prompt
stringclasses
508 values
procedure
stringlengths
20
478
Data Encoding:Standard Encoding
RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel.
Data Encoding:Standard Encoding
RotaJakiro uses ZLIB Compression to compresses data sent to the C2 server in the payload section network communication packet.
Data Encoding:Standard Encoding
S-Type uses Base64 encoding for C2 traffic.
Data Encoding:Standard Encoding
Saint Bot has used Base64 to encode its C2 communications.
Data Encoding:Standard Encoding
It's BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server.
Data Encoding:Standard Encoding
Sardonic can encode client ID data in 32 uppercase hex characters and transfer to the actor-controlled C2 server.
Data Encoding:Standard Encoding
SeaDuke C2 traffic is base64-encoded.
Data Encoding:Standard Encoding
SideTwist has used Base64 for encoded C2 traffic.
Data Encoding:Standard Encoding
Sliver can use standard encoding techniques like gzip and hex to ASCII to encode the C2 communication payload.
Data Encoding:Standard Encoding
SMOKEDHAM has encoded its C2 traffic with Base64.
Data Encoding:Standard Encoding
Spark has encoded communications with the C2 server with base64.
Data Encoding:Standard Encoding
SpeakUp encodes C&C communication using Base64.
Data Encoding:Standard Encoding
Squirrelwaffle has encoded its communications to C2 servers using Base64.
Data Encoding:Standard Encoding
STARWHALE has the ability to hex-encode collected data from an infected host.
Data Encoding:Standard Encoding
Stuxnet transforms encrypted binary data into an ASCII string in order to use it as a URL parameter value.
Data Encoding:Standard Encoding
SUNBURST used Base64 encoding in its C2 traffic.
Data Encoding:Standard Encoding
SysUpdate has used Base64 to encode its C2 traffic.
Data Encoding:Standard Encoding
It has used encoded ASCII text for initial C2 communications.
Data Encoding:Standard Encoding
Torisma has encoded C2 communications with Base64.
Data Encoding:Standard Encoding
TrickBot can Base64-encode C2 commands.
Data Encoding:Standard Encoding
It has used base64 encoding to hide command strings delivered from the C2.
Data Encoding:Standard Encoding
Valak has returned C2 data as encoded ASCII.
Data Encoding:Standard Encoding
WellMess has used Base64 encoding to uniquely identify communication to and from the C2.
Data Encoding:Standard Encoding
xCaon has used Base64 to encode its C2 traffic.
Data Encoding:Standard Encoding
Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.
Data Encoding:Non-Standard Encoding
Newer variants of BACKSPACE will encode C2 communications with a custom system.
Data Encoding:Non-Standard Encoding
Bankshot encodes commands from the control server using a range of characters and gzip.
Data Encoding:Non-Standard Encoding
Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed.
Data Encoding:Non-Standard Encoding
InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests.
Data Encoding:Non-Standard Encoding
NightClub has used a non-standard encoding in DNS tunneling removing any = from the result of base64 encoding, and replacing / characters with -s and + characters with -p.
Data Encoding:Non-Standard Encoding
OceanSalt can encode data with a NOT operation before sending the data to the control server.
Data Encoding:Non-Standard Encoding
PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server.
Data Encoding:Non-Standard Encoding
RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions.
Data Encoding:Non-Standard Encoding
ShadowPad has encoded data as readable Latin characters.
Data Encoding:Non-Standard Encoding
Small Sieve can use a custom hex byte swapping encoding scheme to obfuscate tasking traffic.
Data Encoding:Non-Standard Encoding
Uroburos can use a custom base62 and a de-facto base32 encoding that uses digits 0-9 and lowercase letters a-z in C2 communications.
Data Obfuscation
FlawedAmmyy may obfuscate portions of the initial C2 handshake.
Data Obfuscation
FunnyDream can send compressed and obfuscated packets to C2.
Data Obfuscation
During Operation Wocao, threat actors encrypted IP addresses used for "Agent" proxy hops with RC4.
Data Obfuscation
RDAT has used encoded data within subdomains as AES ciphertext to communicate from the host to the C2.
Data Obfuscation
SideTwist can embed C2 responses in the source code of a fake Flickr webpage.
Data Obfuscation
SLOTHFULMEDIA has hashed a string containing system information prior to exfiltration via POST requests.
Data Obfuscation
TrailBlazer can masquerade its C2 traffic as legitimate Google Notifications HTTP requests.
Data Obfuscation:Junk Data
It added "junk data" to each encoded string, preventing trivial decoding without knowledge of the junk removal algorithm. Each implant was given a "junk length" value when created, tracked by the controller software to allow seamless communication but prevent analysis of the command protocol on the wire.
Data Obfuscation:Junk Data
BendyBear has used byte randomization to obscure its behavior.
Data Obfuscation:Junk Data
Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests, making it difficult to write signatures on them.
Data Obfuscation:Junk Data
GoldMax has used decoy traffic to surround its malicious network traffic to avoid detection.
Data Obfuscation:Junk Data
GrimAgent can pad C2 messages with random generated values.
Data Obfuscation:Junk Data
Kevin can generate a sequence of dummy HTTP C2 requests to obscure traffic.
Data Obfuscation:Junk Data
Mori has obfuscated the FML.dll with 200MB of junk data.
Data Obfuscation:Junk Data
P2P ZeuS added junk data to outgoing UDP packets to peer implants.
Data Obfuscation:Junk Data
P8RAT can send randomly-generated data as part of its C2 communication.
Data Obfuscation:Junk Data
PLEAD samples were found to be highly obfuscated with junk code.
Data Obfuscation:Junk Data
SUNBURST added junk bytes to its C2 over HTTP.
