prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Boot or Logon Autostart Execution:Shortcut Modification
|
MarkiRAT can modify the shortcut that launches Telegram by replacing its path with the malicious payload to launch with the legitimate executable.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Micropsia creates a shortcut to maintain persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk, which points to the malicious msdtc.exe file already created in the %CommonFiles% directory.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
SeaDuke is capable of persisting via a .lnk file stored in the Startup directory.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
TinyZBot can create a shortcut in the Windows startup folder for persistence.
|
Boot or Logon Autostart Execution:Print Processors
|
It has added the Registry key HKLM\SYSTEM\ControlSet001\Control\Print\Environments\Windows x64\Print Processors\UDPrint" /v Driver /d "spool.dll /f to load malware as a Print Processor.
|
Boot or Logon Autostart Execution:Print Processors
|
Gelsemium can drop itself in C:\Windows\System32\spool\prtprocs\x64\winprint.dll to be loaded automatically by the spoolsv Windows service.
|
Boot or Logon Autostart Execution:Print Processors
|
The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
CrossRAT can use an XDG Autostart to establish persistence.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
If executing without root privileges, Fysbis adds a .desktop configuration file to the user's ~/.config/autostart directory.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
NETWIRE can use XDG Autostart Entries to establish persistence on Linux systems.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
Pupy can use an XDG Autostart to establish persistence.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the $HOME/.config/autostart/ folder.
|
Boot or Logon Autostart Execution:Active Setup
|
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.
|
Boot or Logon Autostart Execution:Login Items
|
Dok uses AppleScript to install a login Item by sending Apple events to the System Events process.
|
Boot or Logon Autostart Execution:Login Items
|
Green Lambert can add Login Items to establish persistence.
|
Boot or Logon Autostart Execution:Login Items
|
NETWIRE can persist via startup options for Login items.
|
Boot or Logon Initialization Scripts
|
It has hijacked legitimate application-specific startup scripts to enable malware to execute on system startup.
|
Boot or Logon Initialization Scripts
|
It has installed an "init.d" startup script to maintain persistence.
|
Boot or Logon Initialization Scripts
|
Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .conf file in the /etc/init/ folder.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
An It loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment "UserInitMprLogonScript" .
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
It has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.
|
Boot or Logon Initialization Scripts:RC Scripts
|
It has installed a run command on a compromised system to enable malware execution on system startup.
|
Boot or Logon Initialization Scripts:RC Scripts
|
Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled.
|
Boot or Logon Initialization Scripts:RC Scripts
|
Green Lambert can add init.d and rc.d files in the /etc folder to establish persistence.
|
Boot or Logon Initialization Scripts:RC Scripts
|
HiddenWasp installs reboot persistence by adding itself to /etc/rc.local.
|
Boot or Logon Initialization Scripts:RC Scripts
|
iKitten adds an entry to the rc.common file for persistence.
|
Boot or Logon Initialization Scripts:Startup Items
|
jRAT can list and manage startup entries.
|
Browser Extensions
|
Bundlore can install malicious browser extensions that are used to hijack user searches.
|
Browser Extensions
|
Grandoreiro can use malicious browser extensions to steal cookies and other user information.
|
Browser Extensions
|
It has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.
|
Browser Extensions
|
OSX/Shlayer can install malicious Safari browser extensions to serve ads.
|
Compromise Client Software Binary
|
During the 2016 Ukraine Electric Power Attack, It used a trojanized version of Windows Notepad to add a layer of persistence for Industroyer.
|
Compromise Client Software Binary
|
Bonadan has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.
|
Compromise Client Software Binary
|
Ebury has been embedded into modified OpenSSH binaries to gain persistent access to SSH credential information.
|
Compromise Client Software Binary
|
Industroyer has used a Trojanized version of the Windows Notepad application for an additional backdoor persistence mechanism.
|
Compromise Client Software Binary
|
Kessel has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.
|
Compromise Client Software Binary
|
Kobalos replaced the SSH client with a trojanized SSH client to steal credentials on compromised systems.
|
Compromise Client Software Binary
|
ThiefQuest searches through the /Users/ folder looking for executable files. For each executable, ThiefQuest prepends a copy of itself to the beginning of the file. When the file is executed, the ThiefQuest code is executed first. ThiefQuest creates a hidden file, copies the original target executable to the file, then executes the new hidden file to maintain the appearance of normal behavior.
|
Compromise Client Software Binary
|
XCSSET uses a malicious browser application to replace the legitimate browser in order to continuously capture credentials, monitor web traffic, and download additional modules.
|
Create Account
|
During the 2016 Ukraine Electric Power Attack, It added a login to a SQL Server with sp_addlinkedsrvlogin.
