prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Dynamic Resolution | Tomiris has connected to a signalization server that provides a URL and port, and then Tomiris sends a GET request to that URL to establish C2. |
Dynamic Resolution | It has used dynamic DNS services to set up C2. |
Dynamic Resolution:Fast Flux DNS | Amadey has used fast flux DNS for its C2. |
Dynamic Resolution:Fast Flux DNS | gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses. |
Dynamic Resolution:Fast Flux DNS | It has used dynamic DNS service providers to host malicious domains. |
Dynamic Resolution:Fast Flux DNS | njRAT has used a fast flux DNS for C2 IP resolution. |
Dynamic Resolution:Fast Flux DNS | It has used fast flux to mask botnets by distributing payloads across multiple IPs. |
Dynamic Resolution:Domain Generation Algorithms | It has used DGAs to change their C2 servers monthly. |
Dynamic Resolution:Domain Generation Algorithms | Aria-body has the ability to use a DGA for C2 communications. |
Dynamic Resolution:Domain Generation Algorithms | Astaroth has used a DGA in C2 communications. |
Dynamic Resolution:Domain Generation Algorithms | Bazar can implement DGA using the current date as a seed variable. |
Dynamic Resolution:Domain Generation Algorithms | BONDUPDATER uses a DGA to communicate with command and control servers. |
Dynamic Resolution:Domain Generation Algorithms | CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost. |
Dynamic Resolution:Domain Generation Algorithms | CHOPSTICK can use a DGA for Fallback Channels, domains are generated by concatenating words from lists. |
Dynamic Resolution:Domain Generation Algorithms | Conficker has used a DGA that seeds with the current UTC victim system date to generate domains. |
Dynamic Resolution:Domain Generation Algorithms | DarkWatchman has used a DGA to generate a domain name for C2. |
Dynamic Resolution:Domain Generation Algorithms | Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains. |
Dynamic Resolution:Domain Generation Algorithms | Ebury has used a DGA to generate a domain name for C2. |
Dynamic Resolution:Domain Generation Algorithms | Grandoreiro can use a DGA for hiding C2 addresses, including use of an algorithm with a user-specific key that changes daily. |
Dynamic Resolution:Domain Generation Algorithms | Milan can use hardcoded domains as an input for domain generation algorithms. |
Dynamic Resolution:Domain Generation Algorithms | MiniDuke can use DGA to generate new Twitter URLs for C2. |
Dynamic Resolution:Domain Generation Algorithms | ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours. |
Dynamic Resolution:Domain Generation Algorithms | POSHSPY uses a DGA to derive command and control URLs from a word list. |
Dynamic Resolution:Domain Generation Algorithms | QakBot can use domain generation algorithms in C2 communication. |
Dynamic Resolution:Domain Generation Algorithms | ShadowPad uses a DGA that is based on the day of the month for C2 servers. |
Dynamic Resolution:Domain Generation Algorithms | Shark can send DNS C2 communications using a unique domain generation algorithm. |
Dynamic Resolution:Domain Generation Algorithms | SombRAT can use a custom DGA to generate a subdomain for C2. |
Dynamic Resolution:Domain Generation Algorithms | It has used a DGA to generate URLs from executed macros. |
Dynamic Resolution:Domain Generation Algorithms | Ursnif has used a DGA to generate domain names for C2. |
Dynamic Resolution:DNS Calculation | It has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port. |
Encrypted Channel | It has used multiple layers of encryption within malware to protect C2 communication. |
Encrypted Channel | It has encrypted their C2 communications. |
Encrypted Channel | Chaes has used encryption for its C2 channel. |
Encrypted Channel | Cryptoistic can engage in encrypted communications with C2. |
Encrypted Channel | gh0st RAT has encrypted TCP communications to evade detection. |
Encrypted Channel | Lizar can support encrypted communications between the client and server. |
Encrypted Channel | MacMa has used TLS encryption to initialize a custom protocol for C2 communications. |
Encrypted Channel | It has used an encrypted http proxy in C2 communications. |
Encrypted Channel | NETWIRE can encrypt C2 communications. |
Encrypted Channel | PowerLess can use an encrypted channel for C2 communications. |
Encrypted Channel | PowGoop can receive encrypted commands from C2. |
Encrypted Channel | RCSession can use an encrypted beacon to check in with C2. |
Encrypted Channel | It has encrypted traffic with the C2 to prevent network detection. |
Encrypted Channel:Symmetric Cryptography | 3PARA RAT command and control commands are encrypted within the HTTP C2 channel using the DES algorithm in CBC mode with a key derived from the MD5 hash of the string HYF54&%9&jkMCXuiS. 3PARA RAT will use an 8-byte XOR key derived from the string HYF54&%9&jkMCXuiS if the DES decoding fails |
Encrypted Channel:Symmetric Cryptography | 4H RAT obfuscates C2 communication using a 1-byte XOR with the key 0xBE. |
Encrypted Channel:Symmetric Cryptography | A variant of ADVSTORESHELL encrypts some C2 with 3DES. |
Encrypted Channel:Symmetric Cryptography | It installed a Delphi backdoor that used a custom algorithm for C2 communications. |
Encrypted Channel:Symmetric Cryptography | It has used AES for encryption of command and control traffic. |
Encrypted Channel:Symmetric Cryptography | Attor has encrypted data symmetrically using a randomly generated Blowfish (OFB) key which is encrypted with a public RSA key. |
Encrypted Channel:Symmetric Cryptography | Azorult can encrypt C2 traffic using XOR. |
