text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
This is a classic RAT that can download, upload, execute commands on the victim host and, finally, perform keylogging | ['T1056', 'T1105'] |
This is performed by checking if the following libraries are loaded on the victim machine.SbieDll.dll (sandboxie library)Dbghelp.dll (Microsoft debugging tools)Api_log.dll (threatAnalyzer / GFI SandBox)Dir_watch.dll (threatAnalyzer / GFI SandBox)We were able to uncover some other techniques used by this variant of ROKR... | ['T1574.001', 'T1574.002'] |
This log contains the external IP, the geographic location, the machine name, the time the machine was infected, as well as fields to be logged in the threat actor’s database | ['T1070', 'T1124'] |
This particular sample connected to the CnC domain accounts.serveftp[.]com, which resolved to an IP address previously used by the threat group, although the IP had not been used for some time prior to this most recent activity: MD5 0beb957923df2c885d29a9c1743dd94b accounts.serveftp.com 59.188.0.197 BUBBLEWRA... | ['T1071', 'T1016'] |
This plugin provides the attacker with the ability to both list files and download/upload files on the victim machine | ['T1083', 'T1105'] |
This shortcut file points to ‘C:\Windows\system32\rundll32.exe “%APPDATA%\cnagnt.dll”,Sd’ One of the exceptions to the installation routine above is in the event Symantec is detected | ['T1218.011', 'T1547.009'] |
This task is executed every 25 minutes and will repeat the actions described above – recreating the JavaScript code which later will create and execute a PowerShell script (described below) | ['T1064', 'T1059.001'] |
Thread Name Description Key logger Logs key strokes for configured processes and sends them to the command and control (C2) server Form grabber Monitors HTTP traffic for form data and sends it to the C2 server POS monitor Monitors for changes to logs stored in C:\NSB\Coalition\Logs and nsb.pos.client.log ... | ['T1071', 'T1090', 'T1041', 'T1132', 'T1486'] |
Threat actor using appcmd to delete logs and disable logging | ['T1562.001', 'T1070.004'] |
To create the scheduled task, the PowerShell payload starts by writing the following to a VBScript file with the same name as the task name (ex | ['T1053.005', 'T1036'] |
To install the payload, the script will create a file %APPDATA%\OneDrive.bat and save the following string to it: powershell.exe -WindowStyle Hidden -exec bypass -File “%APPDATA%\OneDrive.ps1” The script then writes a modified copy of itself to %APPDATA%\OneDrive.ps1, with the code that performs this installation omit... | ['T1036', 'T1064'] |
To set up persistence, the loader creates a folder named “c:\temp”, sets its attributes to be a hidden and system folder to hide the folder from view in Windows Explorer | ['T1547.001', 'T1564.001'] |
Tweets by second account @dookhtegan1 providing a Telegram channel with the leaked files Data Dump Contents The contents of the data dump includes various types of datasets that appear to be results from reconnaissance activity, initial compromises, and tools the OilRig operators use against target organizations | ['T1003', 'T1041'] |
Unpacking routine for SWF exploit The exploit is a memory corruption vulnerability that exists in the “com.adobe.tvsdk.mediacore.BufferControlParameters” class. If the exploit is successful, it will gain arbitrary read / write operations within memory, thus allowing it to execute a second stage shellcode | ['T1068', 'T1203'] |
Upon execution, the “Windows Folder.exe” file copies itself to C:\Users\<username>\AppData\Roaming and creates a Windows shortcut (LNK) file in the victim’s Startup directory as a persistence mechanism | ['T1074', 'T1547.009'] |
Upon execution, this command extracted, decrypted, and executed the PowerShell backdoor payload stored in the HiveUploadTask text property of the RacTask class | ['T1140', 'T1059.001'] |
Variable Name Description gdu Google Drive URL for downloading files to the Google Drive account gduu Google Drive URL for uploading files to the Google Drive account gdue Google Drive URL for updating a file on the Google Drive account gdo2t Google Drive URL used to get the OAUTH access_token client_id The c... | ['T1102'] |
Victims are targeted by watering hole attacks, and emails with links to malicious websites or with malicious attachments | ['T1598.003', 'T1189'] |
Watch on Fox News: Hackers may use fake Netflix app to spy on users As users have become more attached to their mobile devices, they want everything on those devices | ['T1120', 'T1087'] |
We are still analyzing this Trojan to determine the specific structure of the data sent between the Trojan and the C2 server; however, it does appear that the Trojan is using the RC4 algorithm to encrypt data sent to the C2 server within HTTP POST requests | ['T1573', 'T1041'] |
