text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components. | ['T1027'] |
AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls. | ['T1027'] |
Aria-body has used an encrypted configuration file for its loader. | ['T1027'] |
Astaroth obfuscates its JScript code, and has used an XOR-based algorithm to encrypt payloads twice with different keys. | ['T1027'] |
AuditCred encrypts the configuration. | ['T1027'] |
Avaddon has used encrypted strings. | ['T1027'] |
Avenger has the ability to XOR encrypt files to be sent to C2. | ['T1027'] |
BLINDINGCAN has obfuscated code using Base64 encoding. | ['T1027'] |
BLUELIGHT has a XOR-encoded payload. | ['T1027'] |
BOOSTWRITE has encoded its payloads using a ChaCha stream cipher with a 256-bit key and 64-bit Initialization vector (IV) to evade detection. | ['T1027'] |
BackdoorDiplomacy has obfuscated tools and malware it uses with VMProtect. | ['T1027'] |
Bazar has used XOR, RSA2, and RC4 encrypted files. | ['T1027'] |
BendyBear has encrypted payloads using RC4 and XOR. | ['T1027'] |
BitPaymer has used RC4-encrypted strings and string hashes to avoid identifiable strings within the binary. | ['T1027'] |
BlackOasis's first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools. | ['T1027'] |
Blue Mockingbird has obfuscated the wallet address in the payload binary. | ['T1027'] |
BoomBox can encrypt data using AES prior to exfiltration. | ['T1027'] |
Bumblebee has been delivered as password-protected zipped ISO files and used control-flow-flattening to obfuscate the flow of functions. | ['T1027'] |
CARROTBAT has the ability to download a base64 encoded payload and execute obfuscated commands on the infected host. | ['T1027'] |
Carbanak encrypts strings to make analysis more difficult. | ['T1027'] |
Carberp has used XOR-based encryption to mask C2 server locations within the trojan. | ['T1027'] |
Chimera has encoded PowerShell commands. | ['T1027'] |
Chinoxy has encrypted its configuration file. | ['T1027'] |
Cobalt Group obfuscated several scriptlets and code used on the victim’s machine, including through use of XOR and RC4. | ['T1027'] |
Cobalt Strike can hash functions to obfuscate calls to the Windows API and use a public/private key pair to encrypt Beacon session metadata. | ['T1027'] |
CoinTicker initially downloads a hidden encoded file. | ['T1027'] |
ComRAT has used encryption and base64 to obfuscate its orchestrator code in the Registry. ComRAT has encrypted its virtual file system using AES-256 in XTS mode and has encoded PowerShell scripts. | ['T1027'] |
Comnie uses RC4 and Base64 to obfuscate strings. | ['T1027'] |
Conficker has obfuscated its code to prevent its removal from host machines. | ['T1027'] |
Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls. | ['T1027'] |
CookieMiner has used base64 encoding to obfuscate scripts on the system. | ['T1027'] |
Cuba has used multiple layers of obfuscation to avoid analysis, including its Base64 encoded payload. | ['T1027'] |
DCSrv's configuration is encrypted. | ['T1027'] |
DRATzarus can be partly encrypted with XOR. | ['T1027'] |
Dacls can encrypt its configuration file with AES CBC. | ['T1027'] |
DanBot can Base64 encode its payload. | ['T1027'] |
Dark Caracal has obfuscated strings in Bandook by base64 encoding, and then encrypting them. | ['T1027'] |
DarkWatchman has used Base64 to encode PowerShell commands. DarkWatchman has been delivered as compressed RAR payloads in ZIP files to victims. | ['T1027'] |
Denis obfuscates its code and encrypts the API names. Denis also encodes its payload in Base64. | ['T1027'] |
Diavol has Base64 encoded the RSA public key used for encrypting files. | ['T1027'] |
Donut can generate encrypted, compressed/encoded, or otherwise obfuscated code modules. | ['T1027'] |
Dridex's strings are obfuscated using RC4. | ['T1027'] |
Droppers used by Putter Panda use RC4 or a 16-byte XOR key consisting of the bytes 0xA0 – 0xAF to obfuscate payloads. | ['T1027'] |
Drovorub has used XOR encrypted payloads in WebSocket client to server messages. | ['T1027'] |
Dtrack has used a dropper that embeds an encrypted payload as extra data. | ['T1027', 'T1027.009'] |
During C0015, the threat actors used Base64-encoded strings. | ['T1027'] |
During Frankenstein, the threat actors ran encoded commands from the command line. | ['T1027'] |
During Night Dragon, threat actors used a DLL that included an XOR-encoded section. | ['T1027'] |
During Operation CuckooBees, the threat actors executed an encoded VBScript file. | ['T1027'] |
During Operation Dust Storm, the threat actors encoded some payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key; other payloads were Base64-encoded. | ['T1027'] |
