prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Ingress Tool Transfer | POWERSOURCE has been observed being used to download TEXTMATE and the Cobalt Strike Beacon payload onto victims. |
Ingress Tool Transfer | POWERSTATS can retrieve and execute additional PowerShell payloads from the C2 server. |
Ingress Tool Transfer | POWRUNER can download or upload files from its C2 server. |
Ingress Tool Transfer | CostaBricks can download additional payloads onto a compromised host. |
Ingress Tool Transfer | Psylo has a command to download a file to the system from its C2 server. |
Ingress Tool Transfer | Pteranodon can download and execute additional files. |
Ingress Tool Transfer | PUNCHBUGGY can download additional files and payloads to compromised hosts. |
Ingress Tool Transfer | Pupy can upload and download to/from a victim machine. |
Ingress Tool Transfer | QakBot has the ability to download additional components and malware. |
Ingress Tool Transfer | QuasarRAT can download files to the victim’s machine and execute them. |
Ingress Tool Transfer | QuietSieve can download and execute payloads on a target host. |
Ingress Tool Transfer | RainyDay can download files to a compromised host. |
Ingress Tool Transfer | It has downloaded additional malware, including by using certutil. |
Ingress Tool Transfer | RARSTONE downloads its backdoor component from a C2 server and loads it directly into memory. |
Ingress Tool Transfer | RATANKBA uploads and downloads information. |
Ingress Tool Transfer | RCSession has the ability to drop additional files to an infected machine. |
Ingress Tool Transfer | RDAT can download files via DNS. |
Ingress Tool Transfer | RedLeaves is capable of downloading a file from a specified URL. |
Ingress Tool Transfer | RegDuke can download files from C2. |
Ingress Tool Transfer | Remcos can upload and download files to and from the victim’s machine. |
Ingress Tool Transfer | RemoteCMD copies a file over to the remote system before execution. |
Ingress Tool Transfer | RemoteUtilities can upload and download files to and from a target machine. |
Ingress Tool Transfer | Remsec contains a network loader to receive executable modules from remote attackers and run them on the local victim. It can also upload and download files over HTTP and HTTPS. |
Ingress Tool Transfer | Revenge RAT has the ability to upload and download files. |
Ingress Tool Transfer | REvil can download a copy of itself from an attacker controlled IP address to the victim machine. |
Ingress Tool Transfer | RGDoor uploads and downloads files to and from the victim’s machine. |
Ingress Tool Transfer | It used malware to download additional malicious files to the target system. |
Ingress Tool Transfer | RogueRobin can save a new file to the system from the C2 server. |
Ingress Tool Transfer | ROKRAT can retrieve additional malicious payloads from its C2 server. |
Ingress Tool Transfer | It can download additional files. |
Ingress Tool Transfer | S-Type can download additional files onto a compromised host. |
Ingress Tool Transfer | Saint Bot can download additional files onto a compromised host. |
Ingress Tool Transfer | Sakula has the capability to download files. |
Ingress Tool Transfer | It has pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data. |
Ingress Tool Transfer | Sardonic has the ability to upload additional malicious files to a compromised machine. |
Ingress Tool Transfer | SDBbot has the ability to download a DLL from C2 to a compromised host. |
Ingress Tool Transfer | SeaDuke is capable of uploading and downloading files. |
Ingress Tool Transfer | Seasalt has a command to download additional files. |
Ingress Tool Transfer | SEASHARPEE can download remote files onto victims. |
Ingress Tool Transfer | ServHelper may download additional files to execute. |
Ingress Tool Transfer | Seth-Locker has the ability to download and execute files on a compromised host. |
Ingress Tool Transfer | ShadowPad has downloaded code from a C2 server. |
Ingress Tool Transfer | Shamoon can download an executable to run on the victim. |
Ingress Tool Transfer | Shark can download additional files from its C2 via HTTP or DNS. |
Ingress Tool Transfer | SharpDisco has been used to download a Python interpreter to C:\Users\Public\WinTN\WinTN.exe as well as other plugins from external sources. |
Ingress Tool Transfer | SharpStage has the ability to download and execute additional payloads via a DropBox API. |
Ingress Tool Transfer | SHARPSTATS has the ability to upload and download files. |
Ingress Tool Transfer | ShimRat can download additional files. |
Ingress Tool Transfer | ShimRatReporter had the ability to download additional payloads. |
Ingress Tool Transfer | SHUTTERSPEED can download and execute an arbitary executable. |
Ingress Tool Transfer | Sibot can download and execute a payload onto a compromised system. |
Ingress Tool Transfer | It has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads. |
