prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Application Layer Protocol:Web Protocols | Ursnif has used HTTPS for C2. |
Application Layer Protocol:Web Protocols | Valak has used HTTP in communications with C2. |
Application Layer Protocol:Web Protocols | VaporRage can use HTTP to download shellcode from compromised websites. |
Application Layer Protocol:Web Protocols | Vasport creates a backdoor by making a connection using a HTTP POST. |
Application Layer Protocol:Web Protocols | VBShower has attempted to obtain a VBS script from command and control (C2) nodes over HTTP. |
Application Layer Protocol:Web Protocols | VERMIN uses HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | WellMess can use HTTP and HTTPS in C2 communications. |
Application Layer Protocol:Web Protocols | WhisperGate can make an HTTPS connection to download additional files. |
Application Layer Protocol:Web Protocols | It has used tools that communicate with C2 over HTTP. |
Application Layer Protocol:Web Protocols | WindTail has the ability to use HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | WinMM uses HTTP for C2. |
Application Layer Protocol:Web Protocols | Winnti for Linux has used HTTP in outbound communications. |
Application Layer Protocol:Web Protocols | Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications. |
Application Layer Protocol:Web Protocols | It has used HTTP for network communication. |
Application Layer Protocol:Web Protocols | It has used HTTP for network communications. |
Application Layer Protocol:Web Protocols | Woody RAT can communicate with its C2 server using HTTP requests. |
Application Layer Protocol:Web Protocols | Xbash uses HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | xCaon has communicated with the C2 server by sending POST requests over HTTP. |
Application Layer Protocol:Web Protocols | YAHOYAH uses HTTP for C2. |
Application Layer Protocol:Web Protocols | Zebrocy uses HTTP for C2. |
Application Layer Protocol:Web Protocols | ZeroT has used HTTP for C2. |
Application Layer Protocol:Web Protocols | Zeus Panda uses HTTP for C2 communications. |
Application Layer Protocol:Web Protocols | ZLib communicates over HTTP for C2. |
Application Layer Protocol:Web Protocols | ZxShell has used HTTP for C2 connections. |
Application Layer Protocol:File Transfer Protocols | It used exploit payloads that initiate download via ftp. |
Application Layer Protocol:File Transfer Protocols | Attor has used FTP protocol for C2 communication. |
Application Layer Protocol:File Transfer Protocols | BADHATCH can emulate an FTP server to connect to actor-controlled C2 servers. |
Application Layer Protocol:File Transfer Protocols | CARROTBALL has the ability to use FTP in C2 communications. |
Application Layer Protocol:File Transfer Protocols | Cobalt Strike can conduct peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports. |
Application Layer Protocol:File Transfer Protocols | Disco can use SMB to transfer files. |
Application Layer Protocol:File Transfer Protocols | It has used SMB for C2. |
Application Layer Protocol:File Transfer Protocols | JPIN can communicate over FTP. |
Application Layer Protocol:File Transfer Protocols | Kazuar uses FTP and FTPS to communicate with the C2 server. |
Application Layer Protocol:File Transfer Protocols | It has used FTP to download additional malware to the target machine. |
Application Layer Protocol:File Transfer Protocols | It uses FTP for Command & Control. |
Application Layer Protocol:File Transfer Protocols | Mythic supports SMB-based peer-to-peer C2 profiles. |
Application Layer Protocol:File Transfer Protocols | NOKKI has used FTP for C2 communications. |
Application Layer Protocol:File Transfer Protocols | During Operation Honeybee, the threat actors had the ability to use FTP for C2. |
Application Layer Protocol:File Transfer Protocols | PoetRAT has used FTP for C2 communications. |
Application Layer Protocol:File Transfer Protocols | The Regin malware platform supports many standard protocols, including SMB. |
Application Layer Protocol:File Transfer Protocols | ShadowPad has used FTP for C2 communications. |
Application Layer Protocol:File Transfer Protocols | SharpDisco has the ability to transfer data between SMB shares. |
Application Layer Protocol:File Transfer Protocols | It uses FTP for C2 communications. |
Application Layer Protocol:File Transfer Protocols | SYSCON has the ability to use FTP in C2 communications. |
Application Layer Protocol:File Transfer Protocols | XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system. |
Application Layer Protocol:File Transfer Protocols | ZxShell has used FTP for C2 connections. |
Application Layer Protocol:Mail Protocols | Agent Tesla has used SMTP for C2 communications. |
Application Layer Protocol:Mail Protocols | It has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims. |
Application Layer Protocol:Mail Protocols | It has used email for C2 via an Office macro. |
