prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Encrypted Channel:Symmetric Cryptography | HiddenWasp uses an RC4-like algorithm with an already computed PRGA generated key-stream for network communication. |
Encrypted Channel:Symmetric Cryptography | It used AES-128 to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | Hikit performs XOR encryption. |
Encrypted Channel:Symmetric Cryptography | HotCroissant has compressed network communications and encrypted them with a custom stream cipher. |
Encrypted Channel:Symmetric Cryptography | httpclient encrypts C2 content with XOR using a single byte, 0x12. |
Encrypted Channel:Symmetric Cryptography | Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations. |
Encrypted Channel:Symmetric Cryptography | HyperStack has used RSA encryption for C2 communications. |
Encrypted Channel:Symmetric Cryptography | The IceApple Result Retriever module can AES encrypt C2 responses. |
Encrypted Channel:Symmetric Cryptography | It has encrypted network communications with AES. |
Encrypted Channel:Symmetric Cryptography | InvisiMole uses variations of a simple XOR encryption routine for C&C communications. |
Encrypted Channel:Symmetric Cryptography | KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | Kobalos's post-authentication communication channel uses a 32-byte-long password with RC4 for inbound and outbound traffic. |
Encrypted Channel:Symmetric Cryptography | The Komplex C2 channel uses an 11-byte XOR algorithm to hide data. |
Encrypted Channel:Symmetric Cryptography | KONNI has used AES to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | Several It malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another It malware sample XORs C2 traffic. Other It malware uses Caracachs encryption to encrypt C2 payloads. It has also used AES to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | LightNeuron uses AES to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | LookBack uses a modified version of RC4 for data transfer. |
Encrypted Channel:Symmetric Cryptography | Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire. |
Encrypted Channel:Symmetric Cryptography | Lurid performs XOR encryption. |
Encrypted Channel:Symmetric Cryptography | It has used AES to exfiltrate documents. |
Encrypted Channel:Symmetric Cryptography | Mafalda can encrypt its C2 traffic with RC4. |
Encrypted Channel:Symmetric Cryptography | metaMain can encrypt the data that it sends and receives from the C2 server using an RC4 encryption algorithm. |
Encrypted Channel:Symmetric Cryptography | Metamorfo has encrypted C2 commands with AES-256. |
Encrypted Channel:Symmetric Cryptography | Mongall has the ability to RC4 encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | MoonWind encrypts C2 traffic using RC4 with a static key. |
Encrypted Channel:Symmetric Cryptography | More_eggs has used an RC4-based encryption method for its C2 communications. |
Encrypted Channel:Symmetric Cryptography | Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm. |
Encrypted Channel:Symmetric Cryptography | It has used AES to encrypt C2 responses. |
Encrypted Channel:Symmetric Cryptography | It has encrypted C2 communications with RC4. |
Encrypted Channel:Symmetric Cryptography | NanoCore uses DES to encrypt the C2 traffic. |
Encrypted Channel:Symmetric Cryptography | NDiskMonitor uses AES to encrypt certain information sent over its C2 channel. |
Encrypted Channel:Symmetric Cryptography | Nebulae can use RC4 and XOR to encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | NETEAGLE will decrypt resources it downloads with HTTP requests by using RC4 with the key "ScoutEagle." |
Encrypted Channel:Symmetric Cryptography | NETWIRE can use AES encryption for C2 data transferred. |
Encrypted Channel:Symmetric Cryptography | Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase. |
Encrypted Channel:Symmetric Cryptography | During Operation Dream Job, It used an AES key to communicate with their C2 server. |
Encrypted Channel:Symmetric Cryptography | OSX_OCEANLOTUS.D encrypts data sent back to the C2 using AES in CBC mode with a null initialization vector (IV) and a key sent from the server that is padded to 32 bytes. |
Encrypted Channel:Symmetric Cryptography | Pandora has the ability to encrypt communications with D3DES. |
Encrypted Channel:Symmetric Cryptography | PingPull can use AES, in cipher block chaining (CBC) mode padded with PKCS5, to encrypt C2 server communications. |
Encrypted Channel:Symmetric Cryptography | PipeMon communications are RC4 encrypted. |
Encrypted Channel:Symmetric Cryptography | PLAINTEE encodes C2 beacons using XOR. |
Encrypted Channel:Symmetric Cryptography | PLEAD has used RC4 encryption to download modules. |
Encrypted Channel:Symmetric Cryptography | PlugX can use RC4 encryption in C2 communications. |
Encrypted Channel:Symmetric Cryptography | PoisonIvy uses the Camellia cipher to encrypt communications. |
Encrypted Channel:Symmetric Cryptography | POWERTON has used AES for encrypting C2 traffic. |
Encrypted Channel:Symmetric Cryptography | Prikormka encrypts some C2 traffic with the Blowfish cipher. |
Encrypted Channel:Symmetric Cryptography | QakBot can RC4 encrypt strings in C2 communication. |
Encrypted Channel:Symmetric Cryptography | QuasarRAT uses AES with a hardcoded pre-shared key to encrypt network communication. |
Encrypted Channel:Symmetric Cryptography | QUIETCANARY can RC4 encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | RainyDay can use RC4 to encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | RDAT has used AES ciphertext to encode C2 communications. |
