prompt
stringclasses
508 values
procedure
stringlengths
20
478
Obfuscated Files or Information:Software Packing
jRAT payloads have been packed.
Obfuscated Files or Information:Software Packing
It has packed malware with UPX.
Obfuscated Files or Information:Software Packing
KONNI has been packed for obfuscation.
Obfuscated Files or Information:Software Packing
LiteDuke has been packed with multiple layers of encryption.
Obfuscated Files or Information:Software Packing
Lokibot has used several packing methods for obfuscation.
Obfuscated Files or Information:Software Packing
Lucifer has used UPX packed binaries.
Obfuscated Files or Information:Software Packing
It has been packed with NSIS.
Obfuscated Files or Information:Software Packing
Melcoz has been packed with VMProtect and Themida.
Obfuscated Files or Information:Software Packing
Metamorfo has used VMProtect to pack and protect files.
Obfuscated Files or Information:Software Packing
Misdat was typically packed using UPX.
Obfuscated Files or Information:Software Packing
Mongall has been packed with Themida.
Obfuscated Files or Information:Software Packing
It has used malware plugins packed with Themida.
Obfuscated Files or Information:Software Packing
NETWIRE has used .NET packer tools to evade detection.
Obfuscated Files or Information:Software Packing
During Night Dragon, threat actors used software packing in its tools.
Obfuscated Files or Information:Software Packing
OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.
Obfuscated Files or Information:Software Packing
During Operation Dream Job, It packed malicious .db files with Themida to evade detection.
Obfuscated Files or Information:Software Packing
For Operation Dust Storm, the threat actors used UPX to pack some payloads.
Obfuscated Files or Information:Software Packing
For Operation Spalax, the threat actors used a variety of packers, including CyaX, to obfuscate malicious executables.
Obfuscated Files or Information:Software Packing
OSX_OCEANLOTUS.D has a variant that is packed with UPX.
Obfuscated Files or Information:Software Packing
A It payload was packed with UPX.
Obfuscated Files or Information:Software Packing
QakBot can encrypt and pack malicious payloads.
Obfuscated Files or Information:Software Packing
Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm.
Obfuscated Files or Information:Software Packing
It's miner has created UPX-packed files in the Windows Start Menu Folder.
Obfuscated Files or Information:Software Packing
Some S-Type samples have been packed with UPX.
Obfuscated Files or Information:Software Packing
Saint Bot has been packed using a dark market crypter.
Obfuscated Files or Information:Software Packing
SDBbot has used a packed installer file.
Obfuscated Files or Information:Software Packing
SeaDuke has been packed with the UPX packer.
Obfuscated Files or Information:Software Packing
ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack.
Obfuscated Files or Information:Software Packing
Spark has been packed with Enigma Protector to obfuscate its contents.
Obfuscated Files or Information:Software Packing
Squirrelwaffle has been packed with a custom packer to hide payloads.
Obfuscated Files or Information:Software Packing
SysUpdate has been packed with VMProtect.
Obfuscated Files or Information:Software Packing
It has used a .NET packer to obfuscate malicious files.
Obfuscated Files or Information:Software Packing
It has used UPX to obscure malicious code.
Obfuscated Files or Information:Software Packing
It has used UPX and Ezuri packer to pack its binaries.
Obfuscated Files or Information:Software Packing
It has obfuscated their payloads through packing.
Obfuscated Files or Information:Software Packing
It has packed malware and tools, including using VMProtect.
Obfuscated Files or Information:Software Packing
Tomiris has been packed with UPX.
Obfuscated Files or Information:Software Packing
Torisma has been packed with Iz4 compression.
Obfuscated Files or Information:Software Packing
TrickBot leverages a custom packer to obfuscate its functionality.
Obfuscated Files or Information:Software Packing
Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer.
Obfuscated Files or Information:Software Packing
Uroburos uses a custom packer.
Obfuscated Files or Information:Software Packing
Valak has used packed DLL payloads.
Obfuscated Files or Information:Software Packing
VERMIN is initially packed.
Obfuscated Files or Information:Software Packing
yty packs a plugin with UPX.
Obfuscated Files or Information:Software Packing
Zebrocy's Delphi variant was packed with UPX.
Obfuscated Files or Information:Software Packing
Some ZeroT DLL files have been packed with UPX.
Obfuscated Files or Information:Software Packing
ItM has used multi-stage packers for exploit code.
Obfuscated Files or Information:Steganography
ABK can extract a malicious Portable Executable (PE) from a photo.
Obfuscated Files or Information:Steganography
It has hidden malicious executables within PNG files.
Obfuscated Files or Information:Steganography
It uses steganography to send images to users that are embedded with shellcode.
Obfuscated Files or Information:Steganography
Avenger can extract backdoor malware from downloaded images.
Obfuscated Files or Information:Steganography
Bandook has used .PNG images within a zip file to build the executable.
Obfuscated Files or Information:Steganography
BBK can extract a malicious Portable Executable (PE) from a photo.
Obfuscated Files or Information:Steganography
It has used steganography in multiple operations to conceal malicious payloads.
Obfuscated Files or Information:Steganography
build_downer can extract malware from a downloaded JPEG.
Obfuscated Files or Information:Steganography
Diavol has obfuscated its main code routines within bitmap images as part of its anti-analysis techniques.
Obfuscated Files or Information:Steganography
It has used steganography to hide shellcode in a BMP image file.
