S0065 4H RAT

4H RAT sends an OS version identifier in its beacons.[7]

S1028 Action RAT

Action RAT has the ability to collect the hostname, OS version, and OS architecture of an infected host.[8]

G0018 admin@338

admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: ver >> %temp%\download systeminfo >> %temp%\download[9]

S0045 ADVSTORESHELL

ADVSTORESHELL can run Systeminfo to gather information about the victim.[10][11]

S0331 Agent Tesla

Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system.[12][13][14]

S1129 Akira

Akira uses the GetSystemInfo Windows function to determine the number of processors on a victim machine.[15]

S1025 Amadey

Amadey has collected the computer name and OS version from a compromised machine.[16][17]

S0504 Anchor

Anchor can determine the hostname and linux version on a compromised host.[18]

S0584 AppleJeus

AppleJeus has collected the victim host information after infection.[19]

S0622 AppleSeed

AppleSeed can identify the OS version of a targeted system.[20]

G0026 APT18

APT18 can collect system information from the victim’s machine.[21]

G0073 APT19

APT19 collected system architecture information. APT19 used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine.[22][23]

G0022 APT3

APT3 has a tool that can obtain information about the local system.[24][25]

G0050 APT32

APT32 has collected the OS version and computer name from victims. One of the group's backdoors can also query the Windows Registry to gather system information, and another macOS backdoor performs a fingerprint of the machine on its first connection to the C&C server. APT32 executed shellcode to identify the name of the infected host.[26][27][28][29]

G0067 APT37

APT37 collects the computer name, the BIOS model, and execution path.[30]

G0082 APT38

APT38 has attempted to get detailed information about a compromised host, including the operating system, version, patches, hotfixes, and service packs.[31]

G0096 APT41

APT41 uses multiple built-in commands such as systeminfo and net config Workstation to enumerate victim system basic configuration information.[32]

G0143 Aquatic Panda

Aquatic Panda has used native OS commands to understand privilege levels and system details.[33]

S0456 Aria-body

Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host.[34]

S0373 Astaroth

Astaroth collects the machine name and keyboard language from the system. [35][36]

S1087 AsyncRAT

AsyncRAT can check the disk size through the values obtained with DeviceInfo.[37]

S0438 Attor

Attor monitors the free disk space on the system.[38]

S1029 AuTo Stealer

AuTo Stealer has the ability to collect the hostname and OS information from an infected host.[8]

S0473 Avenger

Avenger has the ability to identify the host volume ID and the OS architecture on a compromised host.[39]

S0344 Azorult

Azorult can collect the machine information, system architecture, the OS version, computer name, Windows product name, the number of CPU cores, video card information, and the system language.[40][41]

S0638 Babuk

Babuk can enumerate disk volumes, get disk information, and query service status.[42]

S0414 BabyShark

BabyShark has executed the ver command.[43]

S0475 BackConfig

BackConfig has the ability to gather the victim's computer name.[44]

S0093 Backdoor.Oldrea

Backdoor.Oldrea collects information about the OS and computer name.[45][46]

S0031 BACKSPACE

During its initial execution, BACKSPACE extracts operating system information from the infected host.[47]

S0245 BADCALL

BADCALL collects the computer name and host name on the compromised system.[48]

S0642 BADFLICK

BADFLICK has captured victim computer name, memory space, and CPU details.[49]

S1081 BADHATCH

BADHATCH can obtain current system information from a compromised machine such as the SHELL PID, PSVERSION, HOSTNAME, LOGONSERVER, LASTBOOTUP, drive information, OS type/version, bitness, and hostname.[50][51]

S0337 BadPatch

BadPatch collects the OS system, OS version, MAC address, and the computer name from the victim’s machine.[52]

S0234 Bandook

Bandook can collect information about the drives available on the system.[53]

S0239 Bankshot

Bankshot gathers system information, network addresses, disk type, disk free space, and the operation system version.[54][55]

S0534 Bazar

Bazar can fingerprint architecture, computer name, and OS version on the compromised host. Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found.[56][57]

S0017 BISCUIT

BISCUIT has a command to collect the processor type, operation system, computer name, and whether the system is a laptop or PC.[58]

S0268 Bisonal

Bisonal has used commands and API calls to gather system information.[59][60][61]

S1070 Black Basta

Black Basta can enumerate volumes and collect system boot configuration and CPU information.[62][63]

S1068 BlackCat

BlackCat can obtain the computer name and UUID, and enumerate local drives.[64]

S0089 BlackEnergy

BlackEnergy has used Systeminfo to gather the OS version, as well as information on the system configuration, BIOS, the motherboard, and the processor.[65][66]

S0564 BlackMould

BlackMould can enumerate local drives on a compromised host.[67]

S0520 BLINDINGCAN

BLINDINGCAN has collected from a victim machine the system name, processor information, OS version, and disk information, including type and free space available.[68]

G0108 Blue Mockingbird

Blue Mockingbird has collected hardware details for the victim's system, including CPU and memory information.[69]

S0657 BLUELIGHT

BLUELIGHT has collected the computer name and OS version from victim machines.[70]

S0486 Bonadan

Bonadan has discovered the OS version, CPU model, and RAM size of the system it has been installed on.[71]

S0635 BoomBox

BoomBox can enumerate the hostname, domain, and IP of a compromised host.[72]

S0252 Brave Prince

Brave Prince collects hard drive content and system configuration information.[73]

S0043 BUBBLEWRAP

BUBBLEWRAP collects system information, including the operating system version and hostname.[9]

S0471 build_downer

build_downer has the ability to send system volume information to C2.[39]

S1039 Bumblebee

Bumblebee can enumerate the OS version and domain on a targeted system.[74][75][76]