Data Obfuscation:Junk Data
TrailBlazer has used random identifier strings to obscure its C2 operations and result codes.
Data Obfuscation:Junk Data
Turian can insert pseudo-random characters into its network encryption setup.
Data Obfuscation:Junk Data
Uroburos can add extra characters in encoded strings to help mimic DNS legitimate requests.
Data Obfuscation:Junk Data
WellMess can use junk data in the Base64 string for additional obfuscation.
Data Obfuscation:Steganography
It has used steganography to hide its C2 communications.
Data Obfuscation:Steganography
Daserf can use steganography to hide malicious code downloaded to the victim.
Data Obfuscation:Steganography
When the Duqu command and control is operating over HTTP or HTTPS, Duqu uploads data to its controller by appending it to a blank JPG file.
Data Obfuscation:Steganography
HAMMERTOSS is controlled via commands that are appended to image files.
Data Obfuscation:Steganography
LightNeuron is controlled via commands that are embedded into PDFs and JPGs using steganographic methods.
Data Obfuscation:Steganography
During Operation Ghost, It used steganography to hide the communications between the implants and their C&C servers.
Data Obfuscation:Steganography
RDAT can process steganographic images attached to email messages to send and receive C2 commands. RDAT can also embed additional messages within BMP images to communicate with the RDAT operator.
Data Obfuscation:Steganography
Sliver can encode binary data into a .PNG file for C2 communication.
Data Obfuscation:Steganography
SUNBURST C2 data attempted to appear as benign XML related to .NET assemblies or as a faux JSON blob.
Data Obfuscation:Steganography
ZeroT has retrieved stage 2 payloads as Bitmap images that use Least Significant Bit (LSB) steganography.
Data Obfuscation:Steganography
Zox has used the .PNG file format for C2 communications.
Data Obfuscation:Protocol Impersonation
BADCALL uses a FakeTLS method during C2.
Data Obfuscation:Protocol Impersonation
Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications.
Data Obfuscation:Protocol Impersonation
During C0017, It frequently configured the URL endpoints of their stealthy passive backdoor LOWKEY.PASSIVE to masquerade as normal web application traffic on an infected server.
Data Obfuscation:Protocol Impersonation
Cobalt Strike can mimic the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.
Data Obfuscation:Protocol Impersonation
FakeM C2 traffic attempts to evade detection by resembling data generated by legitimate messenger applications, such as MSN and Yahoo! messengers. Additionally, some variants of FakeM use modified SSL code for communications back to C2 servers, making SSL decryption ineffective.
Data Obfuscation:Protocol Impersonation
FALLCHILL uses fake Transport Layer Security (TLS) to communicate with its C2 server.
Data Obfuscation:Protocol Impersonation
HARDRAIN uses FakeTLS to communicate with its C2 server.
Data Obfuscation:Protocol Impersonation
It used a FakeTLS session for C2 communications.
Data Obfuscation:Protocol Impersonation
InvisiMole can mimic HTTP protocol with custom HTTP "verbs" HIDE, ZVVP, and NOP.
Data Obfuscation:Protocol Impersonation
KeyBoy uses custom SSL libraries to impersonate SSL in C2 traffic.
Data Obfuscation:Protocol Impersonation
It malware also uses a unique form of communication encryption known as FakeTLS that mimics TLS but uses a different encryption method, potentially evading SSL traffic inspection/decryption.
Data Obfuscation:Protocol Impersonation
Okrum mimics HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.
Data Obfuscation:Protocol Impersonation
SUNBURST masqueraded its network traffic as the Orion Improvement Program (OIP) protocol.
Data Obfuscation:Protocol Impersonation
TAINTEDSCRIBE has used FakeTLS for session authentication.
Data Obfuscation:Protocol Impersonation
Uroburos can use custom communication methodologies that ride over common protocols including TCP, UDP, HTTP, SMTP, and DNS in order to blend with normal network traffic.
Dynamic Resolution
It has used Dynamic DNS providers for their malware C2 infrastructure.
Dynamic Resolution
AsyncRAT can be configured to use dynamic DNS.
Dynamic Resolution
Bisonal has used a dynamic DNS service for C2.
Dynamic Resolution
It has used DDNS for C2 communications.
Dynamic Resolution
During C0026, the threat actors re-registered a ClouDNS dynamic DNS subdomain which was previously used by ANDROMEDA.
Dynamic Resolution
It has incorporated dynamic DNS domains in its infrastructure.
Dynamic Resolution
Gelsemium can use dynamic DNS domain names in C2.
Dynamic Resolution
Maze has forged POST strings with a random choice from a list of possibilities including "forum", "php", "view", etc. while making connection with the C2, hindering detection efforts.
Dynamic Resolution
NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2.
Dynamic Resolution
During Night Dragon, threat actors used dynamic DNS services for C2.
Dynamic Resolution
For Operation Dust Storm, the threat actors used dynamic DNS domains from a variety of free providers, including No-IP, Oray, and 3322.
Dynamic Resolution
For Operation Spalax, the threat actors used dynamic DNS services, including Duck DNS and DNS Exit, as part of their C2 infrastructure.
Dynamic Resolution
It has resolved Pony C2 server IP addresses by either converting Bitcoin blockchain transaction data to specific octets, or accessing IP addresses directly within the Namecoin blockchain.
Dynamic Resolution
During the SolarWinds Compromise, It used dynamic DNS resolution to construct and resolve to randomly-generated subdomains for C2.
Dynamic Resolution
SUNBURST dynamically resolved C2 infrastructure for randomly-generated subdomains within a parent domain.
Dynamic Resolution
It has used dynamic DNS services for C2 infrastructure.