prompt
stringclasses
508 values
procedure
stringlengths
20
478
Encrypted Channel:Symmetric Cryptography
HiddenWasp uses an RC4-like algorithm with an already computed PRGA generated key-stream for network communication.
Encrypted Channel:Symmetric Cryptography
It used AES-128 to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
Hikit performs XOR encryption.
Encrypted Channel:Symmetric Cryptography
HotCroissant has compressed network communications and encrypted them with a custom stream cipher.
Encrypted Channel:Symmetric Cryptography
httpclient encrypts C2 content with XOR using a single byte, 0x12.
Encrypted Channel:Symmetric Cryptography
Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations.
Encrypted Channel:Symmetric Cryptography
HyperStack has used RSA encryption for C2 communications.
Encrypted Channel:Symmetric Cryptography
The IceApple Result Retriever module can AES encrypt C2 responses.
Encrypted Channel:Symmetric Cryptography
It has encrypted network communications with AES.
Encrypted Channel:Symmetric Cryptography
InvisiMole uses variations of a simple XOR encryption routine for C&C communications.
Encrypted Channel:Symmetric Cryptography
KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
Kobalos's post-authentication communication channel uses a 32-byte-long password with RC4 for inbound and outbound traffic.
Encrypted Channel:Symmetric Cryptography
The Komplex C2 channel uses an 11-byte XOR algorithm to hide data.
Encrypted Channel:Symmetric Cryptography
KONNI has used AES to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
Several It malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another It malware sample XORs C2 traffic. Other It malware uses Caracachs encryption to encrypt C2 payloads. It has also used AES to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
LightNeuron uses AES to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
LookBack uses a modified version of RC4 for data transfer.
Encrypted Channel:Symmetric Cryptography
Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire.
Encrypted Channel:Symmetric Cryptography
Lurid performs XOR encryption.
Encrypted Channel:Symmetric Cryptography
It has used AES to exfiltrate documents.
Encrypted Channel:Symmetric Cryptography
Mafalda can encrypt its C2 traffic with RC4.
Encrypted Channel:Symmetric Cryptography
metaMain can encrypt the data that it sends and receives from the C2 server using an RC4 encryption algorithm.
Encrypted Channel:Symmetric Cryptography
Metamorfo has encrypted C2 commands with AES-256.
Encrypted Channel:Symmetric Cryptography
Mongall has the ability to RC4 encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
MoonWind encrypts C2 traffic using RC4 with a static key.
Encrypted Channel:Symmetric Cryptography
More_eggs has used an RC4-based encryption method for its C2 communications.
Encrypted Channel:Symmetric Cryptography
Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm.
Encrypted Channel:Symmetric Cryptography
It has used AES to encrypt C2 responses.
Encrypted Channel:Symmetric Cryptography
It has encrypted C2 communications with RC4.
Encrypted Channel:Symmetric Cryptography
NanoCore uses DES to encrypt the C2 traffic.
Encrypted Channel:Symmetric Cryptography
NDiskMonitor uses AES to encrypt certain information sent over its C2 channel.
Encrypted Channel:Symmetric Cryptography
Nebulae can use RC4 and XOR to encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
NETEAGLE will decrypt resources it downloads with HTTP requests by using RC4 with the key "ScoutEagle."
Encrypted Channel:Symmetric Cryptography
NETWIRE can use AES encryption for C2 data transferred.
Encrypted Channel:Symmetric Cryptography
Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase.
Encrypted Channel:Symmetric Cryptography
During Operation Dream Job, It used an AES key to communicate with their C2 server.
Encrypted Channel:Symmetric Cryptography
OSX_OCEANLOTUS.D encrypts data sent back to the C2 using AES in CBC mode with a null initialization vector (IV) and a key sent from the server that is padded to 32 bytes.
Encrypted Channel:Symmetric Cryptography
Pandora has the ability to encrypt communications with D3DES.
Encrypted Channel:Symmetric Cryptography
PingPull can use AES, in cipher block chaining (CBC) mode padded with PKCS5, to encrypt C2 server communications.
Encrypted Channel:Symmetric Cryptography
PipeMon communications are RC4 encrypted.
Encrypted Channel:Symmetric Cryptography
PLAINTEE encodes C2 beacons using XOR.
Encrypted Channel:Symmetric Cryptography
PLEAD has used RC4 encryption to download modules.
Encrypted Channel:Symmetric Cryptography
PlugX can use RC4 encryption in C2 communications.
Encrypted Channel:Symmetric Cryptography
PoisonIvy uses the Camellia cipher to encrypt communications.
Encrypted Channel:Symmetric Cryptography
POWERTON has used AES for encrypting C2 traffic.
Encrypted Channel:Symmetric Cryptography
Prikormka encrypts some C2 traffic with the Blowfish cipher.
Encrypted Channel:Symmetric Cryptography
QakBot can RC4 encrypt strings in C2 communication.
Encrypted Channel:Symmetric Cryptography
QuasarRAT uses AES with a hardcoded pre-shared key to encrypt network communication.
Encrypted Channel:Symmetric Cryptography
QUIETCANARY can RC4 encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
RainyDay can use RC4 to encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
RDAT has used AES ciphertext to encode C2 communications.
Encrypted Channel:Symmetric Cryptography
RedLeaves has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear.
Encrypted Channel:Symmetric Cryptography
Rifdoor has encrypted command and control (C2) communications with a stream cipher.
