From c548de6bfc5c994ccde3eb240fee59dce2ab7a4d Mon Sep 17 00:00:00 2001 From: Atomic Red Team GUID generator Date: Mon, 10 Apr 2023 19:23:28 +0000 Subject: [PATCH] Generate GUIDs from job=generate-docs branch=master [skip ci] --- atomics/T1612/T1612.yaml | 1 + atomics/used_guids.txt | 1 + 2 files changed, 2 insertions(+) diff --git a/atomics/T1612/T1612.yaml b/atomics/T1612/T1612.yaml index 752d760c..8828c2ca 100644 --- a/atomics/T1612/T1612.yaml +++ b/atomics/T1612/T1612.yaml @@ -2,6 +2,7 @@ attack_technique: T1612 display_name: "Build Image on Host" atomic_tests: - name: Build Image On Host + auto_generated_guid: 2db30061-589d-409b-b125-7b473944f9b3 description: Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. An adversary may take advantage of that build API to build a custom image on the host that includes malware downloaded from their C2 server, and then they then may utilize Deploy Container using that custom image. supported_platforms: - containers diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 9d7f4456..74e016bf 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1291,3 +1291,4 @@ c3a377f9-1203-4454-aa35-9d391d34768f fb4151a2-db33-4f8c-b7f8-78ea8790f961 adae83d3-0df6-45e7-b2c3-575f91584577 e3ad8e83-3089-49ff-817f-e52f8c948090 +2db30061-589d-409b-b125-7b473944f9b3