prompt
stringclasses
508 values
procedure
stringlengths
20
478
Proxy:Multi-hop Proxy
During Operation Wocao, threat actors executed commands through the installed web shell via Tor exit nodes.
Proxy:Multi-hop Proxy
Siloscape uses Tor to communicate with C2.
Proxy:Multi-hop Proxy
StrongPity can use multiple layers of proxy servers to hide terminal nodes in its infrastructure.
Proxy:Multi-hop Proxy
Traffic traversing the Tor network will be forwarded to multiple nodes before exiting the Tor network and continuing on to its intended destination.
Proxy:Multi-hop Proxy
Uroburos can use implants on multiple compromised machines to proxy communications through its worldwide P2P network.
Proxy:Multi-hop Proxy
Ursnif has used Tor for C2.
Proxy:Multi-hop Proxy
WannaCry uses Tor for command and control traffic.
Proxy:Domain Fronting
It has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic.
Proxy:Domain Fronting
Cobalt Strike has the ability to accept a value for HTTP Host Header to enable domain fronting.
Proxy:Domain Fronting
meek uses Domain Fronting to disguise the destination of network traffic as another server that is hosted in the same Content Delivery Network (CDN) as the intended destination.
Proxy:Domain Fronting
Mythic supports domain fronting via custom request headers.
Proxy:Domain Fronting
SMOKEDHAM has used a fronted domain to obfuscate its hard-coded C2 server domain.
Remote Access Software
During C0015, the threat actors installed the AnyDesk remote desktop application onto the compromised network.
Remote Access Software
During C0018, the threat actors used AnyDesk to transfer tools between systems.
Remote Access Software
During C0027, It directed victims to run remote monitoring and management (RMM) tools.
Remote Access Software
It has a plugin for VNC and Ammyy Admin Tool.
Remote Access Software
It used legitimate programs such as AmmyyAdmin and Team Viewer for remote interactive C2 to target systems.
Remote Access Software
It used the Ammyy Admin tool as well as TeamViewer for remote access, including to preserve remote access if a Cobalt Strike module was lost.
Remote Access Software
It used DameWare Mini Remote Control for lateral movement.
Remote Access Software
Dridex contains a module for VNC.
Remote Access Software
Egregor has checked for the LogMein event log in an attempt to encrypt files in remote machines.
Remote Access Software
EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromrised machines.
Remote Access Software
It has utilized the remote management tool Atera to download malware to a compromised system.
Remote Access Software
It has used the cloud-based remote management and monitoring tool "ConnectWise Control" to deploy REvil.
Remote Access Software
Hildegard has established tmate sessions for C2 communications.
Remote Access Software
It has used a modified TeamViewer client as a command and control channel.
Remote Access Software
It has used a legitimate application, ScreenConnect, to manage systems remotely and move laterally.
Remote Access Software
It has installed TeamViewer on targeted systems.
Remote Access Software
During Night Dragon, threat actors used several remote administration tools as persistent infiltration channels.
Remote Access Software
It has the capability to download a VNC module from command and control (C2).
Remote Access Software
It has used a modified version of TeamViewer and Remote Utilities for remote access.
Remote Access Software
It has used remote administration tools or remote industrial control system client software for execution and to maliciously release electricity breakers.
Remote Access Software
It has established tmate sessions for C2 communications.
Remote Access Software
It used a cloud-based remote access software called LogMeIn for their attacks.
Remote Access Software
TrickBot uses vncDll module to remote control the victim machine.
Traffic Signaling
Chaos provides a reverse shell is triggered upon receipt of a packet with a special string, sent to any port.
Traffic Signaling
Kobalos is triggered by an incoming TCP connection to a legitimate service from a specific source port.
Traffic Signaling
Pandora can identify if incoming HTTP traffic contains a token and if so it will intercept the traffic and process the received command.
Traffic Signaling
Penquin will connect to C2 only after sniffing a "magic packet" value in TCP or UDP packets matching specific conditions.
Traffic Signaling
Ryuk has used Wake-on-Lan to power on turned off systems for lateral movement.
Traffic Signaling
SYNful Knock can be sent instructions via special packets to change its functionality. Code for new functionality can be included in these messages.
Traffic Signaling
Umbreon provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet.
Traffic Signaling
Uroburos can intercept the first client to server packet in the 3-way TCP handshake to determine if the packet contains the correct unique value for a specific Uroburos implant. If the value does not match, the packet and the rest of the TCP session are passed to the legitimate listening application.
Traffic Signaling
Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control (C2) mechanism.
Traffic Signaling:Port Knocking
Mafalda can use port-knocking to authenticate itself to another implant called Cryshell to establish an indirect connection to the C2 server.
Traffic Signaling:Port Knocking
metaMain has authenticated itself to a different implant, Cryshell, through a port knocking and handshake procedure.
Traffic Signaling:Port Knocking
It has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.
Traffic Signaling:Socket Filters
Penquin installs a TCP and UDP filter on the eth0 interface.
Web Service
It has used Dropbox, Amazon S3, and Google Drive to host malicious downloads.
Web Service
BADHATCH can be utilized to abuse sslip.io, a free IP to domain mapping service, as part of actor-controlled C2 channels.
Web Service
Bazar downloads have been hosted on Google Docs.