S0482 Bundlore

Bundlore will enumerate the macOS version to determine which follow-on behaviors to execute using /usr/bin/sw_vers -productVersion.[77][3]

C0017 C0017

During C0017, APT41 issued ping -n 1 ((cmd /c dir c:\|findstr Number).split()[-1]+ commands to find the volume serial number of compromised systems.[78]

S0693 CaddyWiper

CaddyWiper can use DsRoleGetPrimaryDomainInformation to determine the role of the infected machine. CaddyWiper can also halt execution if the compromised host is identified as a domain controller.[79][80]

S0454 Cadelspy

Cadelspy has the ability to discover information about the compromised host.[81]

S0351 Cannon

Cannon can gather system information from the victim’s machine such as the OS version, machine name, and drive information.[82][83]

S0484 Carberp

Carberp has collected the operating system version from the infected system.[84]

S0348 Cardinal RAT

Cardinal RAT can collect the hostname, Microsoft Windows version, and processor architecture from a victim machine.[85]

S0462 CARROTBAT

CARROTBAT has the ability to determine the operating system of the compromised host and whether Windows is being run with x86 or x64 architecture.[86][87]

S0572 Caterpillar WebShell

Caterpillar WebShell has a module to gather information from the compromrised asset, including the computer version, computer name, IIS version, and more.[88]

S0631 Chaes

Chaes has collected system information, including the machine name and OS version.[89]

S0674 CharmPower

CharmPower can enumerate the OS version and computer name on a targeted system.[90]

S0144 ChChes

ChChes collects the victim hostname, window resolution, and Microsoft Windows version.[91][92]

G0114 Chimera

Chimera has used fsutil fsinfo drives, systeminfo, and vssadmin list shadows for system information including shadow volumes and drive information.[93]

S0667 Chrommme

Chrommme has the ability to list drives and obtain the computer name of a compromised host.[94]

S0660 Clambling

Clambling can discover the hostname, computer name, and Windows version of a targeted machine.[95][96]

S0106 cmd

cmd can be used to find information about the operating system.[97]

S0244 Comnie

Comnie collects the hostname of the victim machine.[98]

G0142 Confucius

Confucius has used a file stealer that can examine system drives, including those other than the C drive.[99]

S0137 CORESHELL

CORESHELL collects hostname, volume serial number and OS version data from the victim and sends the information to its C2 server.[100]

S1155 Covenant

Covenant implants can gather basic information on infected systems.[101]

S0046 CozyCar

A system info module in CozyCar gathers information on the victim host’s configuration.[102]

S0488 CrackMapExec

CrackMapExec can enumerate the system drives and associated system name.[103]

S0115 Crimson

Crimson contains a command to collect the victim PC name, disk drive information, and operating system.[104][105][106]

S0625 Cuba

Cuba can enumerate local drives, disk type, and disk free space.[107]

S1153 Cuckoo Stealer

Cuckoo Stealer can gather information about the OS version and hardware on compromised hosts.[108][109]

G1012 CURIUM

CURIUM deploys information gathering tools focused on capturing IP configuration, running application, system information, and network connectivity information.[110]

C0029 Cutting Edge

During Cutting Edge, threat actors used the ENUM4LINUX Perl script for discovery on Windows and Samba hosts.[111]

S0687 Cyclops Blink

Cyclops Blink has the ability to query device information.[112]

G1034 Daggerfly

Daggerfly utilizes victim machine operating system information to create custom User Agent strings for subsequent command and control communication.[113]

S0334 DarkComet

DarkComet can collect the computer name, RAM used, and operating system version from the victim’s machine.[114][115]

S1111 DarkGate

DarkGate uses the Delphi methods Sysutils::DiskSize and GlobalMemoryStatusEx to collect disk size and physical memory as part of the malware's anti-analysis checks for running in a virtualized environment.[116] DarkGate will gather various system information such as display adapter description, operating system type and version, processor type, and RAM amount.[116]

G0012 Darkhotel

Darkhotel has collected the hostname, OS version, service pack version, and the processor architecture from the victim’s machine.[117][118]

S1066 DarkTortilla

DarkTortilla can obtain system information by querying the Win32_ComputerSystem, Win32_BIOS, Win32_MotherboardDevice, Win32_PnPEntity, and Win32_DiskDrive WMI objects.[119]

S0673 DarkWatchman

DarkWatchman can collect the OS version, system architecture, and computer name.[120]

S1052 DEADEYE

DEADEYE can enumerate a victim computer's volume serial number and host name.[78]

S0616 DEATHRANSOM

DEATHRANSOM can enumerate logical drives on a target system.[121]

S0354 Denis

Denis collects OS information and the computer name from the victim’s machine.[122][123]

S0021 Derusbi

Derusbi gathers the name of the local host, version of GNU Compiler Collection (GCC), and the system information about the CPU, machine, and operating system.[124]

S0659 Diavol

Diavol can collect the computer name and OS version from the system.[125]

S0472 down_new

down_new has the ability to identify the system volume information of a compromised host.[39]

S0186 DownPaper

DownPaper collects the victim host name and serial number, and then sends the information to the C2 server.[126]

S0384 Dridex

Dridex has collected the computer name and OS architecture information from the system.[127]

S0547 DropBook

DropBook has checked for the presence of Arabic language in the infected machine's settings.[128]

S0105 dsquery

dsquery has the ability to enumerate various information, such as the operating system and host name, for systems within a domain.[78]

S0567 Dtrack

Dtrack can collect the victim's computer name, hostname and adapter information to create a unique identifier.[129][130]

S1159 DUSTTRAP

DUSTTRAP reads the value of the infected system's HKLM\SYSTEM\Microsoft\Cryptography\MachineGUID value.[131]

