prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Obfuscated Files or Information:Software Packing | jRAT payloads have been packed. |
Obfuscated Files or Information:Software Packing | It has packed malware with UPX. |
Obfuscated Files or Information:Software Packing | KONNI has been packed for obfuscation. |
Obfuscated Files or Information:Software Packing | LiteDuke has been packed with multiple layers of encryption. |
Obfuscated Files or Information:Software Packing | Lokibot has used several packing methods for obfuscation. |
Obfuscated Files or Information:Software Packing | Lucifer has used UPX packed binaries. |
Obfuscated Files or Information:Software Packing | It has been packed with NSIS. |
Obfuscated Files or Information:Software Packing | Melcoz has been packed with VMProtect and Themida. |
Obfuscated Files or Information:Software Packing | Metamorfo has used VMProtect to pack and protect files. |
Obfuscated Files or Information:Software Packing | Misdat was typically packed using UPX. |
Obfuscated Files or Information:Software Packing | Mongall has been packed with Themida. |
Obfuscated Files or Information:Software Packing | It has used malware plugins packed with Themida. |
Obfuscated Files or Information:Software Packing | NETWIRE has used .NET packer tools to evade detection. |
Obfuscated Files or Information:Software Packing | During Night Dragon, threat actors used software packing in its tools. |
Obfuscated Files or Information:Software Packing | OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2. |
Obfuscated Files or Information:Software Packing | During Operation Dream Job, It packed malicious .db files with Themida to evade detection. |
Obfuscated Files or Information:Software Packing | For Operation Dust Storm, the threat actors used UPX to pack some payloads. |
Obfuscated Files or Information:Software Packing | For Operation Spalax, the threat actors used a variety of packers, including CyaX, to obfuscate malicious executables. |
Obfuscated Files or Information:Software Packing | OSX_OCEANLOTUS.D has a variant that is packed with UPX. |
Obfuscated Files or Information:Software Packing | A It payload was packed with UPX. |
Obfuscated Files or Information:Software Packing | QakBot can encrypt and pack malicious payloads. |
Obfuscated Files or Information:Software Packing | Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm. |
Obfuscated Files or Information:Software Packing | It's miner has created UPX-packed files in the Windows Start Menu Folder. |
Obfuscated Files or Information:Software Packing | Some S-Type samples have been packed with UPX. |
Obfuscated Files or Information:Software Packing | Saint Bot has been packed using a dark market crypter. |
Obfuscated Files or Information:Software Packing | SDBbot has used a packed installer file. |
Obfuscated Files or Information:Software Packing | SeaDuke has been packed with the UPX packer. |
Obfuscated Files or Information:Software Packing | ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack. |
Obfuscated Files or Information:Software Packing | Spark has been packed with Enigma Protector to obfuscate its contents. |
Obfuscated Files or Information:Software Packing | Squirrelwaffle has been packed with a custom packer to hide payloads. |
Obfuscated Files or Information:Software Packing | SysUpdate has been packed with VMProtect. |
Obfuscated Files or Information:Software Packing | It has used a .NET packer to obfuscate malicious files. |
Obfuscated Files or Information:Software Packing | It has used UPX to obscure malicious code. |
Obfuscated Files or Information:Software Packing | It has used UPX and Ezuri packer to pack its binaries. |
Obfuscated Files or Information:Software Packing | It has obfuscated their payloads through packing. |
Obfuscated Files or Information:Software Packing | It has packed malware and tools, including using VMProtect. |
Obfuscated Files or Information:Software Packing | Tomiris has been packed with UPX. |
Obfuscated Files or Information:Software Packing | Torisma has been packed with Iz4 compression. |
Obfuscated Files or Information:Software Packing | TrickBot leverages a custom packer to obfuscate its functionality. |
Obfuscated Files or Information:Software Packing | Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer. |
Obfuscated Files or Information:Software Packing | Uroburos uses a custom packer. |
Obfuscated Files or Information:Software Packing | Valak has used packed DLL payloads. |
Obfuscated Files or Information:Software Packing | VERMIN is initially packed. |
Obfuscated Files or Information:Software Packing | yty packs a plugin with UPX. |
Obfuscated Files or Information:Software Packing | Zebrocy's Delphi variant was packed with UPX. |
Obfuscated Files or Information:Software Packing | Some ZeroT DLL files have been packed with UPX. |
Obfuscated Files or Information:Software Packing | ItM has used multi-stage packers for exploit code. |
Obfuscated Files or Information:Steganography | ABK can extract a malicious Portable Executable (PE) from a photo. |
Obfuscated Files or Information:Steganography | It has hidden malicious executables within PNG files. |
Obfuscated Files or Information:Steganography | It uses steganography to send images to users that are embedded with shellcode. |
Obfuscated Files or Information:Steganography | Avenger can extract backdoor malware from downloaded images. |
Obfuscated Files or Information:Steganography | Bandook has used .PNG images within a zip file to build the executable. |
Obfuscated Files or Information:Steganography | BBK can extract a malicious Portable Executable (PE) from a photo. |
Obfuscated Files or Information:Steganography | It has used steganography in multiple operations to conceal malicious payloads. |
Obfuscated Files or Information:Steganography | build_downer can extract malware from a downloaded JPEG. |
Obfuscated Files or Information:Steganography | Diavol has obfuscated its main code routines within bitmap images as part of its anti-analysis techniques. |
Obfuscated Files or Information:Steganography | It has used steganography to hide shellcode in a BMP image file. |
Obfuscated Files or Information:Steganography | IcedID has embedded binaries within RC4 encrypted .png files. |
