prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Deobfuscate | Hildegard has decrypted ELF files with AES. |
Deobfuscate | HyperBro can unpack and decrypt its payload prior to execution. |
Deobfuscate | IceApple can use a Base64-encoded AES key to decrypt tasking. |
Deobfuscate | Imminent Monitor has decoded malware components that are then dropped to the system. |
Deobfuscate | Industroyer decrypts code to connect to a remote C2 server. |
Deobfuscate | InvisiMole can decrypt, unpack and load a DLL from its resources, or from blobs encrypted with Data Protection API, two-key triple DES, and variations of the XOR cipher. |
Deobfuscate | IronNetInjector has the ability to decrypt embedded .NET and PE payloads. |
Deobfuscate | ISMInjector uses the certutil command to decode a payload file. |
Deobfuscate | It has deobfuscated Base64-encoded shellcode strings prior to loading them. |
Deobfuscate | Kerrdown can decode, decrypt, and decompress multiple layers of shellcode. |
Deobfuscate | Kessel has decrypted the binary's configuration once the main function was launched. |
Deobfuscate | KEYPLUG can decode its configuration file to determine C2 protocols. |
Deobfuscate | KGH_SPY can decrypt encrypted strings and write them to a newly created folder. |
Deobfuscate | It has decoded malicious VBScripts using Base64. |
Deobfuscate | Kobalos decrypts strings right after the initial communication, but before the authentication process. |
Deobfuscate | KOCTOPUS has deobfuscated itself before executing its commands. |
Deobfuscate | KONNI has used certutil to download and decode base64 encoded strings and has also devoted a custom section to performing all the components of the deobfuscation process. |
Deobfuscate | Kwampirs decrypts and extracts a copy of its main DLL payload when executing. |
Deobfuscate | It has used shellcode within macros to decrypt and manually map DLLs and shellcode into memory at runtime. |
Deobfuscate | It has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors. |
Deobfuscate | LightNeuron has used AES and XOR to decrypt configuration files and commands. |
Deobfuscate | LiteDuke has the ability to decrypt and decode multiple layers of obfuscation. |
Deobfuscate | Lizar can decrypt its configuration data. |
Deobfuscate | Lokibot has decoded and decrypted its stages multiple times using hard-coded keys to deliver the final payload, and has decoded its server response hex string using XOR. |
Deobfuscate | LookBack has a function that decrypts malicious data. |
Deobfuscate | Lucifer can decrypt its C2 address upon execution. |
Deobfuscate | It’s downloaded data is decrypted using AES. |
Deobfuscate | MacMa decrypts a downloaded file using AES-128-EBC with a custom delta. |
Deobfuscate | Mafalda can decrypt files and data. |
Deobfuscate | MegaCortex has used a Base64 key to decode its components. |
Deobfuscate | It has used certutil in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has also used certutil -decode to decode files on the victim’s machine when dropping UPPERCUT. |
Deobfuscate | After checking for the existence of two files, keyword_parm.txt and parm.txt, MESSAGETAP XOR decodes and read the contents of the files. |
Deobfuscate | metaMain can decrypt and load other modules. |
Deobfuscate | Upon execution, Metamorfo has unzipped itself after being downloaded to the system and has performed string decryption. |
Deobfuscate | MirageFox has a function for decrypting data containing C2 configuration information. |
Deobfuscate | It decompresses ZIP files once on the victim machine. |
Deobfuscate | Mongall has the ability to decrypt its payload prior to execution. |
Deobfuscate | More_eggs will decode malware components that are then dropped to the system. |
Deobfuscate | Mori can resolve networking APIs from strings that are ADD-encrypted. |
Deobfuscate | It decoded base64-encoded PowerShell commands using a VBS file. |
Deobfuscate | NativeZone can decrypt and decode embedded Cobalt Strike beacon stage shellcode. |
Deobfuscate | Netwalker's PowerShell script can decode and decrypt multiple layers of obfuscation, leading to the Netwalker DLL being loaded into memory. |
Deobfuscate | NOKKI uses a unique, custom de-obfuscation technique. |
Deobfuscate | A It macro has run a PowerShell command to decode file contents. It has also used certutil to decode base64-encoded files on victims. |
Deobfuscate | Okrum's loader can decrypt the backdoor code, embedded within the loader or within a legitimate PNG file. A custom XOR cipher or RC4 is used for decryption. |
Deobfuscate | OnionDuke can use a custom decryption algorithm to decrypt strings. |
Deobfuscate | OopsIE concatenates then decompresses multiple resources to load an embedded .Net Framework assembly. |
Deobfuscate | During Operation Dust Storm, attackers used VBS code to decode payloads. |
Deobfuscate | During Operation Honeybee, malicious files were decoded prior to execution. |
Deobfuscate | For Operation Spalax, the threat actors used a variety of packers and droppers to decrypt malicious payloads. |
Deobfuscate | OSX/Shlayer can base64-decode and AES-decrypt downloaded payloads. Versions of OSX/Shlayer pass encrypted and password-protected code to openssl and then write the payload to the /tmp folder. |
