text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Bazar can decrypt downloaded payloads. Bazar also resolves strings and other artifacts at runtime.
['T1140']
Bisonal has decoded strings in the malware using XOR and RC4.
['T1140']
BoomBox can decrypt AES-encrypted files downloaded from C2.
['T1140']
Bumblebee can deobfuscate C2 server responses and unpack its code on targeted hosts.
['T1140']
Bundlore has used "openssl" to decrypt AES encrypted payload data. Bundlore has also used base64 and RC4 with a hardcoded key to deobfuscate data.
['T1140']
Carbon decrypts task and configuration files for execution.
['T1140']
Cardinal RAT decodes many of its artifacts and is decrypted (AES-128) after being downloaded.
['T1140']
Chaes has decrypted an AES encrypted binary file to trigger the download of other files.
['T1140']
CharmPower can decrypt downloaded modules prior to execution.
['T1140']
Chrommme can decrypt its encrypted internal code.
['T1140']
Clambling can deobfuscate its payload prior to execution.
['T1140']
Clop has used a simple XOR operation to decrypt strings.
['T1140']
Cobalt Strike can deobfuscate shellcode using a rolling XOR and decrypt metadata from Beacon sessions.
['T1140']
CoinTicker decodes the initially-downloaded hidden encoded file using OpenSSL.
['T1140']
CookieMiner has used Google Chrome's decryption and extraction operations.
['T1140']
Crimson can decode its encoded PE file prior to execution.
['T1140']
Cyclops Blink can decrypt and parse instructions sent from C2.
['T1140']
DDKONG decodes an embedded configuration using XOR.
['T1140']
DarkWatchman has the ability to self-extract as a RAR archive.
['T1140']
Darkhotel has decrypted strings and imports using RC4 during execution.
['T1140']
Denis will decrypt important strings used for C&C communication.
['T1140']
Drovorub has de-obsfuscated XOR encrypted payloads in WebSocket messages.
['T1140']
Dtrack has used a decryption routine that is part of an executable physical patch.
['T1140']
During Frankenstein, the threat actors deobfuscated Base64-encoded commands following the execution of a malicious script, which revealed a small script designed to obtain an additional payload.
['T1140']
During Operation Dust Storm, attackers used VBS code to decode payloads.
['T1140']
During Operation Honeybee, malicious files were decoded prior to execution.
['T1140']
During execution, Threat Group-3390 malware deobfuscates and decompresses code that was encoded with Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.
['T1140']
Earth Lusca has used certutil to decode a string into a cabinet file.
['T1140']
Ebury has verified C2 domain ownership by decrypting the TXT record using an embedded RSA public key.
['T1140']
Ecipekac has the ability to decrypt fileless loader modules.
['T1140']
Egregor has been decrypted before execution.
['T1140']
Exaramel for Linux can decrypt its configuration file.
['T1140']
Expand can be used to decompress a local or remote CAB file into an executable.
['T1140']
FatDuke can decrypt AES encrypted C2 communications.
['T1140']
FinFisher extracts and decrypts stage 3 malware, which is stored in encrypted resources.
['T1140']
For Operation Spalax, the threat actors used a variety of packers and droppers to decrypt malicious payloads.
['T1140']
Gelsemium can decompress and decrypt DLLs and shellcode.
['T1140']
GoldMax has decoded and decrypted the configuration file when executed.
['T1140']
Goopy has used a polymorphic decryptor to decrypt itself at runtime.
['T1140']
Green Lambert can use multiple custom routines to decrypt strings prior to execution.
['T1140']
GrimAgent can use a decryption algorithm for strings based on Rotate on Right (RoR) and Rotate on Left (RoL) functionality.
['T1140']
Hancitor has decoded Base64 encoded URLs to insert a recipient’s name into the filename of the Word document. Hancitor has also extracted executables from ZIP files.
['T1140']
HermeticWiper can decompress and copy driver files using `LZCopy`.
['T1140']
Heyoka Backdoor can decrypt its payload prior to execution.
['T1140']
Hildegard has decrypted ELF files with AES.
['T1140']
Honeybee drops a Word file containing a Base64-encoded file in it that is read, decoded, and dropped to the disk by the macro.
['T1140']
IceApple can use a Base64-encoded AES key to decrypt tasking.
['T1140']
Industroyer decrypts code to connect to a remote C2 server.
['T1140']
InvisiMole can decrypt, unpack and load a DLL from its resources, or from blobs encrypted with Data Protection API, two-key triple DES, and variations of the XOR cipher.
['T1140']
IronNetInjector has the ability to decrypt embedded .NET and PE payloads.
['T1140']
KGH_SPY can decrypt encrypted strings and write them to a newly created folder.
['T1140']
KOCTOPUS has deobfuscated itself before executing its commands.
['T1140']
Ke3chang has deobfuscated Base64-encoded shellcode strings prior to loading them.
