prompt
stringclasses
508 values
procedure
stringlengths
20
478
Application Layer Protocol:Web Protocols
FELIXROOT uses HTTP and HTTPS to communicate with the C2 server.
Application Layer Protocol:Web Protocols
It has used HTTP requests to chain multiple web shells and to contact actor-controlled C2 servers prior to exfiltrating stolen data.
Application Layer Protocol:Web Protocols
It has used HTTP POST requests to transmit data.
Application Layer Protocol:Web Protocols
It has used HTTPS for command and control.
Application Layer Protocol:Web Protocols
Final1stspy uses HTTP for C2.
Application Layer Protocol:Web Protocols
Flagpro can communicate with its C2 using HTTP.
Application Layer Protocol:Web Protocols
FlawedAmmyy has used HTTP for C2.
Application Layer Protocol:Web Protocols
FoggyWeb has the ability to communicate with C2 servers over HTTP GET/POST requests.
Application Layer Protocol:Web Protocols
During Frankenstein, the threat actors used HTTP GET requests for C2.
Application Layer Protocol:Web Protocols
It has used HTTP and HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
Gazer communicates with its C2 servers over HTTP.
Application Layer Protocol:Web Protocols
Gelsemium can use HTTP/S in C2 communications.
Application Layer Protocol:Web Protocols
GeminiDuke uses HTTP and HTTPS for command and control.
Application Layer Protocol:Web Protocols
Get2 has the ability to use HTTP to send information collected from an infected host to C2.
Application Layer Protocol:Web Protocols
Gold Dragon uses HTTP for communication to the control servers.
Application Layer Protocol:Web Protocols
GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication.
Application Layer Protocol:Web Protocols
GoldFinder has used HTTP for C2.
Application Layer Protocol:Web Protocols
GoldMax has used HTTPS and HTTP GET requests with custom HTTP cookies for C2.
Application Layer Protocol:Web Protocols
Goopy has the ability to communicate with its C2 over HTTP.
Application Layer Protocol:Web Protocols
Grandoreiro has the ability to use HTTP in C2 communications.
Application Layer Protocol:Web Protocols
GravityRAT uses HTTP for C2.
Application Layer Protocol:Web Protocols
GreyEnergy uses HTTP and HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
GrimAgent has the ability to use HTTP for C2 communications.
Application Layer Protocol:Web Protocols
GuLoader can use HTTP to retrieve additional binaries.
Application Layer Protocol:Web Protocols
It has used open-source C2 frameworks, including Covenant.
Application Layer Protocol:Web Protocols
The "Uploader" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands.
Application Layer Protocol:Web Protocols
HAWKBALL has used HTTP to communicate with a single hard-coded C2 server.
Application Layer Protocol:Web Protocols
Helminth can use HTTP for C2.
Application Layer Protocol:Web Protocols
Hi-Zor communicates with its C2 server over HTTPS.
Application Layer Protocol:Web Protocols
It used HTTP and HTTPS to send data back to its C2 server.
Application Layer Protocol:Web Protocols
Hikit has used HTTP for C2.
Application Layer Protocol:Web Protocols
HTTPBrowser has used HTTP and HTTPS for command and control.
Application Layer Protocol:Web Protocols
httpclient uses HTTP for command and control.
Application Layer Protocol:Web Protocols
HyperBro has used HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
IceApple can use HTTP GET to request and pull information from C2.
Application Layer Protocol:Web Protocols
IcedID has used HTTPS in communications with C2.
Application Layer Protocol:Web Protocols
It has used HTTP, HTTPS, and WebDav in network communications.
Application Layer Protocol:Web Protocols
Industroyer’s main backdoor connected to a remote C2 server using HTTPS.
Application Layer Protocol:Web Protocols
InvisiMole uses HTTP for C2 communications.
Application Layer Protocol:Web Protocols
Ixeshe uses HTTP for command and control.
Application Layer Protocol:Web Protocols
JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS.
Application Layer Protocol:Web Protocols
Kazuar uses HTTP and HTTPS to communicate with the C2 server. Kazuar can also act as a webserver and listen for inbound HTTP requests through an exposed API.
Application Layer Protocol:Web Protocols
It malware including RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2.
Application Layer Protocol:Web Protocols
Variants of Kevin can communicate with C2 over HTTP.
Application Layer Protocol:Web Protocols
Keydnap uses HTTPS for command and control.
Application Layer Protocol:Web Protocols
KEYPLUG has the ability to communicate over HTTP and WebSocket Protocol (WSS) for C2.
Application Layer Protocol:Web Protocols
KGH_SPY can send data to C2 with HTTP POST requests.
Application Layer Protocol:Web Protocols
It has used HTTP GET and POST requests for C2.
Application Layer Protocol:Web Protocols
Kinsing has communicated with C2 over HTTP.