Deobfuscate | OSX_OCEANLOTUS.D uses a decode routine combining bit shifting and XOR operations with a variable key that depends on the length of the string that was encoded. If the computation for the variable XOR key turns out to be 0, the default XOR key of 0x1B is used. This routine is also referenced as the rotate function in reporting. |
Deobfuscate | P.A.S. Webshell can use a decryption mechanism to process a user supplied password and allow execution. |
Deobfuscate | PcShare has decrypted its strings by applying a XOR operation and a decompression using a custom implemented LZM algorithm. |
Deobfuscate | Pillowmint has been decompressed by included shellcode prior to being launched. |
Deobfuscate | PingPull can decrypt received data from its C2 server by using AES. |
Deobfuscate | PipeMon can decrypt password-protected executables. |
Deobfuscate | PlugX decompresses and decrypts itself using the Microsoft API call RtlDecompressBuffer. |
Deobfuscate | PoetRAT has used LZMA and base64 libraries to decode obfuscated scripts. |
Deobfuscate | PolyglotDuke can use a custom algorithm to decrypt strings used by the malware. |
Deobfuscate | PowerLess can use base64 and AES ECB decryption prior to execution of downloaded modules. |
Deobfuscate | POWERSTATS can deobfuscate the main backdoor code. |
Deobfuscate | PowGoop can decrypt PowerShell scripts for execution. |
Deobfuscate | Proton uses an encrypted file to store commands and configuration values. |
Deobfuscate | PS1 can use an XOR key to decrypt a PowerShell loader and payload binary. |
Deobfuscate | Pteranodon can decrypt encrypted data strings prior to using them. |
Deobfuscate | PUNCHBUGGY has used PowerShell to decode base64-encoded assembly. |
Deobfuscate | PyDCrypt has decrypted and dropped the DCSrv payload to disk. |
Deobfuscate | QakBot can deobfuscate and re-assemble code strings for execution. |
Deobfuscate | QUADAGENT uses AES and a preshared key to decrypt the custom Base64 routine used to encode strings and scripts. |
Deobfuscate | QUIETCANARY can use a custom parsing routine to decode the command codes and additional parameters from the C2 before executing them. |
Deobfuscate | Raindrop decrypted its Cobalt Strike payload using an AES-256 encryption algorithm in CBC mode with a unique key per sample. |
Deobfuscate | RainyDay can decrypt its payload via a XOR key. |
Deobfuscate | Ramsay can extract its agent from the body of a malicious document. |
Deobfuscate | RDAT can deobfuscate the base64-encoded and AES-encrypted files downloaded from the C2 server. |
Deobfuscate | RegDuke can decrypt strings with a key either stored in the Registry or hardcoded in the code. |
Deobfuscate | Remexi decrypts the configuration data using XOR with 25-character keys. |
Deobfuscate | REvil can decode encrypted strings to enable execution of commands and payloads. |
Deobfuscate | RGDoor decodes Base64 strings and decrypts strings using a custom XOR algorithm. |
Deobfuscate | Rising Sun has decrypted itself using a single-byte XOR scheme. Additionally, Rising Sun can decrypt its configuration data at runtime. |
Deobfuscate | It has extracted tar.gz files after downloading them from a C2 server. |
Deobfuscate | RogueRobin decodes an embedded executable using base64 and decompresses it. |
Deobfuscate | ROKRAT can decrypt strings using the victim's hostname as the key. |
Deobfuscate | RotaJakiro uses the AES algorithm, bit shifts in a function called rotate, and an XOR cipher to decrypt resources required for persistence, process guarding, and file locking. It also performs this same function on encrypted stack strings and the head and key sections in the network packet structure used for C2 communications. |
Deobfuscate | Saint Bot can deobfuscate strings and files for execution. |
Deobfuscate | It's VBS backdoor can decode Base64-encoded data and save it to the %TEMP% folder. The group also decrypted received information using the Triple DES algorithm and decompresses it using GZip. |
Deobfuscate | Sardonic can first decrypt with the RC4 algorithm using a hardcoded decryption key before decompressing. |
Deobfuscate | SDBbot has the ability to decrypt and decompress its payload to enable code execution. |
Deobfuscate | ShadowPad has decrypted a binary blob to start execution. |
Deobfuscate | Shamoon decrypts ciphertext using an XOR cipher and a base64-encoded string. |
Deobfuscate | Shark can extract and decrypt downloaded .zip files. |
Deobfuscate | SharpStage has decompressed data received from the C2 server. |
Deobfuscate | ShimRat has decompressed its core DLL using shellcode once an impersonated antivirus component was running on a system. |
Deobfuscate | Sibot can decrypt data received from a C2 and save to a file. |
Deobfuscate | SideTwist can decode and decrypt messages received from C2. |
Deobfuscate | Siloscape has decrypted the password of the C2 server with a simple byte by byte XOR. Siloscape also writes both an archive of Tor and the unzip binary to disk from data embedded within the payload using Visual Studio’s Resource Manager. |
Deobfuscate | Skidmap has the ability to download, unpack, and decrypt tar.gz files . |
Deobfuscate | Smoke Loader deobfuscates its code. |
Deobfuscate | Snip3 can decode its second-stage PowerShell script prior to execution. |
Deobfuscate | During the SolarWinds Compromise, It used 7-Zip to decode their Raindrop malware. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.