prompt
stringclasses
508 values
procedure
stringlengths
20
478
Ingress Tool Transfer
KeyBoy has a download and upload functionality.
Ingress Tool Transfer
KEYMARBLE can upload files to the victim’s machine and can download additional payloads.
Ingress Tool Transfer
KGH_SPY has the ability to download and execute code from remote servers.
Ingress Tool Transfer
It has downloaded additional scripts, tools, and malware onto victim systems.
Ingress Tool Transfer
Kinsing has downloaded additional lateral movement scripts from C2.
Ingress Tool Transfer
Kivars has the ability to download and execute files.
Ingress Tool Transfer
Koadic can download additional files and tools.
Ingress Tool Transfer
KOCTOPUS has executed a PowerShell command to download a file to the system.
Ingress Tool Transfer
KONNI can download files and execute them on the victim’s machine.
Ingress Tool Transfer
Kwampirs downloads additional files from C2 servers.
Ingress Tool Transfer
It has downloaded files, malware, and tools from its C2 onto a compromised host.
Ingress Tool Transfer
It had downloaded additional tools to a compromised host.
Ingress Tool Transfer
It has downloaded additional scripts and files from adversary-controlled servers.
Ingress Tool Transfer
LightNeuron has the ability to download and execute additional files.
Ingress Tool Transfer
Linfo creates a backdoor through which remote attackers can download files onto compromised hosts.
Ingress Tool Transfer
LiteDuke has the ability to download files.
Ingress Tool Transfer
LitePower has the ability to download payloads containing system commands to a compromised host.
Ingress Tool Transfer
Lizar can download additional plugins, files, and tools.
Ingress Tool Transfer
Lokibot downloaded several staged items onto the victim's machine.
Ingress Tool Transfer
LoudMiner used SCP to update the miner from the C2.
Ingress Tool Transfer
LOWBALL uses the Dropbox API to request two files, one of which is the same file as the one dropped by the malicious email attachment. This is most likely meant to be a mechanism to update the compromised host with a new version of the LOWBALL malware.
Ingress Tool Transfer
Lucifer can download and execute a replica of itself using certutil.
Ingress Tool Transfer
It has downloaded additional malware and tools onto a compromised host.
Ingress Tool Transfer
It can download additional files for execution on the victim’s machine.
Ingress Tool Transfer
MacMa has downloaded additional files, including an exploit for used privilege escalation.
Ingress Tool Transfer
macOS.OSAMiner has used curl to download a Stripped Payloads from a public facing adversary-controlled webpage.
Ingress Tool Transfer
Mafalda can download additional files onto the compromised host.
Ingress Tool Transfer
It has downloaded additional code and files from servers onto victims.
Ingress Tool Transfer
MarkiRAT can download additional files and tools from its C2 server, including through the use of BITSAdmin.
Ingress Tool Transfer
MCMD can upload additional files to a compromised host.
Ingress Tool Transfer
MechaFlounder has the ability to upload and download files to and from a compromised host.
Ingress Tool Transfer
Melcoz has the ability to download additional files to a compromised host.
Ingress Tool Transfer
It has installed updates and new malware on victims.
Ingress Tool Transfer
It has downloaded tools and malware onto a compromised system.
Ingress Tool Transfer
metaMain can download files onto compromised systems.
Ingress Tool Transfer
Metamorfo has used MSI files to download additional files to execute.
Ingress Tool Transfer
Meteor has the ability to download additional files for execution on the victim's machine.
Ingress Tool Transfer
Micropsia can download and execute an executable from the C2 server.
Ingress Tool Transfer
Milan has received files from C2 and stored them in log folders beginning with the character sequence a9850d2f.
Ingress Tool Transfer
MiniDuke can download additional encrypted backdoors onto the victim via GIF files.
Ingress Tool Transfer
Mis-Type has downloaded additional malware and files onto a compromised host.
Ingress Tool Transfer
Misdat is capable of downloading files from the C2.
Ingress Tool Transfer
Mivast has the capability to download and execute .exe files.
Ingress Tool Transfer
MobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card.
Ingress Tool Transfer
MoleNet can download additional payloads from the C2.
Ingress Tool Transfer
It used executables to download malicious files from different sources.
Ingress Tool Transfer
Mongall can download files to targeted systems.
Ingress Tool Transfer
More_eggs can download and launch additional payloads.
Ingress Tool Transfer
It has downloaded and installed web shells to following path C:\inetpub\wwwroot\aspnet_client\system_web\IISpool.aspx.
