text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Stuxnet uses HTTP to communicate with a command and control server. | ['T1071.001'] |
Sys10 uses HTTP for C2. | ['T1071.001'] |
TA551 has used HTTP for C2 communications. | ['T1071.001'] |
TSCookie can multiple protocols including HTTP and HTTPS in communication with command and control (C2) servers. | ['T1071.001'] |
Taidoor has used HTTP GET and POST requests for C2. | ['T1071.001'] |
The "Uploader" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands. | ['T1071.001'] |
The Komplex C2 channel uses HTTP POST requests. | ['T1071.001'] |
The Regin malware platform supports many standard protocols, including HTTP and HTTPS. | ['T1071.001'] |
ThiefQuest uploads files via unencrypted HTTP. | ['T1071.001'] |
Threat Group-3390 malware has used HTTP for C2. | ['T1071.001'] |
TinyTurla can use HTTPS in C2 communications. | ['T1071.001'] |
Tomiris can use HTTP to establish C2 communications. | ['T1071.001'] |
Torisma can use HTTP and HTTPS for C2 communications. | ['T1071.001'] |
TrickBot uses HTTPS to communicate with its C2 servers, to get malware updates, modules that perform most of the malware logic and various configuration files. | ['T1071.001'] |
Turian has the ability to use HTTP for its C2. | ['T1071.001'] |
Turla has used HTTP and HTTPS for C2 communications. | ['T1071.001'] |
UBoatRAT has used HTTP for C2 communications. | ['T1071.001'] |
UNC2452 used HTTP for C2 and data exfiltration. | ['T1071.001'] |
UPPERCUT has used HTTP for C2, including sending error codes in Cookie headers. | ['T1071.001'] |
Ursnif has used HTTPS for C2. | ['T1071.001'] |
VBShower has attempted to obtain a VBS script from command and control (C2) nodes over HTTP. | ['T1071.001'] |
VERMIN uses HTTP for C2 communications. | ['T1071.001'] |
VaporRage can use HTTP to download shellcode from compromised websites. | ['T1071.001'] |
Various implementations of CHOPSTICK communicate with C2 over HTTP. | ['T1071.001'] |
Vasport creates a backdoor by making a connection using a HTTP POST. | ['T1071.001'] |
WellMess can use HTTP and HTTPS in C2 communications. | ['T1071.001'] |
WinMM uses HTTP for C2. | ['T1071.001'] |
WindTail has the ability to use HTTP for C2 communications. | ['T1071.001'] |
Windshift has used tools that communicate with C2 over HTTP. | ['T1071.001'] |
Winnti for Linux has used HTTP in outbound communications. | ['T1071.001'] |
Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications. | ['T1071.001'] |
Wizard Spider has used HTTP for network communications. | ['T1071.001'] |
Xbash uses HTTP for C2 communications. | ['T1071.001'] |
YAHOYAH uses HTTP for C2. | ['T1071.001'] |
ZLib communicates over HTTP for C2. | ['T1071.001'] |
ZeroT has used HTTP for C2. | ['T1071.001'] |
Zeus Panda uses HTTP for C2 communications. | ['T1071.001'] |
ZxShell has used HTTP for C2 connections. | ['T1071.001'] |
httpclient uses HTTP for command and control. | ['T1071.001'] |
pngdowner uses HTTP for command and control. | ['T1071.001'] |
xCaon has communicated with the C2 server by sending POST requests over HTTP. | ['T1071.001'] |
CARROTBALL has the ability to use FTP in C2 communications. | ['T1071.002'] |
During Operation Honeybee, the threat actors had the ability to use FTP for C2. | ['T1071.002'] |
JPIN can communicate over FTP. | ['T1071.002'] |
Kimsuky has used FTP to download additional malware to the target machine. | ['T1071.002'] |
Machete malware used FTP for C2. | ['T1071.002'] |
Machete uses FTP for Command & Control. | ['T1071.002'] |
NOKKI has used FTP for C2 communications. | ['T1071.002'] |
SYSCON has the ability to use FTP in C2 communications. | ['T1071.002'] |
