prompt
stringclasses
508 values
procedure
stringlengths
20
478
Obfuscated Files or Information
NOKKI uses Base64 encoding for strings.
Obfuscated Files or Information
It has encrypted and encoded data in its malware, including by using base64.
Obfuscated Files or Information
OLDBAIT obfuscates internal strings and unpacks them at startup.
Obfuscated Files or Information
OopsIE uses the Confuser protector to obfuscate an embedded .Net Framework assembly used for C2. OopsIE also encodes collected data in hexadecimal format before writing to files on disk and obfuscates strings.
Obfuscated Files or Information
During Operation Dream Job, It encrypted malware such as DRATzarus with XOR and DLL files with base64.
Obfuscated Files or Information
During Operation Dust Storm, the threat actors encoded some payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key; other payloads were Base64-encoded.
Obfuscated Files or Information
During Operation Honeybee, the threat actors used Base64 to encode files with a custom key.
Obfuscated Files or Information
For Operation Spalax, the threat actors used XOR-encrypted payloads.
Obfuscated Files or Information
Some Orz strings are base64 encoded, such as the embedded DLL known as MockDll.
Obfuscated Files or Information
OSX_OCEANLOTUS.D encrypts its strings in RSA256 and encodes them in a custom base64 scheme and XOR.
Obfuscated Files or Information
Out1 has the ability to encode data.
Obfuscated Files or Information
P.A.S. Webshell can use encryption and base64 encoding to hide strings and to enforce access control once deployed.
Obfuscated Files or Information
Pandora has the ability to compress stings with QuickLZ.
Obfuscated Files or Information
PcShare has been encrypted with XOR using different 32-long Base16 strings and compressed with LZW algorithm.
Obfuscated Files or Information
Penquin has encrypted strings in the binary for obfuscation.
Obfuscated Files or Information
Pillowmint has been compressed and stored within a registry key. Pillowmint has also obfuscated the AES key used for encryption.
Obfuscated Files or Information
PipeMon modules are stored encrypted on disk.
Obfuscated Files or Information
Pisloader obfuscates files by splitting strings into smaller sub-strings and including "garbage" strings that are never used. The malware also uses return-oriented programming (ROP) technique and single-byte XOR to obfuscate data.
Obfuscated Files or Information
PlugX can use API hashing and modify the names of strings to evade detection.
Obfuscated Files or Information
PoetRAT has used a custom encryption scheme for communication between scripts.
Obfuscated Files or Information
PoisonIvy hides any strings related to its own indicators of compromise.
Obfuscated Files or Information
PolyglotDuke can custom encrypt strings.
Obfuscated Files or Information
Pony attachments have been delivered via compressed archive files. Pony also obfuscates the memory flow by adding junk instructions when executing to make analysis more difficult.
Obfuscated Files or Information
POSHSPY appends a file signature header (randomly selected from six file types) to encrypted data prior to upload or download.
Obfuscated Files or Information
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.
Obfuscated Files or Information
Some resources in Prikormka are encrypted with a simple XOR operation or encoded with Base64.
Obfuscated Files or Information
PS1 is distributed as a set of encrypted files and scripts.
Obfuscated Files or Information
PUNCHBUGGY has hashed most its code's functions and encrypted payloads with base64 and XOR.
Obfuscated Files or Information
PUNCHTRACK is loaded and executed by a highly obfuscated launcher.
Obfuscated Files or Information
Droppers used by It use RC4 or a 16-byte XOR key consisting of the bytes 0xA0 – 0xAF to obfuscate payloads.
Obfuscated Files or Information
PyDCrypt has been compiled and encrypted with PyInstaller, specifically using the --key flag during the build phase.
Obfuscated Files or Information
QakBot has hidden code within Excel spreadsheets by turning the font color to white and splitting it across multiple cells.
Obfuscated Files or Information
Raindrop encrypted its payload using a simple XOR algorithm with a single-byte key.
Obfuscated Files or Information
RainyDay has downloaded as a XOR-encrypted payload.
Obfuscated Files or Information
Ramsay has base64-encoded its portable executable and hidden itself under a JPG header. Ramsay can also embed information within document footers.
Obfuscated Files or Information
RCSession can compress and obfuscate its strings to evade detection on a compromised host.
Obfuscated Files or Information
Reaver encrypts some of its files with XOR.
Obfuscated Files or Information
A RedLeaves configuration file is encrypted with a simple XOR key, 0x53.
Obfuscated Files or Information
RegDuke can use control-flow flattening or the commercially available .NET Reactor for obfuscation.
Obfuscated Files or Information
Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths.
Obfuscated Files or Information
Remexi obfuscates its configuration data with XOR.
Obfuscated Files or Information
Some data in Remsec is encrypted using RC5 in CBC mode, AES-CBC with a hardcoded key, RC4, or Salsa20. Some data is also base64-encoded.
Obfuscated Files or Information
REvil has used encrypted strings and configuration files.
Obfuscated Files or Information
Rifdoor has encrypted strings with a single byte XOR algorithm.
Obfuscated Files or Information
Configuration data used by Rising Sun has been encrypted using an RC4 stream algorithm.
Obfuscated Files or Information
It has modified UPX headers after packing files to break unpackers.
Obfuscated Files or Information
ROKRAT can encrypt data prior to exfiltration by using an RSA public key.
Obfuscated Files or Information
It strings, network data, configuration, and modules are encrypted with a modified RC4 algorithm. It has also been delivered to targets as various archive files including ZIP, 7-ZIP, and RAR.