S0062 DustySky

DustySky extracts basic information about the operating system.[132]

S0024 Dyre

Dyre has the ability to identify the computer name, OS version, and hardware configuration on a compromised host.[133]

S0554 Egregor

Egregor can perform a language check of the infected system and can query the CPU information (cupid).[134][135]

S0081 Elise

Elise executes systeminfo after initial communication is made to the remote server.[136]

S0082 Emissary

Emissary has the capability to execute ver and systeminfo commands.[137]

S0363 Empire

Empire can enumerate host system information like OS, architecture, domain name, applied patches, and more.[138][139]

S0634 EnvyScout

EnvyScout can determine whether the ISO payload was received by a Windows or iOS device.[72]

S0091 Epic

Epic collects the OS version, hardware information, computer name, available system memory status, disk space information, and system and user language settings.[140]

S0568 EVILNUM

EVILNUM can obtain the computer name from the victim's system.[141]

S0569 Explosive

Explosive has collected the computer name from the infected host.[142]

S0181 FALLCHILL

FALLCHILL can collect operating system (OS) version information, processor information, system name, and information about installed disks from the victim.[143]

S0512 FatDuke

FatDuke can collect the user name, Windows version, computer name, and available space on discs from a compromised host.[144]

S0171 Felismus

Felismus collects the system information, including hostname and OS version, and sends it to the C2 server.[145]

S0267 FELIXROOT

FELIXROOT collects the victim’s computer name, processor architecture, OS version, volume serial number, and system type.[146][147]

S0679 Ferocious

Ferocious can use GET.WORKSPACE in Microsoft Excel to determine the OS version of the compromised host.[148]

G1016 FIN13

FIN13 has collected local host information by utilizing Windows commands systeminfo, fsutil, and fsinfo. FIN13 has also utilized a compromised Symantex Altiris console and LanDesk account to retrieve host information.[149][150]

G0061 FIN8

FIN8 has used PowerShell Scripts to check the architecture of a compromised machine before the selection of a 32-bit or 64-bit version of a malicious .NET loader.[151]

S0355 Final1stspy

Final1stspy obtains victim Microsoft Windows version information and CPU architecture.[152]

S0182 FinFisher

FinFisher checks if the victim OS is 32 or 64-bit.[153][154]

S0381 FlawedAmmyy

FlawedAmmyy can collect the victim's operating system and computer name during the initial infection.[155]

C0001 Frankenstein

During Frankenstein, the threat actors used Empire to obtain the compromised machine's name.[139]

S1044 FunnyDream

FunnyDream can enumerate all logical drives on a targeted machine.[156]

C0007 FunnyDream

During FunnyDream, the threat actors used Systeminfo to collect information on targeted hosts.[156]

S0410 Fysbis

Fysbis has used the command ls /etc | egrep -e"fedora*|debian*|gentoo*|mandriva*|mandrake*|meego*|redhat*|lsb-*|sun-*|SUSE*|release" to determine which Linux OS version is running.[157]

G0047 Gamaredon Group

A Gamaredon Group file stealer can gather the victim's computer name and drive serial numbers to send to a C2 server.[158][159][160]

S0666 Gelsemium

Gelsemium can determine the operating system and whether a targeted machine has a 32 or 64 bit architecture.[94]

S0460 Get2

Get2 has the ability to identify the computer name and Windows version of an infected host.[161]

S0032 gh0st RAT

gh0st RAT has gathered system architecture, processor, OS configuration, and installed hardware information.[162]

S0249 Gold Dragon

Gold Dragon collects endpoint information using the systeminfo command.[73]

S0493 GoldenSpy

GoldenSpy has gathered operating system information.[163]

S1138 Gootloader

Gootloader can inspect the User-Agent string in GET request header information to determine the operating system of targeted systems.[164]

S0531 Grandoreiro

Grandoreiro can collect the computer name and OS version from a compromised host.[165]

S0237 GravityRAT

GravityRAT collects the MAC address, computer name, and CPU information.[166]

S0690 Green Lambert

Green Lambert can use uname to identify the operating system name, version, and processor type.[167][168]

S0417 GRIFFON

GRIFFON has used a reconnaissance module that can be used to retrieve information about a victim's computer, including the resolution of the workstation .[169]

S0632 GrimAgent

GrimAgent can collect the OS, and build version on a compromised host.[170]

S0151 HALFBAKED

HALFBAKED can obtain information about the OS, processor, and BIOS.[171]

S0214 HAPPYWORK

can collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path.[172]

S0391 HAWKBALL

HAWKBALL can collect the OS version, architecture information, and computer name.[173]

S0617 HELLOKITTY

HELLOKITTY can enumerate logical drives on a target system.[121]

S0697 HermeticWiper

HermeticWiper can determine the OS version, bitness, and enumerate physical drives on a targeted host.[174][175][176][177]

G1001 HEXANE

HEXANE has collected the hostname of a compromised machine.[178]

S1027 Heyoka Backdoor

Heyoka Backdoor can enumerate drives on a compromised host.[179]

G0126 Higaisa

Higaisa collected the system volume serial number, GUID, and computer name.[180][181]

S0601 Hildegard

Hildegard has collected the host's OS, CPU, and memory information.[182]

S0376 HOPLIGHT

HOPLIGHT has been observed collecting victim machine information like OS version, volume information, and more.[183]

S0431 HotCroissant

HotCroissant has the ability to determine if the current user is an administrator, Windows product name, processor name, screen resolution, and physical RAM of the infected host.[184]

S0203 Hydraq

Hydraq creates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed.[185]

S1022 IceApple

The IceApple Server Variable Dumper module iterates over all server variables present for the current request and returns them to the adversary.[186]

