prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Obfuscated Files or Information:Software Packing
|
jRAT payloads have been packed.
|
Obfuscated Files or Information:Software Packing
|
It has packed malware with UPX.
|
Obfuscated Files or Information:Software Packing
|
KONNI has been packed for obfuscation.
|
Obfuscated Files or Information:Software Packing
|
LiteDuke has been packed with multiple layers of encryption.
|
Obfuscated Files or Information:Software Packing
|
Lokibot has used several packing methods for obfuscation.
|
Obfuscated Files or Information:Software Packing
|
Lucifer has used UPX packed binaries.
|
Obfuscated Files or Information:Software Packing
|
It has been packed with NSIS.
|
Obfuscated Files or Information:Software Packing
|
Melcoz has been packed with VMProtect and Themida.
|
Obfuscated Files or Information:Software Packing
|
Metamorfo has used VMProtect to pack and protect files.
|
Obfuscated Files or Information:Software Packing
|
Misdat was typically packed using UPX.
|
Obfuscated Files or Information:Software Packing
|
Mongall has been packed with Themida.
|
Obfuscated Files or Information:Software Packing
|
It has used malware plugins packed with Themida.
|
Obfuscated Files or Information:Software Packing
|
NETWIRE has used .NET packer tools to evade detection.
|
Obfuscated Files or Information:Software Packing
|
During Night Dragon, threat actors used software packing in its tools.
|
Obfuscated Files or Information:Software Packing
|
OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.
|
Obfuscated Files or Information:Software Packing
|
During Operation Dream Job, It packed malicious .db files with Themida to evade detection.
|
Obfuscated Files or Information:Software Packing
|
For Operation Dust Storm, the threat actors used UPX to pack some payloads.
|
Obfuscated Files or Information:Software Packing
|
For Operation Spalax, the threat actors used a variety of packers, including CyaX, to obfuscate malicious executables.
|
Obfuscated Files or Information:Software Packing
|
OSX_OCEANLOTUS.D has a variant that is packed with UPX.
|
Obfuscated Files or Information:Software Packing
|
A It payload was packed with UPX.
|
Obfuscated Files or Information:Software Packing
|
QakBot can encrypt and pack malicious payloads.
|
Obfuscated Files or Information:Software Packing
|
Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm.
|
Obfuscated Files or Information:Software Packing
|
It's miner has created UPX-packed files in the Windows Start Menu Folder.
|
Obfuscated Files or Information:Software Packing
|
Some S-Type samples have been packed with UPX.
|
Obfuscated Files or Information:Software Packing
|
Saint Bot has been packed using a dark market crypter.
|
Obfuscated Files or Information:Software Packing
|
SDBbot has used a packed installer file.
|
Obfuscated Files or Information:Software Packing
|
SeaDuke has been packed with the UPX packer.
|
Obfuscated Files or Information:Software Packing
|
ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack.
|
Obfuscated Files or Information:Software Packing
|
Spark has been packed with Enigma Protector to obfuscate its contents.
|
Obfuscated Files or Information:Software Packing
|
Squirrelwaffle has been packed with a custom packer to hide payloads.
|
Obfuscated Files or Information:Software Packing
|
SysUpdate has been packed with VMProtect.
|
Obfuscated Files or Information:Software Packing
|
It has used a .NET packer to obfuscate malicious files.
|
Obfuscated Files or Information:Software Packing
|
It has used UPX to obscure malicious code.
|
Obfuscated Files or Information:Software Packing
|
It has used UPX and Ezuri packer to pack its binaries.
|
Obfuscated Files or Information:Software Packing
|
It has obfuscated their payloads through packing.
|
Obfuscated Files or Information:Software Packing
|
It has packed malware and tools, including using VMProtect.
|
Obfuscated Files or Information:Software Packing
|
Tomiris has been packed with UPX.
|
Obfuscated Files or Information:Software Packing
|
Torisma has been packed with Iz4 compression.
|
Obfuscated Files or Information:Software Packing
|
TrickBot leverages a custom packer to obfuscate its functionality.
|
Obfuscated Files or Information:Software Packing
|
Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer.
|
Obfuscated Files or Information:Software Packing
|
Uroburos uses a custom packer.
|
Obfuscated Files or Information:Software Packing
|
Valak has used packed DLL payloads.
|
Obfuscated Files or Information:Software Packing
|
VERMIN is initially packed.
|
Obfuscated Files or Information:Software Packing
|
yty packs a plugin with UPX.
|
Obfuscated Files or Information:Software Packing
|
Zebrocy's Delphi variant was packed with UPX.
|
Obfuscated Files or Information:Software Packing
|
Some ZeroT DLL files have been packed with UPX.
|
Obfuscated Files or Information:Software Packing
|
ItM has used multi-stage packers for exploit code.
|
Obfuscated Files or Information:Steganography
|
ABK can extract a malicious Portable Executable (PE) from a photo.
|
Obfuscated Files or Information:Steganography
|
It has hidden malicious executables within PNG files.
|
Obfuscated Files or Information:Steganography
|
It uses steganography to send images to users that are embedded with shellcode.
|
Obfuscated Files or Information:Steganography
|
Avenger can extract backdoor malware from downloaded images.
|
Obfuscated Files or Information:Steganography
|
Bandook has used .PNG images within a zip file to build the executable.
