prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Application Layer Protocol:Web Protocols
|
Ursnif has used HTTPS for C2.
|
Application Layer Protocol:Web Protocols
|
Valak has used HTTP in communications with C2.
|
Application Layer Protocol:Web Protocols
|
VaporRage can use HTTP to download shellcode from compromised websites.
|
Application Layer Protocol:Web Protocols
|
Vasport creates a backdoor by making a connection using a HTTP POST.
|
Application Layer Protocol:Web Protocols
|
VBShower has attempted to obtain a VBS script from command and control (C2) nodes over HTTP.
|
Application Layer Protocol:Web Protocols
|
VERMIN uses HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
WellMess can use HTTP and HTTPS in C2 communications.
|
Application Layer Protocol:Web Protocols
|
WhisperGate can make an HTTPS connection to download additional files.
|
Application Layer Protocol:Web Protocols
|
It has used tools that communicate with C2 over HTTP.
|
Application Layer Protocol:Web Protocols
|
WindTail has the ability to use HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
WinMM uses HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
Winnti for Linux has used HTTP in outbound communications.
|
Application Layer Protocol:Web Protocols
|
Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.
|
Application Layer Protocol:Web Protocols
|
It has used HTTP for network communication.
|
Application Layer Protocol:Web Protocols
|
It has used HTTP for network communications.
|
Application Layer Protocol:Web Protocols
|
Woody RAT can communicate with its C2 server using HTTP requests.
|
Application Layer Protocol:Web Protocols
|
Xbash uses HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
xCaon has communicated with the C2 server by sending POST requests over HTTP.
|
Application Layer Protocol:Web Protocols
|
YAHOYAH uses HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
Zebrocy uses HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
ZeroT has used HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
Zeus Panda uses HTTP for C2 communications.
|
Application Layer Protocol:Web Protocols
|
ZLib communicates over HTTP for C2.
|
Application Layer Protocol:Web Protocols
|
ZxShell has used HTTP for C2 connections.
|
Application Layer Protocol:File Transfer Protocols
|
It used exploit payloads that initiate download via ftp.
|
Application Layer Protocol:File Transfer Protocols
|
Attor has used FTP protocol for C2 communication.
|
Application Layer Protocol:File Transfer Protocols
|
BADHATCH can emulate an FTP server to connect to actor-controlled C2 servers.
|
Application Layer Protocol:File Transfer Protocols
|
CARROTBALL has the ability to use FTP in C2 communications.
|
Application Layer Protocol:File Transfer Protocols
|
Cobalt Strike can conduct peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.
|
Application Layer Protocol:File Transfer Protocols
|
Disco can use SMB to transfer files.
|
Application Layer Protocol:File Transfer Protocols
|
It has used SMB for C2.
|
Application Layer Protocol:File Transfer Protocols
|
JPIN can communicate over FTP.
|
Application Layer Protocol:File Transfer Protocols
|
Kazuar uses FTP and FTPS to communicate with the C2 server.
|
Application Layer Protocol:File Transfer Protocols
|
It has used FTP to download additional malware to the target machine.
|
Application Layer Protocol:File Transfer Protocols
|
It uses FTP for Command & Control.
|
Application Layer Protocol:File Transfer Protocols
|
Mythic supports SMB-based peer-to-peer C2 profiles.
|
Application Layer Protocol:File Transfer Protocols
|
NOKKI has used FTP for C2 communications.
|
Application Layer Protocol:File Transfer Protocols
|
During Operation Honeybee, the threat actors had the ability to use FTP for C2.
|
Application Layer Protocol:File Transfer Protocols
|
PoetRAT has used FTP for C2 communications.
|
Application Layer Protocol:File Transfer Protocols
|
The Regin malware platform supports many standard protocols, including SMB.
|
Application Layer Protocol:File Transfer Protocols
|
ShadowPad has used FTP for C2 communications.
|
Application Layer Protocol:File Transfer Protocols
|
SharpDisco has the ability to transfer data between SMB shares.
|
Application Layer Protocol:File Transfer Protocols
|
It uses FTP for C2 communications.
|
Application Layer Protocol:File Transfer Protocols
|
SYSCON has the ability to use FTP in C2 communications.
|
Application Layer Protocol:File Transfer Protocols
|
XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.
|
Application Layer Protocol:File Transfer Protocols
|
ZxShell has used FTP for C2 connections.
|
Application Layer Protocol:Mail Protocols
|
Agent Tesla has used SMTP for C2 communications.
|
Application Layer Protocol:Mail Protocols
|
It has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims.
|
Application Layer Protocol:Mail Protocols
|
It has used email for C2 via an Office macro.
|
Application Layer Protocol:Mail Protocols
|
BadPatch uses SMTP for C2.
|
Application Layer Protocol:Mail Protocols
|
Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails.
|
Application Layer Protocol:Mail Protocols
|
Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3.
