prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Ingress Tool Transfer | CSPY Downloader can download additional tools to a compromised host. |
Ingress Tool Transfer | Cuba can download files from its C2 server. |
Ingress Tool Transfer | Cyclops Blink has the ability to download files to target systems. |
Ingress Tool Transfer | Dacls can download its payload from a C2 server. |
Ingress Tool Transfer | DanBot can download additional files to a targeted system. |
Ingress Tool Transfer | DarkComet can load any files onto the infected machine to execute. |
Ingress Tool Transfer | It has used first-stage payloads that download additional malware from C2 servers. |
Ingress Tool Transfer | DarkTortilla can download additional packages for keylogging, cryptocurrency mining, and other capabilities; it can also retrieve malicious payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit. |
Ingress Tool Transfer | Daserf can download remote files. |
Ingress Tool Transfer | DDKONG downloads and uploads files on the victim’s machine. |
Ingress Tool Transfer | DEATHRANSOM can download files to a compromised host. |
Ingress Tool Transfer | Denis deploys additional backdoors and hacking tools to the system. |
Ingress Tool Transfer | Diavol can receive configuration updates and additional payloads including wscpy.exe from C2. |
Ingress Tool Transfer | Dipsind can download remote files. |
Ingress Tool Transfer | Disco can download files to targeted systems via SMB. |
Ingress Tool Transfer | DnsSystem can download files to compromised systems after receiving a command with the string downloaddd. |
Ingress Tool Transfer | DOGCALL can download and execute additional payloads. |
Ingress Tool Transfer | Doki has downloaded scripts from C2. |
Ingress Tool Transfer | Donut can download and execute previously staged shellcode payloads. |
Ingress Tool Transfer | down_new has the ability to download files to the compromised host. |
Ingress Tool Transfer | After downloading its main config file, Downdelph downloads multiple payloads from C2 servers. |
Ingress Tool Transfer | It has copied and installed tools for operations once in the victim environment. |
Ingress Tool Transfer | DRATzarus can deploy additional tools onto an infected machine. |
Ingress Tool Transfer | DropBook can download and execute additional files. |
Ingress Tool Transfer | Drovorub can download files to a compromised host. |
Ingress Tool Transfer | Dtrack’s can download and upload a file to the victim’s computer. |
Ingress Tool Transfer | Dyre has a command to download and executes additional files. |
Ingress Tool Transfer | Ecipekac can download additional payloads to a compromised host. |
Ingress Tool Transfer | Egregor has the ability to download files from its C2 server. |
Ingress Tool Transfer | The Ritsol backdoor trojan used by It can download files onto a compromised host from a remote location. |
Ingress Tool Transfer | Elise can download additional files from the C2 server for execution. |
Ingress Tool Transfer | It has used tools to download malicious code. |
Ingress Tool Transfer | Emissary has the capability to download files from the C2 server. |
Ingress Tool Transfer | Empire can upload and download to and from a victim machine. |
Ingress Tool Transfer | esentutl can be used to copy files from a given URL. |
Ingress Tool Transfer | EvilBunny has downloaded additional Lua scripts from the C2. |
Ingress Tool Transfer | EVILNUM can download and upload files to the victim's computer. |
Ingress Tool Transfer | It can deploy additional components or tools as needed. |
Ingress Tool Transfer | Exaramel for Linux has a command to download a file from and to a remote C2 server. |
Ingress Tool Transfer | Explosive has a function to download a file to the infected system. |
Ingress Tool Transfer | Felismus can download files from remote servers. |
Ingress Tool Transfer | FELIXROOT downloads and uploads files to and from the victim’s machine. |
Ingress Tool Transfer | It has downloaded additional tools and malware to compromised systems. |
Ingress Tool Transfer | It has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload. |
Ingress Tool Transfer | It has used remote code execution to download subsequent payloads. |
Ingress Tool Transfer | Flagpro can download additional malware from the C2 server. |
Ingress Tool Transfer | FlawedAmmyy can transfer files from C2. |
Ingress Tool Transfer | FoggyWeb can receive additional malicious components from an actor controlled C2 server and execute them on a compromised AD FS server. |
Ingress Tool Transfer | It has downloaded additional tools including PsExec directly to endpoints. |
Ingress Tool Transfer | During Frankenstein, the threat actors downloaded files and tools onto a victim machine. |
Ingress Tool Transfer | ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment. |