Encrypted Channel:Symmetric Cryptography | RedLeaves has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear. |
Encrypted Channel:Symmetric Cryptography | Rifdoor has encrypted command and control (C2) communications with a stream cipher. |
Encrypted Channel:Symmetric Cryptography | It has used the RIPTIDE RAT, which communicates over HTTP with a payload encrypted with RC4. |
Encrypted Channel:Symmetric Cryptography | RotaJakiro encrypts C2 communication using a combination of AES, XOR, ROTATE encryption, and ZLIB compression. |
Encrypted Channel:Symmetric Cryptography | It encrypts C2 traffic with a custom RC4 variant. |
Encrypted Channel:Symmetric Cryptography | Sakula encodes C2 traffic with single-byte XOR keys. |
Encrypted Channel:Symmetric Cryptography | Sardonic has the ability to use an RC4 key to encrypt communications to and from actor-controlled C2 servers. |
Encrypted Channel:Symmetric Cryptography | SeaDuke C2 traffic has been encrypted with RC4 and AES. |
Encrypted Channel:Symmetric Cryptography | SideTwist can encrypt C2 communications with a randomly generated key. |
Encrypted Channel:Symmetric Cryptography | Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange. |
Encrypted Channel:Symmetric Cryptography | SMOKEDHAM has encrypted its C2 traffic with RC4. |
Encrypted Channel:Symmetric Cryptography | SNUGRIDE encrypts C2 traffic using AES with a static key. |
Encrypted Channel:Symmetric Cryptography | SodaMaster can use RC4 to encrypt C2 communications. |
Encrypted Channel:Symmetric Cryptography | SombRAT has encrypted its C2 communications with AES. |
Encrypted Channel:Symmetric Cryptography | It malware encrypts C2 traffic using RC4 with a hard-coded key. |
Encrypted Channel:Symmetric Cryptography | StrifeWater can encrypt C2 traffic using XOR with a hard coded key. |
Encrypted Channel:Symmetric Cryptography | Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt replies to the implant. |
Encrypted Channel:Symmetric Cryptography | SUNBURST encrypted C2 traffic using a single-byte-XOR cipher. |
Encrypted Channel:Symmetric Cryptography | Sys10 uses an XOR 0x1 loop to encrypt its C2 domain. |
Encrypted Channel:Symmetric Cryptography | SysUpdate has used DES to encrypt all C2 communications. |
Encrypted Channel:Symmetric Cryptography | Taidoor uses RC4 to encrypt the message body of HTTP content. |
Encrypted Channel:Symmetric Cryptography | TAINTEDSCRIBE uses a Linear Feedback Shift Register (LFSR) algorithm for network encryption. |
Encrypted Channel:Symmetric Cryptography | Torisma has encrypted its C2 communications using XOR and VEST-32. |
Encrypted Channel:Symmetric Cryptography | TrickBot uses a custom crypter leveraging Microsoft’s CryptoAPI to encrypt C2 traffic.Newer versions of TrickBot have been known to use bcrypt to encrypt and digitally sign responses to their C2 server. |
Encrypted Channel:Symmetric Cryptography | TSCookie has encrypted network communications with RC4. |
Encrypted Channel:Symmetric Cryptography | Some versions of UPPERCUT have used the hard-coded string "this is the encrypt key" for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address. |
Encrypted Channel:Symmetric Cryptography | Uroburos can encrypt the data beneath its http2 or tcp encryption at the session layer with CAST-128, using a different key for incoming and outgoing data. |
Encrypted Channel:Symmetric Cryptography | Volgmer uses a simple XOR cipher to encrypt traffic and files. |
Encrypted Channel:Symmetric Cryptography | It has used a version of the Awen web shell that employed AES encryption and decryption for C2 communications. |
Encrypted Channel:Symmetric Cryptography | WarzoneRAT can encrypt its C2 with RC4 with the password warzone160\x00. |
Encrypted Channel:Symmetric Cryptography | WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key. |
Encrypted Channel:Symmetric Cryptography | Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control (C2). |
Encrypted Channel:Symmetric Cryptography | Winnti for Windows can XOR encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | Woody RAT can use AES-CBC to encrypt data sent to its C2 server. |
Encrypted Channel:Symmetric Cryptography | xCaon has encrypted data sent to the C2 server using a XOR key. |
Encrypted Channel:Symmetric Cryptography | XCSSET uses RC4 encryption over TCP to communicate with its C2 server. |
Encrypted Channel:Symmetric Cryptography | ZeroT has used RC4 to encrypt C2 traffic. |
Encrypted Channel:Symmetric Cryptography | ItM has used AES encrypted communications in C2. |
Encrypted Channel:Asymmetric Cryptography | adbupd contains a copy of the OpenSSL library to encrypt C2 traffic. |
Encrypted Channel:Asymmetric Cryptography | A variant of ADVSTORESHELL encrypts some C2 with RSA. |
Encrypted Channel:Asymmetric Cryptography | Attor's Blowfish key is encrypted with a public RSA key. |
Encrypted Channel:Asymmetric Cryptography | BADHATCH can beacon to a hardcoded C2 IP address using TLS encryption every 5 minutes. |
Encrypted Channel:Asymmetric Cryptography | Bazar can use TLS in C2 communications. |
Encrypted Channel:Asymmetric Cryptography | BISCUIT uses SSL for encrypting C2 communications. |
Encrypted Channel:Asymmetric Cryptography | During C0021, the threat actors used SSL via TCP port 443 for C2 communications. |
Encrypted Channel:Asymmetric Cryptography | Carbon has used RSA encryption for C2 communications. |
Encrypted Channel:Asymmetric Cryptography | CHOPSTICK encrypts C2 communications with TLS. |
Encrypted Channel:Asymmetric Cryptography | It has used the Plink utility to create SSH tunnels. |
Encrypted Channel:Asymmetric Cryptography | Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server. |
Subsets and Splits