Application Layer Protocol:Mail Protocols | BadPatch uses SMTP for C2. |
Application Layer Protocol:Mail Protocols | Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails. |
Application Layer Protocol:Mail Protocols | Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3. |
Application Layer Protocol:Mail Protocols | ComRAT can use email attachments for command and control. |
Application Layer Protocol:Mail Protocols | CORESHELL can communicate over SMTP and POP3 for C2. |
Application Layer Protocol:Mail Protocols | Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2. |
Application Layer Protocol:Mail Protocols | JPIN can send email over SMTP. |
Application Layer Protocol:Mail Protocols | It has used e-mail to send exfiltrated data to C2 servers. |
Application Layer Protocol:Mail Protocols | LightNeuron uses SMTP for C2. |
Application Layer Protocol:Mail Protocols | NavRAT uses the email platform, Naver, for C2 communications, leveraging SMTP. |
Application Layer Protocol:Mail Protocols | NightClub can use emails for C2 communications. |
Application Layer Protocol:Mail Protocols | OLDBAIT can use SMTP for C2. |
Application Layer Protocol:Mail Protocols | RDAT can use email attachments for C2 communications. |
Application Layer Protocol:Mail Protocols | Remsec is capable of using SMTP for C2. |
Application Layer Protocol:Mail Protocols | It uses SMTP for C2 communications. |
Application Layer Protocol:Mail Protocols | A SUGARDUMP variant used SMTP for C2. |
Application Layer Protocol:Mail Protocols | It has used multiple backdoors which communicate with a C2 server via email attachments. |
Application Layer Protocol:Mail Protocols | Uroburos can use custom communications protocols that ride over SMTP. |
Application Layer Protocol:Mail Protocols | Zebrocy uses SMTP and POP3 for C2. |
Application Layer Protocol:DNS | Variants of Anchor can use DNS tunneling to communicate with C2. |
Application Layer Protocol:DNS | It uses DNS for C2 communications. |
Application Layer Protocol:DNS | It has used remote access tools that leverage DNS in communications with C2. |
Application Layer Protocol:DNS | It used DNS for C2 communications. |
Application Layer Protocol:DNS | BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control. |
Application Layer Protocol:DNS | Brute Ratel C4 can use DNS over HTTPS for C2. |
Application Layer Protocol:DNS | It has used Cobalt Strike to encapsulate C2 in DNS traffic. |
Application Layer Protocol:DNS | It has used DNS tunneling for C2. |
Application Layer Protocol:DNS | Cobalt Strike can use a custom command and control protocol that can be encapsulated in DNS. All protocols use their standard assigned ports. |
Application Layer Protocol:DNS | Cobian RAT uses DNS for C2. |
Application Layer Protocol:DNS | DanBot can use use IPv4 A records and IPv6 AAAA DNS records in C2 communications. |
Application Layer Protocol:DNS | Denis has used DNS tunneling for C2 communications. |
Application Layer Protocol:DNS | DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records. |
Application Layer Protocol:DNS | Ebury has used DNS requests over UDP port 53 for C2. |
Application Layer Protocol:DNS | It has performed C2 using DNS via A, OPT, and TXT records. |
Application Layer Protocol:DNS | Gelsemium has the ability to use DNS in communication with C2. |
Application Layer Protocol:DNS | Goopy has the ability to communicate with its C2 over DNS. |
Application Layer Protocol:DNS | Green Lambert can use DNS for C2 communications. |
Application Layer Protocol:DNS | Helminth can use DNS for C2. |
Application Layer Protocol:DNS | Heyoka Backdoor can use DNS tunneling for C2 communications. |
Application Layer Protocol:DNS | HTTPBrowser has used DNS for command and control. |
Application Layer Protocol:DNS | InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies. |
Application Layer Protocol:DNS | It malware RoyalDNS has used DNS for C2. |
Application Layer Protocol:DNS | Variants of Kevin can communicate over DNS through queries to the server for constructed domain names with embedded information. |
Application Layer Protocol:DNS | It has leveraged dynamic DNS providers for C2 communications. |
Application Layer Protocol:DNS | Matryoshka uses DNS for C2. |
Application Layer Protocol:DNS | Milan has the ability to use DNS for C2 communications. |
Application Layer Protocol:DNS | Mori can use DNS tunneling to communicate with C2. |
Application Layer Protocol:DNS | Mythic supports DNS-based C2 profiles. |
Application Layer Protocol:DNS | NanHaiShu uses DNS for the C2 communications. |
Application Layer Protocol:DNS | NightClub can use a DNS tunneling plugin to exfiltrate data by adding it to the subdomain portion of a DNS request. |
Application Layer Protocol:DNS | It has used DNS for C2 including the publicly available requestbin.net tunneling service. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.