text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
HyperBro has used HTTPS for C2 communications. | ['T1071.001'] |
IceApple can use HTTP GET to request and pull information from C2. | ['T1071.001'] |
IcedID has used HTTPS in communications with C2. | ['T1071.001'] |
Inception has used HTTP, HTTPS, and WebDav in network communications. | ['T1071.001'] |
InvisiMole uses HTTP for C2 communications. | ['T1071.001'] |
Ixeshe uses HTTP for command and control. | ['T1071.001'] |
JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS. | ['T1071.001'] |
KONNI has used HTTP POST for C2. | ['T1071.001'] |
Ke3chang malware including RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2. | ['T1071.001'] |
Keydnap uses HTTPS for command and control. | ['T1071.001'] |
Kinsing has communicated with C2 over HTTP. | ['T1071.001'] |
Koadic has used HTTP for C2 communications. | ['T1071.001'] |
LOWBALL command and control occurs via HTTPS over port 443. | ['T1071.001'] |
Lazarus Group has conducted C2 over HTTP and HTTPS. | ['T1071.001'] |
LiteDuke can use HTTP GET requests in C2 communications. | ['T1071.001'] |
Lokibot has used HTTP for C2 communications. | ['T1071.001'] |
LookBack’s C2 proxy tool sends data to a C2 server over HTTP. | ['T1071.001'] |
MCMD can use HTTPS in communication with C2 web servers. | ['T1071.001'] |
MacSpy uses HTTP for command and control. | ['T1071.001'] |
Machete malware used Python’s urllib library to make HTTP requests to the C2 server. | ['T1071.001'] |
Machete uses HTTP for Command & Control. | ['T1071.001'] |
Magic Hound malware has used HTTP for C2. | ['T1071.001'] |
Maze has communicated to hard-coded IP addresses via HTTP. | ['T1071.001'] |
MechaFlounder has the ability to use HTTP in communication with C2. | ['T1071.001'] |
Metamorfo has used HTTP for C2. | ['T1071.001'] |
Micropsia uses HTTP and HTTPS for C2 network communications. | ['T1071.001'] |
Milan can use HTTPS for communication with C2. | ['T1071.001'] |
MiniDuke uses HTTP and HTTPS for command and control. | ['T1071.001'] |
Mis-Type network traffic can communicate over HTTP. | ['T1071.001'] |
Mongall can use HTTP for C2 communication. | ['T1071.001'] |
More_eggs uses HTTPS for C2. | ['T1071.001'] |
Mori can communicate using HTTP over IPv4 or IPv6 depending on a flag set. | ['T1071.001'] |
MuddyWater has used HTTP for C2 communications. | ['T1071.001'] |
NETWIRE has the ability to communicate over HTTP. | ['T1071.001'] |
NOKKI has used HTTP for C2 communications. | ['T1071.001'] |
Neoichor can use HTTP for C2 communications. | ['T1071.001'] |
Night Dragon has used HTTP for C2. | ['T1071.001'] |
OSX_OCEANLOTUS.D can use HTTP POST and GET requests to send and receive C2 information. | ['T1071.001'] |
Octopus has used HTTP GET and POST requests for C2 communications. | ['T1071.001'] |
OnionDuke uses HTTP and HTTPS for C2. | ['T1071.001'] |
OopsIE uses HTTP for C2 communications. | ['T1071.001'] |
Orangeworm has used HTTP for C2. | ['T1071.001'] |
Out1 can use HTTP and HTTPS in communications with remote hosts. | ['T1071.001'] |
OutSteel has used HTTP for C2 communications. | ['T1071.001'] |
OwaAuth uses incoming HTTP requests with a username keyword and commands and handles them as instructions to perform actions. | ['T1071.001'] |
PLEAD has used HTTP for communications with command and control (C2) servers. | ['T1071.001'] |
POWRUNER can use HTTP for C2 communications. | ['T1071.001'] |
PUNCHBUGGY enables remote interaction and can obtain additional code over HTTPS GET and POST requests. | ['T1071.001'] |
Pandora can communicate over HTTP. | ['T1071.001'] |
PcShare has used HTTP for C2 communication. | ['T1071.001'] |
PinchDuke transfers files from the compromised host via HTTP or HTTPS to a C2 server. | ['T1071.001'] |
