Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.
Adversaries may do this using a Command and Scripting Interpreter, such as cmd as well as a Network Device CLI, which have functionality to interact with the file system to gather information. Adversaries may also use Automated Collection on the local system.
ID | Name | Description |
---|---|---|
G0138 | Andariel |
Andariel has collected large numbers of files from compromised network systems for later extraction.[1] |
S0622 | AppleSeed | |
G0006 | APT1 | |
G0007 | APT28 |
APT28 has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.[5][6][7][8] |
G0016 | APT29 | |
G0022 | APT3 |
APT3 will identify Microsoft Office documents on the victim's computer.[10] |
G0067 | APT37 | |
G0082 | APT38 | |
G0087 | APT39 |
APT39 has used various tools to steal files from the compromised host.[13][14] |
G0096 | APT41 |
APT41 has uploaded files and data from a compromised host.[15] |
G0001 | Axiom | |
S0642 | BADFLICK | |
S0128 | BADNEWS |
When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.[18][19] |
S0337 | BadPatch |
BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.[20] |
S0234 | Bandook | |
S0239 | Bankshot | |
S0534 | Bazar |
Bazar can retrieve information from the infected machine.[23] |
S0268 | Bisonal |
Bisonal has collected information from a compromised host.[24] |
S0564 | BlackMould |
BlackMould can copy files on a compromised host.[25] |
S0520 | BLINDINGCAN |
BLINDINGCAN has uploaded files from victim machines.[26] |
S0651 | BoxCaon | |
G0060 | BRONZE BUTLER |
BRONZE BUTLER has exfiltrated files stolen from local systems.[28] |
S0274 | Calisto | |
S0572 | Caterpillar WebShell |
Caterpillar WebShell has a module to collect information from the local database.[30] |
S0674 | CharmPower |
CharmPower can collect data and files from a compromised host.[31] |
S0020 | China Chopper |
China Chopper's server component can upload local files.[32][33][34] |
S0660 | Clambling |
Clambling can collect information from a compromised host.[35] |
S0154 | Cobalt Strike |
Cobalt Strike can collect data from a local system.[36][37] |
S0492 | CookieMiner |
CookieMiner has retrieved iPhone text messages from iTunes phone backup files.[38] |
S0050 | CosmicDuke |
CosmicDuke steals user files from local hard drives with file extensions that match a predefined list.[39] |
S0538 | Crutch | |
S0498 | Cryptoistic |
Cryptoistic can retrieve files from the local file system.[41] |
S0687 | Cyclops Blink |
Cyclops Blink can upload files from a compromised host.[42] |
G0070 | Dark Caracal |
Dark Caracal collected complete contents of the 'Pictures' folder from compromised Windows systems.[43] |
S0673 | DarkWatchman |
DarkWatchman can collect files from a compromised host.[44] |
G0035 | Dragonfly | |
S0694 | DRATzarus |
DRATzarus can collect information from a compromised host.[46] |
S0502 | Drovorub | |
S0567 | Dtrack |
Dtrack can collect a variety of information from victim machines.[48] |
G0031 | Dust Storm |
Dust Storm has used Android backdoors capable of exfiltrating specific files directly from the infected devices.[49] |
S0634 | EnvyScout |
EnvyScout can collect sensitive NTLM material from a compromised host.[50] |
S0404 | esentutl |
esentutl can be used to collect data from local file systems.[51] |
S0512 | FatDuke |
FatDuke can copy files and directories from a compromised host.[52] |
G0037 | FIN6 |
FIN6 has collected and exfiltrated payment card data from compromised systems.[53][54][55] |
G0046 | FIN7 |
FIN7 has collected files and other sensitive information from a compromised network.[56] |
S0696 | Flagpro |
Flagpro can collect data from a compromised host, including Windows authentication information.[57] |
S0036 | FLASHFLOOD |
FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system. FLASHFLOOD will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. FLASHFLOOD also collects information stored in the Windows Address Book.[58] |
S0661 | FoggyWeb |
FoggyWeb can retrieve configuration data from a compromised AD FS server.[59] |
S0193 | Forfiles |
Forfiles can be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).[5] |
