prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Modify Registry
|
TrickBot can modify registry entries.
|
Modify Registry
|
It has modify Registry values to store payloads.
|
Modify Registry
|
TYPEFRAME can install encrypted configuration data under the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellCompatibility\Applications\laxhost.dll and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrintConfigs.
|
Modify Registry
|
Uroburos can store configuration information in the Registry including the initialization vector and AES key needed to find and decrypt other Uroburos components.
|
Modify Registry
|
Ursnif has used Registry modifications as part of its installation routine.
|
Modify Registry
|
Valak has the ability to modify the Registry key HKCU\Software\ApplicationContainer\Appsw64 to store information regarding the C2 server and downloads.
|
Modify Registry
|
Volgmer modifies the Registry to store an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security.
|
Modify Registry
|
WarzoneRAT can create HKCU\Software\Classes\Folder\shell\open\command as a new registry key during privilege escalation.
|
Modify Registry
|
WastedLocker can modify registry values within the Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry key.
|
Modify Registry
|
Waterbear has deleted certain values from the Registry to load a malicious DLL.
|
Modify Registry
|
It has modified the Registry key HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest by setting the UseLogonCredential registry value to 1 in order to force credentials to be stored in clear text in memory. It has also modified the WDigest registry key to allow plaintext credentials to be cached in memory.
|
Modify Registry
|
Zeus Panda modifies several Registry keys under HKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\ to disable phishing filters.
|
Modify Registry
|
zwShell can modify the Registry.
|
Modify Registry
|
ZxShell can create Registry entries to enable services to run.
|
Modify System Image:Patch System Image
|
SYNful Knock is malware that is inserted into a network device by patching the operating system image.
|
Obfuscated Files or Information
|
During the 2016 Ukraine Electric Power Attack, It used heavily obfuscated code with Industroyer in its Windows Notepad backdoor.
|
Obfuscated Files or Information
|
Action RAT's commands, strings, and domains can be Base64 encoded within the payload.
|
Obfuscated Files or Information
|
Most of the strings in ADVSTORESHELL are encrypted with an XOR-based algorithm; some strings are also encrypted with 3DES and reversed. API function names are also reversed, presumably to avoid detection in memory.
|
Obfuscated Files or Information
|
Agent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult. Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings.
|
Obfuscated Files or Information
|
Amadey has obfuscated strings such as antivirus vendor names, domains, files, and others.
|
Obfuscated Files or Information
|
Anchor has obfuscated code with stack strings and string encryption.
|
Obfuscated Files or Information
|
AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components.
|
Obfuscated Files or Information
|
AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls.
|
Obfuscated Files or Information
|
It has used ConfuserEx to obfuscate its variant of Imminent Monitor, compressed payload and RAT packages, and password protected encrypted email attachments to avoid detection.
|
Obfuscated Files or Information
|
It obfuscates strings in the payload.
|
Obfuscated Files or Information
|
It used Base64 to obfuscate payloads.
|
Obfuscated Files or Information
|
It encrypted a .dll payload using RTL and a custom encryption algorithm. It has also obfuscated payloads with base64, XOR, and RC4.
|
Obfuscated Files or Information
|
It obfuscates files or information to help evade defensive measures.
|
Obfuscated Files or Information
|
It has performed code obfuscation, including encoding payloads using Base64 and using a framework called "Dont-Kill-My-Cat (DKMC). It also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor.
|
Obfuscated Files or Information
|
It has used base64 to encode payloads.
|
Obfuscated Files or Information
|
It obfuscates strings and payloads.
|
Obfuscated Files or Information
|
It has used malware to drop encrypted CAB files.
|
Obfuscated Files or Information
|
It used VMProtected binaries in multiple intrusions.
|
Obfuscated Files or Information
|
Aria-body has used an encrypted configuration file for its loader.
|
Obfuscated Files or Information
|
Astaroth has used an XOR-based algorithm to encrypt payloads twice with different keys.
|
Obfuscated Files or Information
|
Strings in Attor's components are encrypted with a XOR cipher, using a hardcoded key and the configuration data, log files and plugins are encrypted using a hybrid encryption scheme of Blowfish-OFB combined with RSA.
|
Obfuscated Files or Information
|
AuditCred encrypts the configuration.
|
Obfuscated Files or Information
|
Avaddon has used encrypted strings.
|
Obfuscated Files or Information
|
Avenger has the ability to XOR encrypt files to be sent to C2.
|
Obfuscated Files or Information
|
AvosLocker has used XOR-encoded strings.
|
Obfuscated Files or Information
|
It has obfuscated tools and malware it uses with VMProtect.
|
Obfuscated Files or Information
|
BADHATCH can be compressed with the ApLib algorithm.
|
Obfuscated Files or Information
|
Bazar has used XOR, RSA2, and RC4 encrypted files.
|
Obfuscated Files or Information
|
BendyBear has encrypted payloads using RC4 and XOR.
|
Obfuscated Files or Information
|
Bisonal's DLL file and non-malicious decoy file are encrypted with RC4 and some function name strings are obfuscated.
|
Obfuscated Files or Information
|
BitPaymer has used RC4-encrypted strings and string hashes to avoid identifiable strings within the binary.
|
Obfuscated Files or Information
|
It has used a RAR SFX dropper to deliver malware.
|
Obfuscated Files or Information
|
It's first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools.
|
Obfuscated Files or Information
|
BLINDINGCAN has obfuscated code using Base64 encoding.
|
Obfuscated Files or Information
|
It has obfuscated the wallet address in the payload binary.