PlugX can be configured to use HTTP for command and control. | ['T1071.001'] |
PoetRAT has used HTTP and HTTPs for C2 communications. | ['T1071.001'] |
PolyglotDuke has has used HTTP GET requests in C2 communications. | ['T1071.001'] |
Pony has sent collected information to the C2 via HTTP POST request. | ['T1071.001'] |
PoshC2 can use protocols like HTTP/HTTPS for command and control traffic. | ['T1071.001'] |
PowerShower has sent HTTP GET and POST requests to C2 servers to send information and receive instructions. | ['T1071.001'] |
Proxysvc uses HTTP over SSL to communicate commands with the control server. | ['T1071.001'] |
Psylo uses HTTPS for C2. | ['T1071.001'] |
Pteranodon can use HTTP for C2. | ['T1071.001'] |
Pupy can communicate over HTTP for C2. | ['T1071.001'] |
QUADAGENT uses HTTPS and HTTP for C2 communications. | ['T1071.001'] |
QakBot has the ability to use HTTP and HTTPS in communication with C2 servers. | ['T1071.001'] |
QuietSieve can use HTTPS in C2 communications. | ['T1071.001'] |
RATANKBA uses HTTP/HTTPS for command and control communication. | ['T1071.001'] |
RCSession can use HTTP in C2 communications. | ['T1071.001'] |
REvil has used HTTP and HTTPS in communication with C2. | ['T1071.001'] |
ROKRAT can use HTTP and HTTPS for command and control communication. | ['T1071.001'] |
RTM has initiated connections to external domains using HTTPS. | ['T1071.001'] |
RainyDay can use HTTP in C2 communications. | ['T1071.001'] |
Ramsay has used HTTP for C2. | ['T1071.001'] |
Rancor has used HTTP for C2. | ['T1071.001'] |
Remexi uses BITSAdmin to communicate with the C2 server over HTTP. | ['T1071.001'] |
Remsec is capable of using HTTP and HTTPS for C2. | ['T1071.001'] |
Rising Sun has used HTTP and HTTPS for command and control. | ['T1071.001'] |
Rocke has executed wget and curl commands to Pastebin over the HTTPS protocol. | ['T1071.001'] |
S-Type uses HTTP for C2. | ['T1071.001'] |
SLOTHFULMEDIA has used HTTP and HTTPS for C2 communications. | ['T1071.001'] |
SNUGRIDE communicates with its C2 server over HTTP. | ['T1071.001'] |
SUPERNOVA had to receive an HTTP GET request containing a specific set of parameters in order to execute. | ['T1071.001'] |
Sakula uses HTTP for C2. | ['T1071.001'] |
Sandworm Team's BCS-server tool connects to the designated C2 server via HTTP. | ['T1071.001'] |
SeaDuke uses HTTP and HTTPS for C2. | ['T1071.001'] |
ServHelper uses HTTP for C2. | ['T1071.001'] |
Shamoon has used HTTP for C2. | ['T1071.001'] |
ShimRat communicated over HTTP and HTTPS with C2 servers. | ['T1071.001'] |
ShimRatReporter communicated over HTTP with preconfigured C2 servers. | ['T1071.001'] |
Sibot communicated with its C2 server via HTTP GET requests. | ['T1071.001'] |
SideTwist has used HTTP GET and POST requests over port 443 for C2. | ['T1071.001'] |
SilverTerrier uses HTTP for C2 communications. | ['T1071.001'] |
Sliver has the ability to support C2 communications over HTTP/S. | ['T1071.001'] |
Small Sieve can contact actor-controlled C2 servers by using the Telegram API over HTTPS. | ['T1071.001'] |
Smoke Loader uses HTTP for C2. | ['T1071.001'] |
Some Reaver variants use HTTP for C2. | ['T1071.001'] |
SoreFang can use HTTP in C2 communications. | ['T1071.001'] |
Spark has used HTTP POST requests to communicate with its C2 server to receive commands. | ['T1071.001'] |
SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C server. | ['T1071.001'] |
Squirrelwaffle has used HTTP POST requests for C2 communications. | ['T1071.001'] |
Stealth Falcon malware communicates with its C2 server via HTTPS. | ['T1071.001'] |
StrongPity can use HTTP and HTTPS in C2 communications. | ['T1071.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.