Obfuscated Files or Information:Steganography
IcedID has embedded binaries within RC4 encrypted .png files.
Obfuscated Files or Information:Steganography
Invoke-PSImage can be used to embed a PowerShell script within the pixels of a PNG file.
Obfuscated Files or Information:Steganography
It has used steganography to hide stolen data inside other files stored on Github.
Obfuscated Files or Information:Steganography
LiteDuke has used image files to hide its loader component.
Obfuscated Files or Information:Steganography
It has stored obfuscated JavaScript code in an image file named temp.jpg.
Obfuscated Files or Information:Steganography
ObliqueRAT can hide its payload in BMP images hosted on compromised websites.
Obfuscated Files or Information:Steganography
Okrum's payload is encrypted and embedded within its loader, or within a legitimate PNG file.
Obfuscated Files or Information:Steganography
During Operation Ghost, It used steganography to hide payloads inside valid images.
Obfuscated Files or Information:Steganography
For Operation Spalax, the threat actors used packers that read pixel data from images contained in PE files' resource sections and build the next layer of execution from the data.
Obfuscated Files or Information:Steganography
PolyglotDuke can use steganography to hide C2 information in images.
Obfuscated Files or Information:Steganography
PowerDuke uses steganography to hide backdoors in PNG files, which are also encrypted using the Tiny Encryption Algorithm (TEA).
Obfuscated Files or Information:Steganography
ProLock can use .jpg and .bmp files to store its payload.
Obfuscated Files or Information:Steganography
Raindrop used steganography to locate the start of its encoded payload within legitimate 7-Zip code.
Obfuscated Files or Information:Steganography
Ramsay has PE data embedded within JPEG files contained within Word documents.
Obfuscated Files or Information:Steganography
RDAT can also embed data within a BMP image prior to exfiltration.
Obfuscated Files or Information:Steganography
RegDuke can hide data in images, including use of the Least Significant Bit (LSB).
Obfuscated Files or Information:Steganography
It has hidden encoded data for malware DLLs in a PNG.
Obfuscated Files or Information:Steganography
It has used JPG files with encrypted payloads to mask their backdoor routines and evade detection.
Obfuscated Files or Information:Compile After Delivery
Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.
Obfuscated Files or Information:Compile After Delivery
DarkWatchman has used the csc.exe tool to compile a C# executable.
Obfuscated Files or Information:Compile After Delivery
FoggyWeb can compile and execute source code sent to the compromised AD FS server via a specific HTTP POST.
Obfuscated Files or Information:Compile After Delivery
It has compiled the source code for a downloader directly on the infected system using the built-in Microsoft.CSharp.CSharpCodeProvider class.
Obfuscated Files or Information:Compile After Delivery
It has used the .NET csc.exe tool to compile executables from downloaded C# code.
Obfuscated Files or Information:Compile After Delivery
njRAT has used AutoIt to compile the payload and main script into a single executable after delivery.
Obfuscated Files or Information:Compile After Delivery
It has compiled malware, delivered to victims as .c files, with the GNU Compiler Collection (GCC).
Obfuscated Files or Information:Indicator Removal from Tools
It has been known to remove indicators of compromise from tools.
Obfuscated Files or Information:Indicator Removal from Tools
Cobalt Strike includes a capability to modify the Beacon payload to eliminate known signatures or unpacking methods.
Obfuscated Files or Information:Indicator Removal from Tools
Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection.
Obfuscated Files or Information:Indicator Removal from Tools
It has updated and modified its malware, resulting in different hash values that evade detection.
Obfuscated Files or Information:Indicator Removal from Tools
It ensured each payload had a unique hash, including by using different types of packers.
Obfuscated Files or Information:Indicator Removal from Tools
The author of GravityRAT submitted samples to VirusTotal for testing, showing that the author modified the code to try to hide the DDE object in a different part of the document.
Obfuscated Files or Information:Indicator Removal from Tools
InvisiMole has undergone regular technical improvements in an attempt to evade detection.
Obfuscated Files or Information:Indicator Removal from Tools
It has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion.
Obfuscated Files or Information:Indicator Removal from Tools
During Operation Wocao, threat actors edited variable names within the Impacket suite to avoid automated detection.
Obfuscated Files or Information:Indicator Removal from Tools
It apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes.
Obfuscated Files or Information:Indicator Removal from Tools
Penquin can remove strings from binaries.
Obfuscated Files or Information:Indicator Removal from Tools
PowerSploit's Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures.
Obfuscated Files or Information:Indicator Removal from Tools
QakBot can make small changes to itself in order to change its checksum and hash value.
Obfuscated Files or Information:Indicator Removal from Tools
SUNBURST source code used generic variable names and pre-obfuscated strings, and was likely sanitized of developer comments before being added to SUNSPOT.
Obfuscated Files or Information:Indicator Removal from Tools
It has modified files based on the open-source project cryptcat in an apparent attempt to decrease AV detection rates.
Obfuscated Files or Information:Indicator Removal from Tools
Based on comparison of Gazer versions, It made an effort to obfuscate strings in the malware that could be used as IoCs, including the mutex name and named pipe.
Obfuscated Files or Information:Indicator Removal from Tools
Waterbear can scramble functions not to be executed again with random values.
Obfuscated Files or Information:HTML Smuggling
It has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.