enterprise |
T1087 |
Account Discovery |
- |
enterprise |
T1087.001 |
Local Account |
admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.003 |
Windows Command Shell |
Following exploitation with LOWBALL malware, admin@338 actors created a file containing a list of commands to be executed on the compromised computer. |
enterprise |
T1203 |
Exploitation for Client Execution |
admin@338 has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158. |
enterprise |
T1083 |
File and Directory Discovery |
admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about files and directories: dir c:\ >> %temp%\download dir “c:\Documents and Settings” >> %temp%\download dir “c:\Program Files" >> %temp%\download dir d:\ >> %temp%\download |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.005 |
Match Legitimate Name or Location |
admin@338 actors used the following command to rename one of their tools to a benign file name: ren “%temp%\upload” audiodg.exe |
enterprise |
T1069 |
Permission Groups Discovery |
- |
enterprise |
T1069.001 |
Local Groups |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: net localgroup administrator >> %temp%\download |
enterprise |
T1566 |
Phishing |
- |
enterprise |
T1566.001 |
Spearphishing Attachment |
admin@338 has sent emails with malicious Microsoft Office documents attached. |
enterprise |
T1082 |
System Information Discovery |
admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: ver >> %temp%\download systeminfo >> %temp%\download |
enterprise |
T1016 |
System Network Configuration Discovery |
admin@338 actors used the following command after exploiting a machine with LOWBALL malware to acquire information about local networks: ipconfig /all >> %temp%\download |
enterprise |
T1049 |
System Network Connections Discovery |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: netstat -ano >> %temp%\download |
enterprise |
T1007 |
System Service Discovery |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: net start >> %temp%\download |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.002 |
Malicious File |
admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails. |