G0117 | Fox Kitten |
Fox Kitten has searched local system resources to access sensitive documents.[60] |
S0503 | FrameworkPOS |
FrameworkPOS can collect elements related to credit card data from process memory.[61] |
G0101 | Frankenstein |
Frankenstein has enumerated hosts via Empire, gathering various local system information.[62] |
G0093 | GALLIUM |
GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.[63] |
G0047 | Gamaredon Group |
Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.[64] |
S0477 | Goopy |
Goopy has the ability to exfiltrate documents from infected systems.[65] |
S0237 | GravityRAT |
GravityRAT steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.[66] |
S0690 | Green Lambert |
Green Lambert can collect data from a compromised host.[67] |
S0632 | GrimAgent |
GrimAgent can collect data and files from a compromised host.[68] |
S0009 | Hikit | |
G0072 | Honeybee | |
S0203 | Hydraq |
Hydraq creates a backdoor through which remote attackers can read data from files.[70][71] |
G0100 | Inception |
Inception used a file hunting plugin to collect .txt, .pdf, .xls or .doc files from the infected host.[72] |
S0260 | InvisiMole |
InvisiMole can collect data from the system, and can monitor changes in specified directories.[73] |
S0015 | Ixeshe | |
S0265 | Kazuar |
Kazuar uploads files from a specified directory to the C2 server.[75] |
G0004 | Ke3chang |
Ke3chang gathered information and files from local directories for exfiltration.[76][77] |
S0526 | KGH_SPY |
KGH_SPY can send a file containing victim system information to C2.[78] |
G0094 | Kimsuky |
Kimsuky has collected Office, PDF, and HWP documents from its victims.[79][80] |
S0250 | Koadic |
Koadic can download files off the target system to send back to the server.[81][82] |
S0356 | KONNI |
KONNI has stored collected information and discovered processes in a tmp file.[83] |
G0032 | Lazarus Group |
Lazarus Group has collected data and files from compromised networks.[84][85][86][87][46][88] |
S0395 | LightNeuron |
LightNeuron can collect files from a local system.[89] |
S0211 | Linfo |
Linfo creates a backdoor through which remote attackers can obtain data from local systems.[90] |
S0409 | Machete | |
S0652 | MarkiRAT |
MarkiRAT can upload data from the victim's machine to the C2 server.[92] |
S0500 | MCMD |
MCMD has the ability to upload files from an infected device.[93] |
G0045 | menuPass |
menuPass has collected various files from the compromised computers.[94][95] |
S0079 | MobileOrder |
MobileOrder exfiltrates data collected from the victim mobile device.[96] |
S0630 | Nebulae |
Nebulae has the capability to upload collected files to C2.[97] |
S0691 | Neoichor | |
S0385 | njRAT | |
S0340 | Octopus |
Octopus can exfiltrate files from the system using a documents collector tool.[99] |
G0116 | Operation Wocao |
Operation Wocao has exfiltrated files and directories of interest from the targeted system.[100] |
S0352 | OSX_OCEANLOTUS.D |
OSX_OCEANLOTUS.D has the ability to upload files from a compromised host.[101] |
S0594 | Out1 |
Out1 can copy files and Registry data from compromised hosts.[102] |
S0598 | P.A.S. Webshell |
P.A.S. Webshell has the ability to copy files on a compromised host.[103] |
S0208 | Pasam |
Pasam creates a backdoor through which remote attackers can retrieve files.[104] |
G0040 | Patchwork |
Patchwork collected and exfiltrated files from the infected system.[105] |
S0517 | Pillowmint |
Pillowmint has collected credit card data using native API functions.[106] |
S0048 | PinchDuke |
PinchDuke collects user files from the compromised host based on predefined file extensions.[107] |
S0012 | PoisonIvy |
PoisonIvy creates a backdoor through which remote attackers can steal system information.[108] |
S0194 | PowerSploit |
PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.[109][110] |
S0223 | POWERSTATS |
POWERSTATS can upload files from compromised hosts.[111] |
S0238 | Proxysvc | |
S0197 | PUNCHTRACK |
PUNCHTRACK scrapes memory for properly formatted payment card data.[113][114] |
S0650 | QakBot |