Encrypted Channel:Symmetric Cryptography
It has used the RIPTIDE RAT, which communicates over HTTP with a payload encrypted with RC4.
Encrypted Channel:Symmetric Cryptography
RotaJakiro encrypts C2 communication using a combination of AES, XOR, ROTATE encryption, and ZLIB compression.
Encrypted Channel:Symmetric Cryptography
It encrypts C2 traffic with a custom RC4 variant.
Encrypted Channel:Symmetric Cryptography
Sakula encodes C2 traffic with single-byte XOR keys.
Encrypted Channel:Symmetric Cryptography
Sardonic has the ability to use an RC4 key to encrypt communications to and from actor-controlled C2 servers.
Encrypted Channel:Symmetric Cryptography
SeaDuke C2 traffic has been encrypted with RC4 and AES.
Encrypted Channel:Symmetric Cryptography
SideTwist can encrypt C2 communications with a randomly generated key.
Encrypted Channel:Symmetric Cryptography
Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange.
Encrypted Channel:Symmetric Cryptography
SMOKEDHAM has encrypted its C2 traffic with RC4.
Encrypted Channel:Symmetric Cryptography
SNUGRIDE encrypts C2 traffic using AES with a static key.
Encrypted Channel:Symmetric Cryptography
SodaMaster can use RC4 to encrypt C2 communications.
Encrypted Channel:Symmetric Cryptography
SombRAT has encrypted its C2 communications with AES.
Encrypted Channel:Symmetric Cryptography
It malware encrypts C2 traffic using RC4 with a hard-coded key.
Encrypted Channel:Symmetric Cryptography
StrifeWater can encrypt C2 traffic using XOR with a hard coded key.
Encrypted Channel:Symmetric Cryptography
Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt replies to the implant.
Encrypted Channel:Symmetric Cryptography
SUNBURST encrypted C2 traffic using a single-byte-XOR cipher.
Encrypted Channel:Symmetric Cryptography
Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.
Encrypted Channel:Symmetric Cryptography
SysUpdate has used DES to encrypt all C2 communications.
Encrypted Channel:Symmetric Cryptography
Taidoor uses RC4 to encrypt the message body of HTTP content.
Encrypted Channel:Symmetric Cryptography
TAINTEDSCRIBE uses a Linear Feedback Shift Register (LFSR) algorithm for network encryption.
Encrypted Channel:Symmetric Cryptography
Torisma has encrypted its C2 communications using XOR and VEST-32.
Encrypted Channel:Symmetric Cryptography
TrickBot uses a custom crypter leveraging Microsoft’s CryptoAPI to encrypt C2 traffic.Newer versions of TrickBot have been known to use bcrypt to encrypt and digitally sign responses to their C2 server.
Encrypted Channel:Symmetric Cryptography
TSCookie has encrypted network communications with RC4.
Encrypted Channel:Symmetric Cryptography
Some versions of UPPERCUT have used the hard-coded string "this is the encrypt key" for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address.
Encrypted Channel:Symmetric Cryptography
Uroburos can encrypt the data beneath its http2 or tcp encryption at the session layer with CAST-128, using a different key for incoming and outgoing data.
Encrypted Channel:Symmetric Cryptography
Volgmer uses a simple XOR cipher to encrypt traffic and files.
Encrypted Channel:Symmetric Cryptography
It has used a version of the Awen web shell that employed AES encryption and decryption for C2 communications.
Encrypted Channel:Symmetric Cryptography
WarzoneRAT can encrypt its C2 with RC4 with the password warzone160\x00.
Encrypted Channel:Symmetric Cryptography
WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key.
Encrypted Channel:Symmetric Cryptography
Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control (C2).
Encrypted Channel:Symmetric Cryptography
Winnti for Windows can XOR encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
Woody RAT can use AES-CBC to encrypt data sent to its C2 server.
Encrypted Channel:Symmetric Cryptography
xCaon has encrypted data sent to the C2 server using a XOR key.
Encrypted Channel:Symmetric Cryptography
XCSSET uses RC4 encryption over TCP to communicate with its C2 server.
Encrypted Channel:Symmetric Cryptography
ZeroT has used RC4 to encrypt C2 traffic.
Encrypted Channel:Symmetric Cryptography
ItM has used AES encrypted communications in C2.
Encrypted Channel:Asymmetric Cryptography
adbupd contains a copy of the OpenSSL library to encrypt C2 traffic.
Encrypted Channel:Asymmetric Cryptography
A variant of ADVSTORESHELL encrypts some C2 with RSA.
Encrypted Channel:Asymmetric Cryptography
Attor's Blowfish key is encrypted with a public RSA key.
Encrypted Channel:Asymmetric Cryptography
BADHATCH can beacon to a hardcoded C2 IP address using TLS encryption every 5 minutes.
Encrypted Channel:Asymmetric Cryptography
Bazar can use TLS in C2 communications.
Encrypted Channel:Asymmetric Cryptography
BISCUIT uses SSL for encrypting C2 communications.
Encrypted Channel:Asymmetric Cryptography
During C0021, the threat actors used SSL via TCP port 443 for C2 communications.
Encrypted Channel:Asymmetric Cryptography
Carbon has used RSA encryption for C2 communications.
Encrypted Channel:Asymmetric Cryptography
CHOPSTICK encrypts C2 communications with TLS.
Encrypted Channel:Asymmetric Cryptography
It has used the Plink utility to create SSH tunnels.
Encrypted Channel:Asymmetric Cryptography
Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server.