|
Application Layer Protocol:Mail Protocols
|
ComRAT can use email attachments for command and control.
|
Application Layer Protocol:Mail Protocols
|
CORESHELL can communicate over SMTP and POP3 for C2.
|
Application Layer Protocol:Mail Protocols
|
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.
|
Application Layer Protocol:Mail Protocols
|
JPIN can send email over SMTP.
|
Application Layer Protocol:Mail Protocols
|
It has used e-mail to send exfiltrated data to C2 servers.
|
Application Layer Protocol:Mail Protocols
|
LightNeuron uses SMTP for C2.
|
Application Layer Protocol:Mail Protocols
|
NavRAT uses the email platform, Naver, for C2 communications, leveraging SMTP.
|
Application Layer Protocol:Mail Protocols
|
NightClub can use emails for C2 communications.
|
Application Layer Protocol:Mail Protocols
|
OLDBAIT can use SMTP for C2.
|
Application Layer Protocol:Mail Protocols
|
RDAT can use email attachments for C2 communications.
|
Application Layer Protocol:Mail Protocols
|
Remsec is capable of using SMTP for C2.
|
Application Layer Protocol:Mail Protocols
|
It uses SMTP for C2 communications.
|
Application Layer Protocol:Mail Protocols
|
A SUGARDUMP variant used SMTP for C2.
|
Application Layer Protocol:Mail Protocols
|
It has used multiple backdoors which communicate with a C2 server via email attachments.
|
Application Layer Protocol:Mail Protocols
|
Uroburos can use custom communications protocols that ride over SMTP.
|
Application Layer Protocol:Mail Protocols
|
Zebrocy uses SMTP and POP3 for C2.
|
Application Layer Protocol:DNS
|
Variants of Anchor can use DNS tunneling to communicate with C2.
|
Application Layer Protocol:DNS
|
It uses DNS for C2 communications.
|
Application Layer Protocol:DNS
|
It has used remote access tools that leverage DNS in communications with C2.
|
Application Layer Protocol:DNS
|
It used DNS for C2 communications.
|
Application Layer Protocol:DNS
|
BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control.
|
Application Layer Protocol:DNS
|
Brute Ratel C4 can use DNS over HTTPS for C2.
|
Application Layer Protocol:DNS
|
It has used Cobalt Strike to encapsulate C2 in DNS traffic.
|
Application Layer Protocol:DNS
|
It has used DNS tunneling for C2.
|
Application Layer Protocol:DNS
|
Cobalt Strike can use a custom command and control protocol that can be encapsulated in DNS. All protocols use their standard assigned ports.
|
Application Layer Protocol:DNS
|
Cobian RAT uses DNS for C2.
|
Application Layer Protocol:DNS
|
DanBot can use use IPv4 A records and IPv6 AAAA DNS records in C2 communications.
|
Application Layer Protocol:DNS
|
Denis has used DNS tunneling for C2 communications.
|
Application Layer Protocol:DNS
|
DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records.
|
Application Layer Protocol:DNS
|
Ebury has used DNS requests over UDP port 53 for C2.
|
Application Layer Protocol:DNS
|
It has performed C2 using DNS via A, OPT, and TXT records.
|
Application Layer Protocol:DNS
|
Gelsemium has the ability to use DNS in communication with C2.
|
Application Layer Protocol:DNS
|
Goopy has the ability to communicate with its C2 over DNS.
|
Application Layer Protocol:DNS
|
Green Lambert can use DNS for C2 communications.
|
Application Layer Protocol:DNS
|
Helminth can use DNS for C2.
|
Application Layer Protocol:DNS
|
Heyoka Backdoor can use DNS tunneling for C2 communications.
|
Application Layer Protocol:DNS
|
HTTPBrowser has used DNS for command and control.
|
Application Layer Protocol:DNS
|
InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies.
|
Application Layer Protocol:DNS
|
It malware RoyalDNS has used DNS for C2.
|
Application Layer Protocol:DNS
|
Variants of Kevin can communicate over DNS through queries to the server for constructed domain names with embedded information.
|
Application Layer Protocol:DNS
|
It has leveraged dynamic DNS providers for C2 communications.
|
Application Layer Protocol:DNS
|
Matryoshka uses DNS for C2.
|
Application Layer Protocol:DNS
|
Milan has the ability to use DNS for C2 communications.
|
Application Layer Protocol:DNS
|
Mori can use DNS tunneling to communicate with C2.
|
Application Layer Protocol:DNS
|
Mythic supports DNS-based C2 profiles.
|
Application Layer Protocol:DNS
|
NanHaiShu uses DNS for the C2 communications.
|
Application Layer Protocol:DNS
|
NightClub can use a DNS tunneling plugin to exfiltrate data by adding it to the subdomain portion of a DNS request.
|
Application Layer Protocol:DNS
|
It has used DNS for C2 including the publicly available requestbin.net tunneling service.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.