{"description": "Enterprise techniques used by POWRUNER, ATT&CK software S0184 (v1.1)", "name": "POWRUNER (S0184)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "17", "navigator": "5.1.0"}, "techniques": [{"techniqueID": "T1087", "showSubtechniques": true}, {"techniqueID": "T1087.002", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect user account information by running net user /domain or a series of other commands on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1071", "showSubtechniques": true}, {"techniqueID": "T1071.001", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) can use HTTP for C2 communications.(Citation: FireEye APT34 Dec 2017)(Citation: FireEye APT34 Webinar Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1071.004", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) can use DNS for C2 communications.(Citation: FireEye APT34 Dec 2017)(Citation: FireEye APT34 Webinar Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1059", "showSubtechniques": true}, {"techniqueID": "T1059.001", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) is written in PowerShell.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1059.003", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) can execute commands from its C2 server.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1132", "showSubtechniques": true}, {"techniqueID": "T1132.001", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) can use base64 encoded C2 communications.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1083", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may enumerate user directories on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1105", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) can download or upload files from its C2 server.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1069", "showSubtechniques": true}, {"techniqueID": "T1069.001", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect local group information by running net localgroup administrators or a series of other commands on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1069.002", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect domain group information by running net group /domain or a series of other commands on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1057", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect process information by running tasklist on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1012", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may query the Registry by running reg query on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1053", "showSubtechniques": true}, {"techniqueID": "T1053.005", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) persists through a scheduled task that executes it every minute.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1113", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) can capture a screenshot from a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1518", "showSubtechniques": true}, {"techniqueID": "T1518.001", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect information on the victim's anti-virus software.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1082", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect information about the system by running hostname and systeminfo on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1016", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect network configuration data by running ipconfig /all on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1049", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect active network connections by running netstat -an on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1033", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may collect information about the currently logged in user by running whoami on a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1047", "comment": "[POWRUNER](https://attack.mitre.org/software/S0184) may use WMI when collecting information about a victim.(Citation: FireEye APT34 Dec 2017)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by POWRUNER", "color": "#66b1ff"}]}