prompt
stringclasses
508 values
procedure
stringlengths
20
478
Obfuscated Files or Information
Elise encrypts several of its files, including configuration files.
Obfuscated Files or Information
It has obfuscated malware to help avoid detection.
Obfuscated Files or Information
Variants of Emissary encrypt payloads using various XOR ciphers, as well as a custom algorithm that uses the "srand" and "rand" functions.
Obfuscated Files or Information
EnvyScout can Base64 encode payloads.
Obfuscated Files or Information
Epic heavily obfuscates its code to make analysis more difficult.
Obfuscated Files or Information
Exaramel for Linux uses RC4 for encrypting the configuration.
Obfuscated Files or Information
FatDuke can use base64 encoding, string stacking, and opaque predicates for obfuscation.
Obfuscated Files or Information
FELIXROOT encrypts strings in the backdoor using a custom XOR algorithm.
Obfuscated Files or Information
Final1stspy obfuscates strings with base64 encoding.
Obfuscated Files or Information
FinFisher is heavily obfuscated in many ways, including through the use of spaghetti code in its functions in an effort to confuse disassembly programs. It also uses a custom XOR algorithm to obfuscate code.
Obfuscated Files or Information
The FIVEHANDS payload is encrypted with AES-128.
Obfuscated Files or Information
Flagpro has been delivered within ZIP or RAR password-protected archived files.
Obfuscated Files or Information
FlawedGrace encrypts its C2 configuration files with AES in CBC mode.
Obfuscated Files or Information
FoggyWeb has been XOR-encoded.
Obfuscated Files or Information
It has base64 encoded payloads to avoid detection.
Obfuscated Files or Information
FunnyDream can Base64 encode its C2 address stored in a template binary with the xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_- orxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_= character sets.
Obfuscated Files or Information
Fysbis has been encrypted using XOR and RC4.
Obfuscated Files or Information
It used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.
Obfuscated Files or Information
It obfuscated shellcode used during execution.
Obfuscated Files or Information
It has delivered self-extracting 7z archive files within malicious document attachments.
Obfuscated Files or Information
Gazer logs its actions into files that are encrypted with 3DES. It also uses RSA to encrypt resources.
Obfuscated Files or Information
Gelsemium has the ability to compress its components.
Obfuscated Files or Information
GoldenSpy's uninstaller has base64-encoded its variables.
Obfuscated Files or Information
GoldMax has written AES-encrypted and Base64-encoded configuration files to disk.
Obfuscated Files or Information
Goopy's decrypter have been inflated with junk code in between legitimate API functions, and also included infinite loops to avoid analysis.
Obfuscated Files or Information
The Grandoreiro payload has been delivered encrypted with a custom XOR-based algorithm and also as a base64-encoded ZIP file.
Obfuscated Files or Information
GravityRAT supports file encryption (AES with the key "lolomycin2017").
Obfuscated Files or Information
Green Lambert has encrypted strings.
Obfuscated Files or Information
GreyEnergy encrypts its configuration files with AES-256 and also encrypts its strings.
Obfuscated Files or Information
GrimAgent has used Rotate on Right (RoR) and Rotate on Left (RoL) functionality to encrypt strings.
Obfuscated Files or Information
It disguised its malicious binaries with several layers of obfuscation, including encrypting the files.
Obfuscated Files or Information
H1N1 uses multiple techniques to obfuscate strings, including XOR.
Obfuscated Files or Information
Hancitor has used Base64 to encode malicious links. Hancitor has also delivered compressed payloads in ZIP files to victims.
Obfuscated Files or Information
HAWKBALL has encrypted the payload with an XOR-based algorithm.
Obfuscated Files or Information
The Helminth config file is encrypted with RC4.
Obfuscated Files or Information
HermeticWiper can compress 32-bit and 64-bit driver files with the Lempel-Ziv algorithm.
Obfuscated Files or Information
HermeticWizard has the ability to encrypt PE files with a reverse XOR loop.
Obfuscated Files or Information
Heyoka Backdoor can encrypt its payload.
Obfuscated Files or Information
Hi-Zor uses various XOR techniques to obfuscate its components.
Obfuscated Files or Information
HiddenWasp encrypts its configuration and payload.
Obfuscated Files or Information
It used Base64 encoded compressed payloads.
Obfuscated Files or Information
Hildegard has encrypted an ELF file.
Obfuscated Files or Information
Some strings in HOMEFRY are obfuscated with XOR x56.
Obfuscated Files or Information
HotCroissant has encrypted strings with single-byte XOR and base64 encoded RC4.
Obfuscated Files or Information
HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming.
Obfuscated Files or Information
Hydraq uses basic obfuscation in the form of spaghetti code.
Obfuscated Files or Information
HyperBro can be delivered encrypted to a compromised host.
Obfuscated Files or Information
IcedID has utilzed encrypted binaries and base64 encoded strings.
Obfuscated Files or Information
Imminent Monitor has encrypted the spearphish attachments to avoid detection from email gateways; the debugger also encrypts information before sending to the C2.
Obfuscated Files or Information
It has encrypted malware payloads dropped on victim machines with AES and RC4 encryption.
Obfuscated Files or Information
Industroyer uses heavily obfuscated code in its Windows Notepad backdoor.
