prompt
stringclasses
508 values
procedure
stringlengths
20
478
Archive Collected Data
NETWIRE has the ability to compress archived screenshots.
Archive Collected Data
It encrypted the collected files' path with AES and then encoded them with base64.
Archive Collected Data
Pillowmint has encrypted stolen credit card information with AES and further encoded it with Base64.
Archive Collected Data
PowerLess can encrypt browser database files prior to exfiltration.
Archive Collected Data
After collecting documents from removable media, Prikormka compresses the collected files, and encrypts it with Blowfish.
Archive Collected Data
Proton zips up files before exfiltrating them.
Archive Collected Data
Remexi encrypts and adds all gathered browser data into files for upload to C2.
Archive Collected Data
RunningRAT contains code to compress files.
Archive Collected Data
ShimRatReporter used LZ compression to compress initial reconnaissance reports before sending to the C2.
Archive Collected Data
TAINTEDSCRIBE has used FileReadZipSend to compress a file and send to C2.
Archive Collected Data
VERMIN encrypts the collected files using 3-DES.
Archive Collected Data
WellMail can archive files on the compromised host.
Archive Collected Data
XCSSET will compress entire ~/Desktop folders excluding all .git folders, but only if the total data size is under 200MB.
Archive Collected Data
Zebrocy has used a method similar to RC4 as well as AES for encryption and hexadecimal for encoding data before exfiltration.
Archive Collected Data:Archive via Utility
AppleSeed can zip and encrypt data collected on a target system.
Archive Collected Data:Archive via Utility
It has used RAR to compress files before moving them outside of the victim network.
Archive Collected Data:Archive via Utility
It has used a variety of utilities, including WinRAR, to archive collected data with password protection.
Archive Collected Data:Archive via Utility
It has used tools to compress data before exfilling it.
Archive Collected Data:Archive via Utility
It has used WinRAR to compress data prior to exfil.
Archive Collected Data:Archive via Utility
It has used WinRAR and 7-Zip to compress an archive stolen data.
Archive Collected Data:Archive via Utility
It created a RAR archive of targeted files for exfiltration.
Archive Collected Data:Archive via Utility
It has used WinRAR to compress memory dumps prior to exfiltration.
Archive Collected Data:Archive via Utility
It has compressed data into password-protected RAR archives prior to exfiltration.
Archive Collected Data:Archive via Utility
During C0026, the threat actors used WinRAR to collect documents on targeted systems. The threat actors appeared to only exfiltrate files created after January 1, 2021.
Archive Collected Data:Archive via Utility
Calisto uses the zip -r command to compress the data collected on the local system.
Archive Collected Data:Archive via Utility
ccf32 has used xcopy \\<target_host>\c$\users\public\path.7z c:\users\public\bin\<target_host>.7z /H /Y to archive collected files.
Archive Collected Data:Archive via Utility
certutil may be used to Base64 encode collected data.
Archive Collected Data:Archive via Utility
It has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts.
Archive Collected Data:Archive via Utility
It uses ZPP, a .NET console program, to compress files with ZIP.
Archive Collected Data:Archive via Utility
CORALDECK has created password-protected RAR, WinImage, and zip archives to be exfiltrated.
Archive Collected Data:Archive via Utility
Crutch has used the WinRAR utility to compress and encrypt stolen files.
Archive Collected Data:Archive via Utility
Daserf hides collected data in password-protected .rar archives.
Archive Collected Data:Archive via Utility
DustySky can compress files via RAR while staging data to be exfiltrated.
Archive Collected Data:Archive via Utility
It has used WinRAR to compress stolen files into an archive prior to exfiltration.
Archive Collected Data:Archive via Utility
It has compressed the dump output of compromised credentials with a 7zip binary.
Archive Collected Data:Archive via Utility
It has used RAR to compress collected data before exfiltration.
Archive Collected Data:Archive via Utility
It has used 7-Zip to archive data.
Archive Collected Data:Archive via Utility
During FunnyDream, the threat actors used 7zr.exe to add collected files to an archive.
Archive Collected Data:Archive via Utility
It used WinRAR to compress and encrypt stolen data prior to exfiltration.
Archive Collected Data:Archive via Utility
It has used WinZip, likely to archive data prior to exfiltration.
Archive Collected Data:Archive via Utility
It has used 7-Zip and WinRAR to compress stolen files for exfiltration.
Archive Collected Data:Archive via Utility
IceApple can encrypt and compress files using Gzip prior to exfiltration.
Archive Collected Data:Archive via Utility
iKitten will zip up the /Library/Keychains directory before exfiltrating it.
Archive Collected Data:Archive via Utility
InvisiMole uses WinRAR to compress data that is intended to be exfiltrated.
Archive Collected Data:Archive via Utility
It is known to use 7Zip and RAR with passwords to encrypt data prior to exfiltration.
Archive Collected Data:Archive via Utility
It has used QuickZip to archive stolen files before exfiltration.
Archive Collected Data:Archive via Utility
It has used gzip to archive dumped LSASS process memory and RAR to stage and compress local folders.
Archive Collected Data:Archive via Utility
It has compressed files before exfiltration using TAR and RAR.
Archive Collected Data:Archive via Utility
Micropsia creates a RAR archive based on collected files on the victim's machine.
Archive Collected Data:Archive via Utility
It has used the native Windows cabinet creation tool, makecab.exe, likely to compress stolen data to be uploaded.
Archive Collected Data:Archive via Utility
It has used RAR to create password-protected archives of collected documents prior to exfiltration.
Archive Collected Data:Archive via Utility
Octopus has compressed data before exfiltrating it using a tool called Abbrevia.
