prompt
stringclasses
508 values
procedure
stringlengths
20
478
Application Layer Protocol:Web Protocols
Ursnif has used HTTPS for C2.
Application Layer Protocol:Web Protocols
Valak has used HTTP in communications with C2.
Application Layer Protocol:Web Protocols
VaporRage can use HTTP to download shellcode from compromised websites.
Application Layer Protocol:Web Protocols
Vasport creates a backdoor by making a connection using a HTTP POST.
Application Layer Protocol:Web Protocols
VBShower has attempted to obtain a VBS script from command and control (C2) nodes over HTTP.
Application Layer Protocol:Web Protocols
VERMIN uses HTTP for C2 communications.
Application Layer Protocol:Web Protocols
WellMess can use HTTP and HTTPS in C2 communications.
Application Layer Protocol:Web Protocols
WhisperGate can make an HTTPS connection to download additional files.
Application Layer Protocol:Web Protocols
It has used tools that communicate with C2 over HTTP.
Application Layer Protocol:Web Protocols
WindTail has the ability to use HTTP for C2 communications.
Application Layer Protocol:Web Protocols
WinMM uses HTTP for C2.
Application Layer Protocol:Web Protocols
Winnti for Linux has used HTTP in outbound communications.
Application Layer Protocol:Web Protocols
Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.
Application Layer Protocol:Web Protocols
It has used HTTP for network communication.
Application Layer Protocol:Web Protocols
It has used HTTP for network communications.
Application Layer Protocol:Web Protocols
Woody RAT can communicate with its C2 server using HTTP requests.
Application Layer Protocol:Web Protocols
Xbash uses HTTP for C2 communications.
Application Layer Protocol:Web Protocols
xCaon has communicated with the C2 server by sending POST requests over HTTP.
Application Layer Protocol:Web Protocols
YAHOYAH uses HTTP for C2.
Application Layer Protocol:Web Protocols
Zebrocy uses HTTP for C2.
Application Layer Protocol:Web Protocols
ZeroT has used HTTP for C2.
Application Layer Protocol:Web Protocols
Zeus Panda uses HTTP for C2 communications.
Application Layer Protocol:Web Protocols
ZLib communicates over HTTP for C2.
Application Layer Protocol:Web Protocols
ZxShell has used HTTP for C2 connections.
Application Layer Protocol:File Transfer Protocols
It used exploit payloads that initiate download via ftp.
Application Layer Protocol:File Transfer Protocols
Attor has used FTP protocol for C2 communication.
Application Layer Protocol:File Transfer Protocols
BADHATCH can emulate an FTP server to connect to actor-controlled C2 servers.
Application Layer Protocol:File Transfer Protocols
CARROTBALL has the ability to use FTP in C2 communications.
Application Layer Protocol:File Transfer Protocols
Cobalt Strike can conduct peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.
Application Layer Protocol:File Transfer Protocols
Disco can use SMB to transfer files.
Application Layer Protocol:File Transfer Protocols
It has used SMB for C2.
Application Layer Protocol:File Transfer Protocols
JPIN can communicate over FTP.
Application Layer Protocol:File Transfer Protocols
Kazuar uses FTP and FTPS to communicate with the C2 server.
Application Layer Protocol:File Transfer Protocols
It has used FTP to download additional malware to the target machine.
Application Layer Protocol:File Transfer Protocols
It uses FTP for Command & Control.
Application Layer Protocol:File Transfer Protocols
Mythic supports SMB-based peer-to-peer C2 profiles.
Application Layer Protocol:File Transfer Protocols
NOKKI has used FTP for C2 communications.
Application Layer Protocol:File Transfer Protocols
During Operation Honeybee, the threat actors had the ability to use FTP for C2.
Application Layer Protocol:File Transfer Protocols
PoetRAT has used FTP for C2 communications.
Application Layer Protocol:File Transfer Protocols
The Regin malware platform supports many standard protocols, including SMB.
Application Layer Protocol:File Transfer Protocols
ShadowPad has used FTP for C2 communications.
Application Layer Protocol:File Transfer Protocols
SharpDisco has the ability to transfer data between SMB shares.
Application Layer Protocol:File Transfer Protocols
It uses FTP for C2 communications.
Application Layer Protocol:File Transfer Protocols
SYSCON has the ability to use FTP in C2 communications.
Application Layer Protocol:File Transfer Protocols
XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.
Application Layer Protocol:File Transfer Protocols
ZxShell has used FTP for C2 connections.
Application Layer Protocol:Mail Protocols
Agent Tesla has used SMTP for C2 communications.
Application Layer Protocol:Mail Protocols
It has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims.