Obfuscated Files or Information
Ryuk can use anti-disassembly and code transformation obfuscation techniques.
Obfuscated Files or Information
Saint Bot has been obfuscated to help avoid detection.
Obfuscated Files or Information
Sakula uses single-byte XOR obfuscation to obfuscate many of its files.
Obfuscated Files or Information
SamSam has been seen using AES or DES to encrypt payloads and payload components.
Obfuscated Files or Information
It has used Base64 encoding within malware variants.
Obfuscated Files or Information
Sardonic can use certain ConfuserEx features for obfuscation and can be encoded in a base64 string.
Obfuscated Files or Information
SDBbot has the ability to XOR the strings for its installer component with a hardcoded 128 byte key.
Obfuscated Files or Information
Seasalt obfuscates configuration data.
Obfuscated Files or Information
ShadowPad has encrypted its payload, a virtual file system, and various files.
Obfuscated Files or Information
Shamoon contains base64-encoded strings.
Obfuscated Files or Information
Shark can use encrypted and encoded files for C2 configuration.
Obfuscated Files or Information
ShimRat has been delivered as a package that includes compressed DLL and shellcode payloads within a .dat file.
Obfuscated Files or Information
ShimRatReporter encrypted gathered information with a combination of shifting and XOR using a static key.
Obfuscated Files or Information
SHOTPUT is obscured using XOR encoding and appended to a valid GIF file.
Obfuscated Files or Information
It has used base64 encoding and ECDH-P256 encryption for payloads.
Obfuscated Files or Information
Siloscape itself is obfuscated and uses obfuscated API calls.
Obfuscated Files or Information
Skidmap has encrypted it's main payload using 3DES.
Obfuscated Files or Information
Sliver can encrypt strings at compile time.
Obfuscated Files or Information
Small Sieve has the ability to use a custom hex byte swapping encoding scheme combined with an obfuscated Base64 function to protect program strings and Telegram credentials.
Obfuscated Files or Information
Smoke Loader uses a simple one-byte XOR method to obfuscate values in the malware.
Obfuscated Files or Information
Snip3 has the ability to obfuscate strings using XOR encryption.
Obfuscated Files or Information
SodaMaster can use "stackstrings" for obfuscation.
Obfuscated Files or Information
SombRAT can encrypt strings with XOR-based routines and use a custom AES storage format for plugins, configuration, C2 domains, and harvested data.
Obfuscated Files or Information
SoreFang has the ability to encode and RC6 encrypt data sent to C2.
Obfuscated Files or Information
SpeakUp encodes its second-stage payload with Base64.
Obfuscated Files or Information
Squirrelwaffle has been obfuscated with a XOR-based algorithm.
Obfuscated Files or Information
STARWHALE has been obfuscated with hex-encoded strings.
Obfuscated Files or Information
StoneDrill has obfuscated its module with an alphabet-based table or XOR encryption.
Obfuscated Files or Information
StreamEx obfuscates some commands by using statically programmed fragments of strings when starting a DLL. It also uses a one-byte xor against 0x91 to encode configuration data.
Obfuscated Files or Information
StrongPity has used encrypted strings in its dropper component.
Obfuscated Files or Information
Stuxnet uses encrypted configuration blocks and writes encrypted files to disk.
Obfuscated Files or Information
SUNBURST strings were compressed and encoded in Base64. SUNBURST also obfuscated collected system information using a FNV-1a + XOR algorithm.
Obfuscated Files or Information
SUNSPOT encrypted log entries it collected with the stream cipher RC4 using a hard-coded key. It also uses AES128-CBC encrypted blobs for SUNBURST source code and data extracted from the SolarWinds Orion <MsBuild.exe process.
Obfuscated Files or Information
SUPERNOVA contained Base64-encoded strings.
Obfuscated Files or Information
SVCReady can encrypt victim data with an RC4 cipher.
Obfuscated Files or Information
SynAck payloads are obfuscated prior to compilation to inhibit analysis and/or reverse engineering.
Obfuscated Files or Information
SysUpdate can encrypt and encode its configuration file.
Obfuscated Files or Information
It has used compressed and char-encoded scripts in operations.
Obfuscated Files or Information
It has password-protected malicious Word documents.
Obfuscated Files or Information
Taidoor can use encrypted string blocks for obfuscation.
Obfuscated Files or Information
TajMahal has used an encrypted Virtual File System to store plugins.
Obfuscated Files or Information
It has encrypted its binaries via AES and encoded files using Base64.
Obfuscated Files or Information
TEARDROP created and read from a file with a fake JPG header, and its payload was encrypted with a simple rotating XOR cipher.
Obfuscated Files or Information
A It tool can encrypt payloads using XOR. It malware is also obfuscated using Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.
Obfuscated Files or Information
ThreatNeedle has been compressed and obfuscated using RC4, AES, or XOR.
Obfuscated Files or Information
TINYTYPHON has used XOR with 0x90 to obfuscate its configuration file.
Obfuscated Files or Information
Torisma has been Base64 encoded and AES encrypted.
Obfuscated Files or Information
It has dropped encoded executables on compromised hosts.
Obfuscated Files or Information
TrickBot uses non-descriptive names to hide functionality and uses an AES CBC (256 bits) encryption algorithm for its loader and configuration files.
Obfuscated Files or Information
Trojan.Karagany can base64 encode and AES-128-CBC encrypt data prior to transmission.
Obfuscated Files or Information
It has encrypted configuration files.
Obfuscated Files or Information
Turian can use VMProtect for obfuscation.