prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Archive Collected Data | NETWIRE has the ability to compress archived screenshots. |
Archive Collected Data | It encrypted the collected files' path with AES and then encoded them with base64. |
Archive Collected Data | Pillowmint has encrypted stolen credit card information with AES and further encoded it with Base64. |
Archive Collected Data | PowerLess can encrypt browser database files prior to exfiltration. |
Archive Collected Data | After collecting documents from removable media, Prikormka compresses the collected files, and encrypts it with Blowfish. |
Archive Collected Data | Proton zips up files before exfiltrating them. |
Archive Collected Data | Remexi encrypts and adds all gathered browser data into files for upload to C2. |
Archive Collected Data | RunningRAT contains code to compress files. |
Archive Collected Data | ShimRatReporter used LZ compression to compress initial reconnaissance reports before sending to the C2. |
Archive Collected Data | TAINTEDSCRIBE has used FileReadZipSend to compress a file and send to C2. |
Archive Collected Data | VERMIN encrypts the collected files using 3-DES. |
Archive Collected Data | WellMail can archive files on the compromised host. |
Archive Collected Data | XCSSET will compress entire ~/Desktop folders excluding all .git folders, but only if the total data size is under 200MB. |
Archive Collected Data | Zebrocy has used a method similar to RC4 as well as AES for encryption and hexadecimal for encoding data before exfiltration. |
Archive Collected Data:Archive via Utility | AppleSeed can zip and encrypt data collected on a target system. |
Archive Collected Data:Archive via Utility | It has used RAR to compress files before moving them outside of the victim network. |
Archive Collected Data:Archive via Utility | It has used a variety of utilities, including WinRAR, to archive collected data with password protection. |
Archive Collected Data:Archive via Utility | It has used tools to compress data before exfilling it. |
Archive Collected Data:Archive via Utility | It has used WinRAR to compress data prior to exfil. |
Archive Collected Data:Archive via Utility | It has used WinRAR and 7-Zip to compress an archive stolen data. |
Archive Collected Data:Archive via Utility | It created a RAR archive of targeted files for exfiltration. |
Archive Collected Data:Archive via Utility | It has used WinRAR to compress memory dumps prior to exfiltration. |
Archive Collected Data:Archive via Utility | It has compressed data into password-protected RAR archives prior to exfiltration. |
Archive Collected Data:Archive via Utility | During C0026, the threat actors used WinRAR to collect documents on targeted systems. The threat actors appeared to only exfiltrate files created after January 1, 2021. |
Archive Collected Data:Archive via Utility | Calisto uses the zip -r command to compress the data collected on the local system. |
Archive Collected Data:Archive via Utility | ccf32 has used xcopy \\<target_host>\c$\users\public\path.7z c:\users\public\bin\<target_host>.7z /H /Y to archive collected files. |
Archive Collected Data:Archive via Utility | certutil may be used to Base64 encode collected data. |
Archive Collected Data:Archive via Utility | It has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts. |
Archive Collected Data:Archive via Utility | It uses ZPP, a .NET console program, to compress files with ZIP. |
Archive Collected Data:Archive via Utility | CORALDECK has created password-protected RAR, WinImage, and zip archives to be exfiltrated. |
Archive Collected Data:Archive via Utility | Crutch has used the WinRAR utility to compress and encrypt stolen files. |
Archive Collected Data:Archive via Utility | Daserf hides collected data in password-protected .rar archives. |
Archive Collected Data:Archive via Utility | DustySky can compress files via RAR while staging data to be exfiltrated. |
Archive Collected Data:Archive via Utility | It has used WinRAR to compress stolen files into an archive prior to exfiltration. |
Archive Collected Data:Archive via Utility | It has compressed the dump output of compromised credentials with a 7zip binary. |
Archive Collected Data:Archive via Utility | It has used RAR to compress collected data before exfiltration. |
Archive Collected Data:Archive via Utility | It has used 7-Zip to archive data. |
Archive Collected Data:Archive via Utility | During FunnyDream, the threat actors used 7zr.exe to add collected files to an archive. |
Archive Collected Data:Archive via Utility | It used WinRAR to compress and encrypt stolen data prior to exfiltration. |
Archive Collected Data:Archive via Utility | It has used WinZip, likely to archive data prior to exfiltration. |
Archive Collected Data:Archive via Utility | It has used 7-Zip and WinRAR to compress stolen files for exfiltration. |
Archive Collected Data:Archive via Utility | IceApple can encrypt and compress files using Gzip prior to exfiltration. |
Archive Collected Data:Archive via Utility | iKitten will zip up the /Library/Keychains directory before exfiltrating it. |
Archive Collected Data:Archive via Utility | InvisiMole uses WinRAR to compress data that is intended to be exfiltrated. |
Archive Collected Data:Archive via Utility | It is known to use 7Zip and RAR with passwords to encrypt data prior to exfiltration. |
Archive Collected Data:Archive via Utility | It has used QuickZip to archive stolen files before exfiltration. |
Archive Collected Data:Archive via Utility | It has used gzip to archive dumped LSASS process memory and RAR to stage and compress local folders. |
Archive Collected Data:Archive via Utility | It has compressed files before exfiltration using TAR and RAR. |
Archive Collected Data:Archive via Utility | Micropsia creates a RAR archive based on collected files on the victim's machine. |
Archive Collected Data:Archive via Utility | It has used the native Windows cabinet creation tool, makecab.exe, likely to compress stolen data to be uploaded. |
Archive Collected Data:Archive via Utility | It has used RAR to create password-protected archives of collected documents prior to exfiltration. |
Archive Collected Data:Archive via Utility | Octopus has compressed data before exfiltrating it using a tool called Abbrevia. |
Archive Collected Data:Archive via Utility | Okrum was seen using a RAR archiver tool to compress/decompress data. |