We are unsure of the shellcode hosted at this URL, but it is possible that additional shellcode-based payloads like Meterpreter could have been served by this shellcode | ['T1064', 'T1105'] |
We determined this by following the process in which the TwoFace++ loader webshell uses the actor provided password to authenticate and decrypt the embedded webshell: Append a string to the password that acts as a salt Obtain the SHA1 hash of the resulting string containing the password and salt Base64 encode the SHA1... | ['T1573', 'T1140', 'T1027', 'T1550.002', 'T1132'] |
We found two obfuscation techniques applied to the script: the first one changing the representation of variables; the second one changing the representation of strings in the script | ['T1562.001', 'T1027'] |
We have gathered three samples of the default loader associated with this group and extracted the following configurations: SHA256 of Sample Configuration 82779504d3fa0ffc8506ab69de9cb4d8f6415adbb11a9b8312828c539cf10190 LAUNCHER_ARGS=[‘–host’, ‘www1.chrome-up[.]date:4443’, ‘-t’, ‘obfs3’] db453b8de1a01a3e4d963847... | ['T1016', 'T1102', 'T1008'] |
We have observed the following capabilities of this payload: Get drive information Read files Write files Delete files Move files Spawn processes Create directories Reaver TCP Payload The malicious CPL payload of Reaver has the following three exported functions: ServiceMain CPlApplet DllEntryPoint When the malwar... | ['T1005', 'T1070.004', 'T1083'] |
We observed the threat group issue the following commands: @echo off dir c:\ >> %temp%\download ipconfig /all >> %temp%\download net user >> %temp%\download net user /domain >> %temp%\download ver >> %temp%\download del %0 @echo off dir "c:\Documents and Settings" >> %temp%\download dir "c:\... | ['T1007', 'T1105', 'T1059.001'] |
We’ve seen two onion addresses used in different samples: g5wcesdfjzne7255.onion (Down) r2elajikcosf7zee.onion (Alive at time of writing) The HTTP resource always starts with /api/osx/ and contains actions such as: /api/osx/started to report the bot has just started /api/osx/keychain to exfiltrate the content of the... | ['T1071', 'T1106'] |
When communicating with its C2 server, the downloaders use multiple protocols, specifically HTTPS, HTTP or DNS, each of which provide a fallback channel in that order | ['T1071', 'T1008'] |
When comparing the provided timestamps of the delivery documents to the timestamps for the remote template documents from Table 2, we find that the time to attack is directly correlated to the last time the templates are modified | ['T1070.006', 'T1124'] |
When executed, the .NET Framework wrapper will first check if VMware tools is running in background, this is done via a simple process check, searching for any process named “vmtoolsd.” Provided there are no matching processes running, the malware continues execution, creating a registry entry with the name ‘MSASCuiLTa... | ['T1057', 'T1547.001'] |
When generating the URL for the HTTP requests issued to the C2 server, the Trojan chooses a random folder from the following to include within the URL path: watch/? search/? find/? results/? open/? search/? close/? XAgent also will choose several parameters names from the following list when finishing the construction ... | ['T1071', 'T1083'] |
When one PlugX succeeds to infect a host, it then accesses to every IP address in the local network one-by-one and communicate with any connectable nodes, using one of the following protocols listed in Table 2 | ['T1016', 'T1008'] |
When the actor modifies the file and changes the modification_time, the Trojan downloads the contents from the file by creating an HTTP request to a URL structured as follows: <Google Drive URL in ‘gdu’> + <file identifier in ‘f_id’> + “?alt=media” The Trojan processes the downloaded data within the file the same way i... | ['T1074', 'T1041', 'T1048', 'T1486'] |
While the seller specifies that HawkEye Reborn should only be used on systems with permission, they also explicitly forbid scanning of HawkEye Reborn executables using antivirus software, likely an attempt to minimize the likelihood that anti-malware solutions will detect HawkEye Reborn binaries.Following these changes... | ['T1518.001', 'T1018'] |
Year Country Industry Malware 2014 Vietnam Network Security WINDSHIELD 2014 Germany Manufacturing WINDSHIELD 2015 Vietnam Media WINDSHIELD 2016 Philippines Consumer products KOMPROGO WINDSHIELD SOUNDBITE BEACON 2016 Vietnam Banking WINDSHIELD 2016 Philippines Technology Infrastructure WINDSH... | ['T1068'] |
استطلاع.docx https://0utl00k[.]net/docs Table 1 Additional DarkHydrus Word documents used to steal credentials Both of these related documents use the attachedTemplate technique to steal credentials by sending them to a URL https://0utl00k[.]net/docs | ['T1003', 'T1552.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.