| ID | Name |
|---|---|
| T1087.001 | Local Account |
| T1087.002 | Domain Account |
| T1087.003 | Email Account |
| T1087.004 | Cloud Account |
Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.
Commands such as net user and net localgroup of the Net utility and id and groups on macOS and Linux can list local users and groups.[1][2][3] On Linux, local users can also be enumerated through the use of the /etc/passwd file. On macOS, the dscl . list /Users command can be used to enumerate local accounts. On ESXi servers, the esxcli system account list command can list local user accounts.[4]
| ID | Name | Description |
|---|---|---|
| G0018 | admin@338 |
admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: |
| S0331 | Agent Tesla |
Agent Tesla can collect account information from the victim’s machine.[6] |
| G0006 | APT1 |
APT1 used the commands |
| G0022 | APT3 |
APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.[7] |
| G0050 | APT32 |
APT32 enumerated administrative users using the commands |
| G0096 | APT41 |
APT41 used built-in |
| G1044 | APT42 |
APT42 has used the PowerShell-based POWERPOST script to collect local account names from the victim machine.[10] |
| S0239 | Bankshot |
Bankshot gathers domain and account names/information through process monitoring.[11] |
| S0534 | Bazar |
Bazar can identify administrator accounts on an infected host.[12] |
| S0570 | BitPaymer |
BitPaymer can enumerate the sessions for each user logged onto the infected host.[13] |
| S0521 | BloodHound |
BloodHound can identify users with local administrator rights.[14] |
| G0114 | Chimera | |
| S0244 | Comnie | |
| S0038 | Duqu |
The discovery modules used with Duqu can collect information on accounts and permissions.[17] |
| S1159 | DUSTTRAP | |
| S0081 | Elise |
Elise executes |
| S0363 | Empire |
Empire can acquire local and domain user account information.[20] |
| S0091 | Epic |
Epic gathers a list of all user accounts, privilege classes, and time of last logon.[21] |
| G0117 | Fox Kitten |
Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts.[22] |
| S0049 | GeminiDuke |
GeminiDuke collects information on local user accounts from the victim.[23] |
| S0537 | HyperStack |
HyperStack can enumerate all account names on a remote share.[24] |
| S1245 | InvisibleFerret |
InvisibleFerret has queried the victim device using Python scripts to obtain the User and Hostname.[25][26] |
| S0260 | InvisiMole |
InvisiMole has a command to list account information on the victim’s machine.[27] |
| S0265 | Kazuar |
Kazuar gathers information on local groups and members on the victim’s machine.[28] |
| G0004 | Ke3chang |
Ke3chang performs account discovery using commands such as |
| S0236 | Kwampirs |
Kwampirs collects a list of accounts with the command |
| G0030 | Lotus Blossom |
Lotus Blossom has used commands such as |
| G1051 | Medusa Group |
Medusa Group has leveraged |
| S1146 | MgBot |
MgBot includes modules for identifying local administrator accounts on victim systems.[33] |
| S1015 | Milan |
Milan has run |
| S0084 | Mis-Type |
Mis-Type may create a file containing the results of the command |
| G1009 | Moses Staff |
Moses Staff has collected the administrator username from a compromised host.[36] |
| S0233 | MURKYTOP |
MURKYTOP has the capability to retrieve information about users on remote hosts.[37] |
| S0039 | Net |
Commands under |
| G0049 | OilRig |
OilRig has run |
| C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors used the |
| S0165 | OSInfo | |
| S0598 | P.A.S. Webshell |
P.A.S. Webshell can display the /etc/passwd file on a compromised host.[41] |
| S1145 | Pikabot |
Pikabot will retrieve the name of the user associated with the thread under which the malware is executing.[42] |
| S0453 | Pony |
Pony has used the |
| G0033 | Poseidon Group |
Poseidon Group searches for administrator accounts on both the local victim machine and the network.[44] |
| S0378 | PoshC2 |
PoshC2 can enumerate local and domain user account information.[45] |
| S0194 | PowerSploit |
PowerSploit's |
| S0223 | POWERSTATS |
POWERSTATS can retrieve usernames from compromised hosts.[48] |
| S0196 | PUNCHBUGGY |
PUNCHBUGGY can gather user names.[49] |
| S0192 | Pupy |
Pupy uses PowerView and Pywerview to perform discovery commands such as net user, net group, net local group, etc.[50] |
| S1242 | Qilin |
Qilin can list all local users found on a targeted system.[51] |
| S1148 | Raccoon Stealer |
Raccoon Stealer checks the privileges of running processes to determine if the running user is equivalent to |
| S0241 | RATANKBA | |
| G1039 | RedCurl |
RedCurl has collected information about local accounts.[54][55] |
| S1240 | RedLine Stealer |
RedLine Stealer has collected account information from the victim’s machine.[56][57] |
| S0125 | Remsec | |
| S0085 | S-Type | |
| S0063 | SHOTPUT |
SHOTPUT has a command to retrieve information about connected users.[59] |
| S0649 | SMOKEDHAM |
SMOKEDHAM has used |
| S0516 | SoreFang |
SoreFang can collect usernames from the local system via |
| S0603 | Stuxnet | |
| G0027 | Threat Group-3390 |
Threat Group-3390 has used |
| S0266 | TrickBot | |
| G0010 | Turla |
Turla has used |
| S0452 | USBferry |
USBferry can use |
| S0476 | Valak |
Valak has the ability to enumerate local admin accounts.[69] |
| G1017 | Volt Typhoon |
Volt Typhoon has executed |
| ID | Mitigation | Description |
|---|---|---|
| M1028 | Operating System Configuration |
Prevent administrator accounts from being enumerated when an application is elevating through UAC since it can lead to the disclosure of account names. The Registry key is located at |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0303 | Local Account Enumeration Across Host Platforms | AN0846 |
Adversary enumeration of local user accounts using Net.exe, WMI, or PowerShell. |
| AN0847 |
Enumeration of local users or groups via file access (/etc/passwd) or commands like id, groups. |
||
| AN0848 |
Enumeration of macOS local users using dscl, id, dscacheutil, or /etc/passwd access. |
||
| AN0849 |
Enumeration of local ESXi accounts using esxcli or vSphere API from unauthorized sessions. |