Ingress Tool Transfer | SideTwist has the ability to download additional files. |
Ingress Tool Transfer | It has used LNK files to download remote files to the victim's network. |
Ingress Tool Transfer | It has downloaded additional modules and malware to victim’s machines. |
Ingress Tool Transfer | SILENTTRINITY can load additional files and tools, including Mimikatz. |
Ingress Tool Transfer | Skidmap has the ability to download files on an infected host. |
Ingress Tool Transfer | Sliver can upload files from the C2 server to the victim machine using the upload command. |
Ingress Tool Transfer | SLOTHFULMEDIA has downloaded files onto a victim machine. |
Ingress Tool Transfer | SLOWDRIFT downloads additional payloads. |
Ingress Tool Transfer | Small Sieve has the ability to download files. |
Ingress Tool Transfer | Smoke Loader downloads a new version of itself once it has installed. It also downloads additional plugins. |
Ingress Tool Transfer | SMOKEDHAM has used Powershell to download UltraVNC and ngrok from third-party file sharing sites. |
Ingress Tool Transfer | Snip3 can download additional payloads to compromised systems. |
Ingress Tool Transfer | SodaMaster has the ability to download additional payloads from C2 to the targeted system. |
Ingress Tool Transfer | During the SolarWinds Compromise, It downloaded additional malware, such as TEARDROP and Cobalt Strike, onto a compromised host following initial access. |
Ingress Tool Transfer | SombRAT has the ability to download and execute additional payloads. |
Ingress Tool Transfer | SoreFang can download additional payloads from C2. |
Ingress Tool Transfer | SpeakUp downloads and executes additional files from a remote server. |
Ingress Tool Transfer | SpicyOmelette can download malicious files from threat actor controlled AWS URL's. |
Ingress Tool Transfer | SQLRat can make a direct SQL connection to a Microsoft database controlled by the attackers, retrieve an item from the bindata table, then write and execute the file on disk. |
Ingress Tool Transfer | Squirrelwaffle has downloaded and executed additional encoded payloads. |
Ingress Tool Transfer | StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine. |
Ingress Tool Transfer | StrifeWater can download updates and auxiliary modules. |
Ingress Tool Transfer | StrongPity can download files to specified targets. |
Ingress Tool Transfer | SUNBURST delivered different payloads, including TEARDROP in at least one instance. |
Ingress Tool Transfer | SVCReady has the ability to download additional tools such as the RedLine Stealer to an infected host. |
Ingress Tool Transfer | SysUpdate has the ability to download files to a compromised host. |
Ingress Tool Transfer | It has used malicious scripts and macros with the ability to download additional payloads. |
Ingress Tool Transfer | It has downloaded additional malware to execute on victim systems. |
Ingress Tool Transfer | It has retrieved DLLs and installer binaries for malware execution from C2. |
Ingress Tool Transfer | Taidoor has downloaded additional files onto a compromised host. |
Ingress Tool Transfer | TAINTEDSCRIBE can download additional modules from its C2 server. |
Ingress Tool Transfer | TDTESS has a command to download and execute an additional file. |
Ingress Tool Transfer | It has the curl and wget commands as well as batch scripts to download new tools. |
Ingress Tool Transfer | ThiefQuest can download and execute payloads in-memory or from disk. |
Ingress Tool Transfer | It has downloaded additional malware and tools, including through the use of certutil, onto a compromised host . |
Ingress Tool Transfer | ThreatNeedle can download additional tools to enable lateral movement. |
Ingress Tool Transfer | TinyIt has the ability to act as a second-stage dropper used to infect the system with additional malware. |
Ingress Tool Transfer | Tomiris can download files and execute them on a victim's system. |
Ingress Tool Transfer | It has downloaded malicious DLLs which served as a ShadowPad loader. |
Ingress Tool Transfer | TrickBot downloads several additional files and saves them to the victim's machine. |
Ingress Tool Transfer | Trojan.Karagany can upload, download, and execute files on the victim. |
Ingress Tool Transfer | It has used a delivered trojan to download additional files. |
Ingress Tool Transfer | TSCookie has the ability to upload and download files to and from the infected host. |
Ingress Tool Transfer | Turian can download additional files and tools from its C2. |
Ingress Tool Transfer | It has used shellcode to download Meterpreter after compromising a victim. |
Ingress Tool Transfer | TURNEDUP is capable of downloading additional files. |
Ingress Tool Transfer | TYPEFRAME can upload and download files to the victim’s machine. |
Ingress Tool Transfer | UBoatRAT can upload and download files to the victim’s machine. |
Subsets and Splits