Obfuscated Files or Information:Steganography | Invoke-PSImage can be used to embed a PowerShell script within the pixels of a PNG file. |
Obfuscated Files or Information:Steganography | It has used steganography to hide stolen data inside other files stored on Github. |
Obfuscated Files or Information:Steganography | LiteDuke has used image files to hide its loader component. |
Obfuscated Files or Information:Steganography | It has stored obfuscated JavaScript code in an image file named temp.jpg. |
Obfuscated Files or Information:Steganography | ObliqueRAT can hide its payload in BMP images hosted on compromised websites. |
Obfuscated Files or Information:Steganography | Okrum's payload is encrypted and embedded within its loader, or within a legitimate PNG file. |
Obfuscated Files or Information:Steganography | During Operation Ghost, It used steganography to hide payloads inside valid images. |
Obfuscated Files or Information:Steganography | For Operation Spalax, the threat actors used packers that read pixel data from images contained in PE files' resource sections and build the next layer of execution from the data. |
Obfuscated Files or Information:Steganography | PolyglotDuke can use steganography to hide C2 information in images. |
Obfuscated Files or Information:Steganography | PowerDuke uses steganography to hide backdoors in PNG files, which are also encrypted using the Tiny Encryption Algorithm (TEA). |
Obfuscated Files or Information:Steganography | ProLock can use .jpg and .bmp files to store its payload. |
Obfuscated Files or Information:Steganography | Raindrop used steganography to locate the start of its encoded payload within legitimate 7-Zip code. |
Obfuscated Files or Information:Steganography | Ramsay has PE data embedded within JPEG files contained within Word documents. |
Obfuscated Files or Information:Steganography | RDAT can also embed data within a BMP image prior to exfiltration. |
Obfuscated Files or Information:Steganography | RegDuke can hide data in images, including use of the Least Significant Bit (LSB). |
Obfuscated Files or Information:Steganography | It has hidden encoded data for malware DLLs in a PNG. |
Obfuscated Files or Information:Steganography | It has used JPG files with encrypted payloads to mask their backdoor routines and evade detection. |
Obfuscated Files or Information:Compile After Delivery | Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code. |
Obfuscated Files or Information:Compile After Delivery | DarkWatchman has used the csc.exe tool to compile a C# executable. |
Obfuscated Files or Information:Compile After Delivery | FoggyWeb can compile and execute source code sent to the compromised AD FS server via a specific HTTP POST. |
Obfuscated Files or Information:Compile After Delivery | It has compiled the source code for a downloader directly on the infected system using the built-in Microsoft.CSharp.CSharpCodeProvider class. |
Obfuscated Files or Information:Compile After Delivery | It has used the .NET csc.exe tool to compile executables from downloaded C# code. |
Obfuscated Files or Information:Compile After Delivery | njRAT has used AutoIt to compile the payload and main script into a single executable after delivery. |
Obfuscated Files or Information:Compile After Delivery | It has compiled malware, delivered to victims as .c files, with the GNU Compiler Collection (GCC). |
Obfuscated Files or Information:Indicator Removal from Tools | It has been known to remove indicators of compromise from tools. |
Obfuscated Files or Information:Indicator Removal from Tools | Cobalt Strike includes a capability to modify the Beacon payload to eliminate known signatures or unpacking methods. |
Obfuscated Files or Information:Indicator Removal from Tools | Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection. |
Obfuscated Files or Information:Indicator Removal from Tools | It has updated and modified its malware, resulting in different hash values that evade detection. |
Obfuscated Files or Information:Indicator Removal from Tools | It ensured each payload had a unique hash, including by using different types of packers. |
Obfuscated Files or Information:Indicator Removal from Tools | The author of GravityRAT submitted samples to VirusTotal for testing, showing that the author modified the code to try to hide the DDE object in a different part of the document. |
Obfuscated Files or Information:Indicator Removal from Tools | InvisiMole has undergone regular technical improvements in an attempt to evade detection. |
Obfuscated Files or Information:Indicator Removal from Tools | It has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion. |
Obfuscated Files or Information:Indicator Removal from Tools | During Operation Wocao, threat actors edited variable names within the Impacket suite to avoid automated detection. |
Obfuscated Files or Information:Indicator Removal from Tools | It apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes. |
Obfuscated Files or Information:Indicator Removal from Tools | Penquin can remove strings from binaries. |
Obfuscated Files or Information:Indicator Removal from Tools | PowerSploit's Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures. |
Obfuscated Files or Information:Indicator Removal from Tools | QakBot can make small changes to itself in order to change its checksum and hash value. |
Obfuscated Files or Information:Indicator Removal from Tools | SUNBURST source code used generic variable names and pre-obfuscated strings, and was likely sanitized of developer comments before being added to SUNSPOT. |
Obfuscated Files or Information:Indicator Removal from Tools | It has modified files based on the open-source project cryptcat in an apparent attempt to decrease AV detection rates. |
Obfuscated Files or Information:Indicator Removal from Tools | Based on comparison of Gazer versions, It made an effort to obfuscate strings in the malware that could be used as IoCs, including the mutex name and named pipe. |
Obfuscated Files or Information:Indicator Removal from Tools | Waterbear can scramble functions not to be executed again with random values. |
Obfuscated Files or Information:HTML Smuggling | It has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.