Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Adversaries may do this using a Command and Scripting Interpreter, such as cmd as well as a Network Device CLI, which have functionality to interact with the file system to gather information.[1] Adversaries may also use Automated Collection on the local system.
| ID | Name | Description |
|---|---|---|
| S1028 | Action RAT |
Action RAT can collect local data from an infected machine.[2] |
| G1030 | Agrius |
Agrius gathered data from database and other critical servers in victim environments, then used wiping mechanisms as an anti-analysis and anti-forensics mechanism.[3] |
| S1025 | Amadey | |
| G0138 | Andariel |
Andariel has collected large numbers of files from compromised network systems for later extraction.[5] |
| S0622 | AppleSeed | |
| G0006 | APT1 | |
| G0007 | APT28 |
APT28 has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.[9][10][11][12] |
| G0016 | APT29 | |
| G0022 | APT3 |
APT3 will identify Microsoft Office documents on the victim's computer.[14] |
| G0067 | APT37 | |
| G0082 | APT38 | |
| G0087 | APT39 |
APT39 has used various tools to steal files from the compromised host.[17][18] |
| G0096 | APT41 |
APT41 has uploaded files and data from a compromised host.[19] |
| G0143 | Aquatic Panda |
Aquatic Panda captured local Windows security event log data from victim machines using the |
| S1029 | AuTo Stealer |
AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine.[2] |
| G0001 | Axiom | |
| S0642 | BADFLICK | |
| S0128 | BADNEWS |
When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.[23][24] |
| S0337 | BadPatch |
BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.[25] |
| S0234 | Bandook | |
| S0239 | Bankshot | |
| S0534 | Bazar |
Bazar can retrieve information from the infected machine.[28] |
| S1246 | BeaverTail |
BeaverTail has exfiltrated data collected from local systems.[29][30][31][32] |
| S0268 | Bisonal |
Bisonal has collected information from a compromised host.[33] |
| S0564 | BlackMould |
BlackMould can copy files on a compromised host.[34] |
| S0520 | BLINDINGCAN |
BLINDINGCAN has uploaded files from victim machines.[35] |
| S0651 | BoxCaon | |
| G0060 | BRONZE BUTLER |
BRONZE BUTLER has exfiltrated files stolen from local systems.[37] |
| S1063 | Brute Ratel C4 |
Brute Ratel C4 has the ability to upload files from a compromised system.[38] |
| S1039 | Bumblebee |
Bumblebee can capture and compress stolen credentials from the Registry and volume shadow copies.[39] |
| C0015 | C0015 |
During C0015, the threat actors obtained files and data from the compromised network.[40] |
| C0017 | C0017 |
During C0017, APT41 collected information related to compromised machines as well as Personal Identifiable Information (PII) from victim networks.[41] |
| C0026 | C0026 |
During C0026, the threat actors collected documents from compromised hosts.[42] |
| S0274 | Calisto | |
| S1224 | CASTLETAP |
CASTLETAP can execute a C2 command to transfer files from victim machines.[44] |
| S0572 | Caterpillar WebShell |
Caterpillar WebShell has a module to collect information from the local database.[45] |
| S1043 | ccf32 | |
| S0674 | CharmPower |
CharmPower can collect data and files from a compromised host.[47] |
| S1149 | CHIMNEYSWEEP |
CHIMNEYSWEEP can collect files from compromised hosts.[48] |
| S0020 | China Chopper |
China Chopper's server component can upload local files.[49][50][51][52] |
| S0667 | Chrommme | |
| S0660 | Clambling |
Clambling can collect information from a compromised host.[54] |
| S0154 | Cobalt Strike |
Cobalt Strike can collect data from a local system.[55][56] |
| S0492 | CookieMiner |
CookieMiner has retrieved iPhone text messages from iTunes phone backup files.[57] |
| S0050 | CosmicDuke |
CosmicDuke steals user files from local hard drives with file extensions that match a predefined list.[58] |
| C0004 | CostaRicto |
During CostaRicto, the threat actors collected data and files from compromised networks.[59] |
| S1023 | CreepyDrive |
CreepyDrive can upload files to C2 from victim machines.[60] |
| S0115 | Crimson |
Crimson can collect information from a compromised host.[61] |
| S0538 | Crutch | |
| S0498 | Cryptoistic |
Cryptoistic can retrieve files from the local file system.[63] |
| G1012 | CURIUM | |
| C0029 | Cutting Edge |
