diff --git a/atomics/T1610/T1610.yaml b/atomics/T1610/T1610.yaml index a3e92ff0..29044125 100644 --- a/atomics/T1610/T1610.yaml +++ b/atomics/T1610/T1610.yaml @@ -4,6 +4,7 @@ display_name: "Deploy a container" atomic_tests: - name: Deploy Docker container + auto_generated_guid: 59aa6f26-7620-417e-9318-589e0fb7a372 description: | Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime. They can do this using docker create and docker start commands. Kinsing & Doki was exploited using this technique. diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index e5923f94..0d965e65 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1209,3 +1209,4 @@ a547d1ba-1d7a-4cc5-a9cb-8d65e8809636 95408a99-4fa7-4cd6-a7ef-cb65f86351cf 082141ed-b048-4c86-99c7-2b8da5b5bf48 f89e58f9-2b49-423b-ac95-1f3e7cfd8277 +59aa6f26-7620-417e-9318-589e0fb7a372