prompt
stringclasses
508 values
procedure
stringlengths
20
478
Deobfuscate
Hildegard has decrypted ELF files with AES.
Deobfuscate
HyperBro can unpack and decrypt its payload prior to execution.
Deobfuscate
IceApple can use a Base64-encoded AES key to decrypt tasking.
Deobfuscate
Imminent Monitor has decoded malware components that are then dropped to the system.
Deobfuscate
Industroyer decrypts code to connect to a remote C2 server.
Deobfuscate
InvisiMole can decrypt, unpack and load a DLL from its resources, or from blobs encrypted with Data Protection API, two-key triple DES, and variations of the XOR cipher.
Deobfuscate
IronNetInjector has the ability to decrypt embedded .NET and PE payloads.
Deobfuscate
ISMInjector uses the certutil command to decode a payload file.
Deobfuscate
It has deobfuscated Base64-encoded shellcode strings prior to loading them.
Deobfuscate
Kerrdown can decode, decrypt, and decompress multiple layers of shellcode.
Deobfuscate
Kessel has decrypted the binary's configuration once the main function was launched.
Deobfuscate
KEYPLUG can decode its configuration file to determine C2 protocols.
Deobfuscate
KGH_SPY can decrypt encrypted strings and write them to a newly created folder.
Deobfuscate
It has decoded malicious VBScripts using Base64.
Deobfuscate
Kobalos decrypts strings right after the initial communication, but before the authentication process.
Deobfuscate
KOCTOPUS has deobfuscated itself before executing its commands.
Deobfuscate
KONNI has used certutil to download and decode base64 encoded strings and has also devoted a custom section to performing all the components of the deobfuscation process.
Deobfuscate
Kwampirs decrypts and extracts a copy of its main DLL payload when executing.
Deobfuscate
It has used shellcode within macros to decrypt and manually map DLLs and shellcode into memory at runtime.
Deobfuscate
It has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors.
Deobfuscate
LightNeuron has used AES and XOR to decrypt configuration files and commands.
Deobfuscate
LiteDuke has the ability to decrypt and decode multiple layers of obfuscation.
Deobfuscate
Lizar can decrypt its configuration data.
Deobfuscate
Lokibot has decoded and decrypted its stages multiple times using hard-coded keys to deliver the final payload, and has decoded its server response hex string using XOR.
Deobfuscate
LookBack has a function that decrypts malicious data.
Deobfuscate
Lucifer can decrypt its C2 address upon execution.
Deobfuscate
It’s downloaded data is decrypted using AES.
Deobfuscate
MacMa decrypts a downloaded file using AES-128-EBC with a custom delta.
Deobfuscate
Mafalda can decrypt files and data.
Deobfuscate
MegaCortex has used a Base64 key to decode its components.
Deobfuscate
It has used certutil in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has also used certutil -decode to decode files on the victim’s machine when dropping UPPERCUT.
Deobfuscate
After checking for the existence of two files, keyword_parm.txt and parm.txt, MESSAGETAP XOR decodes and read the contents of the files.
Deobfuscate
metaMain can decrypt and load other modules.
Deobfuscate
Upon execution, Metamorfo has unzipped itself after being downloaded to the system and has performed string decryption.
Deobfuscate
MirageFox has a function for decrypting data containing C2 configuration information.
Deobfuscate
It decompresses ZIP files once on the victim machine.
Deobfuscate
Mongall has the ability to decrypt its payload prior to execution.
Deobfuscate
More_eggs will decode malware components that are then dropped to the system.
Deobfuscate
Mori can resolve networking APIs from strings that are ADD-encrypted.
Deobfuscate
It decoded base64-encoded PowerShell commands using a VBS file.
Deobfuscate
NativeZone can decrypt and decode embedded Cobalt Strike beacon stage shellcode.
Deobfuscate
Netwalker's PowerShell script can decode and decrypt multiple layers of obfuscation, leading to the Netwalker DLL being loaded into memory.
Deobfuscate
NOKKI uses a unique, custom de-obfuscation technique.
Deobfuscate
A It macro has run a PowerShell command to decode file contents. It has also used certutil to decode base64-encoded files on victims.
Deobfuscate
Okrum's loader can decrypt the backdoor code, embedded within the loader or within a legitimate PNG file. A custom XOR cipher or RC4 is used for decryption.
Deobfuscate
OnionDuke can use a custom decryption algorithm to decrypt strings.
Deobfuscate
OopsIE concatenates then decompresses multiple resources to load an embedded .Net Framework assembly.
Deobfuscate
During Operation Dust Storm, attackers used VBS code to decode payloads.
Deobfuscate
During Operation Honeybee, malicious files were decoded prior to execution.
Deobfuscate
For Operation Spalax, the threat actors used a variety of packers and droppers to decrypt malicious payloads.
Deobfuscate
OSX/Shlayer can base64-decode and AES-decrypt downloaded payloads. Versions of OSX/Shlayer pass encrypted and password-protected code to openssl and then write the payload to the /tmp folder.
