prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Ingress Tool Transfer
|
CSPY Downloader can download additional tools to a compromised host.
|
Ingress Tool Transfer
|
Cuba can download files from its C2 server.
|
Ingress Tool Transfer
|
Cyclops Blink has the ability to download files to target systems.
|
Ingress Tool Transfer
|
Dacls can download its payload from a C2 server.
|
Ingress Tool Transfer
|
DanBot can download additional files to a targeted system.
|
Ingress Tool Transfer
|
DarkComet can load any files onto the infected machine to execute.
|
Ingress Tool Transfer
|
It has used first-stage payloads that download additional malware from C2 servers.
|
Ingress Tool Transfer
|
DarkTortilla can download additional packages for keylogging, cryptocurrency mining, and other capabilities; it can also retrieve malicious payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit.
|
Ingress Tool Transfer
|
Daserf can download remote files.
|
Ingress Tool Transfer
|
DDKONG downloads and uploads files on the victim’s machine.
|
Ingress Tool Transfer
|
DEATHRANSOM can download files to a compromised host.
|
Ingress Tool Transfer
|
Denis deploys additional backdoors and hacking tools to the system.
|
Ingress Tool Transfer
|
Diavol can receive configuration updates and additional payloads including wscpy.exe from C2.
|
Ingress Tool Transfer
|
Dipsind can download remote files.
|
Ingress Tool Transfer
|
Disco can download files to targeted systems via SMB.
|
Ingress Tool Transfer
|
DnsSystem can download files to compromised systems after receiving a command with the string downloaddd.
|
Ingress Tool Transfer
|
DOGCALL can download and execute additional payloads.
|
Ingress Tool Transfer
|
Doki has downloaded scripts from C2.
|
Ingress Tool Transfer
|
Donut can download and execute previously staged shellcode payloads.
|
Ingress Tool Transfer
|
down_new has the ability to download files to the compromised host.
|
Ingress Tool Transfer
|
After downloading its main config file, Downdelph downloads multiple payloads from C2 servers.
|
Ingress Tool Transfer
|
It has copied and installed tools for operations once in the victim environment.
|
Ingress Tool Transfer
|
DRATzarus can deploy additional tools onto an infected machine.
|
Ingress Tool Transfer
|
DropBook can download and execute additional files.
|
Ingress Tool Transfer
|
Drovorub can download files to a compromised host.
|
Ingress Tool Transfer
|
Dtrack’s can download and upload a file to the victim’s computer.
|
Ingress Tool Transfer
|
Dyre has a command to download and executes additional files.
|
Ingress Tool Transfer
|
Ecipekac can download additional payloads to a compromised host.
|
Ingress Tool Transfer
|
Egregor has the ability to download files from its C2 server.
|
Ingress Tool Transfer
|
The Ritsol backdoor trojan used by It can download files onto a compromised host from a remote location.
|
Ingress Tool Transfer
|
Elise can download additional files from the C2 server for execution.
|
Ingress Tool Transfer
|
It has used tools to download malicious code.
|
Ingress Tool Transfer
|
Emissary has the capability to download files from the C2 server.
|
Ingress Tool Transfer
|
Empire can upload and download to and from a victim machine.
|
Ingress Tool Transfer
|
esentutl can be used to copy files from a given URL.
|
Ingress Tool Transfer
|
EvilBunny has downloaded additional Lua scripts from the C2.
|
Ingress Tool Transfer
|
EVILNUM can download and upload files to the victim's computer.
|
Ingress Tool Transfer
|
It can deploy additional components or tools as needed.
|
Ingress Tool Transfer
|
Exaramel for Linux has a command to download a file from and to a remote C2 server.
|
Ingress Tool Transfer
|
Explosive has a function to download a file to the infected system.
|
Ingress Tool Transfer
|
Felismus can download files from remote servers.
|
Ingress Tool Transfer
|
FELIXROOT downloads and uploads files to and from the victim’s machine.
|
Ingress Tool Transfer
|
It has downloaded additional tools and malware to compromised systems.
|
Ingress Tool Transfer
|
It has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload.
|
Ingress Tool Transfer
|
It has used remote code execution to download subsequent payloads.
|
Ingress Tool Transfer
|
Flagpro can download additional malware from the C2 server.
|
Ingress Tool Transfer
|
FlawedAmmyy can transfer files from C2.
|
Ingress Tool Transfer
|
FoggyWeb can receive additional malicious components from an actor controlled C2 server and execute them on a compromised AD FS server.
|
Ingress Tool Transfer
|
It has downloaded additional tools including PsExec directly to endpoints.
|
Ingress Tool Transfer
|
During Frankenstein, the threat actors downloaded files and tools onto a victim machine.
|
Ingress Tool Transfer
|
ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment.
|
Ingress Tool Transfer
|
FunnyDream can download additional files onto a compromised host.
