diff --git a/atomics/T1555.003/T1555.003.yaml b/atomics/T1555.003/T1555.003.yaml index 7125dc89..e84bd21e 100644 --- a/atomics/T1555.003/T1555.003.yaml +++ b/atomics/T1555.003/T1555.003.yaml @@ -387,6 +387,7 @@ atomic_tests: rm "/tmp/T1555.003_Login Data For Account" >/dev/null 2>&1 name: sh - name: WebBrowserPassView - Credentials from Browser + auto_generated_guid: e359627f-2d90-4320-ba5e-b0f878155bbe description: |- The following Atomic test utilizes WebBrowserPassView to extract passwords from browsers on a Window system. WebBrowserPassView is an open source application used to retrieve passwords stored on a local computer. Recently noticed as a tool used in the BlackCat Ransomware. supported_platforms: diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index faa42ef1..312ecd1c 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1083,3 +1083,4 @@ c375558d-7c25-45e9-bd64-7b23a97c1db0 146af1f1-b74e-4aa7-9895-505eb559b4b0 d2c9e41e-cd86-473d-980d-b6403562e3e1 71db768a-5a9c-4047-b5e7-59e01f188e84 +e359627f-2d90-4320-ba5e-b0f878155bbe