Каталоги
- Сертификаты СЗИ - Государственный реестр сертифицированных средств защиты информации опубликованный Федеральной службой по техническому и экспортному контролю, может быть использован для контроля актуальности используемых СЗИ в организации.
- CVE уязвимости - общедоступная публичная база уязвимостей Common Vulnerabilities and Exposures (CVE). Миссия программы CVE заключается в выявлении, определении и каталогизации публично раскрываемых уязвимостей в сфере кибербезопасности. Для каждой уязвимости в каталоге существует одна запись CVE. Уязвимости обнаруживаются, затем присваиваются и публикуются организациями по всему миру, которые сотрудничают с программой CVE. Партнеры публикуют записи CVE для единообразного описания уязвимостей. Специалисты в области информационных технологий и кибербезопасности используют записи CVE, чтобы убедиться, что они обсуждают одну и ту же проблему, и координировать свои усилия по определению приоритетности и устранению уязвимостей.
- БДУ ФСТЭК уязвимости - раздел Уязвимости Банка данных уязвимостей опубликованная Федеральной службой по техническому и экспортному контролю совместно с Государственным научно-исследовательским испытательным институтом проблем технической защиты информации. Одной из целей создания банка данных угроз безопасности информации является объединение специалистов в области информационной безопасности для решения задач повышения защищенности информационных систем.
- НКЦКИ уязвимости - общедоступная публичная база уязвимостей Национального координационного центра по компьютерным инцидентам (НКЦКИ), обеспечивающего координацию деятельности субъектов КИИ по обнаружению, предупреждению, ликвидации последствий компьютерных атак и реагированию на компьютерные инциденты.
- MITRE ATT&CK – Adversarial Tactics, Techniques & Common Knowledge – Тактики, техники и общеизвестные знания о злоумышленниках. Это основанная на реальных наблюдениях база знаний компании Mitre, содержащая описание тактик, приемов и методов, используемых киберпреступниками. База создана в 2013 году и регулярно обновляется, цель – составление структурированной матрицы используемых киберпреступниками приемов, чтобы упростить задачу реагирования на киберинциденты.
- БДУ ФСТЭК и Новая БДУ ФСТЭК – раздел Угрозы Банка данных угроз, опубликованный в 2015 году Федеральной службой по техническому и экспортному контролю и Государственным научно-исследовательским испытательным институтом проблем технической защиты информации, обязателен при моделировании угроз при построении систем защиты персональных данных, критической информационной инфраструктуры, государственных информационных систем.
CVE, БДУ ФСТЭК и НКЦКИ
Интерфейс каталогов идентичен и содержит следующие блоки:
- Метрики:
- Найденные уязвимости – отображает количество найденных в отчетах от сканеров уязвимостей которые связаны с уязвимостями из каталога, при нажатии на виджет перенаправляет в модуль Технические уязвимости с установленным фильтром по названию каталога (тип фильтра Группа уязвимостей);
- Уязвимые хосты – отображает количество хостов на которых обнаружены уязвимости связанные с уязвимостями из каталога, при нажатии на виджет перенаправляет в модуль Технические уязвимости с установленным фильтром по названию каталога (тип фильтра Группа уязвимостей).
- Табличную часть Каталог уязвимостей:
- Фильтр по полю Идентификатор - особенностью данного фильтра является автоматический разбор текста с последующим извлечением из текста идентификаторов. Для этого необходимо вставить произвольный текст с идентификаторами в поле и добавить в фильтр через кнопку плюс;
- Табличную часть с полями для каталогов CVE и БДУ ФСТЭК:
- Идентификатор - id уязвимости в базе уязвимостей;
- Описание - текстовое описание уязвимости;
- Обнаружено - флаг, данный статус отображается если уязвимость обнаружена в отчетах о сканировании;
- CVSS - числовая оценка уязвимости согласно источнику, с указанием даты выявления уязвимости экспертами, оценка отображается цветом согласно оценке CVSS 0.1 – 3.9 Low Зеленый,
4.0 – 6.9 Medium Желтый, 7.0 – 8.9 High Оранжевый, 9.0 – 10.0 Critical Красный.
- Табличную часть с полями для каталогов CVE :
- Дата бюллетеня - информация о дате публикации бюллетеня содержащего уязвимости;
- Идентификатор - id уязвимости в базе уязвимостей;
- Информация - текстовое описание уязвимости;
- Вектор атаки - локальный или сетевой вектор атаки;
- Обнаружено - флаг, данный статус отображается если уязвимость обнаружена в отчетах о сканировании;
- Наличие обновления - - флаг, данный статус отображается если база уязвимостей содержит информацию о наличии обновлений от производителя уязвимого ПО;
- Дата выявления - даты выявления уязвимости экспертами.