During Operation Honeybee, the threat actors used Base64 to encode files with a custom key. | ['T1027'] |
EKANS uses encoded strings in its process kill list. | ['T1027'] |
Earth Lusca used Base64 to encode strings. | ['T1027'] |
Ebury has obfuscated its strings with a simple XOR encryption with a static key. | ['T1027'] |
Elderwood has encrypted documents and malicious executables. | ['T1027'] |
Elise encrypts several of its files, including configuration files. | ['T1027'] |
Ember Bear has obfuscated malware and malicious scripts to help avoid detection. | ['T1027'] |
Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts. | ['T1027'] |
EnvyScout can Base64 encode payloads. | ['T1027'] |
Exaramel for Linux uses RC4 for encrypting the configuration. | ['T1027'] |
Exaramel uses RC4 for encrypting the configuration. | ['T1027'] |
FELIXROOT encrypts strings in the backdoor using a custom XOR algorithm. | ['T1027'] |
FIN6 has used encoded PowerShell commands. | ['T1027'] |
FIN7 has used fragmented strings, environment variables, standard input (stdin), and native character-replacement functionalities to obfuscate commands. | ['T1027'] |
FIN8 has used environment variables and standard input (stdin) to obfuscate command-line arguments. FIN8 also obfuscates malicious macros delivered as payloads. | ['T1027'] |
FatDuke can use base64 encoding, string stacking, and opaque predicates for obfuscation. | ['T1027'] |
Flagpro has been delivered within ZIP or RAR password-protected archived files. | ['T1027'] |
FlawedGrace encrypts its C2 configuration files with AES in CBC mode. | ['T1027'] |
FoggyWeb has been XOR-encoded. | ['T1027'] |
For Operation Spalax, the threat actors used XOR-encrypted payloads. | ['T1027'] |
Frankenstein has run encoded commands from the command line. | ['T1027'] |
FruitFly executes and stores obfuscated Perl scripts. | ['T1027'] |
GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection. | ['T1027'] |
GOLD SOUTHFIELD has executed base64 encoded PowerShell scripts on compromised hosts. | ['T1027'] |
Gallmaker obfuscated shellcode used during execution. | ['T1027'] |
Gamaredon Group has delivered self-extracting 7z archive files within malicious document attachments, and used obfuscated or encrypted scripts. | ['T1027'] |
Gazer logs its actions into files that are encrypted with 3DES. It also uses RSA to encrypt resources. | ['T1027'] |
Gelsemium has the ability to compress its components. | ['T1027'] |
GoldMax has written AES-encrypted and Base64-encoded configuration files to disk. | ['T1027'] |
GoldenSpy's uninstaller has base64-encoded its variables. | ['T1027'] |
Goopy's decrypter have been inflated with junk code in between legitimate API functions, and also included infinite loops to avoid analysis. | ['T1027'] |
GravityRAT supports file encryption (AES with the key "lolomycin2017"). | ['T1027'] |
Green Lambert has encrypted strings. | ['T1027'] |
GreyEnergy encrypts its configuration files with AES-256 and also encrypts its strings. | ['T1027'] |
GrimAgent has used Rotate on Right (RoR) and Rotate on Left (RoL) functionality to encrypt strings. | ['T1027'] |
Group5 disguised its malicious binaries with several layers of obfuscation, including encrypting the files. | ['T1027'] |
H1N1 uses multiple techniques to obfuscate strings, including XOR. | ['T1027'] |
HAWKBALL has encrypted the payload with an XOR-based algorithm. | ['T1027'] |
HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming. | ['T1027'] |
HermeticWiper can compress 32-bit and 64-bit driver files with the Lempel-Ziv algorithm. | ['T1027'] |
HermeticWizard has the ability to encrypt PE files with a reverse XOR loop. | ['T1027'] |
Hi-Zor uses various XOR techniques to obfuscate its components. | ['T1027'] |
HiddenWasp encrypts its configuration and payload. | ['T1027'] |
Higaisa used Base64 encoded compressed payloads. | ['T1027'] |
Hildegard has encrypted an ELF file. | ['T1027'] |
HotCroissant has encrypted strings with single-byte XOR and base64 encoded RC4. | ['T1027'] |
ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com. | ['T1027'] |
IceApple can use Base64 and "junk" JavaScript code to obfuscate information. | ['T1027'] |
If the victim is using PowerShell 3.0 or later, POWERSOURCE writes its decoded payload to an Alternate Data Stream (ADS) named kernel32.dll that is saved in "%PROGRAMDATA%\Windows\". | ['T1027'] |
Imminent Monitor has encrypted the spearphish attachments to avoid detection from email gateways; the debugger also encrypts information before sending to the C2. | ['T1027'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.