prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Fallback Channels
|
Uroburos can use up to 10 channels to communicate between implants.
|
Fallback Channels
|
Valak can communicate over multiple C2 hosts.
|
Fallback Channels
|
WinMM is usually configured with primary and backup domains for C2 communications.
|
Fallback Channels
|
The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.
|
Ingress Tool Transfer
|
During the 2015 Ukraine Electric Power Attack, It pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.
|
Ingress Tool Transfer
|
ABK has the ability to download files from C2.
|
Ingress Tool Transfer
|
Action RAT has the ability to download additional payloads onto an infected machine.
|
Ingress Tool Transfer
|
Agent Tesla can download additional files for execution on the victim’s machine.
|
Ingress Tool Transfer
|
Agent.btz attempts to download an encrypted binary from a specified domain.
|
Ingress Tool Transfer
|
It has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system.
|
Ingress Tool Transfer
|
Amadey can download and execute files to further infect a host machine with additional malware.
|
Ingress Tool Transfer
|
Anchor can download additional payloads.
|
Ingress Tool Transfer
|
It has downloaded additional tools and malware onto compromised hosts.
|
Ingress Tool Transfer
|
ANDROMEDA can download additional payloads from C2.
|
Ingress Tool Transfer
|
It has downloaded binary data from a specified domain after the malicious document is opened.
|
Ingress Tool Transfer
|
It can upload a file to the victim’s machine.
|
Ingress Tool Transfer
|
It has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.
|
Ingress Tool Transfer
|
It has downloaded additional tools and malware onto compromised networks.
|
Ingress Tool Transfer
|
It has a tool that can copy files to remote machines.
|
Ingress Tool Transfer
|
It has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors.
|
Ingress Tool Transfer
|
It has downloaded additional files and programs from its C2 server.
|
Ingress Tool Transfer
|
It has downloaded second stage malware from compromised websites.
|
Ingress Tool Transfer
|
It used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine.
|
Ingress Tool Transfer
|
It has downloaded tools to compromised hosts.
|
Ingress Tool Transfer
|
It used certutil to download additional files.
|
Ingress Tool Transfer
|
It has downloaded additional malware onto compromised hosts.
|
Ingress Tool Transfer
|
Aria-body has the ability to download additional payloads from C2.
|
Ingress Tool Transfer
|
Astaroth uses certutil and BITSAdmin to download additional malware.
|
Ingress Tool Transfer
|
AsyncRAT has the ability to download files over SFTP.
|
Ingress Tool Transfer
|
Attor can download additional plugins, updates and other files.
|
Ingress Tool Transfer
|
AuditCred can download files and additional malware.
|
Ingress Tool Transfer
|
Avenger has the ability to download files from C2 to a compromised host.
|
Ingress Tool Transfer
|
Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes.
|
Ingress Tool Transfer
|
BabyShark has downloaded additional files from the C2.
|
Ingress Tool Transfer
|
BackConfig can download and execute additional payloads on a compromised host.
|
Ingress Tool Transfer
|
Backdoor.Oldrea can download additional modules from C2.
|
Ingress Tool Transfer
|
It has downloaded additional files and tools onto a compromised host.
|
Ingress Tool Transfer
|
BADFLICK has download files from its C2 server.
|
Ingress Tool Transfer
|
BADHATCH has the ability to load a second stage malicious DLL file onto a compromised machine.
|
Ingress Tool Transfer
|
BADNEWS is capable of downloading additional files through C2 channels, including a new version of itself.
|
Ingress Tool Transfer
|
BadPatch can download and execute or update malware.
|
Ingress Tool Transfer
|
Bandook can download files to the system.
|
Ingress Tool Transfer
|
Bankshot uploads files and secondary payloads to the victim's machine.
|
Ingress Tool Transfer
|
Bazar can download and deploy additional payloads, including ransomware and post-exploitation frameworks such as Cobalt Strike.
|
Ingress Tool Transfer
|
BBK has the ability to download files from C2 to the infected host.
|
Ingress Tool Transfer
|
BendyBear is designed to download an implant from a C2 server.
|
Ingress Tool Transfer
|
BISCUIT has a command to download a file from the C2 server.
|
Ingress Tool Transfer
|
Bisonal has the capability to download files to execute on the victim’s machine.
|
Ingress Tool Transfer
|
BITSAdmin can be used to create BITS Jobs to upload and/or download files.
|
Ingress Tool Transfer
|
It has downloaded additional malware and tools onto a compromised host.
|
Ingress Tool Transfer
|
BlackMould has the ability to download files to the victim's machine.
|
Ingress Tool Transfer
|
BLINDINGCAN has downloaded files to a victim machine.