|
Ingress Tool Transfer
|
During FunnyDream, the threat actors downloaded additional droppers and backdoors onto a compromised system.
|
Ingress Tool Transfer
|
FYAnti can download additional payloads to a compromised host.
|
Ingress Tool Transfer
|
It dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN.
|
Ingress Tool Transfer
|
It has downloaded additional malware and tools onto a compromised host.
|
Ingress Tool Transfer
|
Gazer can execute a task to download a file.
|
Ingress Tool Transfer
|
Gelsemium can download additional plug-ins to a compromised host.
|
Ingress Tool Transfer
|
gh0st RAT can download files to the victim’s machine.
|
Ingress Tool Transfer
|
Gold Dragon can download additional components from the C2 server.
|
Ingress Tool Transfer
|
GoldenSpy constantly attempts to download and execute files from the remote C2, including GoldenSpy itself if not found on the system.
|
Ingress Tool Transfer
|
GoldMax can download and execute additional files.
|
Ingress Tool Transfer
|
It malware can download additional files from C2 servers.
|
Ingress Tool Transfer
|
Grandoreiro can download its second stage from a hardcoded URL within the loader's code.
|
Ingress Tool Transfer
|
GreyEnergy can download additional modules and payloads.
|
Ingress Tool Transfer
|
GrimAgent has the ability to download and execute additional payloads.
|
Ingress Tool Transfer
|
GuLoader can download further malware for execution on the victim's machine.
|
Ingress Tool Transfer
|
H1N1 contains a command to download and execute a file from a remotely hosted URL using WinINet HTTP requests.
|
Ingress Tool Transfer
|
It has downloaded malware and tools--including Nishang and PowerCat--onto a compromised host.
|
Ingress Tool Transfer
|
Hancitor has the ability to download additional files from C2.
|
Ingress Tool Transfer
|
can download and execute a second-stage payload.
|
Ingress Tool Transfer
|
Helminth can download additional files.
|
Ingress Tool Transfer
|
It has downloaded additional payloads and malicious scripts onto a compromised host.
|
Ingress Tool Transfer
|
Hi-Zor has the ability to upload and download files from its C2 server.
|
Ingress Tool Transfer
|
HiddenWasp downloads a tar compressed archive from a download server to the system.
|
Ingress Tool Transfer
|
Hikit has the ability to download files to a compromised host.
|
Ingress Tool Transfer
|
Hildegard has downloaded additional scripts that build and run Monero cryptocurrency miners.
|
Ingress Tool Transfer
|
HOPLIGHT has the ability to connect to a remote host in order to upload and download files.
|
Ingress Tool Transfer
|
HotCroissant has the ability to upload a file from the command and control (C2) server to the victim machine.
|
Ingress Tool Transfer
|
HTTPBrowser is capable of writing a file to the compromised system from the C2 server.
|
Ingress Tool Transfer
|
Hydraq creates a backdoor through which remote attackers can download files and additional malware components.
|
Ingress Tool Transfer
|
HyperBro has the ability to download additional files.
|
Ingress Tool Transfer
|
IcedID has the ability to download additional modules and a configuration file from C2.
|
Ingress Tool Transfer
|
It has downloaded additional files and tools from its C2 server.
|
Ingress Tool Transfer
|
It has downloaded additional scripts, malware, and tools onto a compromised host.
|
Ingress Tool Transfer
|
Industroyer downloads a shellcode payload from a remote C2 server and loads it into memory.
|
Ingress Tool Transfer
|
InvisiMole can upload files to the victim's machine for operations.
|
Ingress Tool Transfer
|
Ixeshe can download and execute additional files.
|
Ingress Tool Transfer
|
Javali can download payloads from remote C2 servers.
|
Ingress Tool Transfer
|
JHUHUGIT can retrieve an additional payload from its C2 server. JHUHUGIT has a command to download files to the victim’s machine.
|
Ingress Tool Transfer
|
JPIN can download files and upgrade itself.
|
Ingress Tool Transfer
|
jRAT can download and execute files.
|
Ingress Tool Transfer
|
JSS Loader has the ability to download malicious executables to a compromised host.
|
Ingress Tool Transfer
|
KARAE can upload and download files, including second-stage malware.
|
Ingress Tool Transfer
|
Kasidet has the ability to download and execute additional files.
|
Ingress Tool Transfer
|
Kazuar downloads additional plug-ins to load on the victim’s machine, including the ability to upgrade and replace its own binary.
|
Ingress Tool Transfer
|
It has used tools to download files to compromised machines.
|
Ingress Tool Transfer
|
Kerrdown can download specific payloads to a compromised host based on OS architecture.
|
Ingress Tool Transfer
|
Kessel can download additional modules from the C2 server.
|
Ingress Tool Transfer
|
Kevin can download files to the compromised host.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.