S0483 IcedID

IcedID has the ability to identify the computer name and OS version on a compromised host.[187][188]

S1152 IMAPLoader

IMAPLoader uses WMI queries to gather information about the victim machine.[189]

S1139 INC Ransomware

INC Ransomware can discover and mount hidden drives to encrypt them.[190]

G0100 Inception

Inception has used a reconnaissance module to gather information about the operating system and hardware on the infected host.[191]

S0604 Industroyer

Industroyer collects the victim machine’s Windows GUID.[192]

S0259 InnaputRAT

InnaputRAT gathers volume drive information and system information.[193]

S0260 InvisiMole

InvisiMole can gather information on the mapped drives, OS version, computer name, DEP policy, memory size, and system volume serial number.[194][195]

S0015 Ixeshe

Ixeshe collects the computer name of the victim's system during the initial infection.[196]

S0044 JHUHUGIT

JHUHUGIT obtains a build identifier as well as victim hard drive information from Windows registry key HKLM\SYSTEM\CurrentControlSet\Services\Disk\Enum. Another JHUHUGIT variant gathers the victim storage volume serial number and the storage device name.[197][198]

S0201 JPIN

JPIN can obtain system information such as OS version and disk space.[199]

S0283 jRAT

jRAT collects information about the OS (version, build type, install date) as well as system up-time upon receiving a connection from a backdoor.[200]

S0215 KARAE

KARAE can collect system information.[172]

S0088 Kasidet

Kasidet has the ability to obtain a victim's system name and operating system version.[201]

S0265 Kazuar

Kazuar gathers information on the system and local drives.[202]

G0004 Ke3chang

Ke3chang performs operating system information discovery using systeminfo and has used implants to identify the system language and computer name.[203][204][205]

S0585 Kerrdown

Kerrdown has the ability to determine if the compromised host is running a 32 or 64 bit OS architecture.[206]

S0487 Kessel

Kessel has collected the system architecture, OS version, and MAC address information.[71]

S1020 Kevin

Kevin can enumerate the OS version and hostname of a targeted machine.[178]

S0387 KeyBoy

KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.[207][208]

S0271 KEYMARBLE

KEYMARBLE has the capability to collect the computer name, language settings, the OS version, CPU information, disk devices, and time elapsed since system start.[209]

S0526 KGH_SPY

KGH_SPY can collect drive information from a compromised host.[210]

S0607 KillDisk

KillDisk retrieves the hard disk name by calling the CreateFileA to \.\PHYSICALDRIVE0 API.[211]

G0094 Kimsuky

Kimsuky has enumerated drives, OS type, OS version, and other information using a script or the "systeminfo" command.[212][213]

S0250 Koadic

Koadic can obtain the OS version and build, computer name, and processor architecture from a compromised host.[214]

S0641 Kobalos

Kobalos can record the hostname and kernel version of the target machine.[215]

S0669 KOCTOPUS

KOCTOPUS has checked the OS version using wmic.exe and the find command.[214]

S0156 KOMPROGO

KOMPROGO is capable of retrieving information about the infected system.[216]

S0356 KONNI

KONNI can gather the OS version, architecture information, connected drives, hostname, RAM size, and disk space information from the victim’s machine and has used cmd /c systeminfo command to get a snapshot of the current system state of the target machine.[217][218][219]

S1075 KOPILUWAK

KOPILUWAK can discover logical drive information on compromised hosts.[220]

C0035 KV Botnet Activity

KV Botnet Activity includes use of native system tools, such as uname, to obtain information about victim device architecture, as well as gathering other system information such as the victim's hosts file and CPU utilization.[221]

S0236 Kwampirs

Kwampirs collects OS version information such as registered owner details, manufacturer details, processor type, available storage, installed patches, hostname, version info, system date, and other system information by using the commands systeminfo, net config workstation, hostname, ver, set, and date /t.[222]

S1160 Latrodectus

Latrodectus can gather operating system information.[223][224][224][225]

G0032 Lazarus Group

Several Lazarus Group malware families collect information on the type and version of the victim OS, as well as the victim computer name and CPU information. A Destover-like variant used by Lazarus Group also collects disk space information and sends it to its C2 server.[226][227][228][229][230][231]

S0395 LightNeuron

LightNeuron gathers the victim computer name using the Win32 API call GetComputerName.[232]

S0211 Linfo

Linfo creates a backdoor through which remote attackers can retrieve system information.[233]

S0513 LiteDuke

LiteDuke can enumerate the CPUID and BIOS version on a compromised system.[144]

S0680 LitePower

LitePower has the ability to list local drives and enumerate the OS architecture.[148]

S1121 LITTLELAMB.WOOLTEA

LITTLELAMB.WOOLTEA can check the type of Ivanti VPN device it is running on by executing first_run() to identify the first four bytes of the motherboard serial number.[234]

S0681 Lizar

Lizar can collect the computer name from the machine,.[235]

S0447 Lokibot

Lokibot has the ability to discover the computer name and Windows product name/version.[236]

S0451 LoudMiner

LoudMiner has monitored CPU usage.[237]

S0532 Lucifer

Lucifer can collect the computer name, system architecture, default language, and processor frequency of a compromised host.[238]

S1142 LunarMail

LunarMail can capture environmental variables on compromised hosts.[239]

S1141 LunarWeb

LunarWeb can use WMI queries and shell commands such as systeminfo.exe to collect the operating system, BIOS version, and domain name of the targeted system.[239]

S0409 Machete

Machete collects the hostname of the target computer.[240]

S1016 MacMa

MacMa can collect information about a compromised computer, including: Hardware UUID, Mac serial number, macOS version, and disk sizes.[241]

