text1
stringlengths
7
2.5k
labels
stringlengths
9
100
AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components.
['T1027']
AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls.
['T1027']
Aria-body has used an encrypted configuration file for its loader.
['T1027']
Astaroth obfuscates its JScript code, and has used an XOR-based algorithm to encrypt payloads twice with different keys.
['T1027']
AuditCred encrypts the configuration.
['T1027']
Avaddon has used encrypted strings.
['T1027']
Avenger has the ability to XOR encrypt files to be sent to C2.
['T1027']
BLINDINGCAN has obfuscated code using Base64 encoding.
['T1027']
BLUELIGHT has a XOR-encoded payload.
['T1027']
BOOSTWRITE has encoded its payloads using a ChaCha stream cipher with a 256-bit key and 64-bit Initialization vector (IV) to evade detection.
['T1027']
BackdoorDiplomacy has obfuscated tools and malware it uses with VMProtect.
['T1027']
Bazar has used XOR, RSA2, and RC4 encrypted files.
['T1027']
BendyBear has encrypted payloads using RC4 and XOR.
['T1027']
BitPaymer has used RC4-encrypted strings and string hashes to avoid identifiable strings within the binary.
['T1027']
BlackOasis's first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools.
['T1027']
Blue Mockingbird has obfuscated the wallet address in the payload binary.
['T1027']
BoomBox can encrypt data using AES prior to exfiltration.
['T1027']
Bumblebee has been delivered as password-protected zipped ISO files and used control-flow-flattening to obfuscate the flow of functions.
['T1027']
CARROTBAT has the ability to download a base64 encoded payload and execute obfuscated commands on the infected host.
['T1027']
Carbanak encrypts strings to make analysis more difficult.
['T1027']
Carberp has used XOR-based encryption to mask C2 server locations within the trojan.
['T1027']
Chimera has encoded PowerShell commands.
['T1027']
Chinoxy has encrypted its configuration file.
['T1027']
Cobalt Group obfuscated several scriptlets and code used on the victim’s machine, including through use of XOR and RC4.
['T1027']
Cobalt Strike can hash functions to obfuscate calls to the Windows API and use a public/private key pair to encrypt Beacon session metadata.
['T1027']
CoinTicker initially downloads a hidden encoded file.
['T1027']
ComRAT has used encryption and base64 to obfuscate its orchestrator code in the Registry. ComRAT has encrypted its virtual file system using AES-256 in XTS mode and has encoded PowerShell scripts.
['T1027']
Comnie uses RC4 and Base64 to obfuscate strings.
['T1027']
Conficker has obfuscated its code to prevent its removal from host machines.
['T1027']
Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls.
['T1027']
CookieMiner has used base64 encoding to obfuscate scripts on the system.
['T1027']
Cuba has used multiple layers of obfuscation to avoid analysis, including its Base64 encoded payload.
['T1027']
DCSrv's configuration is encrypted.
['T1027']
DRATzarus can be partly encrypted with XOR.
['T1027']
Dacls can encrypt its configuration file with AES CBC.
['T1027']
DanBot can Base64 encode its payload.
['T1027']
Dark Caracal has obfuscated strings in Bandook by base64 encoding, and then encrypting them.
['T1027']
DarkWatchman has used Base64 to encode PowerShell commands. DarkWatchman has been delivered as compressed RAR payloads in ZIP files to victims.
['T1027']
Denis obfuscates its code and encrypts the API names. Denis also encodes its payload in Base64.
['T1027']
Diavol has Base64 encoded the RSA public key used for encrypting files.
['T1027']
Donut can generate encrypted, compressed/encoded, or otherwise obfuscated code modules.
['T1027']
Dridex's strings are obfuscated using RC4.
['T1027']
Droppers used by Putter Panda use RC4 or a 16-byte XOR key consisting of the bytes 0xA0 – 0xAF to obfuscate payloads.
['T1027']
Drovorub has used XOR encrypted payloads in WebSocket client to server messages.
['T1027']
Dtrack has used a dropper that embeds an encrypted payload as extra data.
['T1027', 'T1027.009']
During C0015, the threat actors used Base64-encoded strings.
['T1027']
During Frankenstein, the threat actors ran encoded commands from the command line.
['T1027']
During Night Dragon, threat actors used a DLL that included an XOR-encoded section.
['T1027']
During Operation CuckooBees, the threat actors executed an encoded VBScript file.
