prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Obfuscated Files or Information | NOKKI uses Base64 encoding for strings. |
Obfuscated Files or Information | It has encrypted and encoded data in its malware, including by using base64. |
Obfuscated Files or Information | OLDBAIT obfuscates internal strings and unpacks them at startup. |
Obfuscated Files or Information | OopsIE uses the Confuser protector to obfuscate an embedded .Net Framework assembly used for C2. OopsIE also encodes collected data in hexadecimal format before writing to files on disk and obfuscates strings. |
Obfuscated Files or Information | During Operation Dream Job, It encrypted malware such as DRATzarus with XOR and DLL files with base64. |
Obfuscated Files or Information | During Operation Dust Storm, the threat actors encoded some payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key; other payloads were Base64-encoded. |
Obfuscated Files or Information | During Operation Honeybee, the threat actors used Base64 to encode files with a custom key. |
Obfuscated Files or Information | For Operation Spalax, the threat actors used XOR-encrypted payloads. |
Obfuscated Files or Information | Some Orz strings are base64 encoded, such as the embedded DLL known as MockDll. |
Obfuscated Files or Information | OSX_OCEANLOTUS.D encrypts its strings in RSA256 and encodes them in a custom base64 scheme and XOR. |
Obfuscated Files or Information | Out1 has the ability to encode data. |
Obfuscated Files or Information | P.A.S. Webshell can use encryption and base64 encoding to hide strings and to enforce access control once deployed. |
Obfuscated Files or Information | Pandora has the ability to compress stings with QuickLZ. |
Obfuscated Files or Information | PcShare has been encrypted with XOR using different 32-long Base16 strings and compressed with LZW algorithm. |
Obfuscated Files or Information | Penquin has encrypted strings in the binary for obfuscation. |
Obfuscated Files or Information | Pillowmint has been compressed and stored within a registry key. Pillowmint has also obfuscated the AES key used for encryption. |
Obfuscated Files or Information | PipeMon modules are stored encrypted on disk. |
Obfuscated Files or Information | Pisloader obfuscates files by splitting strings into smaller sub-strings and including "garbage" strings that are never used. The malware also uses return-oriented programming (ROP) technique and single-byte XOR to obfuscate data. |
Obfuscated Files or Information | PlugX can use API hashing and modify the names of strings to evade detection. |
Obfuscated Files or Information | PoetRAT has used a custom encryption scheme for communication between scripts. |
Obfuscated Files or Information | PoisonIvy hides any strings related to its own indicators of compromise. |
Obfuscated Files or Information | PolyglotDuke can custom encrypt strings. |
Obfuscated Files or Information | Pony attachments have been delivered via compressed archive files. Pony also obfuscates the memory flow by adding junk instructions when executing to make analysis more difficult. |
Obfuscated Files or Information | POSHSPY appends a file signature header (randomly selected from six file types) to encrypted data prior to upload or download. |
Obfuscated Files or Information | PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server. |
Obfuscated Files or Information | Some resources in Prikormka are encrypted with a simple XOR operation or encoded with Base64. |
Obfuscated Files or Information | PS1 is distributed as a set of encrypted files and scripts. |
Obfuscated Files or Information | PUNCHBUGGY has hashed most its code's functions and encrypted payloads with base64 and XOR. |
Obfuscated Files or Information | PUNCHTRACK is loaded and executed by a highly obfuscated launcher. |
Obfuscated Files or Information | Droppers used by It use RC4 or a 16-byte XOR key consisting of the bytes 0xA0 – 0xAF to obfuscate payloads. |
Obfuscated Files or Information | PyDCrypt has been compiled and encrypted with PyInstaller, specifically using the --key flag during the build phase. |
Obfuscated Files or Information | QakBot has hidden code within Excel spreadsheets by turning the font color to white and splitting it across multiple cells. |
Obfuscated Files or Information | Raindrop encrypted its payload using a simple XOR algorithm with a single-byte key. |
Obfuscated Files or Information | RainyDay has downloaded as a XOR-encrypted payload. |
Obfuscated Files or Information | Ramsay has base64-encoded its portable executable and hidden itself under a JPG header. Ramsay can also embed information within document footers. |
Obfuscated Files or Information | RCSession can compress and obfuscate its strings to evade detection on a compromised host. |
Obfuscated Files or Information | Reaver encrypts some of its files with XOR. |
Obfuscated Files or Information | A RedLeaves configuration file is encrypted with a simple XOR key, 0x53. |
Obfuscated Files or Information | RegDuke can use control-flow flattening or the commercially available .NET Reactor for obfuscation. |
Obfuscated Files or Information | Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths. |
Obfuscated Files or Information | Remexi obfuscates its configuration data with XOR. |
Obfuscated Files or Information | Some data in Remsec is encrypted using RC5 in CBC mode, AES-CBC with a hardcoded key, RC4, or Salsa20. Some data is also base64-encoded. |
Obfuscated Files or Information | REvil has used encrypted strings and configuration files. |
Obfuscated Files or Information | Rifdoor has encrypted strings with a single byte XOR algorithm. |
Obfuscated Files or Information | Configuration data used by Rising Sun has been encrypted using an RC4 stream algorithm. |
Obfuscated Files or Information | It has modified UPX headers after packing files to break unpackers. |
Obfuscated Files or Information | ROKRAT can encrypt data prior to exfiltration by using an RSA public key. |
Obfuscated Files or Information | It strings, network data, configuration, and modules are encrypted with a modified RC4 algorithm. It has also been delivered to targets as various archive files including ZIP, 7-ZIP, and RAR. |