S1048 macOS.OSAMiner

macOS.OSAMiner can gather the device serial number and has checked to ensure there is enough disk space using the Unix utility df.[242]

S1060 Mafalda

Mafalda can collect the computer name and enumerate all drives on a compromised host.[243][244]

G0059 Magic Hound

Magic Hound malware has used a PowerShell command to check the victim system architecture to determine if it is an x64 machine. Other malware has obtained the OS version, UUID, and computer/host name to send to the C2 server.[245][246][247]

G1026 Malteiro

Malteiro collects the machine information, system architecture, the OS version, computer name, and Windows product name.[248]

S1156 Manjusaka

Manjusaka performs basic system profiling actions to fingerprint and register the victim system with the C2 controller.[249]

S0652 MarkiRAT

MarkiRAT can obtain the computer name from a compromised host.[250]

S0449 Maze

Maze has checked the language of the infected system using the "GetUSerDefaultUILanguage" function.[251]

S1059 metaMain

metaMain can collect the computer name from a compromised host.[244]

S0455 Metamorfo

Metamorfo has collected the hostname and operating system version from the compromised host.[252][253][254]

S0688 Meteor

Meteor has the ability to discover the hostname of a compromised host.[255]

S0339 Micropsia

Micropsia gathers the hostname and OS version from the victim’s machine.[256][257]

S1015 Milan

Milan can enumerate the targeted machine's name and GUID.[258][259]

S0051 MiniDuke

MiniDuke can gather the hostname on a compromised machine.[144]

S0280 MirageFox

MirageFox can collect CPU and architecture information from the victim’s machine.[260]

S0084 Mis-Type

The initial beacon packet for Mis-Type contains the operating system version and file system of the victim.[261]

S0083 Misdat

The initial beacon packet for Misdat contains the operating system version of the victim.[261]

S1122 Mispadu

Mispadu collects the OS version, computer name, and language ID.[262]

S0079 MobileOrder

MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.[263]

S0553 MoleNet

MoleNet can collect information about the about the system.[128]

S1026 Mongall

Mongall can identify drives on compromised hosts and retrieve the hostname via gethostbyname.[179]

G1036 Moonstone Sleet

Moonstone Sleet has gathered information on victim systems.[264]

S0149 MoonWind

MoonWind can obtain the victim hostname, Windows version, RAM amount, number of drives, and screen resolution.[265]

S0284 More_eggs

More_eggs has the capability to gather the OS version and computer name.[266][267]

G1009 Moses Staff

Moses Staff collected information about the infected host, including the machine names and OS architecture.[268]

G0069 MuddyWater

MuddyWater has used malware that can collect the victim’s OS version and machine name.[269][270][271][272][273]

S0233 MURKYTOP

MURKYTOP has the capability to retrieve information about the OS.[274]

G0129 Mustang Panda

Mustang Panda has gathered system information using systeminfo.[275]

G1020 Mustard Tempest

Mustard Tempest has used implants to perform system reconnaissance on targeted systems.[276]

S0205 Naid

Naid collects a unique identifier (UID) from a compromised host.[277]

S0228 NanHaiShu

NanHaiShu can gather the victim computer name and serial number.[278]

S0247 NavRAT

NavRAT uses systeminfo on a victim’s machine.[279]

S0272 NDiskMonitor

NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel.[280]

S0630 Nebulae

Nebulae can discover logical drive information including the drive type, free space, and volume information.[281]

S0691 Neoichor

Neoichor can collect the OS version and computer name from a compromised host.[205]

S0457 Netwalker

Netwalker can determine the system architecture it is running on to choose which version of the DLL to use.[282]

S0198 NETWIRE

NETWIRE can discover and collect victim system information.[283]

S1147 Nightdoor

Nightdoor gathers information on the victim system such as CPU and Computer name as well as device drivers. Nightdoor can also collect information about disk drives, their total and free space, and file system type.[113]

S1100 Ninja

Ninja can obtain the computer name and information on the OS and physical drives from targeted hosts.[284][285]

S0385 njRAT

njRAT enumerates the victim operating system and computer name during the initial infection.[286]

S1107 NKAbuse

NKAbuse conducts multiple system checks and includes these in subsequent "heartbeat" messages to the malware's command and control server.[287]

S0353 NOKKI

NOKKI can gather information on drives and the operating system on the victim’s machine.[288]

S0644 ObliqueRAT

ObliqueRAT has the ability to check for blocklisted computer names on infected endpoints.[289]

S0346 OceanSalt

OceanSalt can collect the computer name from the system.[290]

S0340 Octopus

Octopus can collect system drive information, the computer name, the size of the disk, OS version, and OS architecture information.[291]

G0049 OilRig

OilRig has run hostname and systeminfo on a victim.[292][293][294][295]

S0439 Okrum

Okrum can collect computer name, locale information, and information about the OS and architecture.[296]

S0264 OopsIE

OopsIE checks for information on the CPU fan, temperature, mouse, hard disk, and motherboard as part of its anti-VM checks.[297]

C0012 Operation CuckooBees

During Operation CuckooBees, the threat actors used the systeminfo command to gather details about a compromised system.[298]

C0006 Operation Honeybee

During Operation Honeybee, the threat actors collected the computer name, OS, and other system information using cmd /c systeminfo > %temp%\ temp.ini.[299]

C0014 Operation Wocao

During Operation Wocao, threat actors discovered the local disks attached to the system and their hardware information including manufacturer and model, as well as the OS versions of systems connected to a targeted network.[300]

S0229 Orz

Orz can gather the victim OS version and whether it is 64 or 32 bit.[278]

S0165 OSInfo

OSInfo discovers information about the infected machine.[24]

