prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Encrypted Channel:Symmetric Cryptography
|
HiddenWasp uses an RC4-like algorithm with an already computed PRGA generated key-stream for network communication.
|
Encrypted Channel:Symmetric Cryptography
|
It used AES-128 to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
Hikit performs XOR encryption.
|
Encrypted Channel:Symmetric Cryptography
|
HotCroissant has compressed network communications and encrypted them with a custom stream cipher.
|
Encrypted Channel:Symmetric Cryptography
|
httpclient encrypts C2 content with XOR using a single byte, 0x12.
|
Encrypted Channel:Symmetric Cryptography
|
Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations.
|
Encrypted Channel:Symmetric Cryptography
|
HyperStack has used RSA encryption for C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
The IceApple Result Retriever module can AES encrypt C2 responses.
|
Encrypted Channel:Symmetric Cryptography
|
It has encrypted network communications with AES.
|
Encrypted Channel:Symmetric Cryptography
|
InvisiMole uses variations of a simple XOR encryption routine for C&C communications.
|
Encrypted Channel:Symmetric Cryptography
|
KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
Kobalos's post-authentication communication channel uses a 32-byte-long password with RC4 for inbound and outbound traffic.
|
Encrypted Channel:Symmetric Cryptography
|
The Komplex C2 channel uses an 11-byte XOR algorithm to hide data.
|
Encrypted Channel:Symmetric Cryptography
|
KONNI has used AES to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
Several It malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another It malware sample XORs C2 traffic. Other It malware uses Caracachs encryption to encrypt C2 payloads. It has also used AES to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
LightNeuron uses AES to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
LookBack uses a modified version of RC4 for data transfer.
|
Encrypted Channel:Symmetric Cryptography
|
Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire.
|
Encrypted Channel:Symmetric Cryptography
|
Lurid performs XOR encryption.
|
Encrypted Channel:Symmetric Cryptography
|
It has used AES to exfiltrate documents.
|
Encrypted Channel:Symmetric Cryptography
|
Mafalda can encrypt its C2 traffic with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
metaMain can encrypt the data that it sends and receives from the C2 server using an RC4 encryption algorithm.
|
Encrypted Channel:Symmetric Cryptography
|
Metamorfo has encrypted C2 commands with AES-256.
|
Encrypted Channel:Symmetric Cryptography
|
Mongall has the ability to RC4 encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
MoonWind encrypts C2 traffic using RC4 with a static key.
|
Encrypted Channel:Symmetric Cryptography
|
More_eggs has used an RC4-based encryption method for its C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm.
|
Encrypted Channel:Symmetric Cryptography
|
It has used AES to encrypt C2 responses.
|
Encrypted Channel:Symmetric Cryptography
|
It has encrypted C2 communications with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
NanoCore uses DES to encrypt the C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
NDiskMonitor uses AES to encrypt certain information sent over its C2 channel.
|
Encrypted Channel:Symmetric Cryptography
|
Nebulae can use RC4 and XOR to encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
NETEAGLE will decrypt resources it downloads with HTTP requests by using RC4 with the key "ScoutEagle."
|
Encrypted Channel:Symmetric Cryptography
|
NETWIRE can use AES encryption for C2 data transferred.
|
Encrypted Channel:Symmetric Cryptography
|
Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase.
|
Encrypted Channel:Symmetric Cryptography
|
During Operation Dream Job, It used an AES key to communicate with their C2 server.
|
Encrypted Channel:Symmetric Cryptography
|
OSX_OCEANLOTUS.D encrypts data sent back to the C2 using AES in CBC mode with a null initialization vector (IV) and a key sent from the server that is padded to 32 bytes.
|
Encrypted Channel:Symmetric Cryptography
|
Pandora has the ability to encrypt communications with D3DES.
|
Encrypted Channel:Symmetric Cryptography
|
PingPull can use AES, in cipher block chaining (CBC) mode padded with PKCS5, to encrypt C2 server communications.
|
Encrypted Channel:Symmetric Cryptography
|
PipeMon communications are RC4 encrypted.
|
Encrypted Channel:Symmetric Cryptography
|
PLAINTEE encodes C2 beacons using XOR.
|
Encrypted Channel:Symmetric Cryptography
|
PLEAD has used RC4 encryption to download modules.
|
Encrypted Channel:Symmetric Cryptography
|
PlugX can use RC4 encryption in C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
PoisonIvy uses the Camellia cipher to encrypt communications.
|
Encrypted Channel:Symmetric Cryptography
|
POWERTON has used AES for encrypting C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
Prikormka encrypts some C2 traffic with the Blowfish cipher.
|
Encrypted Channel:Symmetric Cryptography
|
QakBot can RC4 encrypt strings in C2 communication.
|
Encrypted Channel:Symmetric Cryptography
|
QuasarRAT uses AES with a hardcoded pre-shared key to encrypt network communication.
|
Encrypted Channel:Symmetric Cryptography
|
QUIETCANARY can RC4 encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
RainyDay can use RC4 to encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
RDAT has used AES ciphertext to encode C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
RedLeaves has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear.
|
Encrypted Channel:Symmetric Cryptography
|
Rifdoor has encrypted command and control (C2) communications with a stream cipher.
|
Encrypted Channel:Symmetric Cryptography
|
It has used the RIPTIDE RAT, which communicates over HTTP with a payload encrypted with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
RotaJakiro encrypts C2 communication using a combination of AES, XOR, ROTATE encryption, and ZLIB compression.