Application Layer Protocol:Mail Protocols
It has used email for C2 via an Office macro.
Application Layer Protocol:Mail Protocols
BadPatch uses SMTP for C2.
Application Layer Protocol:Mail Protocols
Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails.
Application Layer Protocol:Mail Protocols
Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3.
Application Layer Protocol:Mail Protocols
ComRAT can use email attachments for command and control.
Application Layer Protocol:Mail Protocols
CORESHELL can communicate over SMTP and POP3 for C2.
Application Layer Protocol:Mail Protocols
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.
Application Layer Protocol:Mail Protocols
JPIN can send email over SMTP.
Application Layer Protocol:Mail Protocols
It has used e-mail to send exfiltrated data to C2 servers.
Application Layer Protocol:Mail Protocols
LightNeuron uses SMTP for C2.
Application Layer Protocol:Mail Protocols
NavRAT uses the email platform, Naver, for C2 communications, leveraging SMTP.
Application Layer Protocol:Mail Protocols
NightClub can use emails for C2 communications.
Application Layer Protocol:Mail Protocols
OLDBAIT can use SMTP for C2.
Application Layer Protocol:Mail Protocols
RDAT can use email attachments for C2 communications.
Application Layer Protocol:Mail Protocols
Remsec is capable of using SMTP for C2.
Application Layer Protocol:Mail Protocols
It uses SMTP for C2 communications.
Application Layer Protocol:Mail Protocols
A SUGARDUMP variant used SMTP for C2.
Application Layer Protocol:Mail Protocols
It has used multiple backdoors which communicate with a C2 server via email attachments.
Application Layer Protocol:Mail Protocols
Uroburos can use custom communications protocols that ride over SMTP.
Application Layer Protocol:Mail Protocols
Zebrocy uses SMTP and POP3 for C2.
Application Layer Protocol:DNS
Variants of Anchor can use DNS tunneling to communicate with C2.
Application Layer Protocol:DNS
It uses DNS for C2 communications.
Application Layer Protocol:DNS
It has used remote access tools that leverage DNS in communications with C2.
Application Layer Protocol:DNS
It used DNS for C2 communications.
Application Layer Protocol:DNS
BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control.
Application Layer Protocol:DNS
Brute Ratel C4 can use DNS over HTTPS for C2.
Application Layer Protocol:DNS
It has used Cobalt Strike to encapsulate C2 in DNS traffic.
Application Layer Protocol:DNS
It has used DNS tunneling for C2.
Application Layer Protocol:DNS
Cobalt Strike can use a custom command and control protocol that can be encapsulated in DNS. All protocols use their standard assigned ports.
Application Layer Protocol:DNS
Cobian RAT uses DNS for C2.
Application Layer Protocol:DNS
DanBot can use use IPv4 A records and IPv6 AAAA DNS records in C2 communications.
Application Layer Protocol:DNS
Denis has used DNS tunneling for C2 communications.
Application Layer Protocol:DNS
DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records.
Application Layer Protocol:DNS
Ebury has used DNS requests over UDP port 53 for C2.
Application Layer Protocol:DNS
It has performed C2 using DNS via A, OPT, and TXT records.
Application Layer Protocol:DNS
Gelsemium has the ability to use DNS in communication with C2.
Application Layer Protocol:DNS
Goopy has the ability to communicate with its C2 over DNS.
Application Layer Protocol:DNS
Green Lambert can use DNS for C2 communications.
Application Layer Protocol:DNS
Helminth can use DNS for C2.
Application Layer Protocol:DNS
Heyoka Backdoor can use DNS tunneling for C2 communications.
Application Layer Protocol:DNS
HTTPBrowser has used DNS for command and control.
Application Layer Protocol:DNS
InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies.
Application Layer Protocol:DNS
It malware RoyalDNS has used DNS for C2.
Application Layer Protocol:DNS
Variants of Kevin can communicate over DNS through queries to the server for constructed domain names with embedded information.
Application Layer Protocol:DNS
It has leveraged dynamic DNS providers for C2 communications.
Application Layer Protocol:DNS
Matryoshka uses DNS for C2.
Application Layer Protocol:DNS
Milan has the ability to use DNS for C2 communications.
Application Layer Protocol:DNS
Mori can use DNS tunneling to communicate with C2.
Application Layer Protocol:DNS
Mythic supports DNS-based C2 profiles.
Application Layer Protocol:DNS
NanHaiShu uses DNS for the C2 communications.
Application Layer Protocol:DNS
NightClub can use a DNS tunneling plugin to exfiltrate data by adding it to the subdomain portion of a DNS request.
Application Layer Protocol:DNS
It has used DNS for C2 including the publicly available requestbin.net tunneling service.