IP associated with the DNSpionage campaign, 185.161.211[.]72. This is a tenuous relationship at best and does not indicate that the OilRig group is the one executing the DNSpionage campaign, but with the combination of the use of DeltaHost and IPs belonging to a fairly small range, there may be reason to believe that these are related to some extent.",
"gold": "- T1140: Deobfuscate/Decode Files or Information\n- T1036: Masquerading",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After copying itself to a DLL file, a variant of calls the DLL file using rundll32.exe.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Honeybee uses a combination of NTWDBLIB.dll and cliconfg.exe to bypass UAC protections using DLL hijacking.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: InvisiMole can register itself for execution and persistence via the Control Panel.\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n",
"input": "\n12. Execute the exported function \u201cupdater\u201d within \u201cMSO1234.win\u201d using rundll32.exe .",
"gold": "- T1218.011: System Binary Proxy Execution - Rundll32",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoetRAT has used a custom encryption scheme for communication between scripts and pyminifier to obfuscate scripts.\n\t - T1027: Obfuscated Files or Information\n- Text: POWRUNER can use base64 encoded C2 communications.\n\t - T1001: Data Obfuscation\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: TrailBlazer has used random identifier strings to obscure its C2 operations and result codes.\n\t - T1001.001: Data Obfuscation - Junk Data\n",
"input": "\nThe decrypted payload belongs to the malware family POISONPLUG (MD5: 84b69b5d14ba5c5c9258370c9505438f). POISONPLUG is a highly obfuscated modular backdoor with plug-in capabilities. The malware is capable of registry or service persistence, self-removal, plug-in execution, and network connection forwarding. POISONPLUG has been observed using social platforms to host encoded command and control commands.",
"gold": "- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information\n- T1112: Modify Registry\n- T1543.003: Create or Modify System Process - Windows Service\n- T1070.004: Indicator Removal - File Deletion\n- T1569.002: System Services - Service Execution\n- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Using job opportunities as template is the known method used by Lazarus to target its victims. The documents created by this actor are well designed and contain a large icon for a known company such as LockHeed Martin, BAE Systems, Boeing and Northrop Grumman in the template. In this campaign the actor has targeted people that are looking for job opportunities at Lockheed Martin. The document\u2019s metadata used in this campaign links them to several other documents used by this actor in the past\n\t - T1027: Obfuscated Files or Information\n- Text: Drovorub has de-obsfuscated XOR encrypted payloads in WebSocket messages.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: InvisiMole can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping.\n\t - T1113: Screen Capture\n",
"input": "\nThis new version was dubbed \u201cGandCrab\u00a02\u201d by the\u00a0infosec\u00a0community. However, upon closer inspection\u00a0of the \u2018version\u2019 string embedded into\u00a0GandCrab\u2019s\u00a0C&C check-in, you can see that the gang uses their own nomenclature: the really early versions are\u00a01.1, the later versions go up to\u00a02.1, the first versions of GandCrab 2 were \u00a01.0.0r and the latest version is kto_zaskrinit_tot_pidor (a colorful Russian snarl, aimed at the people who see the version string and reach for their PrintScreen key).",
"gold": "- T1587.001: Develop Capabilities - Malware",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NETWIRE has used web services including Paste.ee to host payloads.\n\t - T1102: Web Service\n- Text: ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: SMOKEDHAM communicates with its C2 server using HTTPS. The backdoor uses domain fronting to obfuscate its true C2 server. The fronted domain is configured by an earlier stage of execution and the actual domain is hard-coded in the backdoor. Mandiant observed the fronted domain lumiahelptipsmscdnqa.microsoft[.]com and hard-coded domain max-ghoster1.azureedge[.]net used for C2 server communication\n\t - T1090.004: Proxy - Domain Fronting\n",
"input": "\nAnother sample discovered in late August 2021 consisted of the C2 host URI xxx[.]xxxx[.]tk and the host header setting configured to point to test[.]softlemon[.]net.",