|
Create Account
|
It used wmic.exe to add a new user to the system.
|
Create Account:Local Account
|
It has been known to create or enable accounts, such as support_388945a0.
|
Create Account:Local Account
|
It has created accounts on multiple compromised hosts to perform actions within the network.
|
Create Account:Local Account
|
It has created user accounts.
|
Create Account:Local Account
|
Calisto has the capability to add its own account to the victim's machine.
|
Create Account:Local Account
|
It can create a Windows account.
|
Create Account:Local Account
|
It has created accounts on victims, including administrator accounts, some of which appeared to be tailored to each individual staging target.
|
Create Account:Local Account
|
Empire has a module for creating a local user if permissions allow.
|
Create Account:Local Account
|
It has created MS-SQL local accounts in a compromised network.
|
Create Account:Local Account
|
Flame can create backdoor accounts with login "HelpAssistant" on domain connected systems if appropriate rights are available.
|
Create Account:Local Account
|
It has created a local user account with administrator privileges.
|
Create Account:Local Account
|
GoldenSpy can create new users on an infected system.
|
Create Account:Local Account
|
HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine.
|
Create Account:Local Account
|
Hildegard has created a user named "monerodaemon".
|
Create Account:Local Account
|
It has created accounts with net user.
|
Create Account:Local Account
|
It used a tool called Imecab to set up a persistent remote access account on the victim machine.
|
Create Account:Local Account
|
It has created local accounts named help and DefaultAccount on compromised machines.
|
Create Account:Local Account
|
Mis-Type may create a temporary user on the system named Lost_{Unique Identifier}.
|
Create Account:Local Account
|
The net user username \password commands in Net can be used to create a local account.
|
Create Account:Local Account
|
Pupy can user PowerView to execute "net user" commands and create local system accounts.
|
Create Account:Local Account
|
S-Type may create a temporary user on the system named Lost_{Unique Identifier} with the password pond~!@6"{Unique Identifier}.
|
Create Account:Local Account
|
ServHelper has created a new user named "supportaccount".
|
Create Account:Local Account
|
SMOKEDHAM has created user accounts.
|
Create Account:Local Account
|
It has created local privileged users on victim machines.
|
Create Account:Local Account
|
It has created local administrator accounts to maintain persistence in compromised networks.
|
Create Account:Local Account
|
ZxShell has a feature to create local user accounts.
|
Create Account:Domain Account
|
During the 2015 Ukraine Electric Power Attack, It created privileged domain accounts to be used for further exploitation and lateral movement.
|
Create Account:Domain Account
|
During the 2016 Ukraine Electric Power Attack, It created two new accounts, "admin" and "система" (System). The accounts were then assigned to a domain matching local operation and were delegated new privileges.
|
Create Account:Domain Account
|
Empire has a module for creating a new domain user if permissions allow.
|
Create Account:Domain Account
|
It created high-privileged domain user accounts to maintain access to victim networks.
|
Create Account:Domain Account
|
It has created domain accounts.
|
Create Account:Domain Account
|
The net user username \password \domain commands in Net can be used to create a domain account.
|
Create Account:Domain Account
|
PsExec has the ability to remotely create accounts on target systems.
|
Create Account:Domain Account
|
Pupy can user PowerView to execute "net user" commands and create domain accounts.
|
Create Account:Domain Account
|
It has created and used new accounts within a victim's Active Directory environment to maintain persistence.
|
Create Account:Cloud Account
|
AADInternals can create new Azure AD users.
|
Create Account:Cloud Account
|
It can create new users through Azure AD.
|
Create Account:Cloud Account
|
It has created global admin accounts in the targeted organization's cloud instances to gain persistence.
|
Create or Modify System Process
|
Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root.
|
Create or Modify System Process:Launch Agent
|
Bundlore can persist via a LaunchAgent.
|
Create or Modify System Process:Launch Agent
|
Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence.
|
Create or Modify System Process:Launch Agent
|
CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence.
|
Create or Modify System Process:Launch Agent
|
CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software.
|
Create or Modify System Process:Launch Agent
|
CrossRAT creates a Launch Agent on macOS.
|
Create or Modify System Process:Launch Agent
|
Dacls can establish persistence via a LaunchAgent.
|
Create or Modify System Process:Launch Agent
|
Dok installs two LaunchAgents to redirect all network traffic with a randomly generated name for each plist file maintaining the format com.random.name.plist.
|
Create or Modify System Process:Launch Agent
|
FruitFly persists via a Launch Agent.
|
Create or Modify System Process:Launch Agent
|
Green Lambert can create a Launch Agent with the RunAtLoad key-value pair set to true, ensuring the com.apple.GrowlHelper.plist file runs every time a user logs in.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.