Ingress Tool Transfer
Mosquito can upload and download files to the victim.
Ingress Tool Transfer
It has used malware that can upload additional files to the victim’s machine.
Ingress Tool Transfer
It has downloaded additional executables following the initial infection stage.
Ingress Tool Transfer
NanHaiShu can download additional files from URLs.
Ingress Tool Transfer
NanoCore has the capability to download and activate additional modules for execution.
Ingress Tool Transfer
NavRAT can download files remotely.
Ingress Tool Transfer
NDiskMonitor can download and execute a file from given URL.
Ingress Tool Transfer
Nebulae can download files from C2.
Ingress Tool Transfer
Neoichor can download additional files onto a compromised host.
Ingress Tool Transfer
Nerex creates a backdoor through which remote attackers can download files onto a compromised host.
Ingress Tool Transfer
Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload.
Ingress Tool Transfer
NETWIRE can downloaded payloads from C2 to the compromised host.
Ingress Tool Transfer
Nidiran can download and execute files.
Ingress Tool Transfer
During Night Dragon, threat actors used administrative utilities to deliver Trojan components to remote systems.
Ingress Tool Transfer
NightClub can load multiple additional plugins on an infected host.
Ingress Tool Transfer
njRAT can download files to the victim’s machine.
Ingress Tool Transfer
NOKKI has downloaded a remote module for execution.
Ingress Tool Transfer
It has used malicious macros to download additional files to the victim's machine.
Ingress Tool Transfer
Octopus can download additional files and tools onto the victim’s machine.
Ingress Tool Transfer
It can download remote files onto victims.
Ingress Tool Transfer
Okrum has built-in commands for uploading, downloading, and executing files to the system.
Ingress Tool Transfer
OopsIE can download files from its C2 server to the victim's machine.
Ingress Tool Transfer
During Operation Dream Job, It downloaded multistage malware and tools onto a compromised host.
Ingress Tool Transfer
During Operation Honeybee, the threat actors downloaded additional malware and malicious scripts onto a compromised host.
Ingress Tool Transfer
During Operation Sharpshooter, additional payloads were downloaded after a target was infected with a first-stage downloader.
Ingress Tool Transfer
During Operation Wocao, threat actors downloaded additional files to the infected system.
Ingress Tool Transfer
Orz can download files onto the victim.
Ingress Tool Transfer
OSX/Shlayer can download payloads, and extract bytes from files. OSX/Shlayer uses the curl -fsL "$url" >$tmp_path command to download malicious payloads into a temporary directory.
Ingress Tool Transfer
OSX_OCEANLOTUS.D has a command to download and execute a file on the victim’s machine.
Ingress Tool Transfer
OutSteel can download files from its C2 server.
Ingress Tool Transfer
P.A.S. Webshell can upload and download files to and from compromised hosts.
Ingress Tool Transfer
P8RAT can download additional payloads to a target system.
Ingress Tool Transfer
Pandora can load additional drivers and files onto a victim machine.
Ingress Tool Transfer
Pasam creates a backdoor through which remote attackers can upload files.
Ingress Tool Transfer
It payloads download additional files from the C2 server.
Ingress Tool Transfer
Penquin can execute the command code do_download to retrieve remote files from C2.
Ingress Tool Transfer
Peppy can download and execute remote files.
Ingress Tool Transfer
PipeMon can install additional modules via C2 commands.
Ingress Tool Transfer
Pisloader has a command to upload a file to the victim machine.
Ingress Tool Transfer
PLAINTEE has downloaded and executed additional plugins.
Ingress Tool Transfer
It has transferred files using the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel.
Ingress Tool Transfer
PLEAD has the ability to upload and download files to and from an infected host.
Ingress Tool Transfer
PlugX has a module to download and execute files on the compromised machine.
Ingress Tool Transfer
PoetRAT has the ability to copy files and download/upload files into C2 channels using FTP and HTTPS.
Ingress Tool Transfer
PoisonIvy creates a backdoor through which remote attackers can upload files.
Ingress Tool Transfer
PolyglotDuke can retrieve payloads from the C2 server.
Ingress Tool Transfer
Pony can download additional files onto the infected system.
Ingress Tool Transfer
POSHSPY downloads and executes additional PowerShell code and Windows binaries.
Ingress Tool Transfer
PowerDuke has a command to download a file.
Ingress Tool Transfer
PowerLess can download additional payloads to a compromised host.
Ingress Tool Transfer
PowerPunch can download payloads from adversary infrastructure.