Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to Exfiltration.
Adversaries may do this using a Command and Scripting Interpreter, such as cmd, which has functionality to interact with the file system to gather information. Some adversaries may also use Automated Collection on the local system.
ID | Name | Description |
---|---|---|
G0138 | Andariel |
Andariel has collected large numbers of files from compromised network systems for later extraction.[1] |
S0622 | AppleSeed | |
G0006 | APT1 | |
G0007 | APT28 |
APT28 has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.[4][5][6][7] |
G0016 | APT29 | |
G0022 | APT3 |
APT3 will identify Microsoft Office documents on the victim's computer.[9] |
G0067 | APT37 | |
G0082 | APT38 | |
G0087 | APT39 |
APT39 has used various tools to steal files from the compromised host.[12][13] |
G0096 | APT41 |
APT41 has uploaded files and data from a compromised host.[14] |
S0642 | BADFLICK | |
S0128 | BADNEWS |
When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.[16][17] |
S0337 | BadPatch |
BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.[18] |
S0234 | Bandook | |
S0239 | Bankshot | |
S0534 | Bazar |
Bazar can retrieve information from the infected machine.[21] |
S0564 | BlackMould |
BlackMould can copy files on a compromised host.[22] |
S0520 | BLINDINGCAN |
BLINDINGCAN has uploaded files from victim machines.[23] |
S0651 | BoxCaon | |
G0060 | BRONZE BUTLER |
BRONZE BUTLER has exfiltrated files stolen from local systems.[25] |
S0274 | Calisto | |
S0572 | Caterpillar WebShell |
Caterpillar WebShell has a module to collect information from the local database.[27] |
S0020 | China Chopper |
China Chopper's server component can upload local files.[28][29][30] |
S0154 | Cobalt Strike |
Cobalt Strike can collect data from a local system.[31][32] |
S0492 | CookieMiner |
CookieMiner has retrieved iPhone text messages from iTunes phone backup files.[33] |
S0050 | CosmicDuke |
CosmicDuke steals user files from local hard drives with file extensions that match a predefined list.[34] |
S0538 | Crutch | |
S0498 | Cryptoistic |
Cryptoistic can retrieve files from the local file system.[36] |
G0070 | Dark Caracal |
Dark Caracal collected complete contents of the 'Pictures' folder from compromised Windows systems.[37] |
G0074 | Dragonfly 2.0 |
Dragonfly 2.0 collected data from local victim systems.[38] |
S0502 | Drovorub | |
S0567 | Dtrack |
Dtrack can collect a variety of information from victim machines.[40] |
G0031 | Dust Storm |
Dust Storm has used Android backdoors capable of exfiltrating specific files directly from the infected devices.[41] |
S0634 | EnvyScout |
EnvyScout can collect sensitive NTLM material from a compromised host.[42] |
S0404 | esentutl |
esentutl can be used to collect data from local file systems.[43] |
S0512 | FatDuke |
FatDuke can copy files and directories from a compromised host.[44] |
G0037 | FIN6 |
FIN6 has collected and exfiltrated payment card data from compromised systems.[45][46][47] |
G0046 | FIN7 |
FIN7 has collected files and other sensitive information from a compromised network.[48] |
S0036 | FLASHFLOOD |
FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system. FLASHFLOOD will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. FLASHFLOOD also collects information stored in the Windows Address Book.[49] |
S0193 | Forfiles |
Forfiles can be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).[4] |
G0117 | Fox Kitten |
Fox Kitten has searched local system resources to access sensitive documents.[50] |
S0503 | FrameworkPOS |
FrameworkPOS can collect elements related to credit card data from process memory.[51] |
G0101 | Frankenstein |
Frankenstein has enumerated hosts via Empire, gathering various local system information.[52] |
G0093 | GALLIUM |
GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.[53] |
G0047 | Gamaredon Group |
Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.[54] |
S0477 | Goopy |
Goopy has the ability to exfiltrate documents from infected systems.[55] |
S0237 | GravityRAT |
GravityRAT steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.[56] |
S0632 | GrimAgent |
GrimAgent can collect data and files from a compromised host.[57] |
G0072 | Honeybee | |
S0203 | Hydraq |
Hydraq creates a backdoor through which remote attackers can read data from files.[59][60] |
G0100 | Inception |
Inception used a file hunting plugin to collect .txt, .pdf, .xls or .doc files from the infected host.[61] |
S0260 | InvisiMole |
InvisiMole can collect data from the system, and can monitor changes in specified directories.[62] |
S0015 | Ixeshe | |
S0265 | Kazuar |
Kazuar uploads files from a specified directory to the C2 server.[64] |
G0004 | Ke3chang |
Ke3chang gathered information and files from local directories for exfiltration.[65] |
S0526 | KGH_SPY |
KGH_SPY can send a file containing victim system information to C2.[66] |
G0094 | Kimsuky |
Kimsuky has collected Office, PDF, and HWP documents from its victims.[67] |
S0250 | Koadic |
Koadic can download files off the target system to send back to the server.[68] |
G0032 | Lazarus Group |
Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is uploaded to one of its 10 C2 servers. Lazarus Group malware RomeoDelta copies specified directories from the victim's machine, then archives and encrypts the directories before uploading to its C2 server.[69][70][71] |