"gold": "- T1071.001: Application Layer Protocol - Web Protocols",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: captures hashes and credentials that are sent to the system after the name services have been poisoned.\n\t - T1040: Network Sniffing\n- Text: Penquin installs a `TCP` and `UDP` filter on the `eth0` interface.\n\t - T1205.002: Traffic Signaling - Socket Filters\n- Text: The implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules from the anonymity of the internet. Each of the modules are enabled via the HTTP protocol (not HTTPS), using a specifically crafted TCP packets sent to the routers interface. The packets have a nonstandard sequence and corresponding acknowledgment numbers. The modules can manifest themselves as independent executable code or hooks within the routers IOS that provide functionality similar to the backdoor password\n\t - T1205: Traffic Signaling\n",
"input": "\nThe sniffer code is similar to the one used in the driver\u2019s \u201ctdip.sys\u201d and \u201cmstcp32.sys\u201d and uses NT4 NDIS-4, XP NDIS-5 interfaces, targeting incoming traffic on Ethernet and VPN (ndiswanip) interfaces. It captures only directed packets (containing a destination address equal to the station address of the NIC). Packers-filtering engine rules may be set via DeviceIoControl messages. Filtered packets are stored in-memory until requested. Maximum packets storage list length is 128 items per filtering rule.",
"gold": "- T1040: Network Sniffing\n- T1106: Native API\n- T1205.002: Traffic Signaling - Socket Filters",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FatDuke has the ability to create a process.\n\t - T1543: Create or Modify System Process\n- Text: Reaver will then install itself as a service in the event it is running with SeDebugPrivilege privileges. The service is configured with a name, description, and display name that is provided within the configuration\n\t - T1007: System Service Discovery\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Afterwards, the persistence file will be created in /Library/LaunchDaemons/ or ~/Library/LaunchAgents/ folder. This persistence file is also set to hidden with a randomly generated file date and time\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n\t - T1543.001: Create or Modify System Process - Launch Agent\n",
"input": "\nThis watchdog process also ensures that the Cardinal RAT process is always running, as well as ensures that the executable is located in the correct path. Should either of these conditions not be met, the watchdog process will spawn a new instance of Cardinal RAT, or write Cardinal RAT to the correct location, respectively.",
"gold": "- T1057: Process Discovery",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PLEAD also uses CVE-2017-7269, a buffer overflow vulnerability Microsoft Internet Information Services (IIS) 6.0 to compromise the victim\u2019s server. This is another way for them to establish a new C&amp;C or HTTP server\n\t - T1190: Exploit Public-Facing Application\n- Text: It is a preferred platform within data centers and the cloud for businesses, as well as an ongoing favorite when it comes to a majority of Internet-facing web and application servers\n\t - T1505.003: Server Software Component - Web Shell\n- Text: The hooked WriteFile procedure\u2019s main purpose is to save the file handle of the subject file to write and install another hook in the CloseHandle API function\n\t - T1005: Data from Local System\n",
"input": "\nStarting in mid-December 2020, malicious actors that Mandiant tracks as UNC2546 exploited multiple zero-day vulnerabilities in Accellion\u2019s legacy File Transfer Appliance (FTA) to install a newly discovered web shell named DEWMODE. The motivation of UNC2546 was not immediately apparent, but starting in late January 2021, several organizations that had been impacted by UNC2546 in the prior month began receiving extortion emails from actors threatening to publish stolen data on the \u201cCL0P^_- LEAKS\" .onion website.",
"gold": "- T1505.003: Server Software Component - Web Shell",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n- Text: QakBot can move laterally using worm-like functionality through exploitation of SMB.\n\t - T1210: Exploitation of Remote Services\n- Text: Inception has exploited CVE-2012-0158, CVE-2014-1761, CVE-2017-11882 and CVE-2018-0802 for execution.\n\t - T1203: Exploitation for Client Execution\n",
"input": "\nOur Next-Generation Firewall caught the first incident of CVE-2020-8515 exploitation on March 31, 2020 at 13:51 (UTC). In addition to this attack, several bots\u2019 attempt to propagate by exploiting CVE-2020-5722 were also caught by our firewall. In the case of CVE-2020-8515 exploitation, the threat actor attempted to download a shell script to the tmp directory, and execute the downloaded script, as shown in Figure 9. In the case of CVE-2020-5722 exploitation, the payload only downloads an arm7 binary and executes it, as shown in Figure 10.",
