text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
The FIVEHANDS payload is encrypted with AES-128. | ['T1027'] |
The Grandoreiro payload has been delivered encrypted with a custom XOR-based algorithm and also as a base64-encoded ZIP file. | ['T1027'] |
The Helminth config file is encrypted with RC4. | ['T1027'] |
ThreatNeedle has been compressed and obfuscated using RC4, AES, or XOR. | ['T1027'] |
Torisma has been Base64 encoded and AES encrypted. | ['T1027'] |
Trojan.Karagany can base64 encode and AES-128-CBC encrypt data prior to transmission. | ['T1027'] |
Tropic Trooper has encrypted configuration files. | ['T1027'] |
Turian can use VMProtect for obfuscation. | ['T1027'] |
UBoatRAT encrypts instructions in the payload using a simple XOR cipher. | ['T1027'] |
UNC2452 used encoded PowerShell commands. | ['T1027'] |
Ursnif has used an XOR-based algorithm to encrypt Tor clients dropped to disk. Ursnif droppers have also been delivered as password-protected zip files that execute base64 encoded PowerShell commands. | ['T1027'] |
Valak has the ability to base64 encode and XOR encrypt strings. | ['T1027'] |
Variants of Emissary encrypt payloads using various XOR ciphers, as well as a custom algorithm that uses the "srand" and "rand" functions. | ['T1027'] |
Waterbear has used RC4 encrypted shellcode and encrypted functions. | ['T1027'] |
WhisperGate can Base64 encode strings, store downloaded files in reverse byte order, and use the Eazfuscator tool to obfuscate its third stage. | ['T1027'] |
Whitefly has encrypted the payload used for C2. | ['T1027'] |
WindTail can be delivered as a compressed, encrypted, and encoded payload. | ['T1027'] |
Winnti for Linux can encode its configuration file with single-byte XOR encoding. | ['T1027'] |
Winnti for Windows has the ability to encrypt and compress its payload. | ['T1027'] |
Wizard Spider used Base64 encoding to obfuscate an Empire service and PowerShell commands. | ['T1027'] |
ZeroT has encrypted its payload with RC4. | ['T1027'] |
Zeus Panda encrypts strings with XOR and obfuscates the macro code from the initial payload. Zeus Panda also encrypts all configuration and settings in AES and RC4. | ['T1027'] |
hides any strings related to its own indicators of compromise. | ['T1027', 'T1027'] |
jRAT’s Java payload is encrypted with AES. Additionally, backdoor files are encrypted using DES as a stream cipher. Later variants of jRAT also incorporated AV evasion methods such as Java bytecode obfuscation via the commercial Allatori obfuscation tool. | ['T1027'] |
njRAT has included a base64 encoded executable. | ['T1027'] |
A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products. | ['T1027.001'] |
APT29 has used large file sizes to avoid detection. | ['T1027.001'] |
BRONZE BUTLER downloader code has included "0" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection. | ['T1027.001'] |
Before writing to disk, Kwampirs inserts a randomly generated string into the middle of the decrypted payload in an attempt to evade hash-based detections. | ['T1027.001'] |
Bisonal has appended random binary data to the end of itself to generate a large binary. | ['T1027.001'] |
CORESHELL contains unused machine instructions in a likely attempt to hinder analysis. | ['T1027.001'] |
Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk. | ['T1027.001'] |
CostaBricks has added the entire unobfuscated code of the legitimate open source application Blink to its code. | ['T1027.001'] |
Ember Bear has added extra spaces between JavaScript code characters to increase the overall file size. | ['T1027.001'] |
FatDuke has been packed with junk code and strings. | ['T1027.001'] |
Gamaredon Group has obfuscated .NET executables by inserting junk code. | ['T1027.001'] |
Gelsemium can use junk code to hide functions and evade detection. | ['T1027.001'] |
Goopy has had null characters padded in its malicious DLL payload. | ['T1027.001'] |
GrimAgent has the ability to add bytes to change the file hash. | ['T1027.001'] |
Higaisa performed padding with null bytes before calculating its hash. | ['T1027.001'] |
Javali can use large obfuscated libraries to hinder detection and analysis. | ['T1027.001'] |
Leviathan has inserted garbage characters into code, presumably to avoid anti-virus detection. | ['T1027.001'] |
Maze has inserted large blocks of junk code, including some components to decrypt strings and other important information for later in the encryption process. | ['T1027.001'] |
