prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Dynamic Resolution
|
Tomiris has connected to a signalization server that provides a URL and port, and then Tomiris sends a GET request to that URL to establish C2.
|
Dynamic Resolution
|
It has used dynamic DNS services to set up C2.
|
Dynamic Resolution:Fast Flux DNS
|
Amadey has used fast flux DNS for its C2.
|
Dynamic Resolution:Fast Flux DNS
|
gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses.
|
Dynamic Resolution:Fast Flux DNS
|
It has used dynamic DNS service providers to host malicious domains.
|
Dynamic Resolution:Fast Flux DNS
|
njRAT has used a fast flux DNS for C2 IP resolution.
|
Dynamic Resolution:Fast Flux DNS
|
It has used fast flux to mask botnets by distributing payloads across multiple IPs.
|
Dynamic Resolution:Domain Generation Algorithms
|
It has used DGAs to change their C2 servers monthly.
|
Dynamic Resolution:Domain Generation Algorithms
|
Aria-body has the ability to use a DGA for C2 communications.
|
Dynamic Resolution:Domain Generation Algorithms
|
Astaroth has used a DGA in C2 communications.
|
Dynamic Resolution:Domain Generation Algorithms
|
Bazar can implement DGA using the current date as a seed variable.
|
Dynamic Resolution:Domain Generation Algorithms
|
BONDUPDATER uses a DGA to communicate with command and control servers.
|
Dynamic Resolution:Domain Generation Algorithms
|
CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.
|
Dynamic Resolution:Domain Generation Algorithms
|
CHOPSTICK can use a DGA for Fallback Channels, domains are generated by concatenating words from lists.
|
Dynamic Resolution:Domain Generation Algorithms
|
Conficker has used a DGA that seeds with the current UTC victim system date to generate domains.
|
Dynamic Resolution:Domain Generation Algorithms
|
DarkWatchman has used a DGA to generate a domain name for C2.
|
Dynamic Resolution:Domain Generation Algorithms
|
Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains.
|
Dynamic Resolution:Domain Generation Algorithms
|
Ebury has used a DGA to generate a domain name for C2.
|
Dynamic Resolution:Domain Generation Algorithms
|
Grandoreiro can use a DGA for hiding C2 addresses, including use of an algorithm with a user-specific key that changes daily.
|
Dynamic Resolution:Domain Generation Algorithms
|
Milan can use hardcoded domains as an input for domain generation algorithms.
|
Dynamic Resolution:Domain Generation Algorithms
|
MiniDuke can use DGA to generate new Twitter URLs for C2.
|
Dynamic Resolution:Domain Generation Algorithms
|
ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours.
|
Dynamic Resolution:Domain Generation Algorithms
|
POSHSPY uses a DGA to derive command and control URLs from a word list.
|
Dynamic Resolution:Domain Generation Algorithms
|
QakBot can use domain generation algorithms in C2 communication.
|
Dynamic Resolution:Domain Generation Algorithms
|
ShadowPad uses a DGA that is based on the day of the month for C2 servers.
|
Dynamic Resolution:Domain Generation Algorithms
|
Shark can send DNS C2 communications using a unique domain generation algorithm.
|
Dynamic Resolution:Domain Generation Algorithms
|
SombRAT can use a custom DGA to generate a subdomain for C2.
|
Dynamic Resolution:Domain Generation Algorithms
|
It has used a DGA to generate URLs from executed macros.
|
Dynamic Resolution:Domain Generation Algorithms
|
Ursnif has used a DGA to generate domain names for C2.
|
Dynamic Resolution:DNS Calculation
|
It has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port.
|
Encrypted Channel
|
It has used multiple layers of encryption within malware to protect C2 communication.
|
Encrypted Channel
|
It has encrypted their C2 communications.
|
Encrypted Channel
|
Chaes has used encryption for its C2 channel.
|
Encrypted Channel
|
Cryptoistic can engage in encrypted communications with C2.
|
Encrypted Channel
|
gh0st RAT has encrypted TCP communications to evade detection.
|
Encrypted Channel
|
Lizar can support encrypted communications between the client and server.
|
Encrypted Channel
|
MacMa has used TLS encryption to initialize a custom protocol for C2 communications.
|
Encrypted Channel
|
It has used an encrypted http proxy in C2 communications.
|
Encrypted Channel
|
NETWIRE can encrypt C2 communications.
|
Encrypted Channel
|
PowerLess can use an encrypted channel for C2 communications.
|
Encrypted Channel
|
PowGoop can receive encrypted commands from C2.
|
Encrypted Channel
|
RCSession can use an encrypted beacon to check in with C2.
|
Encrypted Channel
|
It has encrypted traffic with the C2 to prevent network detection.
|
Encrypted Channel:Symmetric Cryptography
|
3PARA RAT command and control commands are encrypted within the HTTP C2 channel using the DES algorithm in CBC mode with a key derived from the MD5 hash of the string HYF54&%9&jkMCXuiS. 3PARA RAT will use an 8-byte XOR key derived from the string HYF54&%9&jkMCXuiS if the DES decoding fails
|
Encrypted Channel:Symmetric Cryptography
|
4H RAT obfuscates C2 communication using a 1-byte XOR with the key 0xBE.
|
Encrypted Channel:Symmetric Cryptography
|
A variant of ADVSTORESHELL encrypts some C2 with 3DES.