"gold": "- T1068: Exploitation for Privilege Escalation",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Elise exfiltrates data using cookie values that are Base64-encoded.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The VB.NET variant then gathers system information and running processes like other Zebrocy variants by running the following commands: systeminfo & tasklist The URL used to send the system information, running processes and a screenshot to the C2 server is: hxxp://109.248.148[.]42/agr-enum/progress-inform/cube.php?res=[serial number] The VB.NET variant of Zebrocy uses an HTTP POST request to the URL above to transmit the gathered data, of which is included within the HTTP POST data that is structured as follows (notice the spaces before and after ampersand \u201c&\u201d): data=[system information and running processes] & arg=[screenshot in BMP format] C# Zebrocy Variant The C# variant of Zebrocy is similar to other variants in functionality, but also has several unique attributes that are worth discussing\n\t - T1082: System Information Discovery\n\t - T1057: Process Discovery\n\t - T1132: Data Encoding\n- Text: All RDAT samples have malicious verdicts in WildFire and have protections in place through Cortex XDR. DNS tunneling protocols used for C2 communications are blocked via DNS Security. All C2 domains are classified as Command-and-Control for URL Filtering. AutoFocus customers can monitor activity via the rdat_backdoor tag\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n\t - T1132.001: Data Encoding - Standard Encoding\n",
"input": "\nAfter carrying out the activities for the command, the Trojan will encode the results or output message of the command using the \u2018base64.b16encode\u2019 method. Each command has an output message for both a successful and failed execution of the command with the exception of \u2018empty\u2019 and \u2018terminate\u2019. Table 2 below shows the success and failure messages associated with each command.",
"gold": "- T1027: Obfuscated Files or Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BACKSPACE uses HTTP as a transport to communicate with its command server.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: MuddyWater has used web services including OneHub to distribute remote access tools.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Lazarus Group has used multi-stage malware components that inject later stages into separate processes.\n\t - T1104: Multi-Stage Channels\n",
"input": "\nAfter the initial beacon, Gasket sends supplemental requests to a URL of /time/sync to obtain commands from the threat actor, which will look like the following:",
"gold": "- T1071.001: Application Layer Protocol - Web Protocols",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: downloads a PowerShell script that decodes to a typical shellcode loader.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: STOLEN INFO\u2019 message \u2013 bot message to C2 with stolen information like passwords, accounts, emails, etc. Stolen information is RC4 encrypted and Base64 encoded. The key for the RC4 encryption is generated in a different way and based on the infected system ID (aka Bot ID) values, and not based on a static string as in the case of traffic encryption\n\t - T1132.001: Data Encoding - Standard Encoding\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: We also observed a third approach used by a malicious document file to deliver Hancitor. Although the threat actor and command and control servers are similar to the second Hancitor delivery approach, this one uses an alternate tactic to reach its goal of data theft\n\t - T1027: Obfuscated Files or Information\n",
"input": "\nFirst technique:\u00a0FIN6 used PowerShell to execute an encoded command. The command consisted of a byte array containing a base64 encoded payload shown in Figure 1.",
"gold": "- T1059.001: Command and Scripting Interpreter - PowerShell\n- T1027: Obfuscated Files or Information\n- T1140: Deobfuscate/Decode Files or Information",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Nebulae has the ability to use \"CreateProcess\" to execute a process.\n\t - T1106: Native API\n- Text: Meanwhile, injection and delivery techniques are undergoing changes in 2018 with reflective loaders and code enhancements\n\t - T1055: Process Injection\n- Text: Chinese state-sponsored cyber actors have been observed: \uf0b7 Injecting into the rundll32.exe process to hide usage of Mimikatz, as well as injecting into a running legitimate explorer.exe process for lateral movement. \uf0b7 Using shellcode that injects implants into newly created instances of the Service Host process (svchost).\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1055.002: Process Injection - Portable Executable Injection\n",
