prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Application Layer Protocol:Web Protocols | FELIXROOT uses HTTP and HTTPS to communicate with the C2 server. |
Application Layer Protocol:Web Protocols | It has used HTTP requests to chain multiple web shells and to contact actor-controlled C2 servers prior to exfiltrating stolen data. |
Application Layer Protocol:Web Protocols | It has used HTTP POST requests to transmit data. |
Application Layer Protocol:Web Protocols | It has used HTTPS for command and control. |
Application Layer Protocol:Web Protocols | Final1stspy uses HTTP for C2. |
Application Layer Protocol:Web Protocols | Flagpro can communicate with its C2 using HTTP. |
Application Layer Protocol:Web Protocols | FlawedAmmyy has used HTTP for C2. |
Application Layer Protocol:Web Protocols | FoggyWeb has the ability to communicate with C2 servers over HTTP GET/POST requests. |
Application Layer Protocol:Web Protocols | During Frankenstein, the threat actors used HTTP GET requests for C2. |
Application Layer Protocol:Web Protocols | It has used HTTP and HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | Gazer communicates with its C2 servers over HTTP. |
Application Layer Protocol:Web Protocols | Gelsemium can use HTTP/S in C2 communications. |
Application Layer Protocol:Web Protocols | GeminiDuke uses HTTP and HTTPS for command and control. |
Application Layer Protocol:Web Protocols | Get2 has the ability to use HTTP to send information collected from an infected host to C2. |
Application Layer Protocol:Web Protocols | Gold Dragon uses HTTP for communication to the control servers. |
Application Layer Protocol:Web Protocols | GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication. |
Application Layer Protocol:Web Protocols | GoldFinder has used HTTP for C2. |
Application Layer Protocol:Web Protocols | GoldMax has used HTTPS and HTTP GET requests with custom HTTP cookies for C2. |
Application Layer Protocol:Web Protocols | Goopy has the ability to communicate with its C2 over HTTP. |
Application Layer Protocol:Web Protocols | Grandoreiro has the ability to use HTTP in C2 communications. |
Application Layer Protocol:Web Protocols | GravityRAT uses HTTP for C2. |
Application Layer Protocol:Web Protocols | GreyEnergy uses HTTP and HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | GrimAgent has the ability to use HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | GuLoader can use HTTP to retrieve additional binaries. |
Application Layer Protocol:Web Protocols | It has used open-source C2 frameworks, including Covenant. |
Application Layer Protocol:Web Protocols | The "Uploader" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands. |
Application Layer Protocol:Web Protocols | HAWKBALL has used HTTP to communicate with a single hard-coded C2 server. |
Application Layer Protocol:Web Protocols | Helminth can use HTTP for C2. |
Application Layer Protocol:Web Protocols | Hi-Zor communicates with its C2 server over HTTPS. |
Application Layer Protocol:Web Protocols | It used HTTP and HTTPS to send data back to its C2 server. |
Application Layer Protocol:Web Protocols | Hikit has used HTTP for C2. |
Application Layer Protocol:Web Protocols | HTTPBrowser has used HTTP and HTTPS for command and control. |
Application Layer Protocol:Web Protocols | httpclient uses HTTP for command and control. |
Application Layer Protocol:Web Protocols | HyperBro has used HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | IceApple can use HTTP GET to request and pull information from C2. |
Application Layer Protocol:Web Protocols | IcedID has used HTTPS in communications with C2. |
Application Layer Protocol:Web Protocols | It has used HTTP, HTTPS, and WebDav in network communications. |
Application Layer Protocol:Web Protocols | Industroyer’s main backdoor connected to a remote C2 server using HTTPS. |
Application Layer Protocol:Web Protocols | InvisiMole uses HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | Ixeshe uses HTTP for command and control. |
Application Layer Protocol:Web Protocols | JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS. |
Application Layer Protocol:Web Protocols | Kazuar uses HTTP and HTTPS to communicate with the C2 server. Kazuar can also act as a webserver and listen for inbound HTTP requests through an exposed API. |
Application Layer Protocol:Web Protocols | It malware including RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2. |
Application Layer Protocol:Web Protocols | Variants of Kevin can communicate with C2 over HTTP. |
Application Layer Protocol:Web Protocols | Keydnap uses HTTPS for command and control. |
Application Layer Protocol:Web Protocols | KEYPLUG has the ability to communicate over HTTP and WebSocket Protocol (WSS) for C2. |
Application Layer Protocol:Web Protocols | KGH_SPY can send data to C2 with HTTP POST requests. |
Application Layer Protocol:Web Protocols | It has used HTTP GET and POST requests for C2. |