Encrypted Channel:Symmetric Cryptography | BADCALL encrypts C2 traffic using an XOR/ADD cipher. |
Encrypted Channel:Symmetric Cryptography | BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23. |
Encrypted Channel:Symmetric Cryptography | Bandook has used AES encryption for C2 communication. |
Encrypted Channel:Symmetric Cryptography | Bazar can send C2 communications with XOR encryption. |
Encrypted Channel:Symmetric Cryptography | BBSRAT uses a custom encryption algorithm on data sent back to the C2 server over HTTP. |
Encrypted Channel:Symmetric Cryptography | BendyBear communicates to a C2 server over port 443 using modified RC4 and XOR-encrypted chunks. |
Encrypted Channel:Symmetric Cryptography | Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4. |
Encrypted Channel:Symmetric Cryptography | BLINDINGCAN has encrypted its C2 traffic with RC4. |
Encrypted Channel:Symmetric Cryptography | Bonadan can XOR-encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | It has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. It has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server. |
Encrypted Channel:Symmetric Cryptography | Bumblebee can encrypt C2 requests and responses with RC4 |
Encrypted Channel:Symmetric Cryptography | CallMe uses AES to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | It encrypts the message body of HTTP traffic with RC2 (in CBC mode). It also uses XOR with random keys for its communications. |
Encrypted Channel:Symmetric Cryptography | Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES. |
Encrypted Channel:Symmetric Cryptography | CharmPower can send additional modules over C2 encrypted with a simple substitution cipher. |
Encrypted Channel:Symmetric Cryptography | ChChes can encrypt C2 traffic with AES or RC4. |
Encrypted Channel:Symmetric Cryptography | CHOPSTICK encrypts C2 communications with RC4. |
Encrypted Channel:Symmetric Cryptography | Cobalt Strike has the ability to use AES-256 symmetric encryption in CBC mode with HMAC-SHA-256 to encrypt task commands and XOR to encrypt shell code and configuration data. |
Encrypted Channel:Symmetric Cryptography | Comnie encrypts command and control communications with RC4. |
Encrypted Channel:Symmetric Cryptography | CORESHELL C2 messages are encrypted with custom stream ciphers using six-byte or eight-byte keys. |
Encrypted Channel:Symmetric Cryptography | CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error. |
Encrypted Channel:Symmetric Cryptography | It has used AES-256 and 3DES for C2 communications. |
Encrypted Channel:Symmetric Cryptography | Daserf uses RC4 encryption to obfuscate HTTP traffic. |
Encrypted Channel:Symmetric Cryptography | Derusbi obfuscates C2 traffic with variable 4-byte XOR keys. |
Encrypted Channel:Symmetric Cryptography | Dipsind encrypts C2 data with AES256 in ECB mode. |
Encrypted Channel:Symmetric Cryptography | down_new has the ability to AES encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | Downdelph uses RC4 to encrypt C2 responses. |
Encrypted Channel:Symmetric Cryptography | Dridex has encrypted traffic with RC4. |
Encrypted Channel:Symmetric Cryptography | The Duqu command and control protocol's data stream can be encrypted with AES-CBC. |
Encrypted Channel:Symmetric Cryptography | Ebury has encrypted C2 traffic using the client IP address, then encoded it as a hexadecimal string. |
Encrypted Channel:Symmetric Cryptography | Elise encrypts exfiltrated data with RC4. |
Encrypted Channel:Symmetric Cryptography | The C2 server response to a beacon sent by a variant of Emissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of Emissary use various XOR operations to encrypt C2 data. |
Encrypted Channel:Symmetric Cryptography | Epic encrypts commands from the C2 server using a hardcoded key. |
Encrypted Channel:Symmetric Cryptography | Explosive has encrypted communications with the RC4 method. |
Encrypted Channel:Symmetric Cryptography | The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of "YHCRA" and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | FALLCHILL encrypts C2 data with RC4 encryption. |
Encrypted Channel:Symmetric Cryptography | FatDuke can AES encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys. |
Encrypted Channel:Symmetric Cryptography | FlawedAmmyy has used SEAL encryption during the initial C2 handshake. |
Encrypted Channel:Symmetric Cryptography | FoggyWeb has used a dynamic XOR key and custom XOR methodology for C2 communications. |
Encrypted Channel:Symmetric Cryptography | During Frankenstein, the threat actors communicated with C2 via an encrypted RC4 byte stream and AES-CBC. |
Encrypted Channel:Symmetric Cryptography | Gazer uses custom encryption for C2 that uses 3DES. |
Encrypted Channel:Symmetric Cryptography | gh0st RAT uses RC4 and XOR to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | GreyEnergy encrypts communications using AES256. |
Encrypted Channel:Symmetric Cryptography | GrimAgent can use an AES key to encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | H1N1 encrypts C2 traffic using an RC4 key. |
Encrypted Channel:Symmetric Cryptography | Before being appended to image files, HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands, an investigator would need access to the intended malware sample, the day's tweet, and the image file containing the command. |
Encrypted Channel:Symmetric Cryptography | Helminth encrypts data sent to its C2 server over HTTP with RC4. |
Encrypted Channel:Symmetric Cryptography | Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys. |
Subsets and Splits