|
Encrypted Channel:Symmetric Cryptography
|
It installed a Delphi backdoor that used a custom algorithm for C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
It has used AES for encryption of command and control traffic.
|
Encrypted Channel:Symmetric Cryptography
|
Attor has encrypted data symmetrically using a randomly generated Blowfish (OFB) key which is encrypted with a public RSA key.
|
Encrypted Channel:Symmetric Cryptography
|
Azorult can encrypt C2 traffic using XOR.
|
Encrypted Channel:Symmetric Cryptography
|
BADCALL encrypts C2 traffic using an XOR/ADD cipher.
|
Encrypted Channel:Symmetric Cryptography
|
BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23.
|
Encrypted Channel:Symmetric Cryptography
|
Bandook has used AES encryption for C2 communication.
|
Encrypted Channel:Symmetric Cryptography
|
Bazar can send C2 communications with XOR encryption.
|
Encrypted Channel:Symmetric Cryptography
|
BBSRAT uses a custom encryption algorithm on data sent back to the C2 server over HTTP.
|
Encrypted Channel:Symmetric Cryptography
|
BendyBear communicates to a C2 server over port 443 using modified RC4 and XOR-encrypted chunks.
|
Encrypted Channel:Symmetric Cryptography
|
Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
BLINDINGCAN has encrypted its C2 traffic with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
Bonadan can XOR-encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
It has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. It has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.
|
Encrypted Channel:Symmetric Cryptography
|
Bumblebee can encrypt C2 requests and responses with RC4
|
Encrypted Channel:Symmetric Cryptography
|
CallMe uses AES to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
It encrypts the message body of HTTP traffic with RC2 (in CBC mode). It also uses XOR with random keys for its communications.
|
Encrypted Channel:Symmetric Cryptography
|
Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.
|
Encrypted Channel:Symmetric Cryptography
|
CharmPower can send additional modules over C2 encrypted with a simple substitution cipher.
|
Encrypted Channel:Symmetric Cryptography
|
ChChes can encrypt C2 traffic with AES or RC4.
|
Encrypted Channel:Symmetric Cryptography
|
CHOPSTICK encrypts C2 communications with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
Cobalt Strike has the ability to use AES-256 symmetric encryption in CBC mode with HMAC-SHA-256 to encrypt task commands and XOR to encrypt shell code and configuration data.
|
Encrypted Channel:Symmetric Cryptography
|
Comnie encrypts command and control communications with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
CORESHELL C2 messages are encrypted with custom stream ciphers using six-byte or eight-byte keys.
|
Encrypted Channel:Symmetric Cryptography
|
CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error.
|
Encrypted Channel:Symmetric Cryptography
|
It has used AES-256 and 3DES for C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
Daserf uses RC4 encryption to obfuscate HTTP traffic.
|
Encrypted Channel:Symmetric Cryptography
|
Derusbi obfuscates C2 traffic with variable 4-byte XOR keys.
|
Encrypted Channel:Symmetric Cryptography
|
Dipsind encrypts C2 data with AES256 in ECB mode.
|
Encrypted Channel:Symmetric Cryptography
|
down_new has the ability to AES encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
Downdelph uses RC4 to encrypt C2 responses.
|
Encrypted Channel:Symmetric Cryptography
|
Dridex has encrypted traffic with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
The Duqu command and control protocol's data stream can be encrypted with AES-CBC.
|
Encrypted Channel:Symmetric Cryptography
|
Ebury has encrypted C2 traffic using the client IP address, then encoded it as a hexadecimal string.
|
Encrypted Channel:Symmetric Cryptography
|
Elise encrypts exfiltrated data with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
The C2 server response to a beacon sent by a variant of Emissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of Emissary use various XOR operations to encrypt C2 data.
|
Encrypted Channel:Symmetric Cryptography
|
Epic encrypts commands from the C2 server using a hardcoded key.
|
Encrypted Channel:Symmetric Cryptography
|
Explosive has encrypted communications with the RC4 method.
|
Encrypted Channel:Symmetric Cryptography
|
The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of "YHCRA" and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
FALLCHILL encrypts C2 data with RC4 encryption.
|
Encrypted Channel:Symmetric Cryptography
|
FatDuke can AES encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys.
|
Encrypted Channel:Symmetric Cryptography
|
FlawedAmmyy has used SEAL encryption during the initial C2 handshake.
|
Encrypted Channel:Symmetric Cryptography
|
FoggyWeb has used a dynamic XOR key and custom XOR methodology for C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
During Frankenstein, the threat actors communicated with C2 via an encrypted RC4 byte stream and AES-CBC.
|
Encrypted Channel:Symmetric Cryptography
|
Gazer uses custom encryption for C2 that uses 3DES.
|
Encrypted Channel:Symmetric Cryptography
|
gh0st RAT uses RC4 and XOR to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
GreyEnergy encrypts communications using AES256.
|
Encrypted Channel:Symmetric Cryptography
|
GrimAgent can use an AES key to encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
H1N1 encrypts C2 traffic using an RC4 key.
|
Encrypted Channel:Symmetric Cryptography
|
Before being appended to image files, HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands, an investigator would need access to the intended malware sample, the day's tweet, and the image file containing the command.
|
Encrypted Channel:Symmetric Cryptography
|
Helminth encrypts data sent to its C2 server over HTTP with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.