Home >
Enterprise >
Participants >
CrowdStrike >
Remote System Discovery (T1018)
|
|
Carbanak+FIN7 |
||||
Step | ATT&CK Pattern |
|
||
4.A.2
|
Tactic Discovery (TA0007) |
|
||
5.B.7
![]() |
Tactic Discovery (TA0007) |
|
||
6.A.2
|
Tactic Discovery (TA0007) |
|
||
15.A.8
|
Tactic Discovery (TA0007) |
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
8.A.1
|
Tactic Discovery (TA0007) |
|
||
16.A.1
|
Tactic Discovery (TA0007) |
|
APT3 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
4.A.1
|
Tactic Discovery (TA0007) |
|
||||||||
4.A.2
|
Tactic Discovery (TA0007) |
|
||||||||
13.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Cobalt Strike: 'net group \"Domain Controllers\" -domain' via cmd
Footnotes
- For any alert in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was shown to MITRE throughout the evaluation, though a screenshot was not specifically taken in this instance.


[2]


[3]


[4]


Procedure
Cobalt Strike: 'net group \"Domain Computers\" -domain' via cmd
Footnotes
- For any alert in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was shown to MITRE throughout the evaluation, though a screenshot was not specifically taken in this instance.


[2]


[3]


[4]