Obfuscated Files or Information | Ryuk can use anti-disassembly and code transformation obfuscation techniques. |
Obfuscated Files or Information | Saint Bot has been obfuscated to help avoid detection. |
Obfuscated Files or Information | Sakula uses single-byte XOR obfuscation to obfuscate many of its files. |
Obfuscated Files or Information | SamSam has been seen using AES or DES to encrypt payloads and payload components. |
Obfuscated Files or Information | It has used Base64 encoding within malware variants. |
Obfuscated Files or Information | Sardonic can use certain ConfuserEx features for obfuscation and can be encoded in a base64 string. |
Obfuscated Files or Information | SDBbot has the ability to XOR the strings for its installer component with a hardcoded 128 byte key. |
Obfuscated Files or Information | Seasalt obfuscates configuration data. |
Obfuscated Files or Information | ShadowPad has encrypted its payload, a virtual file system, and various files. |
Obfuscated Files or Information | Shamoon contains base64-encoded strings. |
Obfuscated Files or Information | Shark can use encrypted and encoded files for C2 configuration. |
Obfuscated Files or Information | ShimRat has been delivered as a package that includes compressed DLL and shellcode payloads within a .dat file. |
Obfuscated Files or Information | ShimRatReporter encrypted gathered information with a combination of shifting and XOR using a static key. |
Obfuscated Files or Information | SHOTPUT is obscured using XOR encoding and appended to a valid GIF file. |
Obfuscated Files or Information | It has used base64 encoding and ECDH-P256 encryption for payloads. |
Obfuscated Files or Information | Siloscape itself is obfuscated and uses obfuscated API calls. |
Obfuscated Files or Information | Skidmap has encrypted it's main payload using 3DES. |
Obfuscated Files or Information | Sliver can encrypt strings at compile time. |
Obfuscated Files or Information | Small Sieve has the ability to use a custom hex byte swapping encoding scheme combined with an obfuscated Base64 function to protect program strings and Telegram credentials. |
Obfuscated Files or Information | Smoke Loader uses a simple one-byte XOR method to obfuscate values in the malware. |
Obfuscated Files or Information | Snip3 has the ability to obfuscate strings using XOR encryption. |
Obfuscated Files or Information | SodaMaster can use "stackstrings" for obfuscation. |
Obfuscated Files or Information | SombRAT can encrypt strings with XOR-based routines and use a custom AES storage format for plugins, configuration, C2 domains, and harvested data. |
Obfuscated Files or Information | SoreFang has the ability to encode and RC6 encrypt data sent to C2. |
Obfuscated Files or Information | SpeakUp encodes its second-stage payload with Base64. |
Obfuscated Files or Information | Squirrelwaffle has been obfuscated with a XOR-based algorithm. |
Obfuscated Files or Information | STARWHALE has been obfuscated with hex-encoded strings. |
Obfuscated Files or Information | StoneDrill has obfuscated its module with an alphabet-based table or XOR encryption. |
Obfuscated Files or Information | StreamEx obfuscates some commands by using statically programmed fragments of strings when starting a DLL. It also uses a one-byte xor against 0x91 to encode configuration data. |
Obfuscated Files or Information | StrongPity has used encrypted strings in its dropper component. |
Obfuscated Files or Information | Stuxnet uses encrypted configuration blocks and writes encrypted files to disk. |
Obfuscated Files or Information | SUNBURST strings were compressed and encoded in Base64. SUNBURST also obfuscated collected system information using a FNV-1a + XOR algorithm. |
Obfuscated Files or Information | SUNSPOT encrypted log entries it collected with the stream cipher RC4 using a hard-coded key. It also uses AES128-CBC encrypted blobs for SUNBURST source code and data extracted from the SolarWinds Orion <MsBuild.exe process. |
Obfuscated Files or Information | SUPERNOVA contained Base64-encoded strings. |
Obfuscated Files or Information | SVCReady can encrypt victim data with an RC4 cipher. |
Obfuscated Files or Information | SynAck payloads are obfuscated prior to compilation to inhibit analysis and/or reverse engineering. |
Obfuscated Files or Information | SysUpdate can encrypt and encode its configuration file. |
Obfuscated Files or Information | It has used compressed and char-encoded scripts in operations. |
Obfuscated Files or Information | It has password-protected malicious Word documents. |
Obfuscated Files or Information | Taidoor can use encrypted string blocks for obfuscation. |
Obfuscated Files or Information | TajMahal has used an encrypted Virtual File System to store plugins. |
Obfuscated Files or Information | It has encrypted its binaries via AES and encoded files using Base64. |
Obfuscated Files or Information | TEARDROP created and read from a file with a fake JPG header, and its payload was encrypted with a simple rotating XOR cipher. |
Obfuscated Files or Information | A It tool can encrypt payloads using XOR. It malware is also obfuscated using Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression. |
Obfuscated Files or Information | ThreatNeedle has been compressed and obfuscated using RC4, AES, or XOR. |
Obfuscated Files or Information | TINYTYPHON has used XOR with 0x90 to obfuscate its configuration file. |
Obfuscated Files or Information | Torisma has been Base64 encoded and AES encrypted. |
Obfuscated Files or Information | It has dropped encoded executables on compromised hosts. |
Obfuscated Files or Information | TrickBot uses non-descriptive names to hide functionality and uses an AES CBC (256 bits) encryption algorithm for its loader and configuration files. |
Obfuscated Files or Information | Trojan.Karagany can base64 encode and AES-128-CBC encrypt data prior to transmission. |
Obfuscated Files or Information | It has encrypted configuration files. |
Obfuscated Files or Information | Turian can use VMProtect for obfuscation. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.