text1
stringlengths
7
2.5k
labels
stringlengths
9
100
In one version of KeyBoy, string obfuscation routines were used to hide many of the critical values referenced in the malware.
['T1027']
Industroyer uses heavily obfuscated code in its Windows Notepad backdoor.
['T1027']
InnaputRAT uses an 8-byte XOR key to obfuscate API names and other strings contained in the payload.
['T1027']
InvisiMole avoids analysis by encrypting all strings, internal files, configuration data and by using a custom executable format.
['T1027']
KGH_SPY has used encrypted strings in its installer.
['T1027']
KOCTOPUS has obfuscated scripts with the BatchEncryption tool.
['T1027']
KONNI is heavily obfuscated and includes encrypted configuration files.
['T1027']
Kerrdown can encrypt, encode, and compress multiple layers of shellcode.
['T1027']
Kessel's configuration is hardcoded and RC4 encrypted within the binary.
['T1027']
Kevin has Base64-encoded its configuration file.
['T1027']
KillDisk uses VMProtect to make reverse engineering the malware more difficult.
['T1027']
Lazarus Group has used multiple types of encryption and encoding for their payloads, including AES, Caracachs, RC4, XOR, Base64, and other tricks such as creating aliases in code for Native API function names.
['T1027']
LazyScripter has leveraged the BatchEncryption tool to perform advanced batch obfuscation and encoding techniques.
['T1027']
Leviathan has obfuscated code using base64 and gzip compression.
['T1027']
LightNeuron encrypts its configuration files with AES-256.
['T1027']
Lokibot has obfuscated strings with base64 encoding.
['T1027']
LoudMiner has obfuscated various scripts and encrypted DMG files.
['T1027']
MCMD can Base64 encode output strings prior to sending to C2.
['T1027']
Machete employed some visual obfuscation techniques by naming variables as combinations of letters to hinder analysis.
['T1027']
Machete has used pyobfuscate, zlib compression, and base64 encoding for obfuscation. Machete has also used some visual obfuscation techniques by naming variables as combinations of letters to hinder analysis.
['T1027']
Many strings in JHUHUGIT are obfuscated with a XOR algorithm.
['T1027']
Maze has decrypted strings and other important information during the encryption process. Maze also calls certain functions dynamically to hinder analysis.
['T1027']
Metamorfo has encrypted payloads and strings.
['T1027']
Micropsia obfuscates the configuration with a custom Base64 and XOR.
['T1027']
Milan can encode files containing information about the targeted system.
['T1027']
Molerats has delivered compressed executables within ZIP files to victims.
['T1027']
More_eggs's payload has been encrypted with a key that has the hostname and processor family information appended to the end.
['T1027']
Moses Staff has used obfuscated web shells in their operations.
['T1027']
Mosquito’s installer is obfuscated with a custom crypter to obfuscate the installer.
['T1027']
Most strings in USBStealer are encrypted using 3DES and XOR and reversed.
['T1027']
MuddyWater has used Daniel Bohannon’s Invoke-Obfuscation framework and obfuscated PowerShell scripts. The group has also used other obfuscation methods, including Base64 obfuscation of VBScripts and PowerShell commands.
['T1027']
NanHaiShu encodes files in Base64.
['T1027']
NanoCore’s plugins were obfuscated with Eazfuscater.NET 3.3.
['T1027']
OLDBAIT obfuscates internal strings and unpacks them at startup.
['T1027']
Operation Wocao has executed PowerShell commands which were encoded or compressed using Base64, zlib, and XOR.
['T1027']
P.A.S. Webshell can use encryption and base64 encoding to hide strings and to enforce access control once deployed.
['T1027']
POSHSPY appends a file signature header (randomly selected from six file types) to encrypted data prior to upload or download.
['T1027']
POWERSTATS uses character replacement, PowerShell environment variables, and XOR encoding to obfuscate code. POWERSTATS's backdoor code is a multi-layer obfuscated, encoded, and compressed blob. POWERSTATS has used PowerShell code with custom string obfuscation
['T1027']
PS1 is distributed as a set of encrypted files and scripts.
['T1027']
PUNCHBUGGY has hashed most its code's functions and encrypted payloads with base64 and XOR.
['T1027']
PlugX can use API hashing and modify the names of strings to evade detection.
['T1027']
PoetRAT has used a custom encryption scheme for communication between scripts and pyminifier to obfuscate scripts.
['T1027']
PoisonIvy hides any strings related to its own indicators of compromise.
['T1027']
PolyglotDuke can custom encrypt strings.
['T1027']
Pony attachments have been delivered via compressed archive files. Pony also obfuscates the memory flow by adding junk instructions when executing to make analysis more difficult.
['T1027']
PowerDuke uses steganography to hide backdoors in PNG files, which are also encrypted using the Tiny Encryption Algorithm (TEA).
['T1027', 'T1027.003']
PowerPunch can use Base64-encoded scripts.
['T1027']
PowerSploit contains a collection of ScriptModification modules that compress and encode scripts and payloads.
['T1027']
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.