Web Service
BoomBox can download files from Dropbox using a hardcoded access token.
Web Service
Brute Ratel C4 can use legitimate websites for external C2 channels including Slack, Discord, and MS Teams.
Web Service
Bumblebee has been downloaded to victim's machines from OneDrive.
Web Service
During C0017, It used the Cloudflare services for C2 communications.
Web Service
During C0027, It downloaded tools from sites including file.io, GitHub, and paste.ee.
Web Service
Carbon can use Pastebin to receive C2 commands.
Web Service
CharmPower can download additional modules from actor-controlled Amazon S3 buckets.
Web Service
DarkTortilla can retrieve its primary payload from public sites such as Pastebin and Textbin.
Web Service
Doki has used the dogechain.info API to generate a C2 address.
Web Service
DropBook can communicate with its operators by exploiting the Simplenote, DropBox, and the social media platform, Facebook, where it can create fake accounts to control the backdoor and receive instructions.
Web Service
It has used Discord's content delivery network (CDN) to deliver malware and malicious scripts to a compromised host.
Web Service
It has used file-sharing services including WeTransfer, TransferNow, and OneDrive to deliver payloads.
Web Service
It has used Pastebin and Google Storage to host content for their operations.
Web Service
It has used sslip.io, a free IP to domain mapping service that also makes SSL certificate generation easier for traffic encryption, as part of their command and control.
Web Service
It has used Amazon Web Services to host C2.
Web Service
It has used GitHub repositories for downloaders which will be obtained by the group's .NET executable on the compromised system.
Web Service
GuLoader has the ability to download malware from Google Drive.
Web Service
Hildegard has downloaded scripts from GitHub.
Web Service
It has incorporated at least five different cloud service providers into their C2 infrastructure including CloudMe.
Web Service
It has used GitHub to host its payloads to operate spam campaigns.
Web Service
It has used DropBox URLs to deliver variants of PlugX.
Web Service
NETWIRE has used web services including Paste.ee to host payloads.
Web Service
ngrok has been used by threat actors to proxy C2 connections to ngrok service subdomains.
Web Service
During Operation Spalax, the threat actors used OneDrive and MediaFire to host payloads.
Web Service
It has used Pastebin, Gitee, and GitLab for Command and Control.
Web Service
SharpStage has used a legitimate web service for evading detection.
Web Service
Sibot has used a legitimate compromised website to download DLLs to the victim's machine.
Web Service
SMOKEDHAM has used Google Drive and Dropbox to host files downloaded by victims via malicious links.
Web Service
Snip3 can download additional payloads from web services including Pastebin and top4top.
Web Service
It has leveraged iplogger.org to send collected data back to C2.
Web Service
It has used legitimate web services including Pastebin, Dropbox, and GitHub for C2 communications.
Web Service
WhisperGate can download additional payloads hosted on a Discord channel.
Web Service:Dead Drop Resolver
It used legitimate websites for C2 through dead drop resolvers (DDR), including GitHub, Pastebin, and Microsoft TechNet.
Web Service:Dead Drop Resolver
Astaroth can store C2 information on cloud hosting services such as AWS and CloudFlare and websites like YouTube and Facebook.
Web Service:Dead Drop Resolver
BADNEWS collects C2 information via a dead drop resolver.
Web Service:Dead Drop Resolver
BLACKCOFFEE uses Microsoft’s TechNet Web portal to obtain a dead drop resolver containing an encoded tag with the IP address of a command and control server.
Web Service:Dead Drop Resolver
It's MSGET downloader uses a dead drop resolver to access malicious payloads.
Web Service:Dead Drop Resolver
During C0017, It used dead drop resolvers on two separate tech community forums for their KEYPLUG Windows-version backdoor; notably It updated the community forum posts frequently with new dead drop resolvers during the campaign.
Web Service:Dead Drop Resolver
CharmPower can retrieve C2 domain information from actor-controlled S3 buckets.
Web Service:Dead Drop Resolver
Grandoreiro can obtain C2 information from Google Docs.
Web Service:Dead Drop Resolver
Javali can read C2 information from Google Documents and YouTube.
Web Service:Dead Drop Resolver
The KEYPLUG Windows variant has retrieved C2 addresses from encoded data in posts on tech community forums.
Web Service:Dead Drop Resolver
Metamorfo has used YouTube to store and hide C&C server domains.
Web Service:Dead Drop Resolver
Some MiniDuke components use Twitter to initially obtain the address of a C2 server or as a backup if no hard-coded C2 server responds.
Web Service:Dead Drop Resolver
It hides base64-encoded and encrypted C2 server locations in comments on legitimate websites.
Web Service:Dead Drop Resolver
PlugX uses Pastebin to store C2 addresses.
Web Service:Dead Drop Resolver
PolyglotDuke can use Twitter, Reddit, Imgur and other websites to get a C2 URL.
Web Service:Dead Drop Resolver
It has used Pastebin to check the version of beaconing malware and redirect to another Pastebin hosting updated malware.
Web Service:Dead Drop Resolver
It has used an RSS feed on Livejournal to update a list of encrypted C2 server names. It has also hidden Pony C2 server IP addresses within transactions on the Bitcoin and Namecoin blockchain.