Ingress Tool Transfer | FunnyDream can download additional files onto a compromised host. |
Ingress Tool Transfer | During FunnyDream, the threat actors downloaded additional droppers and backdoors onto a compromised system. |
Ingress Tool Transfer | FYAnti can download additional payloads to a compromised host. |
Ingress Tool Transfer | It dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN. |
Ingress Tool Transfer | It has downloaded additional malware and tools onto a compromised host. |
Ingress Tool Transfer | Gazer can execute a task to download a file. |
Ingress Tool Transfer | Gelsemium can download additional plug-ins to a compromised host. |
Ingress Tool Transfer | gh0st RAT can download files to the victim’s machine. |
Ingress Tool Transfer | Gold Dragon can download additional components from the C2 server. |
Ingress Tool Transfer | GoldenSpy constantly attempts to download and execute files from the remote C2, including GoldenSpy itself if not found on the system. |
Ingress Tool Transfer | GoldMax can download and execute additional files. |
Ingress Tool Transfer | It malware can download additional files from C2 servers. |
Ingress Tool Transfer | Grandoreiro can download its second stage from a hardcoded URL within the loader's code. |
Ingress Tool Transfer | GreyEnergy can download additional modules and payloads. |
Ingress Tool Transfer | GrimAgent has the ability to download and execute additional payloads. |
Ingress Tool Transfer | GuLoader can download further malware for execution on the victim's machine. |
Ingress Tool Transfer | H1N1 contains a command to download and execute a file from a remotely hosted URL using WinINet HTTP requests. |
Ingress Tool Transfer | It has downloaded malware and tools--including Nishang and PowerCat--onto a compromised host. |
Ingress Tool Transfer | Hancitor has the ability to download additional files from C2. |
Ingress Tool Transfer | can download and execute a second-stage payload. |
Ingress Tool Transfer | Helminth can download additional files. |
Ingress Tool Transfer | It has downloaded additional payloads and malicious scripts onto a compromised host. |
Ingress Tool Transfer | Hi-Zor has the ability to upload and download files from its C2 server. |
Ingress Tool Transfer | HiddenWasp downloads a tar compressed archive from a download server to the system. |
Ingress Tool Transfer | Hikit has the ability to download files to a compromised host. |
Ingress Tool Transfer | Hildegard has downloaded additional scripts that build and run Monero cryptocurrency miners. |
Ingress Tool Transfer | HOPLIGHT has the ability to connect to a remote host in order to upload and download files. |
Ingress Tool Transfer | HotCroissant has the ability to upload a file from the command and control (C2) server to the victim machine. |
Ingress Tool Transfer | HTTPBrowser is capable of writing a file to the compromised system from the C2 server. |
Ingress Tool Transfer | Hydraq creates a backdoor through which remote attackers can download files and additional malware components. |
Ingress Tool Transfer | HyperBro has the ability to download additional files. |
Ingress Tool Transfer | IcedID has the ability to download additional modules and a configuration file from C2. |
Ingress Tool Transfer | It has downloaded additional files and tools from its C2 server. |
Ingress Tool Transfer | It has downloaded additional scripts, malware, and tools onto a compromised host. |
Ingress Tool Transfer | Industroyer downloads a shellcode payload from a remote C2 server and loads it into memory. |
Ingress Tool Transfer | InvisiMole can upload files to the victim's machine for operations. |
Ingress Tool Transfer | Ixeshe can download and execute additional files. |
Ingress Tool Transfer | Javali can download payloads from remote C2 servers. |
Ingress Tool Transfer | JHUHUGIT can retrieve an additional payload from its C2 server. JHUHUGIT has a command to download files to the victim’s machine. |
Ingress Tool Transfer | JPIN can download files and upgrade itself. |
Ingress Tool Transfer | jRAT can download and execute files. |
Ingress Tool Transfer | JSS Loader has the ability to download malicious executables to a compromised host. |
Ingress Tool Transfer | KARAE can upload and download files, including second-stage malware. |
Ingress Tool Transfer | Kasidet has the ability to download and execute additional files. |
Ingress Tool Transfer | Kazuar downloads additional plug-ins to load on the victim’s machine, including the ability to upgrade and replace its own binary. |
Ingress Tool Transfer | It has used tools to download files to compromised machines. |
Ingress Tool Transfer | Kerrdown can download specific payloads to a compromised host based on OS architecture. |
Ingress Tool Transfer | Kessel can download additional modules from the C2 server. |
Ingress Tool Transfer | Kevin can download files to the compromised host. |
Subsets and Splits