prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Obfuscated Files or Information | Elise encrypts several of its files, including configuration files. |
Obfuscated Files or Information | It has obfuscated malware to help avoid detection. |
Obfuscated Files or Information | Variants of Emissary encrypt payloads using various XOR ciphers, as well as a custom algorithm that uses the "srand" and "rand" functions. |
Obfuscated Files or Information | EnvyScout can Base64 encode payloads. |
Obfuscated Files or Information | Epic heavily obfuscates its code to make analysis more difficult. |
Obfuscated Files or Information | Exaramel for Linux uses RC4 for encrypting the configuration. |
Obfuscated Files or Information | FatDuke can use base64 encoding, string stacking, and opaque predicates for obfuscation. |
Obfuscated Files or Information | FELIXROOT encrypts strings in the backdoor using a custom XOR algorithm. |
Obfuscated Files or Information | Final1stspy obfuscates strings with base64 encoding. |
Obfuscated Files or Information | FinFisher is heavily obfuscated in many ways, including through the use of spaghetti code in its functions in an effort to confuse disassembly programs. It also uses a custom XOR algorithm to obfuscate code. |
Obfuscated Files or Information | The FIVEHANDS payload is encrypted with AES-128. |
Obfuscated Files or Information | Flagpro has been delivered within ZIP or RAR password-protected archived files. |
Obfuscated Files or Information | FlawedGrace encrypts its C2 configuration files with AES in CBC mode. |
Obfuscated Files or Information | FoggyWeb has been XOR-encoded. |
Obfuscated Files or Information | It has base64 encoded payloads to avoid detection. |
Obfuscated Files or Information | FunnyDream can Base64 encode its C2 address stored in a template binary with the xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_- orxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_= character sets. |
Obfuscated Files or Information | Fysbis has been encrypted using XOR and RC4. |
Obfuscated Files or Information | It used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection. |
Obfuscated Files or Information | It obfuscated shellcode used during execution. |
Obfuscated Files or Information | It has delivered self-extracting 7z archive files within malicious document attachments. |
Obfuscated Files or Information | Gazer logs its actions into files that are encrypted with 3DES. It also uses RSA to encrypt resources. |
Obfuscated Files or Information | Gelsemium has the ability to compress its components. |
Obfuscated Files or Information | GoldenSpy's uninstaller has base64-encoded its variables. |
Obfuscated Files or Information | GoldMax has written AES-encrypted and Base64-encoded configuration files to disk. |
Obfuscated Files or Information | Goopy's decrypter have been inflated with junk code in between legitimate API functions, and also included infinite loops to avoid analysis. |
Obfuscated Files or Information | The Grandoreiro payload has been delivered encrypted with a custom XOR-based algorithm and also as a base64-encoded ZIP file. |
Obfuscated Files or Information | GravityRAT supports file encryption (AES with the key "lolomycin2017"). |
Obfuscated Files or Information | Green Lambert has encrypted strings. |
Obfuscated Files or Information | GreyEnergy encrypts its configuration files with AES-256 and also encrypts its strings. |
Obfuscated Files or Information | GrimAgent has used Rotate on Right (RoR) and Rotate on Left (RoL) functionality to encrypt strings. |
Obfuscated Files or Information | It disguised its malicious binaries with several layers of obfuscation, including encrypting the files. |
Obfuscated Files or Information | H1N1 uses multiple techniques to obfuscate strings, including XOR. |
Obfuscated Files or Information | Hancitor has used Base64 to encode malicious links. Hancitor has also delivered compressed payloads in ZIP files to victims. |
Obfuscated Files or Information | HAWKBALL has encrypted the payload with an XOR-based algorithm. |
Obfuscated Files or Information | The Helminth config file is encrypted with RC4. |
Obfuscated Files or Information | HermeticWiper can compress 32-bit and 64-bit driver files with the Lempel-Ziv algorithm. |
Obfuscated Files or Information | HermeticWizard has the ability to encrypt PE files with a reverse XOR loop. |
Obfuscated Files or Information | Heyoka Backdoor can encrypt its payload. |
Obfuscated Files or Information | Hi-Zor uses various XOR techniques to obfuscate its components. |
Obfuscated Files or Information | HiddenWasp encrypts its configuration and payload. |
Obfuscated Files or Information | It used Base64 encoded compressed payloads. |
Obfuscated Files or Information | Hildegard has encrypted an ELF file. |
Obfuscated Files or Information | Some strings in HOMEFRY are obfuscated with XOR x56. |
Obfuscated Files or Information | HotCroissant has encrypted strings with single-byte XOR and base64 encoded RC4. |
Obfuscated Files or Information | HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming. |
Obfuscated Files or Information | Hydraq uses basic obfuscation in the form of spaghetti code. |
Obfuscated Files or Information | HyperBro can be delivered encrypted to a compromised host. |
Obfuscated Files or Information | IcedID has utilzed encrypted binaries and base64 encoded strings. |
Obfuscated Files or Information | Imminent Monitor has encrypted the spearphish attachments to avoid detection from email gateways; the debugger also encrypts information before sending to the C2. |
Obfuscated Files or Information | It has encrypted malware payloads dropped on victim machines with AES and RC4 encryption. |
Obfuscated Files or Information | Industroyer uses heavily obfuscated code in its Windows Notepad backdoor. |
Obfuscated Files or Information | InnaputRAT uses an 8-byte XOR key to obfuscate API names and other strings contained in the payload. |