|
Encrypted Channel:Symmetric Cryptography
|
It encrypts C2 traffic with a custom RC4 variant.
|
Encrypted Channel:Symmetric Cryptography
|
Sakula encodes C2 traffic with single-byte XOR keys.
|
Encrypted Channel:Symmetric Cryptography
|
Sardonic has the ability to use an RC4 key to encrypt communications to and from actor-controlled C2 servers.
|
Encrypted Channel:Symmetric Cryptography
|
SeaDuke C2 traffic has been encrypted with RC4 and AES.
|
Encrypted Channel:Symmetric Cryptography
|
SideTwist can encrypt C2 communications with a randomly generated key.
|
Encrypted Channel:Symmetric Cryptography
|
Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange.
|
Encrypted Channel:Symmetric Cryptography
|
SMOKEDHAM has encrypted its C2 traffic with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
SNUGRIDE encrypts C2 traffic using AES with a static key.
|
Encrypted Channel:Symmetric Cryptography
|
SodaMaster can use RC4 to encrypt C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
SombRAT has encrypted its C2 communications with AES.
|
Encrypted Channel:Symmetric Cryptography
|
It malware encrypts C2 traffic using RC4 with a hard-coded key.
|
Encrypted Channel:Symmetric Cryptography
|
StrifeWater can encrypt C2 traffic using XOR with a hard coded key.
|
Encrypted Channel:Symmetric Cryptography
|
Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt replies to the implant.
|
Encrypted Channel:Symmetric Cryptography
|
SUNBURST encrypted C2 traffic using a single-byte-XOR cipher.
|
Encrypted Channel:Symmetric Cryptography
|
Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.
|
Encrypted Channel:Symmetric Cryptography
|
SysUpdate has used DES to encrypt all C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
Taidoor uses RC4 to encrypt the message body of HTTP content.
|
Encrypted Channel:Symmetric Cryptography
|
TAINTEDSCRIBE uses a Linear Feedback Shift Register (LFSR) algorithm for network encryption.
|
Encrypted Channel:Symmetric Cryptography
|
Torisma has encrypted its C2 communications using XOR and VEST-32.
|
Encrypted Channel:Symmetric Cryptography
|
TrickBot uses a custom crypter leveraging Microsoft’s CryptoAPI to encrypt C2 traffic.Newer versions of TrickBot have been known to use bcrypt to encrypt and digitally sign responses to their C2 server.
|
Encrypted Channel:Symmetric Cryptography
|
TSCookie has encrypted network communications with RC4.
|
Encrypted Channel:Symmetric Cryptography
|
Some versions of UPPERCUT have used the hard-coded string "this is the encrypt key" for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address.
|
Encrypted Channel:Symmetric Cryptography
|
Uroburos can encrypt the data beneath its http2 or tcp encryption at the session layer with CAST-128, using a different key for incoming and outgoing data.
|
Encrypted Channel:Symmetric Cryptography
|
Volgmer uses a simple XOR cipher to encrypt traffic and files.
|
Encrypted Channel:Symmetric Cryptography
|
It has used a version of the Awen web shell that employed AES encryption and decryption for C2 communications.
|
Encrypted Channel:Symmetric Cryptography
|
WarzoneRAT can encrypt its C2 with RC4 with the password warzone160\x00.
|
Encrypted Channel:Symmetric Cryptography
|
WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key.
|
Encrypted Channel:Symmetric Cryptography
|
Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control (C2).
|
Encrypted Channel:Symmetric Cryptography
|
Winnti for Windows can XOR encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
Woody RAT can use AES-CBC to encrypt data sent to its C2 server.
|
Encrypted Channel:Symmetric Cryptography
|
xCaon has encrypted data sent to the C2 server using a XOR key.
|
Encrypted Channel:Symmetric Cryptography
|
XCSSET uses RC4 encryption over TCP to communicate with its C2 server.
|
Encrypted Channel:Symmetric Cryptography
|
ZeroT has used RC4 to encrypt C2 traffic.
|
Encrypted Channel:Symmetric Cryptography
|
ItM has used AES encrypted communications in C2.
|
Encrypted Channel:Asymmetric Cryptography
|
adbupd contains a copy of the OpenSSL library to encrypt C2 traffic.
|
Encrypted Channel:Asymmetric Cryptography
|
A variant of ADVSTORESHELL encrypts some C2 with RSA.
|
Encrypted Channel:Asymmetric Cryptography
|
Attor's Blowfish key is encrypted with a public RSA key.
|
Encrypted Channel:Asymmetric Cryptography
|
BADHATCH can beacon to a hardcoded C2 IP address using TLS encryption every 5 minutes.
|
Encrypted Channel:Asymmetric Cryptography
|
Bazar can use TLS in C2 communications.
|
Encrypted Channel:Asymmetric Cryptography
|
BISCUIT uses SSL for encrypting C2 communications.
|
Encrypted Channel:Asymmetric Cryptography
|
During C0021, the threat actors used SSL via TCP port 443 for C2 communications.
|
Encrypted Channel:Asymmetric Cryptography
|
Carbon has used RSA encryption for C2 communications.
|
Encrypted Channel:Asymmetric Cryptography
|
CHOPSTICK encrypts C2 communications with TLS.
|
Encrypted Channel:Asymmetric Cryptography
|
It has used the Plink utility to create SSH tunnels.
|
Encrypted Channel:Asymmetric Cryptography
|
Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.