"input": "\nFigure 18. VirtualAlloc() and byte-copying (call 100045c0) function.",
"gold": "- T1106: Native API",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GCMAN uses VNC for lateral movement.\n\t - T1021.005: Remote Services - VNC\n- Text: Mustang Panda has installed TeamViewer on targeted systems.\n\t - T1219: Remote Access Software\n- Text: Although Cobalt Strike has many capabilities beneficial to threat actors in ransomware attacks, it was mainly seen in LockBit 2.0 investigations acting as a command and control beacon, a method of lateral movement and a tool for downloading/executing files.\n\t - T1021: Remote Services\n",
"input": "\nSMOKEDHAM was observed using UltraVNC to establish a connection to the IP address and port pair 81.91.177[.]54[:]7234 that has been observed in past UNC2465 intrusions.",
"gold": "- T1571: Non-Standard Port",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: malware can list a victim's logical drives and the type, as well the total/free space of the fixed devices. Other malware can list a directory's contents.\n\t - T1083: File and Directory Discovery\n- Text: QuasarRAT has the ability to set file attributes to \"hidden\" to hide files from the compromised user's view in Windows File Explorer.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: Lazarus Group has renamed malicious code to disguise it as Microsoft's narrator and other legitimate files.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n",
"input": "\nThe infection procedure lists all directories. Then, for each directory, it creates a copy of itself in the drive root directory using the same directory name and changing the directory attribute to \u201chidden\u201d. This results in all the actual directories being hidden and replaced with a copy of the malware using the same directory name.",
"gold": "- T1083: File and Directory Discovery\n- T1036: Masquerading\n- T1036.005: Masquerading - Match Legitimate Name or Location",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Vasport is capable of tunneling though a proxy.\n\t - T1090: Proxy\n- Text: Note: aswrundll.exe is very similar to Microsoft\u2019s own rundll32.exe - it allows you to execute DLLs by calling their exported functions\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: LAPSUS$ has obtained tools such as AD Explorer inspection software for their operations.\n\t - T1588.002: Obtain Capabilities - Tool\n",
"input": "\nThe Gasket tool referenced a proxying and tunneling capability known as MagicSocks, which is based on the open-source Chisel project. The actors also created a standalone version of MagicSocks that they would use in addition to Gasket. The standalone MagicSocks tool comes as a dynamic link library (DLL), which the actor also wrote in Golang. The developer of MagicSocks uses code from the Chisel project to tunnel traffic from the local system to an external actor-controlled Chisel server. The tool will build the string R:0.0.0.0:50000:socks that it supplies to the Chisel client code that will generate the following JSON that the client uses as a configuration:",
"gold": "- T1572: Protocol Tunneling\n- T1095: Non-Application Layer Protocol\n- T1090: Proxy\n- T1090.002: Proxy - External Proxy",
"predicted": ""
},
{
"instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The APT actors forced BitLocker activation on host networks to encrypt data [T1486]. The corresponding threatening notes were either sent to the victim or left on the victim network as a .txt file. The ransom notes included ransom demands and the following contact information. sar_addr@protonmail[.]com WeAreHere@secmail[.]pro nosterrmann@mail[.]com nosterrmann@protonmail[.]com\n\t - T1486: Data Encrypted for Impact\n- Text: Neoichor can upload files from a victim's machine.\n\t - T1005: Data from Local System\n- Text: has compressed files before exfiltration using TAR and RAR.\n\t - T1560: Archive Collected Data\n",
"input": "\nSince initially surfacing in August 2020, the creators of DARKSIDE ransomware and their affiliates have launched a global crime spree affecting organizations in more than 15 countries and multiple industry verticals. Like many of their peers, these actors conduct multifaceted extortion where data is both exfiltrated and encrypted in place, allowing them to demand payment for unlocking and the non-release of stolen data to exert more pressure on victims.",
"gold": "- T1041: Exfiltration Over C2 Channel\n- T1486: Data Encrypted for Impact\n- T1020: Automated Exfiltration",
"predicted": ""
}
]