text1
stringlengths
7
2.5k
labels
stringlengths
9
100
The FIVEHANDS payload is encrypted with AES-128.
['T1027']
The Grandoreiro payload has been delivered encrypted with a custom XOR-based algorithm and also as a base64-encoded ZIP file.
['T1027']
The Helminth config file is encrypted with RC4.
['T1027']
ThreatNeedle has been compressed and obfuscated using RC4, AES, or XOR.
['T1027']
Torisma has been Base64 encoded and AES encrypted.
['T1027']
Trojan.Karagany can base64 encode and AES-128-CBC encrypt data prior to transmission.
['T1027']
Tropic Trooper has encrypted configuration files.
['T1027']
Turian can use VMProtect for obfuscation.
['T1027']
UBoatRAT encrypts instructions in the payload using a simple XOR cipher.
['T1027']
UNC2452 used encoded PowerShell commands.
['T1027']
Ursnif has used an XOR-based algorithm to encrypt Tor clients dropped to disk. Ursnif droppers have also been delivered as password-protected zip files that execute base64 encoded PowerShell commands.
['T1027']
Valak has the ability to base64 encode and XOR encrypt strings.
['T1027']
Variants of Emissary encrypt payloads using various XOR ciphers, as well as a custom algorithm that uses the "srand" and "rand" functions.
['T1027']
Waterbear has used RC4 encrypted shellcode and encrypted functions.
['T1027']
WhisperGate can Base64 encode strings, store downloaded files in reverse byte order, and use the Eazfuscator tool to obfuscate its third stage.
['T1027']
Whitefly has encrypted the payload used for C2.
['T1027']
WindTail can be delivered as a compressed, encrypted, and encoded payload.
['T1027']
Winnti for Linux can encode its configuration file with single-byte XOR encoding.
['T1027']
Winnti for Windows has the ability to encrypt and compress its payload.
['T1027']
Wizard Spider used Base64 encoding to obfuscate an Empire service and PowerShell commands.
['T1027']
ZeroT has encrypted its payload with RC4.
['T1027']
Zeus Panda encrypts strings with XOR and obfuscates the macro code from the initial payload. Zeus Panda also encrypts all configuration and settings in AES and RC4.
['T1027']
hides any strings related to its own indicators of compromise.
['T1027', 'T1027']
jRAT’s Java payload is encrypted with AES. Additionally, backdoor files are encrypted using DES as a stream cipher. Later variants of jRAT also incorporated AV evasion methods such as Java bytecode obfuscation via the commercial Allatori obfuscation tool.
['T1027']
njRAT has included a base64 encoded executable.
['T1027']
A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products.
['T1027.001']
APT29 has used large file sizes to avoid detection.
['T1027.001']
BRONZE BUTLER downloader code has included "0" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection.
['T1027.001']
Before writing to disk, Kwampirs inserts a randomly generated string into the middle of the decrypted payload in an attempt to evade hash-based detections.
['T1027.001']
Bisonal has appended random binary data to the end of itself to generate a large binary.
['T1027.001']
CORESHELL contains unused machine instructions in a likely attempt to hinder analysis.
['T1027.001']
Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk.
['T1027.001']
CostaBricks has added the entire unobfuscated code of the legitimate open source application Blink to its code.
['T1027.001']
Ember Bear has added extra spaces between JavaScript code characters to increase the overall file size.
['T1027.001']
FatDuke has been packed with junk code and strings.
['T1027.001']
Gamaredon Group has obfuscated .NET executables by inserting junk code.
['T1027.001']
Gelsemium can use junk code to hide functions and evade detection.
['T1027.001']
Goopy has had null characters padded in its malicious DLL payload.
['T1027.001']
GrimAgent has the ability to add bytes to change the file hash.
['T1027.001']
Higaisa performed padding with null bytes before calculating its hash.
['T1027.001']
Javali can use large obfuscated libraries to hinder detection and analysis.
['T1027.001']
Leviathan has inserted garbage characters into code, presumably to avoid anti-virus detection.
['T1027.001']
Maze has inserted large blocks of junk code, including some components to decrypt strings and other important information for later in the encryption process.
