prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Ingress Tool Transfer | KeyBoy has a download and upload functionality. |
Ingress Tool Transfer | KEYMARBLE can upload files to the victim’s machine and can download additional payloads. |
Ingress Tool Transfer | KGH_SPY has the ability to download and execute code from remote servers. |
Ingress Tool Transfer | It has downloaded additional scripts, tools, and malware onto victim systems. |
Ingress Tool Transfer | Kinsing has downloaded additional lateral movement scripts from C2. |
Ingress Tool Transfer | Kivars has the ability to download and execute files. |
Ingress Tool Transfer | Koadic can download additional files and tools. |
Ingress Tool Transfer | KOCTOPUS has executed a PowerShell command to download a file to the system. |
Ingress Tool Transfer | KONNI can download files and execute them on the victim’s machine. |
Ingress Tool Transfer | Kwampirs downloads additional files from C2 servers. |
Ingress Tool Transfer | It has downloaded files, malware, and tools from its C2 onto a compromised host. |
Ingress Tool Transfer | It had downloaded additional tools to a compromised host. |
Ingress Tool Transfer | It has downloaded additional scripts and files from adversary-controlled servers. |
Ingress Tool Transfer | LightNeuron has the ability to download and execute additional files. |
Ingress Tool Transfer | Linfo creates a backdoor through which remote attackers can download files onto compromised hosts. |
Ingress Tool Transfer | LiteDuke has the ability to download files. |
Ingress Tool Transfer | LitePower has the ability to download payloads containing system commands to a compromised host. |
Ingress Tool Transfer | Lizar can download additional plugins, files, and tools. |
Ingress Tool Transfer | Lokibot downloaded several staged items onto the victim's machine. |
Ingress Tool Transfer | LoudMiner used SCP to update the miner from the C2. |
Ingress Tool Transfer | LOWBALL uses the Dropbox API to request two files, one of which is the same file as the one dropped by the malicious email attachment. This is most likely meant to be a mechanism to update the compromised host with a new version of the LOWBALL malware. |
Ingress Tool Transfer | Lucifer can download and execute a replica of itself using certutil. |
Ingress Tool Transfer | It has downloaded additional malware and tools onto a compromised host. |
Ingress Tool Transfer | It can download additional files for execution on the victim’s machine. |
Ingress Tool Transfer | MacMa has downloaded additional files, including an exploit for used privilege escalation. |
Ingress Tool Transfer | macOS.OSAMiner has used curl to download a Stripped Payloads from a public facing adversary-controlled webpage. |
Ingress Tool Transfer | Mafalda can download additional files onto the compromised host. |
Ingress Tool Transfer | It has downloaded additional code and files from servers onto victims. |
Ingress Tool Transfer | MarkiRAT can download additional files and tools from its C2 server, including through the use of BITSAdmin. |
Ingress Tool Transfer | MCMD can upload additional files to a compromised host. |
Ingress Tool Transfer | MechaFlounder has the ability to upload and download files to and from a compromised host. |
Ingress Tool Transfer | Melcoz has the ability to download additional files to a compromised host. |
Ingress Tool Transfer | It has installed updates and new malware on victims. |
Ingress Tool Transfer | It has downloaded tools and malware onto a compromised system. |
Ingress Tool Transfer | metaMain can download files onto compromised systems. |
Ingress Tool Transfer | Metamorfo has used MSI files to download additional files to execute. |
Ingress Tool Transfer | Meteor has the ability to download additional files for execution on the victim's machine. |
Ingress Tool Transfer | Micropsia can download and execute an executable from the C2 server. |
Ingress Tool Transfer | Milan has received files from C2 and stored them in log folders beginning with the character sequence a9850d2f. |
Ingress Tool Transfer | MiniDuke can download additional encrypted backdoors onto the victim via GIF files. |
Ingress Tool Transfer | Mis-Type has downloaded additional malware and files onto a compromised host. |
Ingress Tool Transfer | Misdat is capable of downloading files from the C2. |
Ingress Tool Transfer | Mivast has the capability to download and execute .exe files. |
Ingress Tool Transfer | MobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card. |
Ingress Tool Transfer | MoleNet can download additional payloads from the C2. |
Ingress Tool Transfer | It used executables to download malicious files from different sources. |
Ingress Tool Transfer | Mongall can download files to targeted systems. |
Ingress Tool Transfer | More_eggs can download and launch additional payloads. |
Ingress Tool Transfer | It has downloaded and installed web shells to following path C:\inetpub\wwwroot\aspnet_client\system_web\IISpool.aspx. |