Archive Collected Data:Archive via Utility | OopsIE compresses collected files with GZipStream before sending them to its C2 server. |
Archive Collected Data:Archive via Utility | During Operation CuckooBees, the threat actors used the Makecab utility to compress and a version of WinRAR to create password-protected archives of stolen data prior to exfiltration. |
Archive Collected Data:Archive via Utility | During Operation Dream Job, It archived victim's data into a RAR file. |
Archive Collected Data:Archive via Utility | During Operation Honeybee, the threat actors uses zip to pack collected files before exfiltration. |
Archive Collected Data:Archive via Utility | During Operation Wocao, threat actors archived collected files with WinRAR, prior to exfiltration. |
Archive Collected Data:Archive via Utility | PoetRAT has the ability to compress files with zip. |
Archive Collected Data:Archive via Utility | PoshC2 contains a module for compressing data using ZIP. |
Archive Collected Data:Archive via Utility | PowerShower has used 7Zip to compress .txt, .pdf, .xls or .doc files prior to exfiltration. |
Archive Collected Data:Archive via Utility | PUNCHBUGGY has Gzipped information and saved it to a random temp file before exfil. |
Archive Collected Data:Archive via Utility | Pupy can compress data with Zip before sending it over C2. |
Archive Collected Data:Archive via Utility | Ramsay can compress and archive collected files using WinRAR. |
Archive Collected Data:Archive via Utility | Rclone can compress files using gzip prior to exfiltration. |
Archive Collected Data:Archive via Utility | During the SolarWinds Compromise, It used 7-Zip to compress stolen emails into password-protected archives prior to exfltration; It also compressed text files into zipped archives. |
Archive Collected Data:Archive via Utility | It extracted documents and bundled them into a RAR archive. |
Archive Collected Data:Archive via Utility | Turian can use WinRAR to create a password-protected archive for files of interest. |
Archive Collected Data:Archive via Utility | It has encrypted files stolen from connected USB drives into a RAR file before exfiltration. |
Archive Collected Data:Archive via Utility | It has archived the ntds.dit database as a multi-volume password-protected archive with 7-Zip. |
Archive Collected Data:Archive via Utility | WindTail has the ability to use the macOS built-in zip utility to archive files. |
Archive Collected Data:Archive via Utility | It has archived data into ZIP files on compromised machines. |
Archive Collected Data:Archive via Library | BADFLICK has compressed data using the aPLib compression library. |
Archive Collected Data:Archive via Library | BBSRAT can compress data with ZLIB prior to sending it back to the C2 server. |
Archive Collected Data:Archive via Library | Cardinal RAT applies compression to C2 traffic using the ZLIB library. |
Archive Collected Data:Archive via Library | Denis compressed collected data using zlib. |
Archive Collected Data:Archive via Library | Epic compresses the collected data with bzip2 before sending it to the C2 server. |
Archive Collected Data:Archive via Library | FoggyWeb can invoke the Common.Compress method to compress data with the C# GZipStream compression class. |
Archive Collected Data:Archive via Library | FunnyDream has compressed collected files with zLib. |
Archive Collected Data:Archive via Library | InvisiMole can use zlib to compress and decompress data. |
Archive Collected Data:Archive via Library | It malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib, encrypted, and uploaded to a C2 server. |
Archive Collected Data:Archive via Library | OSX_OCEANLOTUS.D scrambles and encrypts data using AES256 before sending it to the C2 server. |
Archive Collected Data:Archive via Library | SeaDuke compressed data with zlib prior to sending it over C2. |
Archive Collected Data:Archive via Library | TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files. |
Archive Collected Data:Archive via Library | It has used RAR to compress, encrypt, and password-protect files prior to exfiltration. |
Archive Collected Data:Archive via Library | The ZLib backdoor compresses communications using the standard Zlib compression library. |
Archive Collected Data:Archive via Custom Method | ADVSTORESHELL compresses output data generated by command execution with a custom implementation of the Lempel–Ziv–Welch (LZW) algorithm. |
Archive Collected Data:Archive via Custom Method | Agent.btz saves system information into an XML file that is then XOR-encoded. |
Archive Collected Data:Archive via Custom Method | Attor encrypts collected data with a custom implementation of Blowfish and RSA ciphers. |
Archive Collected Data:Archive via Custom Method | BLUELIGHT has encoded data into a binary blob using XOR. |
Archive Collected Data:Archive via Custom Method | During C0017, It hex-encoded PII data prior to exfiltration. |
Archive Collected Data:Archive via Custom Method | It encrypts data with a substitute cipher prior to exfiltration. |
Archive Collected Data:Archive via Custom Method | Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it. |
Archive Collected Data:Archive via Custom Method | It has encoded data gathered from the victim with a simple substitution cipher and single-byte XOR using the 0xAA key, and Base64 with character permutation. |
Archive Collected Data:Archive via Custom Method | FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23. |
Archive Collected Data:Archive via Custom Method | FoggyWeb can use a dynamic XOR key and a custom XOR methodology to encode data before exfiltration. Also, FoggyWeb can encode C2 command output within a legitimate WebP file. |
Archive Collected Data:Archive via Custom Method | FrameworkPOS can XOR credit card information before exfiltration. |
Archive Collected Data:Archive via Custom Method | FunnyDream has compressed collected files with zLib and encrypted them using an XOR operation with the string key from the command line or qwerasdf if the command line argument doesn’t contain the key. File names are obfuscated using XOR with the same key as the compressed file content. |
Archive Collected Data:Archive via Custom Method | HAWKBALL has encrypted data with XOR before sending it over the C2 channel. |
Archive Collected Data:Archive via Custom Method | InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.