Application Layer Protocol:Web Protocols | Kinsing has communicated with C2 over HTTP. |
Application Layer Protocol:Web Protocols | Koadic has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | The Komplex C2 channel uses HTTP POST requests. |
Application Layer Protocol:Web Protocols | KONNI has used HTTP POST for C2. |
Application Layer Protocol:Web Protocols | KOPILUWAK has used HTTP POST requests to send data to C2. |
Application Layer Protocol:Web Protocols | It has conducted C2 over HTTP and HTTPS. |
Application Layer Protocol:Web Protocols | LiteDuke can use HTTP GET requests in C2 communications. |
Application Layer Protocol:Web Protocols | LitePower can use HTTP and HTTPS for C2 communications. |
Application Layer Protocol:Web Protocols | Lokibot has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | LookBack’s C2 proxy tool sends data to a C2 server over HTTP. |
Application Layer Protocol:Web Protocols | LOWBALL command and control occurs via HTTPS over port 443. |
Application Layer Protocol:Web Protocols | It has used HTTP for C2. |
Application Layer Protocol:Web Protocols | It uses HTTP for Command & Control. |
Application Layer Protocol:Web Protocols | MacSpy uses HTTP for command and control. |
Application Layer Protocol:Web Protocols | Mafalda can use HTTP for C2. |
Application Layer Protocol:Web Protocols | It has used HTTP for C2. |
Application Layer Protocol:Web Protocols | MarkiRAT can initiate communication over HTTP/HTTPS for its C2 server. |
Application Layer Protocol:Web Protocols | Maze has communicated to hard-coded IP addresses via HTTP. |
Application Layer Protocol:Web Protocols | MCMD can use HTTPS in communication with C2 web servers. |
Application Layer Protocol:Web Protocols | MechaFlounder has the ability to use HTTP in communication with C2. |
Application Layer Protocol:Web Protocols | It has used HTTP for C2. |
Application Layer Protocol:Web Protocols | metaMain can use HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | Metamorfo has used HTTP for C2. |
Application Layer Protocol:Web Protocols | Micropsia uses HTTP and HTTPS for C2 network communications. |
Application Layer Protocol:Web Protocols | Milan can use HTTPS for communication with C2. |
Application Layer Protocol:Web Protocols | MiniDuke uses HTTP and HTTPS for command and control. |
Application Layer Protocol:Web Protocols | Mis-Type network traffic can communicate over HTTP. |
Application Layer Protocol:Web Protocols | Mongall can use HTTP for C2 communication. |
Application Layer Protocol:Web Protocols | More_eggs uses HTTPS for C2. |
Application Layer Protocol:Web Protocols | Mori can communicate using HTTP over IPv4 or IPv6 depending on a flag set. |
Application Layer Protocol:Web Protocols | It has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | It has communicated with its C2 via HTTP POST requests. |
Application Layer Protocol:Web Protocols | Mythic supports HTTP-based C2 profiles. |
Application Layer Protocol:Web Protocols | Neoichor can use HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request. NETEAGLE will also use HTTP to download resources that contain an IP address and Port Number pair to connect to for further C2. |
Application Layer Protocol:Web Protocols | NETWIRE has the ability to communicate over HTTP. |
Application Layer Protocol:Web Protocols | During Night Dragon, threat actors used HTTP for C2. |
Application Layer Protocol:Web Protocols | njRAT has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | NOKKI has used HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | Octopus has used HTTP GET and POST requests for C2 communications. |
Application Layer Protocol:Web Protocols | It has used HTTP for C2. |
Application Layer Protocol:Web Protocols | Okrum uses HTTP for communication with its C2. |
Application Layer Protocol:Web Protocols | OLDBAIT can use HTTP for C2. |
Application Layer Protocol:Web Protocols | OnionDuke uses HTTP and HTTPS for C2. |
Application Layer Protocol:Web Protocols | OopsIE uses HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | During Operation CuckooBees, the threat actors enabled HTTP and HTTPS listeners. |
Application Layer Protocol:Web Protocols | During Operation Dream Job, It uses HTTP and HTTPS to contact actor-controlled C2 servers. |
Application Layer Protocol:Web Protocols | During Operation Wocao, threat actors’ XServer tool communicated using HTTP and HTTPS. |
Application Layer Protocol:Web Protocols | It has used HTTP for C2. |
Application Layer Protocol:Web Protocols | OSX_OCEANLOTUS.D can also use use HTTP POST and GET requests to send and receive C2 information. |
Application Layer Protocol:Web Protocols | Out1 can use HTTP and HTTPS in communications with remote hosts. |
Application Layer Protocol:Web Protocols | OutSteel has used HTTP for C2 communications. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.