Archive Collected Data:Archive via Utility
Okrum was seen using a RAR archiver tool to compress/decompress data.
Archive Collected Data:Archive via Utility
OopsIE compresses collected files with GZipStream before sending them to its C2 server.
Archive Collected Data:Archive via Utility
During Operation CuckooBees, the threat actors used the Makecab utility to compress and a version of WinRAR to create password-protected archives of stolen data prior to exfiltration.
Archive Collected Data:Archive via Utility
During Operation Dream Job, It archived victim's data into a RAR file.
Archive Collected Data:Archive via Utility
During Operation Honeybee, the threat actors uses zip to pack collected files before exfiltration.
Archive Collected Data:Archive via Utility
During Operation Wocao, threat actors archived collected files with WinRAR, prior to exfiltration.
Archive Collected Data:Archive via Utility
PoetRAT has the ability to compress files with zip.
Archive Collected Data:Archive via Utility
PoshC2 contains a module for compressing data using ZIP.
Archive Collected Data:Archive via Utility
PowerShower has used 7Zip to compress .txt, .pdf, .xls or .doc files prior to exfiltration.
Archive Collected Data:Archive via Utility
PUNCHBUGGY has Gzipped information and saved it to a random temp file before exfil.
Archive Collected Data:Archive via Utility
Pupy can compress data with Zip before sending it over C2.
Archive Collected Data:Archive via Utility
Ramsay can compress and archive collected files using WinRAR.
Archive Collected Data:Archive via Utility
Rclone can compress files using gzip prior to exfiltration.
Archive Collected Data:Archive via Utility
During the SolarWinds Compromise, It used 7-Zip to compress stolen emails into password-protected archives prior to exfltration; It also compressed text files into zipped archives.
Archive Collected Data:Archive via Utility
It extracted documents and bundled them into a RAR archive.
Archive Collected Data:Archive via Utility
Turian can use WinRAR to create a password-protected archive for files of interest.
Archive Collected Data:Archive via Utility
It has encrypted files stolen from connected USB drives into a RAR file before exfiltration.
Archive Collected Data:Archive via Utility
It has archived the ntds.dit database as a multi-volume password-protected archive with 7-Zip.
Archive Collected Data:Archive via Utility
WindTail has the ability to use the macOS built-in zip utility to archive files.
Archive Collected Data:Archive via Utility
It has archived data into ZIP files on compromised machines.
Archive Collected Data:Archive via Library
BADFLICK has compressed data using the aPLib compression library.
Archive Collected Data:Archive via Library
BBSRAT can compress data with ZLIB prior to sending it back to the C2 server.
Archive Collected Data:Archive via Library
Cardinal RAT applies compression to C2 traffic using the ZLIB library.
Archive Collected Data:Archive via Library
Denis compressed collected data using zlib.
Archive Collected Data:Archive via Library
Epic compresses the collected data with bzip2 before sending it to the C2 server.
Archive Collected Data:Archive via Library
FoggyWeb can invoke the Common.Compress method to compress data with the C# GZipStream compression class.
Archive Collected Data:Archive via Library
FunnyDream has compressed collected files with zLib.
Archive Collected Data:Archive via Library
InvisiMole can use zlib to compress and decompress data.
Archive Collected Data:Archive via Library
It malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib, encrypted, and uploaded to a C2 server.
Archive Collected Data:Archive via Library
OSX_OCEANLOTUS.D scrambles and encrypts data using AES256 before sending it to the C2 server.
Archive Collected Data:Archive via Library
SeaDuke compressed data with zlib prior to sending it over C2.
Archive Collected Data:Archive via Library
TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.
Archive Collected Data:Archive via Library
It has used RAR to compress, encrypt, and password-protect files prior to exfiltration.
Archive Collected Data:Archive via Library
The ZLib backdoor compresses communications using the standard Zlib compression library.
Archive Collected Data:Archive via Custom Method
ADVSTORESHELL compresses output data generated by command execution with a custom implementation of the Lempel–Ziv–Welch (LZW) algorithm.
Archive Collected Data:Archive via Custom Method
Agent.btz saves system information into an XML file that is then XOR-encoded.
Archive Collected Data:Archive via Custom Method
Attor encrypts collected data with a custom implementation of Blowfish and RSA ciphers.
Archive Collected Data:Archive via Custom Method
BLUELIGHT has encoded data into a binary blob using XOR.
Archive Collected Data:Archive via Custom Method
During C0017, It hex-encoded PII data prior to exfiltration.
Archive Collected Data:Archive via Custom Method
It encrypts data with a substitute cipher prior to exfiltration.
Archive Collected Data:Archive via Custom Method
Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it.
Archive Collected Data:Archive via Custom Method
It has encoded data gathered from the victim with a simple substitution cipher and single-byte XOR using the 0xAA key, and Base64 with character permutation.
Archive Collected Data:Archive via Custom Method
FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.
Archive Collected Data:Archive via Custom Method
FoggyWeb can use a dynamic XOR key and a custom XOR methodology to encode data before exfiltration. Also, FoggyWeb can encode C2 command output within a legitimate WebP file.
Archive Collected Data:Archive via Custom Method
FrameworkPOS can XOR credit card information before exfiltration.
Archive Collected Data:Archive via Custom Method
FunnyDream has compressed collected files with zLib and encrypted them using an XOR operation with the string key from the command line or qwerasdf if the command line argument doesn’t contain the key. File names are obfuscated using XOR with the same key as the compressed file content.
Archive Collected Data:Archive via Custom Method
HAWKBALL has encrypted data with XOR before sending it over the C2 channel.
Archive Collected Data:Archive via Custom Method
InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration.