prompt
stringclasses
508 values
procedure
stringlengths
20
478
Dynamic Resolution
Tomiris has connected to a signalization server that provides a URL and port, and then Tomiris sends a GET request to that URL to establish C2.
Dynamic Resolution
It has used dynamic DNS services to set up C2.
Dynamic Resolution:Fast Flux DNS
Amadey has used fast flux DNS for its C2.
Dynamic Resolution:Fast Flux DNS
gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses.
Dynamic Resolution:Fast Flux DNS
It has used dynamic DNS service providers to host malicious domains.
Dynamic Resolution:Fast Flux DNS
njRAT has used a fast flux DNS for C2 IP resolution.
Dynamic Resolution:Fast Flux DNS
It has used fast flux to mask botnets by distributing payloads across multiple IPs.
Dynamic Resolution:Domain Generation Algorithms
It has used DGAs to change their C2 servers monthly.
Dynamic Resolution:Domain Generation Algorithms
Aria-body has the ability to use a DGA for C2 communications.
Dynamic Resolution:Domain Generation Algorithms
Astaroth has used a DGA in C2 communications.
Dynamic Resolution:Domain Generation Algorithms
Bazar can implement DGA using the current date as a seed variable.
Dynamic Resolution:Domain Generation Algorithms
BONDUPDATER uses a DGA to communicate with command and control servers.
Dynamic Resolution:Domain Generation Algorithms
CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.
Dynamic Resolution:Domain Generation Algorithms
CHOPSTICK can use a DGA for Fallback Channels, domains are generated by concatenating words from lists.
Dynamic Resolution:Domain Generation Algorithms
Conficker has used a DGA that seeds with the current UTC victim system date to generate domains.
Dynamic Resolution:Domain Generation Algorithms
DarkWatchman has used a DGA to generate a domain name for C2.
Dynamic Resolution:Domain Generation Algorithms
Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains.
Dynamic Resolution:Domain Generation Algorithms
Ebury has used a DGA to generate a domain name for C2.
Dynamic Resolution:Domain Generation Algorithms
Grandoreiro can use a DGA for hiding C2 addresses, including use of an algorithm with a user-specific key that changes daily.
Dynamic Resolution:Domain Generation Algorithms
Milan can use hardcoded domains as an input for domain generation algorithms.
Dynamic Resolution:Domain Generation Algorithms
MiniDuke can use DGA to generate new Twitter URLs for C2.
Dynamic Resolution:Domain Generation Algorithms
ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours.
Dynamic Resolution:Domain Generation Algorithms
POSHSPY uses a DGA to derive command and control URLs from a word list.
Dynamic Resolution:Domain Generation Algorithms
QakBot can use domain generation algorithms in C2 communication.
Dynamic Resolution:Domain Generation Algorithms
ShadowPad uses a DGA that is based on the day of the month for C2 servers.
Dynamic Resolution:Domain Generation Algorithms
Shark can send DNS C2 communications using a unique domain generation algorithm.
Dynamic Resolution:Domain Generation Algorithms
SombRAT can use a custom DGA to generate a subdomain for C2.
Dynamic Resolution:Domain Generation Algorithms
It has used a DGA to generate URLs from executed macros.
Dynamic Resolution:Domain Generation Algorithms
Ursnif has used a DGA to generate domain names for C2.
Dynamic Resolution:DNS Calculation
It has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port.
Encrypted Channel
It has used multiple layers of encryption within malware to protect C2 communication.
Encrypted Channel
It has encrypted their C2 communications.
Encrypted Channel
Chaes has used encryption for its C2 channel.
Encrypted Channel
Cryptoistic can engage in encrypted communications with C2.
Encrypted Channel
gh0st RAT has encrypted TCP communications to evade detection.
Encrypted Channel
Lizar can support encrypted communications between the client and server.
Encrypted Channel
MacMa has used TLS encryption to initialize a custom protocol for C2 communications.
Encrypted Channel
It has used an encrypted http proxy in C2 communications.
Encrypted Channel
NETWIRE can encrypt C2 communications.
Encrypted Channel
PowerLess can use an encrypted channel for C2 communications.
Encrypted Channel
PowGoop can receive encrypted commands from C2.
Encrypted Channel
RCSession can use an encrypted beacon to check in with C2.
Encrypted Channel
It has encrypted traffic with the C2 to prevent network detection.
Encrypted Channel:Symmetric Cryptography
3PARA RAT command and control commands are encrypted within the HTTP C2 channel using the DES algorithm in CBC mode with a key derived from the MD5 hash of the string HYF54&%9&jkMCXuiS. 3PARA RAT will use an 8-byte XOR key derived from the string HYF54&%9&jkMCXuiS if the DES decoding fails
Encrypted Channel:Symmetric Cryptography
4H RAT obfuscates C2 communication using a 1-byte XOR with the key 0xBE.
Encrypted Channel:Symmetric Cryptography
A variant of ADVSTORESHELL encrypts some C2 with 3DES.
Encrypted Channel:Symmetric Cryptography
It installed a Delphi backdoor that used a custom algorithm for C2 communications.
Encrypted Channel:Symmetric Cryptography
It has used AES for encryption of command and control traffic.
