text1
stringlengths
7
2.5k
labels
stringlengths
9
100
HyperBro has used HTTPS for C2 communications.
['T1071.001']
IceApple can use HTTP GET to request and pull information from C2.
['T1071.001']
IcedID has used HTTPS in communications with C2.
['T1071.001']
Inception has used HTTP, HTTPS, and WebDav in network communications.
['T1071.001']
InvisiMole uses HTTP for C2 communications.
['T1071.001']
Ixeshe uses HTTP for command and control.
['T1071.001']
JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS.
['T1071.001']
KONNI has used HTTP POST for C2.
['T1071.001']
Ke3chang malware including RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2.
['T1071.001']
Keydnap uses HTTPS for command and control.
['T1071.001']
Kinsing has communicated with C2 over HTTP.
['T1071.001']
Koadic has used HTTP for C2 communications.
['T1071.001']
LOWBALL command and control occurs via HTTPS over port 443.
['T1071.001']
Lazarus Group has conducted C2 over HTTP and HTTPS.
['T1071.001']
LiteDuke can use HTTP GET requests in C2 communications.
['T1071.001']
Lokibot has used HTTP for C2 communications.
['T1071.001']
LookBack’s C2 proxy tool sends data to a C2 server over HTTP.
['T1071.001']
MCMD can use HTTPS in communication with C2 web servers.
['T1071.001']
MacSpy uses HTTP for command and control.
['T1071.001']
Machete malware used Python’s urllib library to make HTTP requests to the C2 server.
['T1071.001']
Machete uses HTTP for Command & Control.
['T1071.001']
Magic Hound malware has used HTTP for C2.
['T1071.001']
Maze has communicated to hard-coded IP addresses via HTTP.
['T1071.001']
MechaFlounder has the ability to use HTTP in communication with C2.
['T1071.001']
Metamorfo has used HTTP for C2.
['T1071.001']
Micropsia uses HTTP and HTTPS for C2 network communications.
['T1071.001']
Milan can use HTTPS for communication with C2.
['T1071.001']
MiniDuke uses HTTP and HTTPS for command and control.
['T1071.001']
Mis-Type network traffic can communicate over HTTP.
['T1071.001']
Mongall can use HTTP for C2 communication.
['T1071.001']
More_eggs uses HTTPS for C2.
['T1071.001']
Mori can communicate using HTTP over IPv4 or IPv6 depending on a flag set.
['T1071.001']
MuddyWater has used HTTP for C2 communications.
['T1071.001']
NETWIRE has the ability to communicate over HTTP.
['T1071.001']
NOKKI has used HTTP for C2 communications.
['T1071.001']
Neoichor can use HTTP for C2 communications.
['T1071.001']
Night Dragon has used HTTP for C2.
['T1071.001']
OSX_OCEANLOTUS.D can use HTTP POST and GET requests to send and receive C2 information.
['T1071.001']
Octopus has used HTTP GET and POST requests for C2 communications.
['T1071.001']
OnionDuke uses HTTP and HTTPS for C2.
['T1071.001']
OopsIE uses HTTP for C2 communications.
['T1071.001']
Orangeworm has used HTTP for C2.
['T1071.001']
Out1 can use HTTP and HTTPS in communications with remote hosts.
['T1071.001']
OutSteel has used HTTP for C2 communications.
['T1071.001']
OwaAuth uses incoming HTTP requests with a username keyword and commands and handles them as instructions to perform actions.
['T1071.001']
PLEAD has used HTTP for communications with command and control (C2) servers.
['T1071.001']
POWRUNER can use HTTP for C2 communications.
['T1071.001']
PUNCHBUGGY enables remote interaction and can obtain additional code over HTTPS GET and POST requests.
['T1071.001']
Pandora can communicate over HTTP.
['T1071.001']
PcShare has used HTTP for C2 communication.
['T1071.001']
PinchDuke transfers files from the compromised host via HTTP or HTTPS to a C2 server.