S0395 | LightNeuron |
LightNeuron can collect files from a local system.[72] |
S0211 | Linfo |
Linfo creates a backdoor through which remote attackers can obtain data from local systems.[73] |
S0409 | Machete | |
S0652 | MarkiRAT |
MarkiRAT can upload data from the victim's machine to the C2 server.[75] |
S0500 | MCMD |
MCMD has the ability to upload files from an infected device.[76] |
G0045 | menuPass |
menuPass has collected various files from the compromised computers.[77][78] |
S0079 | MobileOrder |
MobileOrder exfiltrates data collected from the victim mobile device.[79] |
S0630 | Nebulae |
Nebulae has the capability to upload collected files to C2.[80] |
S0385 | njRAT | |
S0340 | Octopus |
Octopus can exfiltrate files from the system using a documents collector tool.[82] |
G0116 | Operation Wocao |
Operation Wocao has exfiltrated files and directories of interest from the targeted system.[83] |
S0352 | OSX_OCEANLOTUS.D |
OSX_OCEANLOTUS.D has the ability to upload files from a compromised host.[84] |
S0594 | Out1 |
Out1 can copy files and Registry data from compromised hosts.[85] |
S0598 | P.A.S. Webshell |
P.A.S. Webshell has the ability to copy files on a compromised host.[86] |
S0208 | Pasam |
Pasam creates a backdoor through which remote attackers can retrieve files.[87] |
G0040 | Patchwork |
Patchwork collected and exfiltrated files from the infected system.[88] |
S0517 | Pillowmint |
Pillowmint has collected credit card data using native API functions.[89] |
S0048 | PinchDuke |
PinchDuke collects user files from the compromised host based on predefined file extensions.[90] |
S0012 | PoisonIvy |
PoisonIvy creates a backdoor through which remote attackers can steal system information.[91] |
S0194 | PowerSploit |
PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.[92][93] |
S0223 | POWERSTATS |
POWERSTATS can upload files from compromised hosts.[94] |
S0238 | Proxysvc | |
S0197 | PUNCHTRACK |
PUNCHTRACK scrapes memory for properly formatted payment card data.[96][97] |
S0650 | QakBot |
QakBot can use a variety of commands, including esentutl.exe to steal sensitive data from Internet Explorer and Microsoft Edge, to acquire information that is subsequently exfiltrated.[98][99] |
S0629 | RainyDay |
RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.[80] |
S0458 | Ramsay |
Ramsay can collect Microsoft Word documents from the target's file system, as well as |
S0169 | RawPOS |
RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.[102][103][104] |
S0240 | ROKRAT |
ROKRAT can request to upload collected host data and additional files.[105] |
S0090 | Rover |
Rover searches for files on local drives based on a predefined list of file extensions.[106] |
G0034 | Sandworm Team |
Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.[107] |
S0461 | SDBbot |
SDBbot has the ability to access the file system on a compromised host.[108] |
S0444 | ShimRat |
ShimRat has the capability to upload collected files to a C2.[109] |
S0610 | SideTwist |
SideTwist has the ability to upload files from a compromised host.[110] |
S0533 | SLOTHFULMEDIA |
SLOTHFULMEDIA has uploaded files and information from victim machines.[111] |
S0615 | SombRAT |
SombRAT has collected data and files from a compromised host.[112][113] |
S0646 | SpicyOmelette |
SpicyOmelette has collected data and other information from a compromised host.[114] |
G0038 | Stealth Falcon |
Stealth Falcon malware gathers data from the local victim system.[115] |
S0559 | SUNBURST |
SUNBURST collected information from a compromised host.[116][117] |
S0011 | Taidoor |
Taidoor can upload data and files from a victim's machine.[118] |
S0467 | TajMahal |
TajMahal has the ability to steal documents from the local system including the print spooler queue.[119] |
G0027 | Threat Group-3390 |
Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.[120] |
S0266 | TrickBot |
TrickBot collects local files and information from the victim’s local machine.[121] |
G0010 | Turla |
Turla RPC backdoors can upload files from victim machines.[122] |
S0386 | Ursnif |
Ursnif has collected files from victim machines, including certificates and cookies.[123] |
S0452 | USBferry |
USBferry can collect information from an air-gapped host machine.[124] |
S0515 | WellMail | |
S0514 | WellMess |
WellMess can send files from the victim machine to C2.[126][127] |
S0645 | Wevtutil |
Wevtutil can be used to export events from a specific log.[128][129] |
G0124 | Windigo |
Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.[130] |
S0653 | xCaon | |
S0658 | XCSSET |
XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders.[131] |
S0248 | yty |
yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.[132] |
ID | Mitigation | Description |
---|---|---|
M1057 | Data Loss Prevention |
Data loss prevention can restrict access to sensitive data and detect sensitive data that is unencrypted. |
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0022 | File | File Access |
DS0012 | Script | Script Execution |
Monitor processes and command-line arguments for actions that could be taken to collect files from a system. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.