text
stringlengths
104
2.24k
### Human:Find the techniques and ID from MITRE ATT&CK framework.,By default, XDG autostart entries are stored within the /etc/xdg/autostart or ~/.config/autostart directories and have a .desktop file extension.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OilRig has created scheduled tasks that run a VBScript to execute a payload on victim machines.### Assistant: T1053: Scheduled Task/Job
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The time of the observed attacker activity coincides with Iran’s Daylight Time, which is +0430 UTC### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BoomBox has the ability to download next stage malware components to a compromised system.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Higaisa used AES-128 to encrypt C2 traffic.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PoisonIvy can inject a malicious DLL into a process.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,RogueRobin uses a command prompt to run a PowerShell script from Excel.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An APT3 downloader establishes SOCKS5 connections for its initial C2.### Assistant: T1090: Proxy
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ebury can disable SELinux Role-Based Access Control and deactivate PAM modules.### Assistant: T1562: Impair Defenses
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries can collect or forward email from mail servers or clients.### Assistant: T1114: Email Collection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Turla has used net accounts and net accounts /domain to acquire password policy information.### Assistant: T1201: Password Policy Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TA505 has signed payloads with code signing certificates from Thawte and Sectigo.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,WannaCry searches for variety of user files by file extension before encrypting them using RSA and AES, including Office, PDF, image, audio, video, source code, archive/compression format, and key and certificate files.### Assistant: T1083: File and Directory Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Tools such as PsExec and sc.exe can accept remote servers as arguments and may be used to conduct remote execution.### Assistant: T1569: System Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Root certificates can also be cloned and reinstalled.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Manipulating TLS callbacks may be performed by allocating and writing to specific offsets within a process’ memory space using other Process Injection techniques such as Process Hollowing.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FinFisher uses token manipulation with NtFilterToken as part of UAC bypass.### Assistant: T1134: Access Token Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sandworm Team has crafted phishing emails containing malicious hyperlinks.### Assistant: T1566: Phishing
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An adversary can create a new access token that duplicates an existing token using DuplicateToken.### Assistant: T1134: Access Token Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Bonadan has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.### Assistant: T1554: Compromise Client Software Binary
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ragnar Locker has used rundll32.exe to execute components of VirtualBox.### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,During the macOS initialization startup, the launchd process loads the parameters for launch-on-demand system-level daemons from plist files found in /System/Library/LaunchDaemons/ and /Library/LaunchDaemons/.### Assistant: T1543: Create or Modify System Process
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Domains provide centralized identity management, allowing users to login using one set of credentials across the entire network.### Assistant: T1021: Remote Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Active Setup is a Windows mechanism that is used to execute programs when a user logs in.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An APT3 downloader first establishes a SOCKS5 connection to 192.157.198.103 using TCP port 1913; once the server response is verified, it then requests a connection to 192.184.60.229 on TCP port 81.### Assistant: T1104: Multi-Stage Channels
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TajMahal has the ability to capture keystrokes on an infected host.### Assistant: T1056: Input Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,It also uses launchctl to unload all Launch Daemons when updating to a newer version of LoudMiner.### Assistant: T1569: System Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The at utility exists as an executable within Windows for scheduling tasks at a specified time and date.### Assistant: T1053: Scheduled Task/Job
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes.### Assistant: T1486: Data Encrypted for Impact
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt.### Assistant: T1056: Input Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may leverage a user's credentials and interact directly with the Exchange server to acquire information from within a network.### Assistant: T1114: Email Collection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GuLoader can download further malware for execution on the victim's machine.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Eventually it will start new processes with the stored token attached.### Assistant: T1134: Access Token Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The RAT, however, had a multitude of functionalities (as listed in the table below) such as to download and execute, compress, encrypt, upload, search directories, etc### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,jRAT can map UPnP ports.### Assistant: T1120: Peripheral Device Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FIN7 has used application shim databases for persistence.### Assistant: T1546: Event Triggered Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may access network configuration files to collect sensitive data about the device and the network.### Assistant: T1602: Data from Configuration Repository
### Human:Find the techniques and ID from MITRE ATT&CK framework.,NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,mericcs.org 221.121.138.141 Domain used for spear phish sender e-mail address and to host malicious documents### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The sudoers file, /etc/sudoers, describes which users can run which commands and from which terminals.### Assistant: T1548: Abuse Elevation Control Mechanism
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Silence has named its backdoor "WINWORD.exe".### Assistant: T1036: Masquerading
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,KGH_SPY can save collected system information to a file named "info" before exfiltration.### Assistant: T1074: Data Staged
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Previous to macOS 11, adversaries could silently install browser extensions via the command line using the profiles tool to install malicious .mobileconfig files.### Assistant: T1176: Browser Extensions