|
Obfuscated Files or Information:Steganography
|
BBK can extract a malicious Portable Executable (PE) from a photo.
|
Obfuscated Files or Information:Steganography
|
It has used steganography in multiple operations to conceal malicious payloads.
|
Obfuscated Files or Information:Steganography
|
build_downer can extract malware from a downloaded JPEG.
|
Obfuscated Files or Information:Steganography
|
Diavol has obfuscated its main code routines within bitmap images as part of its anti-analysis techniques.
|
Obfuscated Files or Information:Steganography
|
It has used steganography to hide shellcode in a BMP image file.
|
Obfuscated Files or Information:Steganography
|
IcedID has embedded binaries within RC4 encrypted .png files.
|
Obfuscated Files or Information:Steganography
|
Invoke-PSImage can be used to embed a PowerShell script within the pixels of a PNG file.
|
Obfuscated Files or Information:Steganography
|
It has used steganography to hide stolen data inside other files stored on Github.
|
Obfuscated Files or Information:Steganography
|
LiteDuke has used image files to hide its loader component.
|
Obfuscated Files or Information:Steganography
|
It has stored obfuscated JavaScript code in an image file named temp.jpg.
|
Obfuscated Files or Information:Steganography
|
ObliqueRAT can hide its payload in BMP images hosted on compromised websites.
|
Obfuscated Files or Information:Steganography
|
Okrum's payload is encrypted and embedded within its loader, or within a legitimate PNG file.
|
Obfuscated Files or Information:Steganography
|
During Operation Ghost, It used steganography to hide payloads inside valid images.
|
Obfuscated Files or Information:Steganography
|
For Operation Spalax, the threat actors used packers that read pixel data from images contained in PE files' resource sections and build the next layer of execution from the data.
|
Obfuscated Files or Information:Steganography
|
PolyglotDuke can use steganography to hide C2 information in images.
|
Obfuscated Files or Information:Steganography
|
PowerDuke uses steganography to hide backdoors in PNG files, which are also encrypted using the Tiny Encryption Algorithm (TEA).
|
Obfuscated Files or Information:Steganography
|
ProLock can use .jpg and .bmp files to store its payload.
|
Obfuscated Files or Information:Steganography
|
Raindrop used steganography to locate the start of its encoded payload within legitimate 7-Zip code.
|
Obfuscated Files or Information:Steganography
|
Ramsay has PE data embedded within JPEG files contained within Word documents.
|
Obfuscated Files or Information:Steganography
|
RDAT can also embed data within a BMP image prior to exfiltration.
|
Obfuscated Files or Information:Steganography
|
RegDuke can hide data in images, including use of the Least Significant Bit (LSB).
|
Obfuscated Files or Information:Steganography
|
It has hidden encoded data for malware DLLs in a PNG.
|
Obfuscated Files or Information:Steganography
|
It has used JPG files with encrypted payloads to mask their backdoor routines and evade detection.
|
Obfuscated Files or Information:Compile After Delivery
|
Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.
|
Obfuscated Files or Information:Compile After Delivery
|
DarkWatchman has used the csc.exe tool to compile a C# executable.
|
Obfuscated Files or Information:Compile After Delivery
|
FoggyWeb can compile and execute source code sent to the compromised AD FS server via a specific HTTP POST.
|
Obfuscated Files or Information:Compile After Delivery
|
It has compiled the source code for a downloader directly on the infected system using the built-in Microsoft.CSharp.CSharpCodeProvider class.
|
Obfuscated Files or Information:Compile After Delivery
|
It has used the .NET csc.exe tool to compile executables from downloaded C# code.
|
Obfuscated Files or Information:Compile After Delivery
|
njRAT has used AutoIt to compile the payload and main script into a single executable after delivery.
|
Obfuscated Files or Information:Compile After Delivery
|
It has compiled malware, delivered to victims as .c files, with the GNU Compiler Collection (GCC).
|
Obfuscated Files or Information:Indicator Removal from Tools
|
It has been known to remove indicators of compromise from tools.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
Cobalt Strike includes a capability to modify the Beacon payload to eliminate known signatures or unpacking methods.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
It has updated and modified its malware, resulting in different hash values that evade detection.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
It ensured each payload had a unique hash, including by using different types of packers.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
The author of GravityRAT submitted samples to VirusTotal for testing, showing that the author modified the code to try to hide the DDE object in a different part of the document.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
InvisiMole has undergone regular technical improvements in an attempt to evade detection.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
It has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
During Operation Wocao, threat actors edited variable names within the Impacket suite to avoid automated detection.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
It apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
Penquin can remove strings from binaries.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
PowerSploit's Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
QakBot can make small changes to itself in order to change its checksum and hash value.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
SUNBURST source code used generic variable names and pre-obfuscated strings, and was likely sanitized of developer comments before being added to SUNSPOT.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
It has modified files based on the open-source project cryptcat in an apparent attempt to decrease AV detection rates.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
Based on comparison of Gazer versions, It made an effort to obfuscate strings in the malware that could be used as IoCs, including the mutex name and named pipe.
|
Obfuscated Files or Information:Indicator Removal from Tools
|
Waterbear can scramble functions not to be executed again with random values.
|
Obfuscated Files or Information:HTML Smuggling
|
It has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.