Ingress Tool Transfer | Mosquito can upload and download files to the victim. |
Ingress Tool Transfer | It has used malware that can upload additional files to the victim’s machine. |
Ingress Tool Transfer | It has downloaded additional executables following the initial infection stage. |
Ingress Tool Transfer | NanHaiShu can download additional files from URLs. |
Ingress Tool Transfer | NanoCore has the capability to download and activate additional modules for execution. |
Ingress Tool Transfer | NavRAT can download files remotely. |
Ingress Tool Transfer | NDiskMonitor can download and execute a file from given URL. |
Ingress Tool Transfer | Nebulae can download files from C2. |
Ingress Tool Transfer | Neoichor can download additional files onto a compromised host. |
Ingress Tool Transfer | Nerex creates a backdoor through which remote attackers can download files onto a compromised host. |
Ingress Tool Transfer | Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload. |
Ingress Tool Transfer | NETWIRE can downloaded payloads from C2 to the compromised host. |
Ingress Tool Transfer | Nidiran can download and execute files. |
Ingress Tool Transfer | During Night Dragon, threat actors used administrative utilities to deliver Trojan components to remote systems. |
Ingress Tool Transfer | NightClub can load multiple additional plugins on an infected host. |
Ingress Tool Transfer | njRAT can download files to the victim’s machine. |
Ingress Tool Transfer | NOKKI has downloaded a remote module for execution. |
Ingress Tool Transfer | It has used malicious macros to download additional files to the victim's machine. |
Ingress Tool Transfer | Octopus can download additional files and tools onto the victim’s machine. |
Ingress Tool Transfer | It can download remote files onto victims. |
Ingress Tool Transfer | Okrum has built-in commands for uploading, downloading, and executing files to the system. |
Ingress Tool Transfer | OopsIE can download files from its C2 server to the victim's machine. |
Ingress Tool Transfer | During Operation Dream Job, It downloaded multistage malware and tools onto a compromised host. |
Ingress Tool Transfer | During Operation Honeybee, the threat actors downloaded additional malware and malicious scripts onto a compromised host. |
Ingress Tool Transfer | During Operation Sharpshooter, additional payloads were downloaded after a target was infected with a first-stage downloader. |
Ingress Tool Transfer | During Operation Wocao, threat actors downloaded additional files to the infected system. |
Ingress Tool Transfer | Orz can download files onto the victim. |
Ingress Tool Transfer | OSX/Shlayer can download payloads, and extract bytes from files. OSX/Shlayer uses the curl -fsL "$url" >$tmp_path command to download malicious payloads into a temporary directory. |
Ingress Tool Transfer | OSX_OCEANLOTUS.D has a command to download and execute a file on the victim’s machine. |
Ingress Tool Transfer | OutSteel can download files from its C2 server. |
Ingress Tool Transfer | P.A.S. Webshell can upload and download files to and from compromised hosts. |
Ingress Tool Transfer | P8RAT can download additional payloads to a target system. |
Ingress Tool Transfer | Pandora can load additional drivers and files onto a victim machine. |
Ingress Tool Transfer | Pasam creates a backdoor through which remote attackers can upload files. |
Ingress Tool Transfer | It payloads download additional files from the C2 server. |
Ingress Tool Transfer | Penquin can execute the command code do_download to retrieve remote files from C2. |
Ingress Tool Transfer | Peppy can download and execute remote files. |
Ingress Tool Transfer | PipeMon can install additional modules via C2 commands. |
Ingress Tool Transfer | Pisloader has a command to upload a file to the victim machine. |
Ingress Tool Transfer | PLAINTEE has downloaded and executed additional plugins. |
Ingress Tool Transfer | It has transferred files using the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel. |
Ingress Tool Transfer | PLEAD has the ability to upload and download files to and from an infected host. |
Ingress Tool Transfer | PlugX has a module to download and execute files on the compromised machine. |
Ingress Tool Transfer | PoetRAT has the ability to copy files and download/upload files into C2 channels using FTP and HTTPS. |
Ingress Tool Transfer | PoisonIvy creates a backdoor through which remote attackers can upload files. |
Ingress Tool Transfer | PolyglotDuke can retrieve payloads from the C2 server. |
Ingress Tool Transfer | Pony can download additional files onto the infected system. |
Ingress Tool Transfer | POSHSPY downloads and executes additional PowerShell code and Windows binaries. |
Ingress Tool Transfer | PowerDuke has a command to download a file. |
Ingress Tool Transfer | PowerLess can download additional payloads to a compromised host. |
Ingress Tool Transfer | PowerPunch can download payloads from adversary infrastructure. |
Subsets and Splits