Deobfuscate
OSX_OCEANLOTUS.D uses a decode routine combining bit shifting and XOR operations with a variable key that depends on the length of the string that was encoded. If the computation for the variable XOR key turns out to be 0, the default XOR key of 0x1B is used. This routine is also referenced as the rotate function in reporting.
Deobfuscate
P.A.S. Webshell can use a decryption mechanism to process a user supplied password and allow execution.
Deobfuscate
PcShare has decrypted its strings by applying a XOR operation and a decompression using a custom implemented LZM algorithm.
Deobfuscate
Pillowmint has been decompressed by included shellcode prior to being launched.
Deobfuscate
PingPull can decrypt received data from its C2 server by using AES.
Deobfuscate
PipeMon can decrypt password-protected executables.
Deobfuscate
PlugX decompresses and decrypts itself using the Microsoft API call RtlDecompressBuffer.
Deobfuscate
PoetRAT has used LZMA and base64 libraries to decode obfuscated scripts.
Deobfuscate
PolyglotDuke can use a custom algorithm to decrypt strings used by the malware.
Deobfuscate
PowerLess can use base64 and AES ECB decryption prior to execution of downloaded modules.
Deobfuscate
POWERSTATS can deobfuscate the main backdoor code.
Deobfuscate
PowGoop can decrypt PowerShell scripts for execution.
Deobfuscate
Proton uses an encrypted file to store commands and configuration values.
Deobfuscate
PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.
Deobfuscate
Pteranodon can decrypt encrypted data strings prior to using them.
Deobfuscate
PUNCHBUGGY has used PowerShell to decode base64-encoded assembly.
Deobfuscate
PyDCrypt has decrypted and dropped the DCSrv payload to disk.
Deobfuscate
QakBot can deobfuscate and re-assemble code strings for execution.
Deobfuscate
QUADAGENT uses AES and a preshared key to decrypt the custom Base64 routine used to encode strings and scripts.
Deobfuscate
QUIETCANARY can use a custom parsing routine to decode the command codes and additional parameters from the C2 before executing them.
Deobfuscate
Raindrop decrypted its Cobalt Strike payload using an AES-256 encryption algorithm in CBC mode with a unique key per sample.
Deobfuscate
RainyDay can decrypt its payload via a XOR key.
Deobfuscate
Ramsay can extract its agent from the body of a malicious document.
Deobfuscate
RDAT can deobfuscate the base64-encoded and AES-encrypted files downloaded from the C2 server.
Deobfuscate
RegDuke can decrypt strings with a key either stored in the Registry or hardcoded in the code.
Deobfuscate
Remexi decrypts the configuration data using XOR with 25-character keys.
Deobfuscate
REvil can decode encrypted strings to enable execution of commands and payloads.
Deobfuscate
RGDoor decodes Base64 strings and decrypts strings using a custom XOR algorithm.
Deobfuscate
Rising Sun has decrypted itself using a single-byte XOR scheme. Additionally, Rising Sun can decrypt its configuration data at runtime.
Deobfuscate
It has extracted tar.gz files after downloading them from a C2 server.
Deobfuscate
RogueRobin decodes an embedded executable using base64 and decompresses it.
Deobfuscate
ROKRAT can decrypt strings using the victim's hostname as the key.
Deobfuscate
RotaJakiro uses the AES algorithm, bit shifts in a function called rotate, and an XOR cipher to decrypt resources required for persistence, process guarding, and file locking. It also performs this same function on encrypted stack strings and the head and key sections in the network packet structure used for C2 communications.
Deobfuscate
Saint Bot can deobfuscate strings and files for execution.
Deobfuscate
It's VBS backdoor can decode Base64-encoded data and save it to the %TEMP% folder. The group also decrypted received information using the Triple DES algorithm and decompresses it using GZip.
Deobfuscate
Sardonic can first decrypt with the RC4 algorithm using a hardcoded decryption key before decompressing.
Deobfuscate
SDBbot has the ability to decrypt and decompress its payload to enable code execution.
Deobfuscate
ShadowPad has decrypted a binary blob to start execution.
Deobfuscate
Shamoon decrypts ciphertext using an XOR cipher and a base64-encoded string.
Deobfuscate
Shark can extract and decrypt downloaded .zip files.
Deobfuscate
SharpStage has decompressed data received from the C2 server.
Deobfuscate
ShimRat has decompressed its core DLL using shellcode once an impersonated antivirus component was running on a system.
Deobfuscate
Sibot can decrypt data received from a C2 and save to a file.
Deobfuscate
SideTwist can decode and decrypt messages received from C2.
Deobfuscate
Siloscape has decrypted the password of the C2 server with a simple byte by byte XOR. Siloscape also writes both an archive of Tor and the unzip binary to disk from data embedded within the payload using Visual Studio’s Resource Manager.
Deobfuscate
Skidmap has the ability to download, unpack, and decrypt tar.gz files .
Deobfuscate
Smoke Loader deobfuscates its code.
Deobfuscate
Snip3 can decode its second-stage PowerShell script prior to execution.
Deobfuscate
During the SolarWinds Compromise, It used 7-Zip to decode their Raindrop malware.