['T1027.001']
Mustang Panda has used junk code within their DLL files to hinder analysis.
['T1027.001']
Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes.
['T1027.001', 'T1027.005']
TAINTEDSCRIBE can execute "FileRecvWriteRand" to append random bytes to the end of a file received from C2.
['T1027.001']
ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions.
['T1027.001']
A FinFisher variant uses a custom packer.
['T1027.002']
A Patchwork payload was packed with UPX.
['T1027.002']
A version of Daserf uses the MPRESS packer.
['T1027.002']
APT29 used UPX to pack files.
['T1027.002']
APT3 has been known to pack their tools.
['T1027.002']
APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants.
['T1027.002']
APT39 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection.
['T1027.002']
Anchor has come with a packed payload.
['T1027.002']
Aoqin Dragon has used the Themida packer to obfuscate malicious payloads.
['T1027.002']
Astaroth uses a software packer called Pe123\RPolyCryptor.
['T1027.002']
Bisonal has used the MPRESS packer and similar tools for obfuscation.
['T1027.002']
CSPY Downloader has been packed with UPX.
['T1027.002']
China Chopper's client component is packed with UPX.
['T1027.002']
Clop has been packed to help avoid detection.
['T1027.002']
CostaBricks can implement a custom-built virtual machine mechanism to obfuscate its code.
['T1027.002']
DRATzarus's dropper can be packed with UPX.
['T1027.002']
DarkComet has the option to compress its payload using UPX or MPRESS.
['T1027.002']
Dok is packed with an UPX executable packer.
['T1027.002']
During Night Dragon, threat actors used software packing in its tools.
['T1027.002']
Dyre has been delivered with encrypted resources and must be unpacked for execution.
['T1027.002']
Egregor's payloads are custom-packed, archived and encrypted to prevent analysis.
['T1027.002']
Elderwood has packed malware payloads before delivery to victims.
['T1027.002']
FYAnti has used ConfuserEx to pack its .NET module.
['T1027.002']
FatDuke has been regularly repacked by its operators to create large binaries and evade detection.
['T1027.002']
For Operation Dust Storm, the threat actors used UPX to pack some payloads.
['T1027.002']
For Operation Spalax, the threat actors used a variety of packers, including CyaX, to obfuscate malicious executables.
['T1027.002']
GreyEnergy is packed for obfuscation.
['T1027.002']
H1N1 uses a custom packing algorithm.
['T1027.002']
Hildegard has packed ELF files into other binaries.
['T1027.002']
HotCroissant has used the open source UPX executable packer.
['T1027.002']
HyperBro has the ability to pack its payload.
['T1027.002']
Kimsuky has packed malware with UPX.
['T1027.002']
Lazarus Group has used Themida to pack malicious DLLs and other files.
['T1027.002']
LiteDuke has been packed with multiple layers of encryption.
['T1027.002']
Lokibot has used several packing methods for obfuscation.
['T1027.002']
Machete has been packed with NSIS.
['T1027.002']
Melcoz has been packed with VMProtect and Themida.
['T1027.002']
Metamorfo has used VMProtect to pack and protect files.
['T1027.002']
NETWIRE has used .NET packer tools to evade detection.
['T1027.002']
Night Dragon is known to use software packing in its tools.
['T1027.002']
OSX_OCEANLOTUS.D has a variant that is packed with UPX.
['T1027.002']
OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.
['T1027.002']
QakBot can encrypt and pack malicious payloads.
['T1027.002']
Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm.
['T1027.002']
Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.
['T1027.002', 'T1547.001']
SDBbot has used a packed installer file.
['T1027.002']
Saint Bot has been packed using a dark market crypter.
['T1027.002']
Sandworm Team used UPX to pack a copy of Mimikatz.
['T1027.002']
SeaDuke has been packed with the UPX packer.
['T1027.002']
ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack.
['T1027.002']
Some S-Type samples have been packed with UPX.
['T1027.002']
Some ZeroT DLL files have been packed with UPX.
['T1027.002']
Spark has been packed with Enigma Protector to obfuscate its contents.
['T1027.002']