|
Ingress Tool Transfer
|
BLUELIGHT can download additional files onto the host.
|
Ingress Tool Transfer
|
Bonadan can download additional modules from the C2 server.
|
Ingress Tool Transfer
|
BONDUPDATER can download or upload files from its C2 server.
|
Ingress Tool Transfer
|
BoomBox has the ability to download next stage malware components to a compromised system.
|
Ingress Tool Transfer
|
BoxCaon can download files.
|
Ingress Tool Transfer
|
Briba downloads files onto infected hosts.
|
Ingress Tool Transfer
|
It has used various tools to download files, including DGet (a similar tool to wget).
|
Ingress Tool Transfer
|
Brute Ratel C4 can download files to compromised hosts.
|
Ingress Tool Transfer
|
build_downer has the ability to download files from C2 to the infected host.
|
Ingress Tool Transfer
|
Bumblebee can download and execute additional payloads including through the use of a Dex command.
|
Ingress Tool Transfer
|
Bundlore can download and execute new versions of itself.
|
Ingress Tool Transfer
|
During C0010, UNC3890 actors downloaded tools and malware onto a compromised host.
|
Ingress Tool Transfer
|
During C0015, the threat actors downloaded additional tools and files onto a compromised network.
|
Ingress Tool Transfer
|
During C0017, It downloaded malicious payloads onto compromised systems.
|
Ingress Tool Transfer
|
During C0018, the threat actors downloaded additional tools, such as Mimikatz and Sliver, as well as Cobalt Strike and AvosLocker ransomware onto the victim network.
|
Ingress Tool Transfer
|
During C0021, the threat actors downloaded additional tools and files onto victim machines.
|
Ingress Tool Transfer
|
During C0026, the threat actors downloaded malicious payloads onto select compromised hosts.
|
Ingress Tool Transfer
|
During C0027, It downloaded tools using victim organization systems.
|
Ingress Tool Transfer
|
Calisto has the capability to upload and download files to the victim's machine.
|
Ingress Tool Transfer
|
CallMe has the capability to download a file to the victim from the C2 server.
|
Ingress Tool Transfer
|
Cannon can download a payload for execution.
|
Ingress Tool Transfer
|
Carberp can download and execute new plugins from the C2 server.
|
Ingress Tool Transfer
|
Cardinal RAT can download and execute additional payloads.
|
Ingress Tool Transfer
|
CARROTBALL has the ability to download and install a remote payload.
|
Ingress Tool Transfer
|
CARROTBAT has the ability to download and execute a remote file via certutil.
|
Ingress Tool Transfer
|
Caterpillar WebShell has a module to download and upload files to the system.
|
Ingress Tool Transfer
|
certutil can be used to download files from a given URL.
|
Ingress Tool Transfer
|
Chaes can download additional files onto an infected machine.
|
Ingress Tool Transfer
|
CharmPower has the ability to download additional modules to a compromised host.
|
Ingress Tool Transfer
|
ChChes is capable of downloading files, including additional modules.
|
Ingress Tool Transfer
|
It has remotely copied tools and malware onto targeted systems.
|
Ingress Tool Transfer
|
China Chopper's server component can download remote files.
|
Ingress Tool Transfer
|
CHOPSTICK is capable of performing remote file transmission.
|
Ingress Tool Transfer
|
Chrommme can download its code from C2.
|
Ingress Tool Transfer
|
CloudDuke downloads and executes additional malware from either a Web address or a Microsoft OneDrive account.
|
Ingress Tool Transfer
|
cmd can be used to copy files to/from a remotely connected external system.
|
Ingress Tool Transfer
|
It has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers. The group's JavaScript backdoor is also capable of downloading files.
|
Ingress Tool Transfer
|
Cobalt Strike can deliver additional payloads to victim machines.
|
Ingress Tool Transfer
|
CoinTicker executes a Python script to download its second stage.
|
Ingress Tool Transfer
|
Conficker downloads an HTTP server to the infected machine.
|
Ingress Tool Transfer
|
It has downloaded additional files and payloads onto a compromised host following initial access.
|
Ingress Tool Transfer
|
CookieMiner can download additional scripts from a web server.
|
Ingress Tool Transfer
|
CORESHELL downloads another dropper from its C2 server.
|
Ingress Tool Transfer
|
CostaBricks has been used to load SombRAT onto a compromised host.
|
Ingress Tool Transfer
|
During CostaRicto, the threat actors downloaded malware and tools onto a compromised host.
|
Ingress Tool Transfer
|
CreepyDrive can download files to the compromised host.
|
Ingress Tool Transfer
|
Crimson contains a command to retrieve files from its C2 server.
|
Ingress Tool Transfer
|
Cryptoistic has the ability to send and receive files.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.