QakBot can use a variety of commands, including esentutl.exe to steal sensitive data from Internet Explorer and Microsoft Edge, to acquire information that is subsequently exfiltrated.[115][116] |
S0686 | QuietSieve |
QuietSieve can collect files from a compromised host.[117] |
S0629 | RainyDay |
RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.[97] |
S0458 | Ramsay |
Ramsay can collect Microsoft Word documents from the target's file system, as well as |
S0169 | RawPOS |
RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.[120][121][122] |
S0662 | RCSession |
RCSession can collect data from a compromised host.[123][35] |
S0240 | ROKRAT |
ROKRAT can collect host data and specific file types.[124][125][126] |
S0090 | Rover |
Rover searches for files on local drives based on a predefined list of file extensions.[127] |
G0034 | Sandworm Team |
Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.[128] |
S0461 | SDBbot |
SDBbot has the ability to access the file system on a compromised host.[129] |
S0444 | ShimRat |
ShimRat has the capability to upload collected files to a C2.[130] |
S0610 | SideTwist |
SideTwist has the ability to upload files from a compromised host.[131] |
S0533 | SLOTHFULMEDIA |
SLOTHFULMEDIA has uploaded files and information from victim machines.[132] |
S0615 | SombRAT |
SombRAT has collected data and files from a compromised host.[133][134] |
S0646 | SpicyOmelette |
SpicyOmelette has collected data and other information from a compromised host.[135] |
G0038 | Stealth Falcon |
Stealth Falcon malware gathers data from the local victim system.[136] |
S0559 | SUNBURST |
SUNBURST collected information from a compromised host.[137][138] |
S0011 | Taidoor |
Taidoor can upload data and files from a victim's machine.[139] |
S0467 | TajMahal |
TajMahal has the ability to steal documents from the local system including the print spooler queue.[140] |
G0027 | Threat Group-3390 |
Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.[141] |
S0665 | ThreatNeedle |
ThreatNeedle can collect data and files from a compromised host.[87] |
S0668 | TinyTurla | |
S0671 | Tomiris |
Tomiris has the ability to collect recent files matching a hardcoded list of extensions prior to exfiltration.[143] |
S0266 | TrickBot |
TrickBot collects local files and information from the victim’s local machine.[144] |
G0010 | Turla |
Turla RPC backdoors can upload files from victim machines.[145] |
S0386 | Ursnif |
Ursnif has collected files from victim machines, including certificates and cookies.[146] |
S0452 | USBferry |
USBferry can collect information from an air-gapped host machine.[147] |
S0670 | WarzoneRAT |
WarzoneRAT can collect data from a compromised host.[148] |
S0515 | WellMail | |
S0514 | WellMess |
WellMess can send files from the victim machine to C2.[150][151] |
S0645 | Wevtutil |
Wevtutil can be used to export events from a specific log.[152][153] |
G0124 | Windigo |
Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.[154] |
S0653 | xCaon | |
S0658 | XCSSET |
XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders.[155] |
S0248 | yty |
yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.[156] |
S0672 | Zox |
Zox has the ability to upload files from a targeted system.[16] |
S0412 | ZxShell |
ID | Mitigation | Description |
---|---|---|
M1057 | Data Loss Prevention |
Data loss prevention can restrict access to sensitive data and detect sensitive data that is unencrypted. |
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0022 | File | File Access |
DS0009 | Process | OS API Execution |
Process Creation | ||
DS0012 | Script | Script Execution |
Monitor processes and command-line arguments for actions that could be taken to collect files from a system. Remote access tools with built-in features may interact directly with the Windows API to gather data. Further, Network Device CLI commands may also be used to collect files such as configuration files with built-in features native to the network device platform.[158][159] Monitor CLI activity for unexpected or unauthorized use commands being run by non-standard users from non-standard locations. Data may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.