prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Fallback Channels | Uroburos can use up to 10 channels to communicate between implants. |
Fallback Channels | Valak can communicate over multiple C2 hosts. |
Fallback Channels | WinMM is usually configured with primary and backup domains for C2 communications. |
Fallback Channels | The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port. |
Ingress Tool Transfer | During the 2015 Ukraine Electric Power Attack, It pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data. |
Ingress Tool Transfer | ABK has the ability to download files from C2. |
Ingress Tool Transfer | Action RAT has the ability to download additional payloads onto an infected machine. |
Ingress Tool Transfer | Agent Tesla can download additional files for execution on the victim’s machine. |
Ingress Tool Transfer | Agent.btz attempts to download an encrypted binary from a specified domain. |
Ingress Tool Transfer | It has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system. |
Ingress Tool Transfer | Amadey can download and execute files to further infect a host machine with additional malware. |
Ingress Tool Transfer | Anchor can download additional payloads. |
Ingress Tool Transfer | It has downloaded additional tools and malware onto compromised hosts. |
Ingress Tool Transfer | ANDROMEDA can download additional payloads from C2. |
Ingress Tool Transfer | It has downloaded binary data from a specified domain after the malicious document is opened. |
Ingress Tool Transfer | It can upload a file to the victim’s machine. |
Ingress Tool Transfer | It has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant. |
Ingress Tool Transfer | It has downloaded additional tools and malware onto compromised networks. |
Ingress Tool Transfer | It has a tool that can copy files to remote machines. |
Ingress Tool Transfer | It has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors. |
Ingress Tool Transfer | It has downloaded additional files and programs from its C2 server. |
Ingress Tool Transfer | It has downloaded second stage malware from compromised websites. |
Ingress Tool Transfer | It used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine. |
Ingress Tool Transfer | It has downloaded tools to compromised hosts. |
Ingress Tool Transfer | It used certutil to download additional files. |
Ingress Tool Transfer | It has downloaded additional malware onto compromised hosts. |
Ingress Tool Transfer | Aria-body has the ability to download additional payloads from C2. |
Ingress Tool Transfer | Astaroth uses certutil and BITSAdmin to download additional malware. |
Ingress Tool Transfer | AsyncRAT has the ability to download files over SFTP. |
Ingress Tool Transfer | Attor can download additional plugins, updates and other files. |
Ingress Tool Transfer | AuditCred can download files and additional malware. |
Ingress Tool Transfer | Avenger has the ability to download files from C2 to a compromised host. |
Ingress Tool Transfer | Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes. |
Ingress Tool Transfer | BabyShark has downloaded additional files from the C2. |
Ingress Tool Transfer | BackConfig can download and execute additional payloads on a compromised host. |
Ingress Tool Transfer | Backdoor.Oldrea can download additional modules from C2. |
Ingress Tool Transfer | It has downloaded additional files and tools onto a compromised host. |
Ingress Tool Transfer | BADFLICK has download files from its C2 server. |
Ingress Tool Transfer | BADHATCH has the ability to load a second stage malicious DLL file onto a compromised machine. |
Ingress Tool Transfer | BADNEWS is capable of downloading additional files through C2 channels, including a new version of itself. |
Ingress Tool Transfer | BadPatch can download and execute or update malware. |
Ingress Tool Transfer | Bandook can download files to the system. |
Ingress Tool Transfer | Bankshot uploads files and secondary payloads to the victim's machine. |
Ingress Tool Transfer | Bazar can download and deploy additional payloads, including ransomware and post-exploitation frameworks such as Cobalt Strike. |
Ingress Tool Transfer | BBK has the ability to download files from C2 to the infected host. |
Ingress Tool Transfer | BendyBear is designed to download an implant from a C2 server. |
Ingress Tool Transfer | BISCUIT has a command to download a file from the C2 server. |
Ingress Tool Transfer | Bisonal has the capability to download files to execute on the victim’s machine. |
Ingress Tool Transfer | BITSAdmin can be used to create BITS Jobs to upload and/or download files. |
Ingress Tool Transfer | It has downloaded additional malware and tools onto a compromised host. |
Ingress Tool Transfer | BlackMould has the ability to download files to the victim's machine. |
Ingress Tool Transfer | BLINDINGCAN has downloaded files to a victim machine. |
Ingress Tool Transfer | BLUELIGHT can download additional files onto the host. |
Ingress Tool Transfer | Bonadan can download additional modules from the C2 server. |
Ingress Tool Transfer | BONDUPDATER can download or upload files from its C2 server. |
Ingress Tool Transfer | BoomBox has the ability to download next stage malware components to a compromised system. |
Ingress Tool Transfer | BoxCaon can download files. |
Ingress Tool Transfer | Briba downloads files onto infected hosts. |
Ingress Tool Transfer | It has used various tools to download files, including DGet (a similar tool to wget). |
Ingress Tool Transfer | Brute Ratel C4 can download files to compromised hosts. |
Ingress Tool Transfer | build_downer has the ability to download files from C2 to the infected host. |
Ingress Tool Transfer | Bumblebee can download and execute additional payloads including through the use of a Dex command. |
Ingress Tool Transfer | Bundlore can download and execute new versions of itself. |
Ingress Tool Transfer | During C0010, UNC3890 actors downloaded tools and malware onto a compromised host. |
Ingress Tool Transfer | During C0015, the threat actors downloaded additional tools and files onto a compromised network. |
Ingress Tool Transfer | During C0017, It downloaded malicious payloads onto compromised systems. |
Ingress Tool Transfer | During C0018, the threat actors downloaded additional tools, such as Mimikatz and Sliver, as well as Cobalt Strike and AvosLocker ransomware onto the victim network. |
Ingress Tool Transfer | During C0021, the threat actors downloaded additional tools and files onto victim machines. |
Ingress Tool Transfer | During C0026, the threat actors downloaded malicious payloads onto select compromised hosts. |
Ingress Tool Transfer | During C0027, It downloaded tools using victim organization systems. |
Ingress Tool Transfer | Calisto has the capability to upload and download files to the victim's machine. |
Ingress Tool Transfer | CallMe has the capability to download a file to the victim from the C2 server. |
Ingress Tool Transfer | Cannon can download a payload for execution. |
Ingress Tool Transfer | Carberp can download and execute new plugins from the C2 server. |
Ingress Tool Transfer | Cardinal RAT can download and execute additional payloads. |
Ingress Tool Transfer | CARROTBALL has the ability to download and install a remote payload. |
Ingress Tool Transfer | CARROTBAT has the ability to download and execute a remote file via certutil. |
Ingress Tool Transfer | Caterpillar WebShell has a module to download and upload files to the system. |
Ingress Tool Transfer | certutil can be used to download files from a given URL. |
Ingress Tool Transfer | Chaes can download additional files onto an infected machine. |
Ingress Tool Transfer | CharmPower has the ability to download additional modules to a compromised host. |
Ingress Tool Transfer | ChChes is capable of downloading files, including additional modules. |
Ingress Tool Transfer | It has remotely copied tools and malware onto targeted systems. |
Ingress Tool Transfer | China Chopper's server component can download remote files. |
Ingress Tool Transfer | CHOPSTICK is capable of performing remote file transmission. |
Ingress Tool Transfer | Chrommme can download its code from C2. |
Ingress Tool Transfer | CloudDuke downloads and executes additional malware from either a Web address or a Microsoft OneDrive account. |
Ingress Tool Transfer | cmd can be used to copy files to/from a remotely connected external system. |
Ingress Tool Transfer | It has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers. The group's JavaScript backdoor is also capable of downloading files. |
Ingress Tool Transfer | Cobalt Strike can deliver additional payloads to victim machines. |
Ingress Tool Transfer | CoinTicker executes a Python script to download its second stage. |
Ingress Tool Transfer | Conficker downloads an HTTP server to the infected machine. |
Ingress Tool Transfer | It has downloaded additional files and payloads onto a compromised host following initial access. |
Ingress Tool Transfer | CookieMiner can download additional scripts from a web server. |
Ingress Tool Transfer | CORESHELL downloads another dropper from its C2 server. |
Ingress Tool Transfer | CostaBricks has been used to load SombRAT onto a compromised host. |
Ingress Tool Transfer | During CostaRicto, the threat actors downloaded malware and tools onto a compromised host. |
Ingress Tool Transfer | CreepyDrive can download files to the compromised host. |
Ingress Tool Transfer | Crimson contains a command to retrieve files from its C2 server. |
Ingress Tool Transfer | Cryptoistic has the ability to send and receive files. |
Subsets and Splits