S0402 OSX/Shlayer

OSX/Shlayer has collected the IOPlatformUUID, session UID, and the OS version using the command sw_vers -productVersion.[301][302]

S0352 OSX_OCEANLOTUS.D

OSX_OCEANLOTUS.D collects processor information, memory information, computer name, hardware UUID, serial number, and operating system version. OSX_OCEANLOTUS.D has used the ioreg command to gather some of this information.[303][304][3]

S0208 Pasam

Pasam creates a backdoor through which remote attackers can retrieve information such as hostname and free disk space.[305]

G0040 Patchwork

Patchwork collected the victim computer name, OS version, and architecture type and sent the information to its C2 server. Patchwork also enumerated all available drives on the victim's machine.[306][280]

S0556 Pay2Key

Pay2Key has the ability to gather the hostname of the victim machine.[307]

S0587 Penquin

Penquin can report the file system type and disk space of a compromised host to C2.[308]

S1145 Pikabot

Pikabot performs a variety of system checks and gathers system information, including commands such as whoami.[309][310]

S0048 PinchDuke

PinchDuke gathers system configuration information.[311]

S1031 PingPull

PingPull can retrieve the hostname of a compromised host.[312]

S0501 PipeMon

PipeMon can collect and send OS version and computer name as a part of its C2 beacon.[313]

S0124 Pisloader

Pisloader has a command to collect victim system information, including the system name and OS version.[314]

S0254 PLAINTEE

PLAINTEE collects general system enumeration data about the infected machine and checks the OS version.[315]

G1040 Play

Play has leveraged tools to enumerate system information.[316]

S0428 PoetRAT

PoetRAT has the ability to gather information about the compromised host.[317]

S0453 Pony

Pony has collected the Service Pack, language, and region information to send to the C2.[318]

S0216 POORAIM

POORAIM can identify system information, including battery status.[172]

S0378 PoshC2

PoshC2 contains modules, such as Get-ComputerInfo, for enumerating common system information.[319]

S0139 PowerDuke

PowerDuke has commands to get information about the victim's name, build, version, serial number, and memory usage.[320]

S0441 PowerShower

PowerShower has collected system information on the infected host.[321]

S0223 POWERSTATS

POWERSTATS can retrieve OS name/architecture and computer/domain name information from compromised hosts.[322][323]

S0184 POWRUNER

POWRUNER may collect information about the system by running hostname and systeminfo on a victim.[324]

S0113 Prikormka

A module in Prikormka collects information from the victim about Windows OS version, computer name, battery info, and physical memory.[325]

S0238 Proxysvc

Proxysvc collects the OS version, country name, MAC address, computer name, physical memory statistics, and volume information for all drives on the system.[230]

S0196 PUNCHBUGGY

PUNCHBUGGY can gather system information such as computer names.[326]

S0192 Pupy

Pupy can grab a system’s information including the OS version, architecture, etc.[327]

S0650 QakBot

QakBot can collect system information including the OS version and domain on a compromised host.[328][329][330][276]

S0262 QuasarRAT

QuasarRAT can gather system information from the victim’s machine including the OS type.[331]

S1148 Raccoon Stealer

Raccoon Stealer gathers information on infected systems such as operating system, processor information, RAM, and display information.[332][333]

S0458 Ramsay

Ramsay can detect system information--including disk names, total space, and remaining space--to create a hardware profile GUID which acts as a system identifier for operators.[334][335]

S1130 Raspberry Robin

Raspberry Robin performs several system checks as part of anti-analysis mechanisms, including querying the operating system build number, processor vendor and type, video controller, and CPU temperature.[336]

S0241 RATANKBA

RATANKBA gathers information about the OS architecture, OS name, and OS version/Service pack.[337][338]

S0662 RCSession

RCSession can gather system information from a compromised host.[339]

S0172 Reaver

Reaver collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information.[340]

G1039 RedCurl

RedCurl has collected information about the target system, such as system information and list of network connections.[341][342]

S0153 RedLeaves

RedLeaves can gather extended system information including the hostname, OS version number, platform, memory information, time elapsed since system startup, and CPU information.[92][343]

S0125 Remsec

Remsec can obtain the OS version information, computer name, processor architecture, machine role, and OS edition.[344]

S0379 Revenge RAT

Revenge RAT collects the CPU information, OS information, and system language.[345]

S0496 REvil

REvil can identify the username, machine name, system language, keyboard layout, OS version, and system drive information on a compromised host.[346][347][348][349][349][350][351][352]

S0433 Rifdoor

Rifdoor has the ability to identify the Windows version on the compromised host.[353]

S0448 Rising Sun

Rising Sun can detect the computer name, operating system, and drive information, including drive type, total number of bytes on disk, total number of free bytes on disk, and name of a specified volume.[354]

S1150 ROADSWEEP

ROADSWEEP can enumerate logical drives on targeted devices.[355][356]

G0106 Rocke

Rocke has used uname -m to collect the name and information about the infected system's kernel.[357]

S0270 RogueRobin

RogueRobin gathers BIOS versions and manufacturers, the number of CPU cores, the total physical memory, and the computer name.[358]

S0240 ROKRAT

ROKRAT can gather the hostname and the OS version to ensure it doesn’t run on a Windows XP or Windows Server 2003 systems.[359][360][361][362][363][364]

S1078 RotaJakiro

RotaJakiro executes a set of commands to collect device information, including uname. Another example is the cat /etc/*release | uniq command used to collect the current OS distribution.[365]

S1073 Royal

Royal can use GetNativeSystemInfo and GetLogicalDrives to enumerate system processors and logical drives.[366][367]

S0148 RTM

RTM can obtain the computer name, OS version, and default language identifier.[368]