ShadowPad has used FTP for C2 communications. | ['T1071.002'] |
SilverTerrier uses FTP for C2 communications. | ['T1071.002'] |
XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system. | ['T1071.002'] |
ZxShell has used FTP for C2 connections. | ['T1071.002'] |
A SUGARDUMP variant used SMTP for C2. | ['T1071.003'] |
APT28 has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims. | ['T1071.003'] |
APT32 has used email for C2 via an Office macro. | ['T1071.003'] |
Agent Tesla has used SMTP for C2 communications. | ['T1071.003'] |
BadPatch uses SMTP for C2. | ['T1071.003'] |
CORESHELL can communicate over SMTP and POP3 for C2. | ['T1071.003'] |
Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails. | ['T1071.003'] |
JPIN can send email over SMTP. | ['T1071.003'] |
LightNeuron uses SMTP for C2. | ['T1071.003'] |
NavRAT uses the email platform, Naver, for C2 communications, leveraging SMTP. | ['T1071.003'] |
OLDBAIT can use SMTP for C2. | ['T1071.003'] |
RDAT can use email attachments for C2 communications. | ['T1071.003'] |
Remsec is capable of using SMTP for C2. | ['T1071.003'] |
SilverTerrier uses SMTP for C2 communications. | ['T1071.003'] |
Turla has used multiple backdoors which communicate with a C2 server via email attachments. | ['T1071.003'] |
Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3. | ['T1071.003'] |
Zebrocy uses SMTP and POP3 for C2. | ['T1071.003'] |
APT18 uses DNS for C2 communications. | ['T1071.004'] |
APT39 has used remote access tools that leverage DNS in communications with C2. | ['T1071.004'] |
APT41 used DNS for C2 communications. | ['T1071.004'] |
BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control. | ['T1071.004'] |
Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic. | ['T1071.004'] |
Cobalt Group has used DNS tunneling for C2. | ['T1071.004'] |
Cobalt Strike can use a custom command and control protocol that can be encapsulated in DNS. All protocols use their standard assigned ports. | ['T1071.004'] |
Cobalt Strike uses a custom command and control protocol that can encapsulated in DNS. All protocols use their standard assigned ports. | ['T1071.004'] |
Cobian RAT uses DNS for C2. | ['T1071.004'] |
DanBot can use use IPv4 A records and IPv6 AAAA DNS records in C2 communications. | ['T1071.004'] |
Denis has used DNS tunneling for C2 communications. | ['T1071.004'] |
DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records. | ['T1071.004'] |
Ebury has used DNS requests over UDP port 53 for C2. | ['T1071.004'] |
Gelsemium has the ability to use DNS in communication with C2. | ['T1071.004'] |
Goopy has the ability to communicate with its C2 over DNS. | ['T1071.004'] |
HTTPBrowser has used DNS for command and control. | ['T1071.004'] |
Helminth can use DNS for C2. | ['T1071.004'] |
Heyoka Backdoor can use DNS tunneling for C2 communications. | ['T1071.004'] |
InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies. | ['T1071.004'] |
Ke3chang malware RoyalDNS has used DNS for C2. | ['T1071.004'] |
LazyScripter has leveraged dynamic DNS providers for C2 communications. | ['T1071.004'] |
Matryoshka uses DNS for C2. | ['T1071.004'] |
Mythic supports DNS-based C2 profiles. | ['T1071.004'] |
NanHaiShu uses DNS for the C2 communications. | ['T1071.004'] |
OilRig has used DNS for C2 including the publicly available "requestbin.net" tunneling service. | ['T1071.004'] |
POWRUNER can use DNS for C2 communications. | ['T1071.004'] |
Pisloader uses DNS as its C2 protocol. | ['T1071.004'] |
RDAT has used DNS to communicate with the C2. | ['T1071.004'] |
Remsec is capable of using DNS for C2. | ['T1071.004'] |
SOUNDBITE communicates via DNS for C2. | ['T1071.004'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.