During Cutting Edge, threat actors stole the running configuration and cache data from targeted Ivanti Connect Secure VPNs.[65][66] |
| S0687 | Cyclops Blink |
Cyclops Blink can upload files from a compromised host.[67] |
| S1014 | DanBot | |
| G0070 | Dark Caracal |
Dark Caracal collected complete contents of the 'Pictures' folder from compromised Windows systems.[69] |
| S1111 | DarkGate |
DarkGate has stolen |
| S0673 | DarkWatchman |
DarkWatchman can collect files from a compromised host.[71] |
| S1021 | DnsSystem |
DnsSystem can upload files from infected machines after receiving a command with |
| G0035 | Dragonfly | |
| S0694 | DRATzarus |
DRATzarus can collect information from a compromised host.[74] |
| S0502 | Drovorub | |
| S0567 | Dtrack |
Dtrack can collect a variety of information from victim machines.[76] |
| S1159 | DUSTTRAP | |
| G1003 | Ember Bear |
Ember Bear gathers victim system information such as enumerating the volume of a given device or extracting system and security event logs for analysis.[78][79] |
| S0634 | EnvyScout |
EnvyScout can collect sensitive NTLM material from a compromised host.[80] |
| S0404 | esentutl |
esentutl can be used to collect data from local file systems.[81] |
| S0512 | FatDuke |
FatDuke can copy files and directories from a compromised host.[82] |
| G1016 | FIN13 |
FIN13 has gathered stolen credentials, sensitive data such as point-of-sale (POS), and ATM data from a compromised network before exfiltration.[83][84] |
| G0037 | FIN6 |
FIN6 has collected and exfiltrated payment card data from compromised systems.[85][86][87] |
| G0046 | FIN7 |
FIN7 has collected files and other sensitive information from a compromised network.[88] |
| S0696 | Flagpro |
Flagpro can collect data from a compromised host, including Windows authentication information.[89] |
| S0036 | FLASHFLOOD |
FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system. FLASHFLOOD will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. FLASHFLOOD also collects information stored in the Windows Address Book.[90] |
| S0381 | FlawedAmmyy |
FlawedAmmyy has collected information and files from a compromised machine.[91] |
| S0661 | FoggyWeb |
FoggyWeb can retrieve configuration data from a compromised AD FS server.[92] |
| S0193 | Forfiles |
Forfiles can be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).[9] |
| G0117 | Fox Kitten |
Fox Kitten has searched local system resources to access sensitive documents.[93] |
| S0503 | FrameworkPOS |
FrameworkPOS can collect elements related to credit card data from process memory.[94] |
| C0001 | Frankenstein |
During Frankenstein, the threat actors used Empire to gather various local system information.[95] |
| S1044 | FunnyDream |
FunnyDream can upload files from victims' machines.[46][96] |
| G0093 | GALLIUM |
GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.[97] |
| G0047 | Gamaredon Group |
Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.[98][99] |
| S0666 | Gelsemium | |
| S0477 | Goopy |
Goopy has the ability to exfiltrate documents from infected systems.[100] |
| S0237 | GravityRAT |
GravityRAT steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.[101] |
| S0690 | Green Lambert |
Green Lambert can collect data from a compromised host.[102] |
| S0632 | GrimAgent |
GrimAgent can collect data and files from a compromised host.[103] |
| G0125 | HAFNIUM |
HAFNIUM has collected data and files from a compromised machine.[52][104] |
| S1229 | Havoc |
Havoc can download files from the victim's computer.[105][106] |
| S0009 | Hikit | |
| S0203 | Hydraq |
Hydraq creates a backdoor through which remote attackers can read data from files.[107][108] |
| S1022 | IceApple |
IceApple can collect files, passwords, and other data from a compromised host.[109] |
| G0100 | Inception |
Inception used a file hunting plugin to collect .txt, .pdf, .xls or .doc files from the infected host.[110] |
| S1245 | InvisibleFerret |
InvisibleFerret has collected data utilizing a script that contained a list of excluded files and directory names and naming patterns of interest such as environment and configuration files, documents, spreadsheets, and other files that contained the words secret, wallet, private, and password.[30] |
| S0260 | InvisiMole |