S0253 RunningRAT

RunningRAT gathers the OS version, logical drives information, processor information, and volume information.[73]

S0446 Ryuk

Ryuk has called GetLogicalDrives to emumerate all mounted drives, and GetDriveTypeW to determine the drive type.[369]

S0085 S-Type

The initial beacon packet for S-Type contains the operating system version and file system of the victim.[261]

S1018 Saint Bot

Saint Bot can identify the OS version, CPU, and other details from a victim's machine.[370]

G0034 Sandworm Team

Sandworm Team used a backdoor to enumerate information about the infected system's operating system.[371][372]

S1085 Sardonic

Sardonic has the ability to collect the computer name, CPU manufacturer name, and C:\ drive serial number from a compromised machine. Sardonic also has the ability to execute the ver and systeminfo commands.[373]

S0461 SDBbot

SDBbot has the ability to identify the OS version, OS bit information and computer name.[161][16]

S0382 ServHelper

ServHelper will attempt to enumerate Windows version and system architecture.[374]

S0596 ShadowPad

ShadowPad has discovered system information including memory status, CPU frequency, OS versions, and volume serial numbers.[375]

S0140 Shamoon

Shamoon obtains the victim's operating system version and keyboard layout and sends the information to the C2 server.[376][377]

S1019 Shark

Shark can collect the GUID of a targeted machine.[258][259]

S1089 SharpDisco

SharpDisco can use a plugin to enumerate system drives.[378]

S0546 SharpStage

SharpStage has checked the system settings to see if Arabic is the configured language.[379]

S0450 SHARPSTATS

SHARPSTATS has the ability to identify the IP address, machine name, and OS of the compromised host.[323]

S0445 ShimRatReporter

ShimRatReporter gathered the operating system name and specific Windows version of an infected machine.[380]

S0217 SHUTTERSPEED

SHUTTERSPEED can collect system information.[172]

G1008 SideCopy

SideCopy has identified the OS version of a compromised host.[8]

S0610 SideTwist

SideTwist can collect the computer name of a targeted system.[295]

G0121 Sidewinder

Sidewinder has used tools to collect the computer name, OS version, installed hotfixes, as well as information regarding the memory and processor on a compromised host.[381][382]

S0692 SILENTTRINITY

SILENTTRINITY can collect information related to a compromised host, including OS version and a list of drives.[383]

S0468 Skidmap

Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use.[384]

S0533 SLOTHFULMEDIA

SLOTHFULMEDIA has collected system name, OS version, adapter information, memory usage, and disk information from a victim machine.[385]

S0218 SLOWDRIFT

SLOWDRIFT collects and sends system information to its C2.[172]

S0649 SMOKEDHAM

SMOKEDHAM has used the systeminfo command on a compromised host.[386]

S1086 Snip3

Snip3 has the ability to query Win32_ComputerSystem for system information. [387]

S1124 SocGholish

SocGholish has the ability to enumerate system information including the victim computer name.[388][389][390]

S0627 SodaMaster

SodaMaster can enumerate the host name and OS version on a target system.[391]

C0024 SolarWinds Compromise

During the SolarWinds Compromise, APT29 used fsutil to check available free space before executing actions that might create large files on disk.[392]

S0615 SombRAT

SombRAT can execute getinfo to enumerate the computer name and OS version of a compromised system.[393]

S0516 SoreFang

SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo.[394]

S0157 SOUNDBITE

SOUNDBITE is capable of gathering system information.[216]

G0054 Sowbug

Sowbug obtained OS version and hardware configuration from a victim.[395]

S0543 Spark

Spark can collect the hostname, keyboard layout, and language from the system.[396]

S0374 SpeakUp

SpeakUp uses the cat /proc/cpuinfo | grep -c "cpu family" 2>&1 command to gather system information. [397]

S0646 SpicyOmelette

SpicyOmelette can identify the system name of a compromised host.[398]

S1030 Squirrelwaffle

Squirrelwaffle has gathered victim computer information and configurations.[399]

S0058 SslMM

SslMM sends information to its hard-coded C2, including OS version, service pack information, processor speed, system name, and OS install date.[400]

S1037 STARWHALE

STARWHALE can gather the computer name of an infected host.[401][402]

G0038 Stealth Falcon

Stealth Falcon malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory.[403]

S0380 StoneDrill

StoneDrill has the capability to discover the system OS, Windows version, architecture and environment.[404]

S0142 StreamEx

StreamEx has the ability to enumerate system information.[405]

S1034 StrifeWater

StrifeWater can collect the OS version, architecture, and machine name to create a unique token for the infected host.[406]

S0491 StrongPity

StrongPity can identify the hard disk volume serial number on a compromised host.[407]

S0603 Stuxnet

Stuxnet collects system information including computer and domain names, OS version, and S7P paths.[408]

S0559 SUNBURST

SUNBURST collected hostname and OS version.[409][410]

S1064 SVCReady

SVCReady has the ability to collect information such as computer name, computer manufacturer, BIOS, operating system, and firmware, including through the use of systeminfo.exe.[411]

S0242 SynAck

SynAck gathers computer names, OS version info, and also checks installed keyboard layouts to estimate if it has been launched from a certain list of countries.[412]

S0060 Sys10

Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2.[400]

S0464 SYSCON

SYSCON has the ability to use Systeminfo to identify system information.[87]

S0096 Systeminfo

Systeminfo can be used to gather information about the operating system.[413]

S0663 SysUpdate

SysUpdate can collect a system's architecture, operating system version, hostname, and drive information.[414][415]

S0098 T9000

T9000 gathers and beacons the operating system build number and CPU Architecture (32-bit/64-bit) during installation.[416]

G1018 TA2541

TA2541 has collected system information prior to downloading malware on the targeted host.[417]

