prompt
stringclasses
508 values
procedure
stringlengths
20
478
Ingress Tool Transfer
CSPY Downloader can download additional tools to a compromised host.
Ingress Tool Transfer
Cuba can download files from its C2 server.
Ingress Tool Transfer
Cyclops Blink has the ability to download files to target systems.
Ingress Tool Transfer
Dacls can download its payload from a C2 server.
Ingress Tool Transfer
DanBot can download additional files to a targeted system.
Ingress Tool Transfer
DarkComet can load any files onto the infected machine to execute.
Ingress Tool Transfer
It has used first-stage payloads that download additional malware from C2 servers.
Ingress Tool Transfer
DarkTortilla can download additional packages for keylogging, cryptocurrency mining, and other capabilities; it can also retrieve malicious payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit.
Ingress Tool Transfer
Daserf can download remote files.
Ingress Tool Transfer
DDKONG downloads and uploads files on the victim’s machine.
Ingress Tool Transfer
DEATHRANSOM can download files to a compromised host.
Ingress Tool Transfer
Denis deploys additional backdoors and hacking tools to the system.
Ingress Tool Transfer
Diavol can receive configuration updates and additional payloads including wscpy.exe from C2.
Ingress Tool Transfer
Dipsind can download remote files.
Ingress Tool Transfer
Disco can download files to targeted systems via SMB.
Ingress Tool Transfer
DnsSystem can download files to compromised systems after receiving a command with the string downloaddd.
Ingress Tool Transfer
DOGCALL can download and execute additional payloads.
Ingress Tool Transfer
Doki has downloaded scripts from C2.
Ingress Tool Transfer
Donut can download and execute previously staged shellcode payloads.
Ingress Tool Transfer
down_new has the ability to download files to the compromised host.
Ingress Tool Transfer
After downloading its main config file, Downdelph downloads multiple payloads from C2 servers.
Ingress Tool Transfer
It has copied and installed tools for operations once in the victim environment.
Ingress Tool Transfer
DRATzarus can deploy additional tools onto an infected machine.
Ingress Tool Transfer
DropBook can download and execute additional files.
Ingress Tool Transfer
Drovorub can download files to a compromised host.
Ingress Tool Transfer
Dtrack’s can download and upload a file to the victim’s computer.
Ingress Tool Transfer
Dyre has a command to download and executes additional files.
Ingress Tool Transfer
Ecipekac can download additional payloads to a compromised host.
Ingress Tool Transfer
Egregor has the ability to download files from its C2 server.
Ingress Tool Transfer
The Ritsol backdoor trojan used by It can download files onto a compromised host from a remote location.
Ingress Tool Transfer
Elise can download additional files from the C2 server for execution.
Ingress Tool Transfer
It has used tools to download malicious code.
Ingress Tool Transfer
Emissary has the capability to download files from the C2 server.
Ingress Tool Transfer
Empire can upload and download to and from a victim machine.
Ingress Tool Transfer
esentutl can be used to copy files from a given URL.
Ingress Tool Transfer
EvilBunny has downloaded additional Lua scripts from the C2.
Ingress Tool Transfer
EVILNUM can download and upload files to the victim's computer.
Ingress Tool Transfer
It can deploy additional components or tools as needed.
Ingress Tool Transfer
Exaramel for Linux has a command to download a file from and to a remote C2 server.
Ingress Tool Transfer
Explosive has a function to download a file to the infected system.
Ingress Tool Transfer
Felismus can download files from remote servers.
Ingress Tool Transfer
FELIXROOT downloads and uploads files to and from the victim’s machine.
Ingress Tool Transfer
It has downloaded additional tools and malware to compromised systems.
Ingress Tool Transfer
It has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload.
Ingress Tool Transfer
It has used remote code execution to download subsequent payloads.
Ingress Tool Transfer
Flagpro can download additional malware from the C2 server.
Ingress Tool Transfer
FlawedAmmyy can transfer files from C2.
Ingress Tool Transfer
FoggyWeb can receive additional malicious components from an actor controlled C2 server and execute them on a compromised AD FS server.
Ingress Tool Transfer
It has downloaded additional tools including PsExec directly to endpoints.
Ingress Tool Transfer
During Frankenstein, the threat actors downloaded files and tools onto a victim machine.
Ingress Tool Transfer
ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment.
Ingress Tool Transfer
FunnyDream can download additional files onto a compromised host.