Obfuscated Files or Information | InvisiMole avoids analysis by encrypting all strings, internal files, configuration data and by using a custom executable format. |
Obfuscated Files or Information | IronNetInjector can obfuscate variable names, encrypt strings, as well as base64 encode and Rijndael encrypt payloads. |
Obfuscated Files or Information | ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com. |
Obfuscated Files or Information | Many strings in JHUHUGIT are obfuscated with a XOR algorithm. |
Obfuscated Files or Information | A JPIN uses a encrypted and compressed payload that is disguised as a bitmap within the resource section of the installer. |
Obfuscated Files or Information | jRAT’s Java payload is encrypted with AES. Additionally, backdoor files are encrypted using DES as a stream cipher. Later variants of jRAT also incorporated AV evasion methods such as Java bytecode obfuscation via the commercial Allatori obfuscation tool. |
Obfuscated Files or Information | Kazuar is obfuscated using the open source ConfuserEx protector. Kazuar also obfuscates the name of created files/folders/mutexes and encrypts debug messages written to log files using the Rijndael cipher. |
Obfuscated Files or Information | It has used Base64-encoded shellcode strings. |
Obfuscated Files or Information | Kerrdown can encrypt, encode, and compress multiple layers of shellcode. |
Obfuscated Files or Information | Kessel's configuration is hardcoded and RC4 encrypted within the binary. |
Obfuscated Files or Information | Kevin has Base64-encoded its configuration file. |
Obfuscated Files or Information | In one version of KeyBoy, string obfuscation routines were used to hide many of the critical values referenced in the malware. |
Obfuscated Files or Information | KEYPLUG can use a hardcoded one-byte XOR encoded configuration file. |
Obfuscated Files or Information | KGH_SPY has used encrypted strings in its installer. |
Obfuscated Files or Information | KillDisk uses VMProtect to make reverse engineering the malware more difficult. |
Obfuscated Files or Information | It has obfuscated binary strings including the use of XOR encryption and Base64 encoding. It has also modified the first byte of DLL implants targeting victims to prevent recognition of the executable file format. |
Obfuscated Files or Information | Kobalos encrypts all strings using RC4 and bundles all functionality into a single function call. |
Obfuscated Files or Information | KONNI is heavily obfuscated and includes encrypted configuration files. |
Obfuscated Files or Information | Kwampirs downloads additional files that are base64-encoded and encrypted with another cipher. |
Obfuscated Files or Information | It has used multiple types of encryption and encoding for their payloads, including AES, Caracachs, RC4, XOR, Base64, and other tricks such as creating aliases in code for Native API function names. |
Obfuscated Files or Information | It has obfuscated code using base64 and gzip compression. |
Obfuscated Files or Information | LightNeuron encrypts its configuration files with AES-256. |
Obfuscated Files or Information | Lokibot has obfuscated strings with base64 encoding. |
Obfuscated Files or Information | LoudMiner has encrypted DMG files. |
Obfuscated Files or Information | Mafalda has been obfuscated and contains encrypted functions. |
Obfuscated Files or Information | It malware has used base64-encoded files and has also encrypted embedded strings with AES. |
Obfuscated Files or Information | Matryoshka obfuscates API function names using a substitute cipher combined with Base64 encoding. |
Obfuscated Files or Information | Maze has decrypted strings and other important information during the encryption process. Maze also calls certain functions dynamically to hinder analysis. |
Obfuscated Files or Information | MCMD can Base64 encode output strings prior to sending to C2. |
Obfuscated Files or Information | It has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40. |
Obfuscated Files or Information | It has encrypted their payloads. |
Obfuscated Files or Information | metaMain's module file has been encrypted via XOR. |
Obfuscated Files or Information | Metamorfo has encrypted payloads and strings. |
Obfuscated Files or Information | Micropsia obfuscates the configuration with a custom Base64 and XOR. |
Obfuscated Files or Information | Milan can encode files containing information about the targeted system. |
Obfuscated Files or Information | MiniDuke can use control flow flattening to obscure code. |
Obfuscated Files or Information | It has compressed the ShimRat executable within malicious email attachments. It has also encrypted payloads before they are downloaded to victims. |
Obfuscated Files or Information | It has delivered compressed executables within ZIP files to victims. |
Obfuscated Files or Information | More_eggs's payload has been encrypted with a key that has the hostname and processor family information appended to the end. |
Obfuscated Files or Information | It has used obfuscated web shells in their operations. |
Obfuscated Files or Information | Mosquito’s installer is obfuscated with a custom crypter to obfuscate the installer. |
Obfuscated Files or Information | It has delivered initial payloads hidden using archives and encoding measures. |
Obfuscated Files or Information | NanHaiShu encodes files in Base64. |
Obfuscated Files or Information | NanoCore’s plugins were obfuscated with Eazfuscater.NET 3.3. |
Obfuscated Files or Information | NETWIRE has used a custom obfuscation algorithm to hide strings including Registry keys, APIs, and DLL names. |
Obfuscated Files or Information | During Night Dragon, threat actors used a DLL that included an XOR-encoded section. |
Obfuscated Files or Information | NightClub can obfuscate strings using the congruential generator (LCG): staten+1 = (690069 × staten + 1) mod 232. |
Obfuscated Files or Information | njRAT has included a base64 encoded executable. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.