prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Ingress Tool Transfer
|
POWERSOURCE has been observed being used to download TEXTMATE and the Cobalt Strike Beacon payload onto victims.
|
Ingress Tool Transfer
|
POWERSTATS can retrieve and execute additional PowerShell payloads from the C2 server.
|
Ingress Tool Transfer
|
POWRUNER can download or upload files from its C2 server.
|
Ingress Tool Transfer
|
CostaBricks can download additional payloads onto a compromised host.
|
Ingress Tool Transfer
|
Psylo has a command to download a file to the system from its C2 server.
|
Ingress Tool Transfer
|
Pteranodon can download and execute additional files.
|
Ingress Tool Transfer
|
PUNCHBUGGY can download additional files and payloads to compromised hosts.
|
Ingress Tool Transfer
|
Pupy can upload and download to/from a victim machine.
|
Ingress Tool Transfer
|
QakBot has the ability to download additional components and malware.
|
Ingress Tool Transfer
|
QuasarRAT can download files to the victim’s machine and execute them.
|
Ingress Tool Transfer
|
QuietSieve can download and execute payloads on a target host.
|
Ingress Tool Transfer
|
RainyDay can download files to a compromised host.
|
Ingress Tool Transfer
|
It has downloaded additional malware, including by using certutil.
|
Ingress Tool Transfer
|
RARSTONE downloads its backdoor component from a C2 server and loads it directly into memory.
|
Ingress Tool Transfer
|
RATANKBA uploads and downloads information.
|
Ingress Tool Transfer
|
RCSession has the ability to drop additional files to an infected machine.
|
Ingress Tool Transfer
|
RDAT can download files via DNS.
|
Ingress Tool Transfer
|
RedLeaves is capable of downloading a file from a specified URL.
|
Ingress Tool Transfer
|
RegDuke can download files from C2.
|
Ingress Tool Transfer
|
Remcos can upload and download files to and from the victim’s machine.
|
Ingress Tool Transfer
|
RemoteCMD copies a file over to the remote system before execution.
|
Ingress Tool Transfer
|
RemoteUtilities can upload and download files to and from a target machine.
|
Ingress Tool Transfer
|
Remsec contains a network loader to receive executable modules from remote attackers and run them on the local victim. It can also upload and download files over HTTP and HTTPS.
|
Ingress Tool Transfer
|
Revenge RAT has the ability to upload and download files.
|
Ingress Tool Transfer
|
REvil can download a copy of itself from an attacker controlled IP address to the victim machine.
|
Ingress Tool Transfer
|
RGDoor uploads and downloads files to and from the victim’s machine.
|
Ingress Tool Transfer
|
It used malware to download additional malicious files to the target system.
|
Ingress Tool Transfer
|
RogueRobin can save a new file to the system from the C2 server.
|
Ingress Tool Transfer
|
ROKRAT can retrieve additional malicious payloads from its C2 server.
|
Ingress Tool Transfer
|
It can download additional files.
|
Ingress Tool Transfer
|
S-Type can download additional files onto a compromised host.
|
Ingress Tool Transfer
|
Saint Bot can download additional files onto a compromised host.
|
Ingress Tool Transfer
|
Sakula has the capability to download files.
|
Ingress Tool Transfer
|
It has pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.
|
Ingress Tool Transfer
|
Sardonic has the ability to upload additional malicious files to a compromised machine.
|
Ingress Tool Transfer
|
SDBbot has the ability to download a DLL from C2 to a compromised host.
|
Ingress Tool Transfer
|
SeaDuke is capable of uploading and downloading files.
|
Ingress Tool Transfer
|
Seasalt has a command to download additional files.
|
Ingress Tool Transfer
|
SEASHARPEE can download remote files onto victims.
|
Ingress Tool Transfer
|
ServHelper may download additional files to execute.
|
Ingress Tool Transfer
|
Seth-Locker has the ability to download and execute files on a compromised host.
|
Ingress Tool Transfer
|
ShadowPad has downloaded code from a C2 server.
|
Ingress Tool Transfer
|
Shamoon can download an executable to run on the victim.
|
Ingress Tool Transfer
|
Shark can download additional files from its C2 via HTTP or DNS.
|
Ingress Tool Transfer
|
SharpDisco has been used to download a Python interpreter to C:\Users\Public\WinTN\WinTN.exe as well as other plugins from external sources.
|
Ingress Tool Transfer
|
SharpStage has the ability to download and execute additional payloads via a DropBox API.
|
Ingress Tool Transfer
|
SHARPSTATS has the ability to upload and download files.
|
Ingress Tool Transfer
|
ShimRat can download additional files.
|
Ingress Tool Transfer
|
ShimRatReporter had the ability to download additional payloads.
|
Ingress Tool Transfer
|
SHUTTERSPEED can download and execute an arbitary executable.
|
Ingress Tool Transfer
|
Sibot can download and execute a payload onto a compromised system.
|
Ingress Tool Transfer
|
It has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads.