S0586 TAINTEDSCRIBE

TAINTEDSCRIBE can use DriveList to retrieve drive information.[418]

S0467 TajMahal

TajMahal has the ability to identify hardware information, the computer name, and OS information on an infected host.[419]

G0139 TeamTNT

TeamTNT has searched for system version, architecture, disk partition, logical volume, and hostname information.[420][421]

S0665 ThreatNeedle

ThreatNeedle can collect system profile information from a compromised host.[422]

G1022 ToddyCat

ToddyCat has collected information on bootable drives including model, vendor, and serial numbers.[285]

S0678 Torisma

Torisma can use GetlogicalDrives to get a bitmask of all drives available on a compromised system. It can also use GetDriveType to determine if a new drive is a CD-ROM drive.[423]

S0266 TrickBot

TrickBot gathers the OS version, machine name, CPU type, amount of RAM available, and UEFI/BIOS firmware information from the victim’s machine.[424][425][426][427]

S0094 Trojan.Karagany

Trojan.Karagany can capture information regarding the victim's OS, security, and hardware configuration.[428]

G0081 Tropic Trooper

Tropic Trooper has detected a target system’s OS version and system volume information.[429][430]

S0647 Turian

Turian can retrieve system information including OS version, memory usage, local hostname, and system adapter information.[431]

G0010 Turla

Turla surveys a system upon check-in to discover operating system configuration details using the systeminfo and set commands.[432][433]

S0199 TURNEDUP

TURNEDUP is capable of gathering system information.[434]

S0263 TYPEFRAME

TYPEFRAME can gather the disk volume information.[435]

S0130 Unknown Logger

Unknown Logger can obtain information about the victim computer name, physical memory, country, and date.[436]

S0275 UPPERCUT

UPPERCUT has the capability to gather the system’s hostname and OS version.[437]

S0022 Uroburos

Uroburos has the ability to gather basic system information and run the POSIX API gethostbyname.[438]

S0386 Ursnif

Ursnif has used Systeminfo to gather system information.[439]

S0476 Valak

Valak can determine the Windows version and computer name on a compromised host.[440][441]

S0257 VERMIN

VERMIN collects the OS name, machine name, and architecture information.[442]

S0180 Volgmer

Volgmer can gather system information, the computer name, OS version, drive and serial information from the victim's machine.[443][444][445]

G1017 Volt Typhoon

Volt Typhoon has discovered file system types, drive names, size, and free space on compromised systems.[446][447][448][449]

S0670 WarzoneRAT

WarzoneRAT can collect compromised host information, including OS version, PC name, RAM size, and CPU details.[450]

S0514 WellMess

WellMess can identify the computer name of a compromised host.[451][452]

S0689 WhisperGate

WhisperGate has the ability to enumerate fixed logical drives on a targeted system.[453]

G0124 Windigo

Windigo has used a script to detect which Linux distribution and version is currently installed on the system.[71]

S0155 WINDSHIELD

WINDSHIELD can gather the victim computer name.[216]

G0112 Windshift

Windshift has used malware to identify the computer name of a compromised host.[454]

S0219 WINERACK

WINERACK can gather information about the host.[172]

S0176 Wingbird

Wingbird checks the victim OS version after executing to determine where to drop files based on whether the victim is 32-bit or 64-bit.[455]

S0059 WinMM

WinMM collects the system name, OS version including service pack, and system install date and sends the information to the C2 server.[400]

S0141 Winnti for Windows

Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP.[456]

G1035 Winter Vivern

Winter Vivern script execution includes basic victim information gathering steps which are then transmitted to command and control servers.[457]

G0102 Wizard Spider

Wizard Spider has used Systeminfo and similar commands to acquire detailed configuration information of a victim's machine. Wizard Spider has also utilized the PowerShell cmdlet Get-ADComputer to collect DNS hostnames, last logon dates, and operating system information from Active Directory.[458][459]

S1065 Woody RAT

Woody RAT can retrieve the following information from an infected machine: OS, architecture, computer name, OS build version, environment variables, and storage drives.[460]

S0161 XAgentOSX

XAgentOSX contains the getInstalledAPP function to run ls -la /Applications to gather what applications are installed.[461]

S0658 XCSSET

XCSSET identifies the macOS version and uses ioreg to determine serial number.[462]

S0388 YAHOYAH

YAHOYAH checks for the system’s Windows OS version and hostname.[429]

S0248 yty

yty gathers the computer name, the serial number of the main disk volume, CPU information, Microsoft Windows version, and runs the command systeminfo.[463]

S0251 Zebrocy

Zebrocy collects the OS version, computer name and serial number for the storage volume C:. Zebrocy also runs the systeminfo command to gather system information. [464][82][465][83][466][467][468]

S1151 ZeroCleare

ZeroCleare can use the IOCTL_DISK_GET_DRIVE_GEOMETRY_EX, IOCTL_DISK_GET_DRIVE_GEOMETRY, and IOCTL_DISK_GET_LENGTH_INFO system calls to compute disk size.[355]

S0230 ZeroT

ZeroT gathers the victim's computer name, Windows version, and system language, and then sends it to its C2 server.[469]

S0330 Zeus Panda

Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system.[470][471]

G0128 ZIRCONIUM

ZIRCONIUM has used a tool to capture the processor architecture of a compromised host in order to register it with C2.[472]

S0086 ZLib

ZLib has the ability to enumerate system information.[261]

S0672 Zox

Zox can enumerate attached drives.[473]

S0350 zwShell

zwShell can obtain the victim PC name and OS version.[474]

S0412 ZxShell

ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory.[475]

S1013 ZxxZ

ZxxZ has collected the host name and operating system product name from a compromised machine.[476]