['T1027']
During Operation Dust Storm, the threat actors encoded some payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key; other payloads were Base64-encoded.
['T1027']
During Operation Honeybee, the threat actors used Base64 to encode files with a custom key.
['T1027']
EKANS uses encoded strings in its process kill list.
['T1027']
Earth Lusca used Base64 to encode strings.
['T1027']
Ebury has obfuscated its strings with a simple XOR encryption with a static key.
['T1027']
Elderwood has encrypted documents and malicious executables.
['T1027']
Elise encrypts several of its files, including configuration files.
['T1027']
Ember Bear has obfuscated malware and malicious scripts to help avoid detection.
['T1027']
Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts.
['T1027']
EnvyScout can Base64 encode payloads.
['T1027']
Exaramel for Linux uses RC4 for encrypting the configuration.
['T1027']
Exaramel uses RC4 for encrypting the configuration.
['T1027']
FELIXROOT encrypts strings in the backdoor using a custom XOR algorithm.
['T1027']
FIN6 has used encoded PowerShell commands.
['T1027']
FIN7 has used fragmented strings, environment variables, standard input (stdin), and native character-replacement functionalities to obfuscate commands.
['T1027']
FIN8 has used environment variables and standard input (stdin) to obfuscate command-line arguments. FIN8 also obfuscates malicious macros delivered as payloads.
['T1027']
FatDuke can use base64 encoding, string stacking, and opaque predicates for obfuscation.
['T1027']
Flagpro has been delivered within ZIP or RAR password-protected archived files.
['T1027']
FlawedGrace encrypts its C2 configuration files with AES in CBC mode.
['T1027']
FoggyWeb has been XOR-encoded.
['T1027']
For Operation Spalax, the threat actors used XOR-encrypted payloads.
['T1027']
Frankenstein has run encoded commands from the command line.
['T1027']
FruitFly executes and stores obfuscated Perl scripts.
['T1027']
GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.
['T1027']
GOLD SOUTHFIELD has executed base64 encoded PowerShell scripts on compromised hosts.
['T1027']
Gallmaker obfuscated shellcode used during execution.
['T1027']
Gamaredon Group has delivered self-extracting 7z archive files within malicious document attachments, and used obfuscated or encrypted scripts.
['T1027']
Gazer logs its actions into files that are encrypted with 3DES. It also uses RSA to encrypt resources.
['T1027']
Gelsemium has the ability to compress its components.
['T1027']
GoldMax has written AES-encrypted and Base64-encoded configuration files to disk.
['T1027']
GoldenSpy's uninstaller has base64-encoded its variables.
['T1027']
Goopy's decrypter have been inflated with junk code in between legitimate API functions, and also included infinite loops to avoid analysis.
['T1027']
GravityRAT supports file encryption (AES with the key "lolomycin2017").
['T1027']
Green Lambert has encrypted strings.
['T1027']
GreyEnergy encrypts its configuration files with AES-256 and also encrypts its strings.
['T1027']
GrimAgent has used Rotate on Right (RoR) and Rotate on Left (RoL) functionality to encrypt strings.
['T1027']
Group5 disguised its malicious binaries with several layers of obfuscation, including encrypting the files.
['T1027']
H1N1 uses multiple techniques to obfuscate strings, including XOR.
['T1027']
HAWKBALL has encrypted the payload with an XOR-based algorithm.
['T1027']
HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming.
['T1027']
HermeticWiper can compress 32-bit and 64-bit driver files with the Lempel-Ziv algorithm.
['T1027']
HermeticWizard has the ability to encrypt PE files with a reverse XOR loop.
['T1027']
Hi-Zor uses various XOR techniques to obfuscate its components.
['T1027']
HiddenWasp encrypts its configuration and payload.
['T1027']
Higaisa used Base64 encoded compressed payloads.
['T1027']
Hildegard has encrypted an ELF file.
['T1027']
HotCroissant has encrypted strings with single-byte XOR and base64 encoded RC4.
['T1027']
ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.
['T1027']
IceApple can use Base64 and "junk" JavaScript code to obfuscate information.
['T1027']
If the victim is using PowerShell 3.0 or later, POWERSOURCE writes its decoded payload to an Alternate Data Stream (ADS) named kernel32.dll that is saved in "%PROGRAMDATA%\Windows\".
['T1027']
Imminent Monitor has encrypted the spearphish attachments to avoid detection from email gateways; the debugger also encrypts information before sending to the C2.
['T1027']