['T1027']
QUADAGENT was likely obfuscated using Invoke-Obfuscation.
['T1027']
QakBot can use obfuscated and encoded scripts; it has also hidden code within Excel spreadsheets by turning the font color to white and splitting it across multiple cells.
['T1027']
REvil has used encrypted strings and configuration files.
['T1027']
ROKRAT can encrypt data prior to exfiltration by using an RSA public key.
['T1027']
RTM strings, network data, configuration, and modules are encrypted with a modified RC4 algorithm. RTM has also been delivered to targets as various archive files including ZIP, 7-ZIP, and RAR.
['T1027']
Ramsay has base64-encoded its portable executable and hidden itself under a JPG header. Ramsay can also embed information within document footers.
['T1027']
Reaver encrypts some of its files with XOR.
['T1027']
RegDuke can use control-flow flattening or the commercially available .NET Reactor for obfuscation.
['T1027']
Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths.
['T1027']
Rifdoor has encrypted strings with a single byte XOR algorithm.
['T1027']
Rocke has modified UPX headers after packing files to break unpackers.
['T1027']
SHARPSTATS has used base64 encoding and XOR to obfuscate PowerShell scripts.
['T1027']
SHOTPUT is obscured using XOR encoding and appended to a valid GIF file.
['T1027']
SQLRat has used a character insertion obfuscation technique, making the script appear to contain Chinese characters.
['T1027']
STARWHALE has been obfuscated with hex-encoded strings.
['T1027']
SUNSPOT encrypted log entries it collected with the stream cipher RC4 using a hard-coded key. It also uses AES128-CBC encrypted blobs for SUNBURST source code and data extracted from the SolarWinds Orion <MsBuild.exe" process.
['T1027']
SUPERNOVA contained Base64-encoded strings.
['T1027']
Sakula uses single-byte XOR obfuscation to obfuscate many of its files.
['T1027']
SamSam has been seen using AES or DES to encrypt payloads and payload components.
['T1027']
Sandworm Team has used Base64 encoding within malware variants. Sandworm Team has also used ROT13 encoding, AES encryption and compression with the zlib library for their Python-based backdoor.
['T1027']
Seasalt obfuscates configuration data.
['T1027']
ShadowPad has encrypted its payload, a virtual file system, and various files.
['T1027']
Shamoon contains base64-encoded strings.
['T1027']
Shark can use encrypted and encoded files for C2 configuration.
['T1027']
ShimRat has been delivered as a package that includes compressed DLL and shellcode payloads within a .dat file.
['T1027']
ShimRatReporter encrypted gathered information with a combination of shifting and XOR using a static key.
['T1027']
Sibot has obfuscated scripts used in execution.
['T1027']
Sidewinder has used base64 encoding and ECDH-P256 encryption for scripts and files.
['T1027']
Silence has used environment variable string substitution for obfuscation.
['T1027']
Siloscape itself is obfuscated and uses obfuscated API calls.
['T1027']
Skidmap has encrypted it's main payload using 3DES.
['T1027']
Sliver can encrypt strings at compile time.
['T1027']
Smoke Loader uses a simple one-byte XOR method to obfuscate values in the malware.
['T1027']
SodaMaster can use "stackstrings" for obfuscation.
['T1027']
SombRAT can encrypt strings with XOR-based routines and use a custom AES storage format for plugins, configuration, C2 domains, and harvested data.
['T1027']
Some Orz strings are base64 encoded, such as the embedded DLL known as MockDll.
['T1027']
Some data in Remsec is encrypted using RC5 in CBC mode, AES-CBC with a hardcoded key, RC4, or Salsa20. Some data is also base64-encoded.
['T1027']
Some resources in Prikormka are encrypted with a simple XOR operation or encoded with Base64.
['T1027']
Some strings in HOMEFRY are obfuscated with XOR x56.
['T1027']
SoreFang has the ability to encode and RC6 encrypt data sent to C2.
['T1027']
SpeakUp encodes its second-stage payload with Base64.
['T1027']
Squirrelwaffle has been obfuscated with a XOR-based algorithm.
['T1027']
StoneDrill has obfuscated its module with an alphabet-based table or XOR encryption.
['T1027']
StreamEx obfuscates some commands by using statically programmed fragments of strings when starting a DLL. It also uses a one-byte xor against 0x91 to encode configuration data.
['T1027']
Strings in Attor's components are encrypted with a XOR cipher, using a hardcoded key and the configuration data, log files and plugins are encrypted using a hybrid encryption scheme of Blowfish-OFB combined with RSA.
['T1027']
SynAck payloads are obfuscated prior to compilation to inhibit analysis and/or reverse engineering.
['T1027']
SysUpdate can encrypt and encode its configuration file.
['T1027']
TA505 has password-protected malicious Word documents and used base64 encoded PowerShell commands.
['T1027']
TEARDROP created and read from a file with a fake JPG header, and its payload was encrypted with a simple rotating XOR cipher.
['T1027']
Taidoor can use encrypted string blocks for obfuscation.
['T1027']
TeamTNT has encrypted its binaries via AES and encoded files using Base64.
['T1027']