- Чекбокс «Только обнаруженные уязвимости» - устанавливает фильтр на табличную часть для отображения только обнаруженные уязвимости.
- Функционал для экспорта всех уязвимостей каталога.
- Для каталога добавляется функционал Варианты отображения:
- Бюллетени - изменяет отображение табличной части на реестр бюллетеней, отображает общее количество уязвимостей в бюллетени в поле Уязвимостей в бюллетени и статус по обнаружению в поле Обнаружено - данный статус отображается если хотя бы одна уязвимость из бюллетеня обнаружена в инфраструктуре.
- Уязвимости.
MITRE ATT&CK, БДУ ФСТЭК, Новая БДУ ФСТЭК
Каждый из указанных каталогов сформирован по собственной схеме данных, которая не соответствует подходу оценки риска, используемому в сервисе. Но в основе своей указанные базы описывают все те же риски информационной безопасности, каждый под своим углом. Поэтому они добавлены в сервис и как отдельные компоненты и как основа для создания рисков, угроз или уязвимостей.
Каталоги могут использоваться в сервисе с целью:
- Облегчения процесса формирования рисков, угроз и уязвимостей;
- Обогащения информации по рискам (угрозам, уязвимостям) созданным в сервисе.
- Взгляда на компанию и оценку рисков через публичные каталоги угроз.
- Уязвимости могут быть связаны с угрозами БДУ ФСТЭК, техниками ATT&CK и способами реализации Новой БДУ ФСТЭК.
- Угрозы могут быть связаны с угрозами БДУ ФСТЭК, техниками ATT&CK, угрозами и последствиями Новой БДУ ФСТЭК.
- Риски могут быть связаны с угрозами БДУ ФСТЭК, техниками ATT&CK, угрозами, способами реализации и последствиями Новой БДУ ФСТЭК.
Для рисков, угроз и уязвимостей из базы Community связи с каталогами угроз уже установлены.
Связь с каталогом угроз может быть прямой или косвенной. Например, если уязвимость связана с угрозой из БДУ ФСТЭК то и все риски, в составе которых есть данная уязвимость будут автоматически связаны с угрозой из БДУ ФСТЭК.
Каталог БДУ ФСТЭК - это реестр рисков от банка данных угроз безопасности информации ФСТЭК России.
Каждая угроза содержит описание, рекомендации к каким типам активов может быть применена эта угроза, классификация по свойствам информации и вероятные источники угрозы. Дополнительно в блоке Связанные риски указаны связанные риски, а в блоке Каталоги указываются связи с записями из других каталогов.
Каталог Новая БДУ ФСТЭК от банка данных угроз безопасности информации ФСТЭК России содержит:
- матрицу Способы реализации (возникновения угроз) - каждая ячейка которых содержит описание поверхности атаки: группу способов, уровень возможностей нарушителя, возможные реализуемые угрозы, компоненты объектов воздействия, возможные меры защиты;
- Негативные последствия - перечень негативных последствий в классификации ФСТЭК в виде кода и описания;
- Угрозы - реестр угроз с описанием, каждая угроза содержит возможные объекты воздействия и возможные способы реализации угроз;
- Объекты - перечень объектов последствий с описанием и компонентами которые могут входить в состав объекта;
- Компоненты - перечень компонентов объектов воздействия с указанием объектов воздействия на которых они могут располагаться;
- Нарушители - уровни возможностей нарушителей классифицированные по возможностям и компетенции;
- Меры защиты - в терминологии SECURITM это список требований выполнение которых сокращает возможности нарушителя.
- Матрица - содержит тактики и техники злоумышленника, позволяет на основании тактики или техники создать риск или уязвимость, в матрице указаны связи с рисками в базе Community и с рисками в базе команды;
- Тактики - направления действия нарушителя на том или ином этапе cyberkillchane;
- Техники - конкретные действия нарушителя для достижения цели на конкретном шаге cyberkillchane;
- Контрмеры - в терминологии SECURITM это список требований выполнение которых сокращает возможности нарушителя;
- Преступные группы - описание APT группировок и их особенности и модель поведения;
- Инструменты - ПО используемое нарушителями для вредоносного воздействия.
Сертификаты СЗИ
- Имеющиеся СЗИ - отображает количество активов у которых заполнено поле Номер сертификата СЗИ;
- Скоро будут просрочены - отображает количество активов у которых срок действия сертификата меньше 90 календарных дней;
- Просроченные сертификаты - отображает количество активов у которых срок действия сертификата уже истек;
- Истекшая поддержка - отображает количество активов у которых срок действия сертификата уже истек.