|
Ingress Tool Transfer
|
SideTwist has the ability to download additional files.
|
Ingress Tool Transfer
|
It has used LNK files to download remote files to the victim's network.
|
Ingress Tool Transfer
|
It has downloaded additional modules and malware to victim’s machines.
|
Ingress Tool Transfer
|
SILENTTRINITY can load additional files and tools, including Mimikatz.
|
Ingress Tool Transfer
|
Skidmap has the ability to download files on an infected host.
|
Ingress Tool Transfer
|
Sliver can upload files from the C2 server to the victim machine using the upload command.
|
Ingress Tool Transfer
|
SLOTHFULMEDIA has downloaded files onto a victim machine.
|
Ingress Tool Transfer
|
SLOWDRIFT downloads additional payloads.
|
Ingress Tool Transfer
|
Small Sieve has the ability to download files.
|
Ingress Tool Transfer
|
Smoke Loader downloads a new version of itself once it has installed. It also downloads additional plugins.
|
Ingress Tool Transfer
|
SMOKEDHAM has used Powershell to download UltraVNC and ngrok from third-party file sharing sites.
|
Ingress Tool Transfer
|
Snip3 can download additional payloads to compromised systems.
|
Ingress Tool Transfer
|
SodaMaster has the ability to download additional payloads from C2 to the targeted system.
|
Ingress Tool Transfer
|
During the SolarWinds Compromise, It downloaded additional malware, such as TEARDROP and Cobalt Strike, onto a compromised host following initial access.
|
Ingress Tool Transfer
|
SombRAT has the ability to download and execute additional payloads.
|
Ingress Tool Transfer
|
SoreFang can download additional payloads from C2.
|
Ingress Tool Transfer
|
SpeakUp downloads and executes additional files from a remote server.
|
Ingress Tool Transfer
|
SpicyOmelette can download malicious files from threat actor controlled AWS URL's.
|
Ingress Tool Transfer
|
SQLRat can make a direct SQL connection to a Microsoft database controlled by the attackers, retrieve an item from the bindata table, then write and execute the file on disk.
|
Ingress Tool Transfer
|
Squirrelwaffle has downloaded and executed additional encoded payloads.
|
Ingress Tool Transfer
|
StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine.
|
Ingress Tool Transfer
|
StrifeWater can download updates and auxiliary modules.
|
Ingress Tool Transfer
|
StrongPity can download files to specified targets.
|
Ingress Tool Transfer
|
SUNBURST delivered different payloads, including TEARDROP in at least one instance.
|
Ingress Tool Transfer
|
SVCReady has the ability to download additional tools such as the RedLine Stealer to an infected host.
|
Ingress Tool Transfer
|
SysUpdate has the ability to download files to a compromised host.
|
Ingress Tool Transfer
|
It has used malicious scripts and macros with the ability to download additional payloads.
|
Ingress Tool Transfer
|
It has downloaded additional malware to execute on victim systems.
|
Ingress Tool Transfer
|
It has retrieved DLLs and installer binaries for malware execution from C2.
|
Ingress Tool Transfer
|
Taidoor has downloaded additional files onto a compromised host.
|
Ingress Tool Transfer
|
TAINTEDSCRIBE can download additional modules from its C2 server.
|
Ingress Tool Transfer
|
TDTESS has a command to download and execute an additional file.
|
Ingress Tool Transfer
|
It has the curl and wget commands as well as batch scripts to download new tools.
|
Ingress Tool Transfer
|
ThiefQuest can download and execute payloads in-memory or from disk.
|
Ingress Tool Transfer
|
It has downloaded additional malware and tools, including through the use of certutil, onto a compromised host .
|
Ingress Tool Transfer
|
ThreatNeedle can download additional tools to enable lateral movement.
|
Ingress Tool Transfer
|
TinyIt has the ability to act as a second-stage dropper used to infect the system with additional malware.
|
Ingress Tool Transfer
|
Tomiris can download files and execute them on a victim's system.
|
Ingress Tool Transfer
|
It has downloaded malicious DLLs which served as a ShadowPad loader.
|
Ingress Tool Transfer
|
TrickBot downloads several additional files and saves them to the victim's machine.
|
Ingress Tool Transfer
|
Trojan.Karagany can upload, download, and execute files on the victim.
|
Ingress Tool Transfer
|
It has used a delivered trojan to download additional files.
|
Ingress Tool Transfer
|
TSCookie has the ability to upload and download files to and from the infected host.
|
Ingress Tool Transfer
|
Turian can download additional files and tools from its C2.
|
Ingress Tool Transfer
|
It has used shellcode to download Meterpreter after compromising a victim.
|
Ingress Tool Transfer
|
TURNEDUP is capable of downloading additional files.
|
Ingress Tool Transfer
|
TYPEFRAME can upload and download files to the victim’s machine.
|
Ingress Tool Transfer
|
UBoatRAT can upload and download files to the victim’s machine.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.