InvisiMole can collect data from the system, and can monitor changes in specified directories.[111] |
| S1132 | IPsec Helper |
IPsec Helper can identify specific files and folders for follow-on exfiltration.[112] |
| S0015 | Ixeshe | |
| S0265 | Kazuar |
Kazuar uploads files from a specified directory to the C2 server.[114] |
| G0004 | Ke3chang |
Ke3chang gathered information and files from local directories for exfiltration.[115][116] |
| S1020 | Kevin |
Kevin can upload logs and other data from a compromised host.[117] |
| S0526 | KGH_SPY |
KGH_SPY can send a file containing victim system information to C2.[118] |
| G0094 | Kimsuky |
Kimsuky has collected Office, PDF, and HWP documents from its victims.[119][120] |
| S0250 | Koadic |
Koadic can download files off the target system to send back to the server.[121][122] |
| S0356 | KONNI |
KONNI has stored collected information and discovered processes in a tmp file.[123] |
| S1075 | KOPILUWAK |
KOPILUWAK can gather information from compromised hosts.[42] |
| G1004 | LAPSUS$ |
LAPSUS$ uploaded sensitive files, information, and credentials from a targeted organization for extortion or public release.[124] |
| S1160 | Latrodectus |
Latrodectus can collect data from a compromised host using a stealer module.[125] |
| G0032 | Lazarus Group |
Lazarus Group has collected data and files from compromised networks.[126][127][128][129] |
| S0395 | LightNeuron |
LightNeuron can collect files from a local system.[130] |
| S0211 | Linfo |
Linfo creates a backdoor through which remote attackers can obtain data from local systems.[131] |
| S1101 | LoFiSe |
LoFiSe can collect files of interest from targeted systems.[132] |
| G1014 | LuminousMoth |
LuminousMoth has collected files and data from compromised machines.[133][134] |
| S0409 | Machete |
Machete searches the File system for files of interest.[135] |
| S1016 | MacMa |
MacMa can collect then exfiltrate files from the compromised system.[136] |
| S1060 | Mafalda |
Mafalda can collect files and information from a compromised host.[137] |
| G0059 | Magic Hound |
Magic Hound has used a web shell to exfiltrate a ZIP file containing a dump of LSASS memory on a compromised machine.[138][139] |
| S0652 | MarkiRAT |
MarkiRAT can upload data from the victim's machine to the C2 server.[140] |
| S0500 | MCMD |
MCMD has the ability to upload files from an infected device.[141] |
| G0045 | menuPass |
menuPass has collected various files from the compromised computers.[142][143] |
| S1059 | metaMain |
metaMain can collect files and system information from a compromised host.[137][144] |
| S1146 | MgBot |
MgBot includes modules for collecting files from local systems based on a given set of properties and filenames.[145] |
| S1015 | Milan | |
| S0084 | Mis-Type |
Mis-Type has collected files and data from a compromised host.[147] |
| S0083 | Misdat |
Misdat has collected files and data from a compromised host.[147] |
| S0079 | MobileOrder |
MobileOrder exfiltrates data collected from the victim mobile device.[148] |
| S1026 | Mongall |
Mongall has the ability to upload files from victim's machines.[149] |
| S0630 | Nebulae |
Nebulae has the capability to upload collected files to C2.[150] |
| S0691 | Neoichor | |
| C0002 | Night Dragon |
During Night Dragon, the threat actors collected files and other data from compromised systems.[151] |
| S1090 | NightClub |
NightClub can use a file monitor to steal specific files from targeted systems.[152] |
| S0385 | njRAT | |
| S1131 | NPPSPY |
NPPSPY records data entered from the local system logon at Winlogon to capture credentials in cleartext.[154] |
| S0340 | Octopus |
Octopus can exfiltrate files from the system using a documents collector tool.[155] |
| G0049 | OilRig |
OilRig has used PowerShell to upload files from compromised systems.[156] |
| C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors collected data, files, and other information from compromised networks.[157] |
| C0022 | Operation Dream Job |
During Operation Dream Job, Lazarus Group used malicious Trojans and DLL files to exfiltrate data from an infected host.[74][158] |
| C0006 | Operation Honeybee |
During Operation Honeybee, the threat actors collected data from compromised hosts.[159] |
| C0048 | Operation MidnightEclipse |