Ingress Tool Transfer
During FunnyDream, the threat actors downloaded additional droppers and backdoors onto a compromised system.
Ingress Tool Transfer
FYAnti can download additional payloads to a compromised host.
Ingress Tool Transfer
It dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN.
Ingress Tool Transfer
It has downloaded additional malware and tools onto a compromised host.
Ingress Tool Transfer
Gazer can execute a task to download a file.
Ingress Tool Transfer
Gelsemium can download additional plug-ins to a compromised host.
Ingress Tool Transfer
gh0st RAT can download files to the victim’s machine.
Ingress Tool Transfer
Gold Dragon can download additional components from the C2 server.
Ingress Tool Transfer
GoldenSpy constantly attempts to download and execute files from the remote C2, including GoldenSpy itself if not found on the system.
Ingress Tool Transfer
GoldMax can download and execute additional files.
Ingress Tool Transfer
It malware can download additional files from C2 servers.
Ingress Tool Transfer
Grandoreiro can download its second stage from a hardcoded URL within the loader's code.
Ingress Tool Transfer
GreyEnergy can download additional modules and payloads.
Ingress Tool Transfer
GrimAgent has the ability to download and execute additional payloads.
Ingress Tool Transfer
GuLoader can download further malware for execution on the victim's machine.
Ingress Tool Transfer
H1N1 contains a command to download and execute a file from a remotely hosted URL using WinINet HTTP requests.
Ingress Tool Transfer
It has downloaded malware and tools--including Nishang and PowerCat--onto a compromised host.
Ingress Tool Transfer
Hancitor has the ability to download additional files from C2.
Ingress Tool Transfer
can download and execute a second-stage payload.
Ingress Tool Transfer
Helminth can download additional files.
Ingress Tool Transfer
It has downloaded additional payloads and malicious scripts onto a compromised host.
Ingress Tool Transfer
Hi-Zor has the ability to upload and download files from its C2 server.
Ingress Tool Transfer
HiddenWasp downloads a tar compressed archive from a download server to the system.
Ingress Tool Transfer
Hikit has the ability to download files to a compromised host.
Ingress Tool Transfer
Hildegard has downloaded additional scripts that build and run Monero cryptocurrency miners.
Ingress Tool Transfer
HOPLIGHT has the ability to connect to a remote host in order to upload and download files.
Ingress Tool Transfer
HotCroissant has the ability to upload a file from the command and control (C2) server to the victim machine.
Ingress Tool Transfer
HTTPBrowser is capable of writing a file to the compromised system from the C2 server.
Ingress Tool Transfer
Hydraq creates a backdoor through which remote attackers can download files and additional malware components.
Ingress Tool Transfer
HyperBro has the ability to download additional files.
Ingress Tool Transfer
IcedID has the ability to download additional modules and a configuration file from C2.
Ingress Tool Transfer
It has downloaded additional files and tools from its C2 server.
Ingress Tool Transfer
It has downloaded additional scripts, malware, and tools onto a compromised host.
Ingress Tool Transfer
Industroyer downloads a shellcode payload from a remote C2 server and loads it into memory.
Ingress Tool Transfer
InvisiMole can upload files to the victim's machine for operations.
Ingress Tool Transfer
Ixeshe can download and execute additional files.
Ingress Tool Transfer
Javali can download payloads from remote C2 servers.
Ingress Tool Transfer
JHUHUGIT can retrieve an additional payload from its C2 server. JHUHUGIT has a command to download files to the victim’s machine.
Ingress Tool Transfer
JPIN can download files and upgrade itself.
Ingress Tool Transfer
jRAT can download and execute files.
Ingress Tool Transfer
JSS Loader has the ability to download malicious executables to a compromised host.
Ingress Tool Transfer
KARAE can upload and download files, including second-stage malware.
Ingress Tool Transfer
Kasidet has the ability to download and execute additional files.
Ingress Tool Transfer
Kazuar downloads additional plug-ins to load on the victim’s machine, including the ability to upgrade and replace its own binary.
Ingress Tool Transfer
It has used tools to download files to compromised machines.
Ingress Tool Transfer
Kerrdown can download specific payloads to a compromised host based on OS architecture.
Ingress Tool Transfer
Kessel can download additional modules from the C2 server.
Ingress Tool Transfer
Kevin can download files to the compromised host.