['T1140']
Kerrdown can decode, decrypt, and decompress multiple layers of shellcode.
['T1140']
Kessel has decrypted the binary's configuration once the "main" function was launched.
['T1140']
Kobalos decrypts strings right after the initial communication, but before the authentication process.
['T1140']
Kwampirs decrypts and extracts a copy of its main DLL payload when executing.
['T1140']
Lazarus Group has used shellcode within macros to decrypt and manually map DLLs and shellcode into memory at runtime.
['T1140']
Leviathan has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors.
['T1140']
LightNeuron has used AES and XOR to decrypt configuration files and commands.
['T1140']
LiteDuke has the ability to decrypt and decode multiple layers of obfuscation.
['T1140']
Lokibot has decoded and decrypted its stages multiple times using hard-coded keys to deliver the final payload, and has decoded its server response hex string using XOR.
['T1140']
Lucifer can decrypt its C2 address upon execution.
['T1140']
MacMa decrypts a downloaded file using AES-128-EBC with a custom delta.
['T1140']
MirageFox has a function for decrypting data containing C2 configuration information.
['T1140']
Molerats decompresses ZIP files once on the victim machine.
['T1140']
Mongall has the ability to decrypt its payload prior to execution.
['T1140']
Mori can resolve networking APIs from strings that are ADD-encrypted.
['T1140']
NativeZone can decrypt and decode embedded Cobalt Strike beacon stage shellcode.
['T1140']
Netwalker's PowerShell script can decode and decrypt multiple layers of obfuscation, leading to the Netwalker DLL being loaded into memory.
['T1140']
OSX/Shlayer can base64-decode and AES-decrypt downloaded payloads. Versions of OSX/Shlayer pass encrypted and password-protected code to "openssl" and then write the payload to the "/tmp" folder.
['T1140']
Okrum's loader can decrypt the backdoor code, embedded within the loader or within a legitimate PNG file. A custom XOR cipher or RC4 is used for decryption.
['T1140']
One TYPEFRAME variant decrypts an archive using an RC4 key, then decompresses and installs the decrypted malicious DLL module. Another variant decodes the embedded file by XORing it with the value "0x35".
['T1140']
OnionDuke can use a custom decryption algorithm to decrypt strings.
['T1140']
OopsIE concatenates then decompresses multiple resources to load an embedded .Net Framework assembly.
['T1140']
P.A.S. Webshell can use a decryption mechanism to process a user supplied password and allow execution.
['T1140']
PUNCHBUGGY has used PowerShell to decode base64-encoded assembly.
['T1140']
PcShare has decrypted its strings by applying a XOR operation and a decompression using a custom implemented LZM algorithm.
['T1140']
Pillowmint has been decompressed by included shellcode prior to being launched.
['T1140']
PlugX decompresses and decrypts itself using the Microsoft API call RtlDecompressBuffer.
['T1140']
PoetRAT has used LZMA and base64 libraries to decode obfuscated scripts.
['T1140']
Proton uses an encrypted file to store commands and configuration values.
['T1140']
Pteranodon can decrypt encrypted data strings prior to using them.
['T1140']
PyDCrypt has decrypted and dropped the DCSrv payload to disk.
['T1140']
QUADAGENT uses AES and a preshared key to decrypt the custom Base64 routine used to encode strings and scripts.
['T1140']
QakBot can deobfuscate and re-assemble code strings for execution.
['T1140']
RDAT can deobfuscate the base64-encoded and AES-encrypted files downloaded from the C2 server.
['T1140']
REvil can decode encrypted strings to enable execution of commands and payloads.
['T1140']
RGDoor decodes Base64 strings and decrypts strings using a custom XOR algorithm.
['T1140']
ROKRAT can decrypt strings using the victim's hostname as the key.
['T1140']
Raindrop decrypted its Cobalt Strike payload using an AES-256 encryption algorithm in CBC mode with a unique key per sample.
['T1140']
Ramsay can extract its agent from the body of a malicious document.
['T1140']
RegDuke can decrypt strings with a key either stored in the Registry or hardcoded in the code.
['T1140']
Rising Sun has decrypted itself using a single-byte XOR scheme. Additionally, Rising Sun can decrypt its configuration data at runtime.
['T1140']
RogueRobin decodes an embedded executable using base64 and decompresses it.
['T1140']
SDBbot has the ability to decrypt and decompress its payload to enable code execution.
['T1140']
SUNSPOT decrypts SUNBURST, which was stored in AES128-CBC encrypted blobs.
['T1140']
Saint Bot can deobfuscate strings and files for execution.
['T1140']
Sandworm Team's VBS backdoor can decode Base64-encoded data and save it to the %TEMP% folder. The group also decrypted received information using the Triple DES algorithm and decompresses it using GZip.
['T1140']
ShadowPad has decrypted a binary blob to start execution.
['T1140']