During Operation MidnightEclipse, threat actors stole saved cookies and login data from targeted systems.[160] |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors exfiltrated files and directories of interest from the targeted system.[161] |
| S0352 | OSX_OCEANLOTUS.D |
OSX_OCEANLOTUS.D has the ability to upload files from a compromised host.[162] |
| S0594 | Out1 |
Out1 can copy files and Registry data from compromised hosts.[163] |
| S1017 | OutSteel |
OutSteel can collect information from a compromised host.[164] |
| S0598 | P.A.S. Webshell |
P.A.S. Webshell has the ability to copy files on a compromised host.[165] |
| S0208 | Pasam |
Pasam creates a backdoor through which remote attackers can retrieve files.[166] |
| G0040 | Patchwork |
Patchwork collected and exfiltrated files from the infected system.[167] |
| S1102 | Pcexter | |
| S1050 | PcShare |
PcShare can collect files and information from a compromised host.[46] |
| S0517 | Pillowmint |
Pillowmint has collected credit card data using native API functions.[168] |
| S0048 | PinchDuke |
PinchDuke collects user files from the compromised host based on predefined file extensions.[169] |
| S1031 | PingPull | |
| S0012 | PoisonIvy |
PoisonIvy creates a backdoor through which remote attackers can steal system information.[171] |
| S1012 | PowerLess |
PowerLess has the ability to exfiltrate data, including Chrome and Edge browser database files, from compromised machines.[172] |
| S0194 | PowerSploit |
PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.[173][174] |
| S0223 | POWERSTATS |
POWERSTATS can upload files from compromised hosts.[175] |
| S0238 | Proxysvc | |
| S0197 | PUNCHTRACK |
PUNCHTRACK scrapes memory for properly formatted payment card data.[177][178] |
| S0650 | QakBot |
QakBot can use a variety of commands, including esentutl.exe to steal sensitive data from Internet Explorer and Microsoft Edge, to acquire information that is subsequently exfiltrated.[179][180] |
| S0262 | QuasarRAT |
QuasarRAT can retrieve files from compromised client machines.[181] |
| S0686 | QuietSieve |
QuietSieve can collect files from a compromised host.[182] |
| S1148 | Raccoon Stealer |
Raccoon Stealer collects data from victim machines based on configuration information received from command and control nodes.[183][184] |
| S0629 | RainyDay |
RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.[150] |
| S0458 | Ramsay |
Ramsay can collect Microsoft Word documents from the target's file system, as well as |
| S1113 | RAPIDPULSE |
RAPIDPULSE retrieves files from the victim system via encrypted commands sent to the web shell.[187] |
| S0169 | RawPOS |
RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.[188][189][190] |
| S0662 | RCSession |
RCSession can collect data from a compromised host.[191][54] |
| G1039 | RedCurl |
RedCurl has collected data from the local disk of compromised hosts.[192][193] |
| S1240 | RedLine Stealer |
RedLine Stealer has collected data stored locally including chat logs and files associated with chat services such as Steam, Discord, and Telegram.[194] |
| S0448 | Rising Sun |
Rising Sun has collected data and files from a compromised host.[195] |
| S0240 | ROKRAT |
ROKRAT can collect host data and specific file types.[196][197][198] |
| S0090 | Rover |
Rover searches for files on local drives based on a predefined list of file extensions.[199] |
| S1018 | Saint Bot |
Saint Bot can collect files and information from a compromised host.[200] |
| S1099 | Samurai |
Samurai can leverage an exfiltration module to download arbitrary files from compromised machines.[201] |
| G0034 | Sandworm Team |
Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.[202] |
| S1085 | Sardonic |
Sardonic has the ability to collect data from a compromised machine to deliver to the attacker.[203] |
| S0461 | SDBbot |
SDBbot has the ability to access the file system on a compromised host.[204] |
| C0058 | SharePoint ToolShell Exploitation |
During SharePoint ToolShell Exploitation, threat actors extracted information from the compromised systems.[205][206][207][208] |
| S1019 | Shark | |
| S1089 | SharpDisco |
SharpDisco has dropped a recent-files stealer plugin to |
| S0444 | ShimRat |
ShimRat has the capability to upload collected files to a C2.[210] |
| S0610 | SideTwist |
SideTwist has the ability to upload files from a compromised host.[211] |