['T1071.001']
PlugX can be configured to use HTTP for command and control.
['T1071.001']
PoetRAT has used HTTP and HTTPs for C2 communications.
['T1071.001']
PolyglotDuke has has used HTTP GET requests in C2 communications.
['T1071.001']
Pony has sent collected information to the C2 via HTTP POST request.
['T1071.001']
PoshC2 can use protocols like HTTP/HTTPS for command and control traffic.
['T1071.001']
PowerShower has sent HTTP GET and POST requests to C2 servers to send information and receive instructions.
['T1071.001']
Proxysvc uses HTTP over SSL to communicate commands with the control server.
['T1071.001']
Psylo uses HTTPS for C2.
['T1071.001']
Pteranodon can use HTTP for C2.
['T1071.001']
Pupy can communicate over HTTP for C2.
['T1071.001']
QUADAGENT uses HTTPS and HTTP for C2 communications.
['T1071.001']
QakBot has the ability to use HTTP and HTTPS in communication with C2 servers.
['T1071.001']
QuietSieve can use HTTPS in C2 communications.
['T1071.001']
RATANKBA uses HTTP/HTTPS for command and control communication.
['T1071.001']
RCSession can use HTTP in C2 communications.
['T1071.001']
REvil has used HTTP and HTTPS in communication with C2.
['T1071.001']
ROKRAT can use HTTP and HTTPS for command and control communication.
['T1071.001']
RTM has initiated connections to external domains using HTTPS.
['T1071.001']
RainyDay can use HTTP in C2 communications.
['T1071.001']
Ramsay has used HTTP for C2.
['T1071.001']
Rancor has used HTTP for C2.
['T1071.001']
Remexi uses BITSAdmin to communicate with the C2 server over HTTP.
['T1071.001']
Remsec is capable of using HTTP and HTTPS for C2.
['T1071.001']
Rising Sun has used HTTP and HTTPS for command and control.
['T1071.001']
Rocke has executed wget and curl commands to Pastebin over the HTTPS protocol.
['T1071.001']
S-Type uses HTTP for C2.
['T1071.001']
SLOTHFULMEDIA has used HTTP and HTTPS for C2 communications.
['T1071.001']
SNUGRIDE communicates with its C2 server over HTTP.
['T1071.001']
SUPERNOVA had to receive an HTTP GET request containing a specific set of parameters in order to execute.
['T1071.001']
Sakula uses HTTP for C2.
['T1071.001']
Sandworm Team's BCS-server tool connects to the designated C2 server via HTTP.
['T1071.001']
SeaDuke uses HTTP and HTTPS for C2.
['T1071.001']
ServHelper uses HTTP for C2.
['T1071.001']
Shamoon has used HTTP for C2.
['T1071.001']
ShimRat communicated over HTTP and HTTPS with C2 servers.
['T1071.001']
ShimRatReporter communicated over HTTP with preconfigured C2 servers.
['T1071.001']
Sibot communicated with its C2 server via HTTP GET requests.
['T1071.001']
SideTwist has used HTTP GET and POST requests over port 443 for C2.
['T1071.001']
SilverTerrier uses HTTP for C2 communications.
['T1071.001']
Sliver has the ability to support C2 communications over HTTP/S.
['T1071.001']
Small Sieve can contact actor-controlled C2 servers by using the Telegram API over HTTPS.
['T1071.001']
Smoke Loader uses HTTP for C2.
['T1071.001']
Some Reaver variants use HTTP for C2.
['T1071.001']
SoreFang can use HTTP in C2 communications.
['T1071.001']
Spark has used HTTP POST requests to communicate with its C2 server to receive commands.
['T1071.001']
SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C server.
['T1071.001']
Squirrelwaffle has used HTTP POST requests for C2 communications.
['T1071.001']
Stealth Falcon malware communicates with its C2 server via HTTPS.
['T1071.001']
StrongPity can use HTTP and HTTPS in C2 communications.
['T1071.001']