Application Layer Protocol:Web Protocols
Koadic has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
The Komplex C2 channel uses HTTP POST requests.
Application Layer Protocol:Web Protocols
KONNI has used HTTP POST for C2.
Application Layer Protocol:Web Protocols
KOPILUWAK has used HTTP POST requests to send data to C2.
Application Layer Protocol:Web Protocols
It has conducted C2 over HTTP and HTTPS.
Application Layer Protocol:Web Protocols
LiteDuke can use HTTP GET requests in C2 communications.
Application Layer Protocol:Web Protocols
LitePower can use HTTP and HTTPS for C2 communications.
Application Layer Protocol:Web Protocols
Lokibot has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
LookBack’s C2 proxy tool sends data to a C2 server over HTTP.
Application Layer Protocol:Web Protocols
LOWBALL command and control occurs via HTTPS over port 443.
Application Layer Protocol:Web Protocols
It has used HTTP for C2.
Application Layer Protocol:Web Protocols
It uses HTTP for Command & Control.
Application Layer Protocol:Web Protocols
MacSpy uses HTTP for command and control.
Application Layer Protocol:Web Protocols
Mafalda can use HTTP for C2.
Application Layer Protocol:Web Protocols
It has used HTTP for C2.
Application Layer Protocol:Web Protocols
MarkiRAT can initiate communication over HTTP/HTTPS for its C2 server.
Application Layer Protocol:Web Protocols
Maze has communicated to hard-coded IP addresses via HTTP.
Application Layer Protocol:Web Protocols
MCMD can use HTTPS in communication with C2 web servers.
Application Layer Protocol:Web Protocols
MechaFlounder has the ability to use HTTP in communication with C2.
Application Layer Protocol:Web Protocols
It has used HTTP for C2.
Application Layer Protocol:Web Protocols
metaMain can use HTTP for C2 communications.
Application Layer Protocol:Web Protocols
Metamorfo has used HTTP for C2.
Application Layer Protocol:Web Protocols
Micropsia uses HTTP and HTTPS for C2 network communications.
Application Layer Protocol:Web Protocols
Milan can use HTTPS for communication with C2.
Application Layer Protocol:Web Protocols
MiniDuke uses HTTP and HTTPS for command and control.
Application Layer Protocol:Web Protocols
Mis-Type network traffic can communicate over HTTP.
Application Layer Protocol:Web Protocols
Mongall can use HTTP for C2 communication.
Application Layer Protocol:Web Protocols
More_eggs uses HTTPS for C2.
Application Layer Protocol:Web Protocols
Mori can communicate using HTTP over IPv4 or IPv6 depending on a flag set.
Application Layer Protocol:Web Protocols
It has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
It has communicated with its C2 via HTTP POST requests.
Application Layer Protocol:Web Protocols
Mythic supports HTTP-based C2 profiles.
Application Layer Protocol:Web Protocols
Neoichor can use HTTP for C2 communications.
Application Layer Protocol:Web Protocols
NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request. NETEAGLE will also use HTTP to download resources that contain an IP address and Port Number pair to connect to for further C2.
Application Layer Protocol:Web Protocols
NETWIRE has the ability to communicate over HTTP.
Application Layer Protocol:Web Protocols
During Night Dragon, threat actors used HTTP for C2.
Application Layer Protocol:Web Protocols
njRAT has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
NOKKI has used HTTP for C2 communications.
Application Layer Protocol:Web Protocols
Octopus has used HTTP GET and POST requests for C2 communications.
Application Layer Protocol:Web Protocols
It has used HTTP for C2.
Application Layer Protocol:Web Protocols
Okrum uses HTTP for communication with its C2.
Application Layer Protocol:Web Protocols
OLDBAIT can use HTTP for C2.
Application Layer Protocol:Web Protocols
OnionDuke uses HTTP and HTTPS for C2.
Application Layer Protocol:Web Protocols
OopsIE uses HTTP for C2 communications.
Application Layer Protocol:Web Protocols
During Operation CuckooBees, the threat actors enabled HTTP and HTTPS listeners.
Application Layer Protocol:Web Protocols
During Operation Dream Job, It uses HTTP and HTTPS to contact actor-controlled C2 servers.
Application Layer Protocol:Web Protocols
During Operation Wocao, threat actors’ XServer tool communicated using HTTP and HTTPS.
Application Layer Protocol:Web Protocols
It has used HTTP for C2.
Application Layer Protocol:Web Protocols
OSX_OCEANLOTUS.D can also use use HTTP POST and GET requests to send and receive C2 information.
Application Layer Protocol:Web Protocols
Out1 can use HTTP and HTTPS in communications with remote hosts.
Application Layer Protocol:Web Protocols
OutSteel has used HTTP for C2 communications.