| S1110 | SLIGHTPULSE |
SLIGHTPULSE can read files specified on the local system.[212] |
| S0533 | SLOTHFULMEDIA |
SLOTHFULMEDIA has uploaded files and information from victim machines.[213] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 extracted files from compromised networks.[214] |
| S0615 | SombRAT |
SombRAT has collected data and files from a compromised host.[59][215] |
| S0646 | SpicyOmelette |
SpicyOmelette has collected data and other information from a compromised host.[216] |
| S1037 | STARWHALE |
STARWHALE can collect data from an infected local host.[217] |
| S1200 | StealBit |
StealBit can upload data and files to the LockBit victim-shaming site.[218][219] |
| G0038 | Stealth Falcon |
Stealth Falcon malware gathers data from the local victim system.[220] |
| S1034 | StrifeWater |
StrifeWater can collect data from a compromised host.[221] |
| S0559 | SUNBURST |
SUNBURST collected information from a compromised host.[222][223] |
| S1064 | SVCReady | |
| S0663 | SysUpdate |
SysUpdate can collect information and files from a compromised host.[225] |
| S0011 | Taidoor |
Taidoor can upload data and files from a victim's machine.[226] |
| S0467 | TajMahal |
TajMahal has the ability to steal documents from the local system including the print spooler queue.[227] |
| G0027 | Threat Group-3390 |
Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.[228] |
| S0665 | ThreatNeedle |
ThreatNeedle can collect data and files from a compromised host.[129] |
| S0668 | TinyTurla | |
| G1022 | ToddyCat |
ToddyCat has run scripts to collect documents from targeted hosts.[132] |
| S0671 | Tomiris |
Tomiris has the ability to collect recent files matching a hardcoded list of extensions prior to exfiltration.[230] |
| S0266 | TrickBot |
TrickBot collects local files and information from the victim’s local machine.[231] |
| S1196 | Troll Stealer |
Troll Stealer gathers information from infected systems such as SSH information from the victim's |
| G0010 | Turla |
Turla RPC backdoors can upload files from victim machines.[234] |
| S0022 | Uroburos |
Uroburos can use its |
| S0386 | Ursnif |
Ursnif has collected files from victim machines, including certificates and cookies.[236] |
| S0452 | USBferry |
USBferry can collect information from an air-gapped host machine.[237] |
| G1017 | Volt Typhoon |
Volt Typhoon has stolen files from a sensitive file server and the Active Directory database from targeted environments, and used Wevtutil to extract event log information.[238][239][240] |
| S0670 | WarzoneRAT |
WarzoneRAT can collect data from a compromised host.[241] |
| S0515 | WellMail | |
| S0514 | WellMess |
WellMess can send files from the victim machine to C2.[243][244] |
| S0645 | Wevtutil |
Wevtutil can be used to export events from a specific log.[245][246] |
| G0124 | Windigo |
Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.[247] |
| G0102 | Wizard Spider |
Wizard Spider has collected data from a compromised host prior to exfiltration.[248] |
| S1065 | Woody RAT |
Woody RAT can collect information from a compromised host.[249] |
| S0653 | xCaon | |
| S0658 | XCSSET |
XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders.[250] |
| S0248 | yty |
yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.[251] |
| S0672 | Zox |
Zox has the ability to upload files from a targeted system.[21] |
| S0412 | ZxShell | |
| S1013 | ZxxZ |
| ID | Mitigation | Description |
|---|---|---|
| M1057 | Data Loss Prevention |
Data loss prevention can restrict access to sensitive data and detect sensitive data that is unencrypted. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0380 | Detection of Local Data Collection Prior to Exfiltration | AN1070 |
Adversaries collecting local files via PowerShell, WMI, or direct file API calls often include recursive file listings, targeted file reads, and temporary file staging. |
| AN1071 |
Adversaries using bash scripts or tools to recursively enumerate user home directories, config files, or SSH keys. |
||
| AN1072 |
Adversary use of bash/zsh or AppleScript to locate files and exfil targets like user keychains or documents. |
||
| AN1073 |
Collection of device configuration via CLI commands (e.g., |
||
| AN1074 |
Adversaries accessing datastore or configuration files via |