Mustang Panda has used junk code within their DLL files to hinder analysis. | ['T1027.001'] |
Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes. | ['T1027.001', 'T1027.005'] |
TAINTEDSCRIBE can execute "FileRecvWriteRand" to append random bytes to the end of a file received from C2. | ['T1027.001'] |
ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions. | ['T1027.001'] |
A FinFisher variant uses a custom packer. | ['T1027.002'] |
A Patchwork payload was packed with UPX. | ['T1027.002'] |
A version of Daserf uses the MPRESS packer. | ['T1027.002'] |
APT29 used UPX to pack files. | ['T1027.002'] |
APT3 has been known to pack their tools. | ['T1027.002'] |
APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants. | ['T1027.002'] |
APT39 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection. | ['T1027.002'] |
Anchor has come with a packed payload. | ['T1027.002'] |
Aoqin Dragon has used the Themida packer to obfuscate malicious payloads. | ['T1027.002'] |
Astaroth uses a software packer called Pe123\RPolyCryptor. | ['T1027.002'] |
Bisonal has used the MPRESS packer and similar tools for obfuscation. | ['T1027.002'] |
CSPY Downloader has been packed with UPX. | ['T1027.002'] |
China Chopper's client component is packed with UPX. | ['T1027.002'] |
Clop has been packed to help avoid detection. | ['T1027.002'] |
CostaBricks can implement a custom-built virtual machine mechanism to obfuscate its code. | ['T1027.002'] |
DRATzarus's dropper can be packed with UPX. | ['T1027.002'] |
DarkComet has the option to compress its payload using UPX or MPRESS. | ['T1027.002'] |
Dok is packed with an UPX executable packer. | ['T1027.002'] |
During Night Dragon, threat actors used software packing in its tools. | ['T1027.002'] |
Dyre has been delivered with encrypted resources and must be unpacked for execution. | ['T1027.002'] |
Egregor's payloads are custom-packed, archived and encrypted to prevent analysis. | ['T1027.002'] |
Elderwood has packed malware payloads before delivery to victims. | ['T1027.002'] |
FYAnti has used ConfuserEx to pack its .NET module. | ['T1027.002'] |
FatDuke has been regularly repacked by its operators to create large binaries and evade detection. | ['T1027.002'] |
For Operation Dust Storm, the threat actors used UPX to pack some payloads. | ['T1027.002'] |
For Operation Spalax, the threat actors used a variety of packers, including CyaX, to obfuscate malicious executables. | ['T1027.002'] |
GreyEnergy is packed for obfuscation. | ['T1027.002'] |
H1N1 uses a custom packing algorithm. | ['T1027.002'] |
Hildegard has packed ELF files into other binaries. | ['T1027.002'] |
HotCroissant has used the open source UPX executable packer. | ['T1027.002'] |
HyperBro has the ability to pack its payload. | ['T1027.002'] |
Kimsuky has packed malware with UPX. | ['T1027.002'] |
Lazarus Group has used Themida to pack malicious DLLs and other files. | ['T1027.002'] |
LiteDuke has been packed with multiple layers of encryption. | ['T1027.002'] |
Lokibot has used several packing methods for obfuscation. | ['T1027.002'] |
Machete has been packed with NSIS. | ['T1027.002'] |
Melcoz has been packed with VMProtect and Themida. | ['T1027.002'] |
Metamorfo has used VMProtect to pack and protect files. | ['T1027.002'] |
NETWIRE has used .NET packer tools to evade detection. | ['T1027.002'] |
Night Dragon is known to use software packing in its tools. | ['T1027.002'] |
OSX_OCEANLOTUS.D has a variant that is packed with UPX. | ['T1027.002'] |
OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2. | ['T1027.002'] |
QakBot can encrypt and pack malicious payloads. | ['T1027.002'] |
Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm. | ['T1027.002'] |
Rocke's miner has created UPX-packed files in the Windows Start Menu Folder. | ['T1027.002', 'T1547.001'] |
SDBbot has used a packed installer file. | ['T1027.002'] |
Saint Bot has been packed using a dark market crypter. | ['T1027.002'] |
Sandworm Team used UPX to pack a copy of Mimikatz. | ['T1027.002'] |
SeaDuke has been packed with the UPX packer. | ['T1027.002'] |
ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack. | ['T1027.002'] |
Some S-Type samples have been packed with UPX. | ['T1027.002'] |
Some ZeroT DLL files have been packed with UPX. | ['T1027.002'] |
Spark has been packed with Enigma Protector to obfuscate its contents. | ['T1027.002'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.