### Human:Find the techniques and ID from MITRE ATT&CK framework.,menuPass has used net use to conduct connectivity checks to machines.### Assistant: T1049: System Network Connections Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Following the compromise of this system, analysts identified FIN6 leveraged stolen credentials to move laterally within the environment using the Windows’ Remote Desktop Protocol (RDP).### Assistant: T1021: Remote Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Olympic Destroyer uses WMI to help propagate itself across a network.### Assistant: T1047: Windows Management Instrumentation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Siloscape uses Tor to communicate with C2.### Assistant: T1090: Proxy
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BADFLICK has relied upon users clicking on a malicious attachment delivered through spearphishing.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Mustang Panda has created the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobelmdyU to maintain persistence.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Astaroth uses ActiveX objects for file execution and manipulation.### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Daserf can execute shell commands.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sibot can decrypt data received from a C2 and save to a file.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SpicyOmelette has been executed through malicious links within spearphishing emails.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,CallMe exfiltrates data to its C2 server over the same protocol as C2 communications.### Assistant: T1041: Exfiltration Over C2 Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may abuse Pre-OS Boot mechanisms as a way to establish persistence on a system.### Assistant: T1542: Pre-OS Boot
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FruitFly executes and stores obfuscated Perl scripts.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,njRAT can identify remote hosts on connected networks.### Assistant: T1018: Remote System Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Additionally, Rising Sun can decrypt its configuration data at runtime.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TrickBot can steal passwords from the KeePass open source password manager.### Assistant: T1555: Credentials from Password Stores
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dyre has the ability to create files in a TEMP folder to act as a database to store information.### Assistant: T1074: Data Staged
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Threat Group-3390 has detached network shares after exfiltrating files, likely to evade detection.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,yty packs a plugin with UPX.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,For example, if C:\example path precedes C:\Windows\system32 is in the PATH environment variable, a program that is named net.exe and placed in C:\example path will be called instead of the Windows system "net" when "net" is executed from the command-line.### Assistant: T1574: Hijack Execution Flow
### Human:Find the techniques and ID from MITRE ATT&CK framework.,XAgentOSX contains the getInfoOSX function to return the OS X version as well as the current user.### Assistant: T1033: System Owner/User Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Remote Service Session Hijacking differs from use of Remote Services because it hijacks an existing session rather than creating a new session using Valid Accounts.### Assistant: T1563: Remote Service Session Hijacking
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Metamorfo uses JavaScript to get the system time.### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN.### Assistant: T1056: Input Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Host enumeration and lateral movement After gaining an initial foothold in a compromised environment, the threat actors quickly identify and explore accessible systems### Assistant: T1018: Remote System Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,WMI is an administration feature that provides a uniform environment to access Windows system components.### Assistant: T1047: Windows Management Instrumentation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Cobalt Strike can use self signed Java applets to execute signed applet attacks.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Taidoor can use TCP for C2 communications.### Assistant: T1095: Non-Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may use search engines to collect information about victims that can be used during targeting.### Assistant: T1593: Search Open Websites/Domains
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Turla has used the Registry to store encrypted payloads.### Assistant: T1112: Modify Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Volgmer can execute commands on the victim's machine.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Locations where the operating system looks for programs/resources, such as file directories and in the case of Windows the Registry, could also be poisoned to include malicious payloads.### Assistant: T1574: Hijack Execution Flow
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SUPERNOVA has masqueraded as a legitimate SolarWinds DLL.### Assistant: T1036: Masquerading
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Stored procedures can be invoked via SQL statements to the database using the procedure name or via defined events .### Assistant: T1505: Server Software Component
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free.### Assistant: T1588: Obtain Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GOLD SOUTHFIELD has breached Managed Service Providers to deliver malware to MSP customers.### Assistant: T1199: Trusted Relationship
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Thrip has used WinSCP to exfiltrate data from a targeted organization over FTP.### Assistant: T1048: Exfiltration Over Alternative Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Keylogging is likely to be used to acquire credentials for new access opportunities when OS Credential Dumping efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured.### Assistant: T1056: Input Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OceanSalt can collect the victim’s IP address.### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Another Lazarus Group malware sample checks for the presence of the following Registry key:HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt.### Assistant: T1012: Query Registry
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The group has also used downloaded encrypted payloads over HTTP.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The value is derived using the IOService to access the IOPlatformUUID property, which is equivalent to the “Hardware UUID” listed in the system information application, as seen in the Figure 3 screenshot of our analysis system### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This is common behavior that can be used across different platforms and the network to evade defenses.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Machete has has relied on users opening malicious links delivered through spearphishing to execute malware.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,QakBot can inject itself into processes including explore.exe, Iexplore.exe, and Mobsync.exe.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,NETWIRE can discover and collect victim system information.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,HTTPBrowser deletes its original installer file once installation is complete.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox.### Assistant: T1497: Virtualization/Sandbox Evasion
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lokibot has the ability to discover the username on the infected host.### Assistant: T1033: System Owner/User Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.### Assistant: T1049: System Network Connections Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may attempt to access cached domain credentials used to allow authentication to occur in the event a domain controller is unavailable.### Assistant: T1003: OS Credential Dumping
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings.### Assistant: T1529: System Shutdown/Reboot
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries can use purchased domains for a variety of purposes, including for Phishing, Drive-by Compromise, and Command and Control.### Assistant: T1583: Acquire Infrastructure