S0359 Nltest
Nltest is a Windows command-line utility used to list domain controllers and enumerate domain trusts.1
| Item | Value |
|---|---|
| ID | S0359 |
| Associated Names | |
| Type | TOOL |
| Version | 1.3 |
| Created | 14 February 2019 |
| Last Modified | 25 September 2024 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1482 | Domain Trust Discovery | Nltest may be used to enumerate trusted domains by using commands such as nltest /domain_trusts.12 |
| enterprise | T1018 | Remote System Discovery | Nltest may be used to enumerate remote domain controllers using options such as /dclist and /dsgetdc.1 |
| enterprise | T1016 | System Network Configuration Discovery | Nltest may be used to enumerate the parent domain of a local machine using /parentdomain.1 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G1040 | Play | 3 |
| G0102 | Wizard Spider | 51089647 |
| G1032 | INC Ransom | 11 |
| G1053 | Storm-0501 | Storm-0501 has used Windows native utility Nltest, e.g. nltest.exe, for discovery.12 |
| G0061 | FIN8 | 13 |
| G1006 | Earth Lusca | 14 |
| G1017 | Volt Typhoon | 1615 |
References
-
ss64. (n.d.). NLTEST.exe - Network Location Test. Retrieved February 14, 2019. ↩↩↩↩
-
Bacurio Jr., F. and Salvio, J. (2018, April 9). Trickbot’s New Reconnaissance Plugin. Retrieved February 14, 2019. ↩
-
Trend Micro Research. (2023, July 21). Ransomware Spotlight: Play. Retrieved September 24, 2024. ↩
-
Brian Donohue, Katie Nickels, Paul Michaud, Adina Bodkins, Taylor Chapman, Tony Lambert, Jeff Felling, Kyle Rainey, Mike Haag, Matt Graeber, Aaron Didier.. (2020, October 29). A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak. Retrieved October 30, 2020. ↩
-
Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020. ↩
-
Sean Gallagher, Peter Mackenzie, Elida Leite, Syed Shahram, Bill Kearney, Anand Aijan, Sivagnanam Gn, Suraj Mundalik. (2020, October 14). They’re back: inside a new Ryuk ransomware attack. Retrieved October 14, 2020. ↩
-
Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023. ↩
-
The DFIR Report. (2020, November 5). Ryuk Speed Run, 2 Hours to Ransom. Retrieved November 6, 2020. ↩
-
The DFIR Report. (2020, October 18). Ryuk in 5 Hours. Retrieved October 19, 2020. ↩
-
The DFIR Report. (2020, October 8). Ryuk’s Return. Retrieved October 9, 2020. ↩
-
Team Huntress. (2023, August 11). Investigating New INC Ransom Group Activity. Retrieved June 5, 2024. ↩
-
Microsoft Threat Intelligence. (2024, September 26). Storm-0501: Ransomware attacks expanding to hybrid cloud environments. Retrieved October 19, 2025. ↩
-
Martin Zugec. (2021, July 27). Deep Dive Into a FIN8 Attack - A Forensic Investigation. Retrieved September 1, 2021. ↩
-
Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca’s Operations. Retrieved July 1, 2022. ↩
-
CISA et al.. (2024, February 7). PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure. Retrieved May 15, 2024. ↩
-
Counter Threat Unit Research Team. (2023, May 24). Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations. Retrieved July 27, 2023. ↩