Encrypted Channel:Symmetric Cryptography
Attor has encrypted data symmetrically using a randomly generated Blowfish (OFB) key which is encrypted with a public RSA key.
Encrypted Channel:Symmetric Cryptography
Azorult can encrypt C2 traffic using XOR.
Encrypted Channel:Symmetric Cryptography
BADCALL encrypts C2 traffic using an XOR/ADD cipher.
Encrypted Channel:Symmetric Cryptography
BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23.
Encrypted Channel:Symmetric Cryptography
Bandook has used AES encryption for C2 communication.
Encrypted Channel:Symmetric Cryptography
Bazar can send C2 communications with XOR encryption.
Encrypted Channel:Symmetric Cryptography
BBSRAT uses a custom encryption algorithm on data sent back to the C2 server over HTTP.
Encrypted Channel:Symmetric Cryptography
BendyBear communicates to a C2 server over port 443 using modified RC4 and XOR-encrypted chunks.
Encrypted Channel:Symmetric Cryptography
Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4.
Encrypted Channel:Symmetric Cryptography
BLINDINGCAN has encrypted its C2 traffic with RC4.
Encrypted Channel:Symmetric Cryptography
Bonadan can XOR-encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
It has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. It has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.
Encrypted Channel:Symmetric Cryptography
Bumblebee can encrypt C2 requests and responses with RC4
Encrypted Channel:Symmetric Cryptography
CallMe uses AES to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
It encrypts the message body of HTTP traffic with RC2 (in CBC mode). It also uses XOR with random keys for its communications.
Encrypted Channel:Symmetric Cryptography
Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.
Encrypted Channel:Symmetric Cryptography
CharmPower can send additional modules over C2 encrypted with a simple substitution cipher.
Encrypted Channel:Symmetric Cryptography
ChChes can encrypt C2 traffic with AES or RC4.
Encrypted Channel:Symmetric Cryptography
CHOPSTICK encrypts C2 communications with RC4.
Encrypted Channel:Symmetric Cryptography
Cobalt Strike has the ability to use AES-256 symmetric encryption in CBC mode with HMAC-SHA-256 to encrypt task commands and XOR to encrypt shell code and configuration data.
Encrypted Channel:Symmetric Cryptography
Comnie encrypts command and control communications with RC4.
Encrypted Channel:Symmetric Cryptography
CORESHELL C2 messages are encrypted with custom stream ciphers using six-byte or eight-byte keys.
Encrypted Channel:Symmetric Cryptography
CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error.
Encrypted Channel:Symmetric Cryptography
It has used AES-256 and 3DES for C2 communications.
Encrypted Channel:Symmetric Cryptography
Daserf uses RC4 encryption to obfuscate HTTP traffic.
Encrypted Channel:Symmetric Cryptography
Derusbi obfuscates C2 traffic with variable 4-byte XOR keys.
Encrypted Channel:Symmetric Cryptography
Dipsind encrypts C2 data with AES256 in ECB mode.
Encrypted Channel:Symmetric Cryptography
down_new has the ability to AES encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
Downdelph uses RC4 to encrypt C2 responses.
Encrypted Channel:Symmetric Cryptography
Dridex has encrypted traffic with RC4.
Encrypted Channel:Symmetric Cryptography
The Duqu command and control protocol's data stream can be encrypted with AES-CBC.
Encrypted Channel:Symmetric Cryptography
Ebury has encrypted C2 traffic using the client IP address, then encoded it as a hexadecimal string.
Encrypted Channel:Symmetric Cryptography
Elise encrypts exfiltrated data with RC4.
Encrypted Channel:Symmetric Cryptography
The C2 server response to a beacon sent by a variant of Emissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of Emissary use various XOR operations to encrypt C2 data.
Encrypted Channel:Symmetric Cryptography
Epic encrypts commands from the C2 server using a hardcoded key.
Encrypted Channel:Symmetric Cryptography
Explosive has encrypted communications with the RC4 method.
Encrypted Channel:Symmetric Cryptography
The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of "YHCRA" and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
FALLCHILL encrypts C2 data with RC4 encryption.
Encrypted Channel:Symmetric Cryptography
FatDuke can AES encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys.
Encrypted Channel:Symmetric Cryptography
FlawedAmmyy has used SEAL encryption during the initial C2 handshake.
Encrypted Channel:Symmetric Cryptography
FoggyWeb has used a dynamic XOR key and custom XOR methodology for C2 communications.
Encrypted Channel:Symmetric Cryptography
During Frankenstein, the threat actors communicated with C2 via an encrypted RC4 byte stream and AES-CBC.
Encrypted Channel:Symmetric Cryptography
Gazer uses custom encryption for C2 that uses 3DES.
Encrypted Channel:Symmetric Cryptography
gh0st RAT uses RC4 and XOR to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
GreyEnergy encrypts communications using AES256.
Encrypted Channel:Symmetric Cryptography
GrimAgent can use an AES key to encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
H1N1 encrypts C2 traffic using an RC4 key.
Encrypted Channel:Symmetric Cryptography
Before being appended to image files, HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands, an investigator would need access to the intended malware sample, the day's tweet, and the image file containing the command.
Encrypted Channel:Symmetric Cryptography
Helminth encrypts data sent to its C2 server over HTTP with RC4.
Encrypted Channel:Symmetric Cryptography
Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys.