prompt
stringclasses
508 values
procedure
stringlengths
20
478
Fallback Channels
Uroburos can use up to 10 channels to communicate between implants.
Fallback Channels
Valak can communicate over multiple C2 hosts.
Fallback Channels
WinMM is usually configured with primary and backup domains for C2 communications.
Fallback Channels
The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.
Ingress Tool Transfer
During the 2015 Ukraine Electric Power Attack, It pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.
Ingress Tool Transfer
ABK has the ability to download files from C2.
Ingress Tool Transfer
Action RAT has the ability to download additional payloads onto an infected machine.
Ingress Tool Transfer
Agent Tesla can download additional files for execution on the victim’s machine.
Ingress Tool Transfer
Agent.btz attempts to download an encrypted binary from a specified domain.
Ingress Tool Transfer
It has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system.
Ingress Tool Transfer
Amadey can download and execute files to further infect a host machine with additional malware.
Ingress Tool Transfer
Anchor can download additional payloads.
Ingress Tool Transfer
It has downloaded additional tools and malware onto compromised hosts.
Ingress Tool Transfer
ANDROMEDA can download additional payloads from C2.
Ingress Tool Transfer
It has downloaded binary data from a specified domain after the malicious document is opened.
Ingress Tool Transfer
It can upload a file to the victim’s machine.
Ingress Tool Transfer
It has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.
Ingress Tool Transfer
It has downloaded additional tools and malware onto compromised networks.
Ingress Tool Transfer
It has a tool that can copy files to remote machines.
Ingress Tool Transfer
It has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors.
Ingress Tool Transfer
It has downloaded additional files and programs from its C2 server.
Ingress Tool Transfer
It has downloaded second stage malware from compromised websites.
Ingress Tool Transfer
It used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine.
Ingress Tool Transfer
It has downloaded tools to compromised hosts.
Ingress Tool Transfer
It used certutil to download additional files.
Ingress Tool Transfer
It has downloaded additional malware onto compromised hosts.
Ingress Tool Transfer
Aria-body has the ability to download additional payloads from C2.
Ingress Tool Transfer
Astaroth uses certutil and BITSAdmin to download additional malware.
Ingress Tool Transfer
AsyncRAT has the ability to download files over SFTP.
Ingress Tool Transfer
Attor can download additional plugins, updates and other files.
Ingress Tool Transfer
AuditCred can download files and additional malware.
Ingress Tool Transfer
Avenger has the ability to download files from C2 to a compromised host.
Ingress Tool Transfer
Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes.
Ingress Tool Transfer
BabyShark has downloaded additional files from the C2.
Ingress Tool Transfer
BackConfig can download and execute additional payloads on a compromised host.
Ingress Tool Transfer
Backdoor.Oldrea can download additional modules from C2.
Ingress Tool Transfer
It has downloaded additional files and tools onto a compromised host.
Ingress Tool Transfer
BADFLICK has download files from its C2 server.
Ingress Tool Transfer
BADHATCH has the ability to load a second stage malicious DLL file onto a compromised machine.
Ingress Tool Transfer
BADNEWS is capable of downloading additional files through C2 channels, including a new version of itself.
Ingress Tool Transfer
BadPatch can download and execute or update malware.
Ingress Tool Transfer
Bandook can download files to the system.
Ingress Tool Transfer
Bankshot uploads files and secondary payloads to the victim's machine.
Ingress Tool Transfer
Bazar can download and deploy additional payloads, including ransomware and post-exploitation frameworks such as Cobalt Strike.
Ingress Tool Transfer
BBK has the ability to download files from C2 to the infected host.
Ingress Tool Transfer
BendyBear is designed to download an implant from a C2 server.
Ingress Tool Transfer
BISCUIT has a command to download a file from the C2 server.
Ingress Tool Transfer
Bisonal has the capability to download files to execute on the victim’s machine.
Ingress Tool Transfer
BITSAdmin can be used to create BITS Jobs to upload and/or download files.
Ingress Tool Transfer
It has downloaded additional malware and tools onto a compromised host.
Ingress Tool Transfer
BlackMould has the ability to download files to the victim's machine.
Ingress Tool Transfer
BLINDINGCAN has downloaded files to a victim machine.
Ingress Tool Transfer
BLUELIGHT can download additional files onto the host.
Ingress Tool Transfer
Bonadan can download additional modules from the C2 server.
Ingress Tool Transfer
BONDUPDATER can download or upload files from its C2 server.
Ingress Tool Transfer
BoomBox has the ability to download next stage malware components to a compromised system.
Ingress Tool Transfer
BoxCaon can download files.
Ingress Tool Transfer
Briba downloads files onto infected hosts.
Ingress Tool Transfer
It has used various tools to download files, including DGet (a similar tool to wget).
Ingress Tool Transfer
Brute Ratel C4 can download files to compromised hosts.
Ingress Tool Transfer
build_downer has the ability to download files from C2 to the infected host.
Ingress Tool Transfer
Bumblebee can download and execute additional payloads including through the use of a Dex command.
Ingress Tool Transfer
Bundlore can download and execute new versions of itself.
Ingress Tool Transfer
During C0010, UNC3890 actors downloaded tools and malware onto a compromised host.
Ingress Tool Transfer
During C0015, the threat actors downloaded additional tools and files onto a compromised network.
Ingress Tool Transfer
During C0017, It downloaded malicious payloads onto compromised systems.
Ingress Tool Transfer
During C0018, the threat actors downloaded additional tools, such as Mimikatz and Sliver, as well as Cobalt Strike and AvosLocker ransomware onto the victim network.
Ingress Tool Transfer
During C0021, the threat actors downloaded additional tools and files onto victim machines.
Ingress Tool Transfer
During C0026, the threat actors downloaded malicious payloads onto select compromised hosts.
Ingress Tool Transfer
During C0027, It downloaded tools using victim organization systems.
Ingress Tool Transfer
Calisto has the capability to upload and download files to the victim's machine.
Ingress Tool Transfer
CallMe has the capability to download a file to the victim from the C2 server.
Ingress Tool Transfer
Cannon can download a payload for execution.
Ingress Tool Transfer
Carberp can download and execute new plugins from the C2 server.
Ingress Tool Transfer
Cardinal RAT can download and execute additional payloads.
Ingress Tool Transfer
CARROTBALL has the ability to download and install a remote payload.
Ingress Tool Transfer
CARROTBAT has the ability to download and execute a remote file via certutil.
Ingress Tool Transfer
Caterpillar WebShell has a module to download and upload files to the system.
Ingress Tool Transfer
certutil can be used to download files from a given URL.
Ingress Tool Transfer
Chaes can download additional files onto an infected machine.
Ingress Tool Transfer
CharmPower has the ability to download additional modules to a compromised host.
Ingress Tool Transfer
ChChes is capable of downloading files, including additional modules.
Ingress Tool Transfer
It has remotely copied tools and malware onto targeted systems.
Ingress Tool Transfer
China Chopper's server component can download remote files.
Ingress Tool Transfer
CHOPSTICK is capable of performing remote file transmission.
Ingress Tool Transfer
Chrommme can download its code from C2.
Ingress Tool Transfer
CloudDuke downloads and executes additional malware from either a Web address or a Microsoft OneDrive account.
Ingress Tool Transfer
cmd can be used to copy files to/from a remotely connected external system.
Ingress Tool Transfer
It has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers. The group's JavaScript backdoor is also capable of downloading files.
Ingress Tool Transfer
Cobalt Strike can deliver additional payloads to victim machines.
Ingress Tool Transfer
CoinTicker executes a Python script to download its second stage.
Ingress Tool Transfer
Conficker downloads an HTTP server to the infected machine.
Ingress Tool Transfer
It has downloaded additional files and payloads onto a compromised host following initial access.
Ingress Tool Transfer
CookieMiner can download additional scripts from a web server.
Ingress Tool Transfer
CORESHELL downloads another dropper from its C2 server.
Ingress Tool Transfer
CostaBricks has been used to load SombRAT onto a compromised host.
Ingress Tool Transfer
During CostaRicto, the threat actors downloaded malware and tools onto a compromised host.
Ingress Tool Transfer
CreepyDrive can download files to the compromised host.
Ingress Tool Transfer
Crimson contains a command to retrieve files from its C2 server.
Ingress Tool Transfer
Cryptoistic has the ability to send and receive files.