|
Obfuscated Files or Information
|
BLUELIGHT has a XOR-encoded payload.
|
Obfuscated Files or Information
|
BoomBox can encrypt data using AES prior to exfiltration.
|
Obfuscated Files or Information
|
BOOSTWRITE has encoded its payloads using a ChaCha stream cipher with a 256-bit key and 64-bit Initialization vector (IV) to evade detection.
|
Obfuscated Files or Information
|
BoxCaon used the "StackStrings" obfuscation technique to hide malicious functionalities.
|
Obfuscated Files or Information
|
Brute Ratel C4 has used encrypted payload files and maintains an encrypted configuration structure in memory.
|
Obfuscated Files or Information
|
Bumblebee has been delivered as password-protected zipped ISO files and used control-flow-flattening to obfuscate the flow of functions.
|
Obfuscated Files or Information
|
Bundlore has obfuscated data with base64, AES, RC4, and bz2.
|
Obfuscated Files or Information
|
During C0015, the threat actors used Base64-encoded strings.
|
Obfuscated Files or Information
|
During C0017, It broke malicious binaries, including DEADEYE and KEYPLUG, into multiple sections on disk to evade detection.
|
Obfuscated Files or Information
|
It encrypts strings to make analysis more difficult.
|
Obfuscated Files or Information
|
Carberp has used XOR-based encryption to mask C2 server locations within the trojan.
|
Obfuscated Files or Information
|
Carbon encrypts configuration files and tasks for the malware to complete using CAST-128 algorithm.
|
Obfuscated Files or Information
|
Cardinal RAT encodes many of its artifacts and is encrypted (AES-128) when downloaded.
|
Obfuscated Files or Information
|
CARROTBALL has used a custom base64 alphabet to decode files.
|
Obfuscated Files or Information
|
CARROTBAT has the ability to download a base64 encoded payload.
|
Obfuscated Files or Information
|
Chinoxy has encrypted its configuration file.
|
Obfuscated Files or Information
|
Chrommme can encrypt sections of its code to evade detection.
|
Obfuscated Files or Information
|
The Clambling executable has been obfuscated when dropped on a compromised host.
|
Obfuscated Files or Information
|
Cobalt Strike can hash functions to obfuscate calls to the Windows API and use a public/private key pair to encrypt Beacon session metadata.
|
Obfuscated Files or Information
|
CoinTicker initially downloads a hidden encoded file.
|
Obfuscated Files or Information
|
Comnie uses RC4 and Base64 to obfuscate strings.
|
Obfuscated Files or Information
|
ComRAT has encrypted its virtual file system using AES-256 in XTS mode.
|
Obfuscated Files or Information
|
Conficker has obfuscated its code to prevent its removal from host machines.
|
Obfuscated Files or Information
|
Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls.
|
Obfuscated Files or Information
|
CORESHELL obfuscates strings using a custom stream cipher.
|
Obfuscated Files or Information
|
The payload of CozyCar is encrypted with simple XOR with a rotating key. The CozyCar configuration file has been encrypted with RC4 keys.
|
Obfuscated Files or Information
|
Cuba has used multiple layers of obfuscation to avoid analysis, including its Base64 encoded payload.
|
Obfuscated Files or Information
|
Dacls can encrypt its configuration file with AES CBC.
|
Obfuscated Files or Information
|
DanBot can Base64 encode its payload.
|
Obfuscated Files or Information
|
It has obfuscated strings in Bandook by base64 encoding, and then encrypting them.
|
Obfuscated Files or Information
|
It has obfuscated code using RC4, XOR, and RSA.
|
Obfuscated Files or Information
|
DarkTortilla has been obfuscated with the DeepSea .NET and ConfuserEx code obfuscators.
|
Obfuscated Files or Information
|
DarkWatchman has been delivered as compressed RAR payloads in ZIP files to victims.
|
Obfuscated Files or Information
|
Daserf uses encrypted Windows APIs and also encrypts data using the alternative base64+RC4 or the Caesar cipher.
|
Obfuscated Files or Information
|
DCSrv's configuration is encrypted.
|
Obfuscated Files or Information
|
DEADEYE has encrypted its payload.
|
Obfuscated Files or Information
|
Denis obfuscates its code and encrypts the API names.
|
Obfuscated Files or Information
|
Diavol has Base64 encoded the RSA public key used for encrypting files.
|
Obfuscated Files or Information
|
DOGCALL is encrypted using single-byte XOR.
|
Obfuscated Files or Information
|
Donut can generate encrypted, compressed/encoded, or otherwise obfuscated code modules.
|
Obfuscated Files or Information
|
DRATzarus can be partly encrypted with XOR.
|
Obfuscated Files or Information
|
Dridex's strings are obfuscated using RC4.
|
Obfuscated Files or Information
|
Drovorub has used XOR encrypted payloads in WebSocket client to server messages.
|
Obfuscated Files or Information
|
The DustySky dropper uses a function to obfuscate the name of functions and other parts of the malware.
|
Obfuscated Files or Information
|
It used Base64 to encode strings.
|
Obfuscated Files or Information
|
Ebury has obfuscated its strings with a simple XOR encryption with a static key.
|
Obfuscated Files or Information
|
ECCENTRICBANDWAGON has encrypted strings with RC4.
|
Obfuscated Files or Information
|
Ecipekac can use XOR, AES, and DES to encrypt loader shellcode.
|
Obfuscated Files or Information
|
EKANS uses encoded strings in its process kill list.
|
Obfuscated Files or Information
|
It has encrypted documents and malicious executables.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.