Obfuscated Files or Information
InnaputRAT uses an 8-byte XOR key to obfuscate API names and other strings contained in the payload.
Obfuscated Files or Information
InvisiMole avoids analysis by encrypting all strings, internal files, configuration data and by using a custom executable format.
Obfuscated Files or Information
IronNetInjector can obfuscate variable names, encrypt strings, as well as base64 encode and Rijndael encrypt payloads.
Obfuscated Files or Information
ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.
Obfuscated Files or Information
Many strings in JHUHUGIT are obfuscated with a XOR algorithm.
Obfuscated Files or Information
A JPIN uses a encrypted and compressed payload that is disguised as a bitmap within the resource section of the installer.
Obfuscated Files or Information
jRAT’s Java payload is encrypted with AES. Additionally, backdoor files are encrypted using DES as a stream cipher. Later variants of jRAT also incorporated AV evasion methods such as Java bytecode obfuscation via the commercial Allatori obfuscation tool.
Obfuscated Files or Information
Kazuar is obfuscated using the open source ConfuserEx protector. Kazuar also obfuscates the name of created files/folders/mutexes and encrypts debug messages written to log files using the Rijndael cipher.
Obfuscated Files or Information
It has used Base64-encoded shellcode strings.
Obfuscated Files or Information
Kerrdown can encrypt, encode, and compress multiple layers of shellcode.
Obfuscated Files or Information
Kessel's configuration is hardcoded and RC4 encrypted within the binary.
Obfuscated Files or Information
Kevin has Base64-encoded its configuration file.
Obfuscated Files or Information
In one version of KeyBoy, string obfuscation routines were used to hide many of the critical values referenced in the malware.
Obfuscated Files or Information
KEYPLUG can use a hardcoded one-byte XOR encoded configuration file.
Obfuscated Files or Information
KGH_SPY has used encrypted strings in its installer.
Obfuscated Files or Information
KillDisk uses VMProtect to make reverse engineering the malware more difficult.
Obfuscated Files or Information
It has obfuscated binary strings including the use of XOR encryption and Base64 encoding. It has also modified the first byte of DLL implants targeting victims to prevent recognition of the executable file format.
Obfuscated Files or Information
Kobalos encrypts all strings using RC4 and bundles all functionality into a single function call.
Obfuscated Files or Information
KONNI is heavily obfuscated and includes encrypted configuration files.
Obfuscated Files or Information
Kwampirs downloads additional files that are base64-encoded and encrypted with another cipher.
Obfuscated Files or Information
It has used multiple types of encryption and encoding for their payloads, including AES, Caracachs, RC4, XOR, Base64, and other tricks such as creating aliases in code for Native API function names.
Obfuscated Files or Information
It has obfuscated code using base64 and gzip compression.
Obfuscated Files or Information
LightNeuron encrypts its configuration files with AES-256.
Obfuscated Files or Information
Lokibot has obfuscated strings with base64 encoding.
Obfuscated Files or Information
LoudMiner has encrypted DMG files.
Obfuscated Files or Information
Mafalda has been obfuscated and contains encrypted functions.
Obfuscated Files or Information
It malware has used base64-encoded files and has also encrypted embedded strings with AES.
Obfuscated Files or Information
Matryoshka obfuscates API function names using a substitute cipher combined with Base64 encoding.
Obfuscated Files or Information
Maze has decrypted strings and other important information during the encryption process. Maze also calls certain functions dynamically to hinder analysis.
Obfuscated Files or Information
MCMD can Base64 encode output strings prior to sending to C2.
Obfuscated Files or Information
It has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.
Obfuscated Files or Information
It has encrypted their payloads.
Obfuscated Files or Information
metaMain's module file has been encrypted via XOR.
Obfuscated Files or Information
Metamorfo has encrypted payloads and strings.
Obfuscated Files or Information
Micropsia obfuscates the configuration with a custom Base64 and XOR.
Obfuscated Files or Information
Milan can encode files containing information about the targeted system.
Obfuscated Files or Information
MiniDuke can use control flow flattening to obscure code.
Obfuscated Files or Information
It has compressed the ShimRat executable within malicious email attachments. It has also encrypted payloads before they are downloaded to victims.
Obfuscated Files or Information
It has delivered compressed executables within ZIP files to victims.
Obfuscated Files or Information
More_eggs's payload has been encrypted with a key that has the hostname and processor family information appended to the end.
Obfuscated Files or Information
It has used obfuscated web shells in their operations.
Obfuscated Files or Information
Mosquito’s installer is obfuscated with a custom crypter to obfuscate the installer.
Obfuscated Files or Information
It has delivered initial payloads hidden using archives and encoding measures.
Obfuscated Files or Information
NanHaiShu encodes files in Base64.
Obfuscated Files or Information
NanoCore’s plugins were obfuscated with Eazfuscater.NET 3.3.
Obfuscated Files or Information
NETWIRE has used a custom obfuscation algorithm to hide strings including Registry keys, APIs, and DLL names.
Obfuscated Files or Information
During Night Dragon, threat actors used a DLL that included an XOR-encoded section.
Obfuscated Files or Information
NightClub can obfuscate strings using the congruential generator (LCG): staten+1 = (690069 × staten + 1) mod 232.
Obfuscated Files or Information
njRAT has included a base64 encoded executable.