- Номер сертификата;
- Дата внесения в реестр;
- Срок действия сертификата;
- Срок окончания тех. поддержки;
- Наименование средства (шифр);
- Схема сертификации;
- Испытательная лаборатория;
- Орган по сертификации;
- Заявитель;
- Наименования документов соответствия;
- Реквизиты заявителя.
Передача инструментов из внешней сети
Adversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may be copied from an external adversary-controlled system to the victim network through the command and control channel or through alternate protocols such as ftp. Once present, adversaries may also transfer/spread tools between victim devices within a compromised environment (i.e. Lateral Tool Transfer).
On Windows, adversaries may use various utilities to download tools, such as `copy`, `finger`, certutil, and PowerShell commands such as IEX(New-Object Net.WebClient).downloadString() and Invoke-WebRequest. On Linux and macOS systems, a variety of utilities also exist, such as `curl`, `scp`, `sftp`, `tftp`, `rsync`, `finger`, and `wget`.(Citation: t1105_lolbas) A number of these tools, such as `wget`, `curl`, and `scp`, also exist on ESXi. After downloading a file, a threat actor may attempt to verify its integrity by checking its hash value (e.g., via `certutil -hashfile`).(Citation: Google Cloud Threat Intelligence COSCMICENERGY 2023)
Adversaries may also abuse installers and package managers, such as `yum` or `winget`, to download tools to victim hosts. Adversaries have also abused file application features, such as the Windows `search-ms` protocol handler, to deliver malicious files to victims through remote file searches invoked by User Execution (typically after interacting with Phishing lures).(Citation: T1105: Trellix_search-ms)
Files can also be transferred using various Web Services as well as native or otherwise present tools on the victim system.(Citation: PTSecurity Cobalt Dec 2016) In some cases, adversaries may be able to leverage services that sync between a web-based and an on-premises client, such as Dropbox or OneDrive, to transfer files onto victim systems. For example, by compromising a cloud account and logging into the service's web portal, an adversary may be able to trigger an automatic syncing process that transfers the file onto the victim's machine.(Citation: Dropbox Malware Sync)
Примеры процедур |
|
| Название | Описание |
|---|---|
| TrickBot |
TrickBot downloads several additional files and saves them to the victim's machine.(Citation: Trend Micro Totbrick Oct 2016)(Citation: Bitdefender Trickbot VNC module Whitepaper 2021) |
| PowerDuke |
PowerDuke has a command to download a file.(Citation: Volexity PowerDuke November 2016) |
| BLINDINGCAN |
BLINDINGCAN has downloaded files to a victim machine.(Citation: US-CERT BLINDINGCAN Aug 2020) |
| Wiarp |
Wiarp creates a backdoor through which remote attackers can download files.(Citation: Symantec Wiarp May 2012) |
| RCSession |
RCSession has the ability to drop additional files to an infected machine.(Citation: Profero APT27 December 2020) |
| RemoteUtilities |
RemoteUtilities can upload and download files to and from a target machine.(Citation: Trend Micro Muddy Water March 2021) |
| QuietSieve |
QuietSieve can download and execute payloads on a target host.(Citation: Microsoft Actinium February 2022) |
| Bumblebee |
Bumblebee can download and execute additional payloads including through the use of a `Dex` command.(Citation: Google EXOTIC LILY March 2022)(Citation: Proofpoint Bumblebee April 2022)(Citation: Symantec Bumblebee June 2022) |
| Amadey |
Amadey can download and execute files to further infect a host machine with additional malware.(Citation: BlackBerry Amadey 2020) |
| NICECURL |
NICECURL has the ability to download additional content onto an infected machine, e.g. by using `curl`.(Citation: Mandiant APT42-untangling) |
| Orz |
Orz can download files onto the victim.(Citation: Proofpoint Leviathan Oct 2017) |
| NOKKI |
NOKKI has downloaded a remote module for execution.(Citation: Unit 42 NOKKI Sept 2018) |
| Backdoor.Oldrea |
Backdoor.Oldrea can download additional modules from C2.(Citation: Gigamon Berserk Bear October 2021) |
| DOGCALL |
DOGCALL can download and execute additional payloads.(Citation: Unit 42 Nokki Oct 2018) |
| Downdelph |
After downloading its main config file, Downdelph downloads multiple payloads from C2 servers.(Citation: ESET Sednit Part 3) |
| SEASHARPEE |
SEASHARPEE can download remote files onto victims.(Citation: FireEye APT34 Webinar Dec 2017) |
| POWRUNER |
POWRUNER can download or upload files from its C2 server.(Citation: FireEye APT34 Dec 2017) |
| certutil |
certutil can be used to download files from a given URL.(Citation: TechNet Certutil)(Citation: LOLBAS Certutil) |
| TDTESS |
TDTESS has a command to download and execute an additional file.(Citation: ClearSky Wilted Tulip July 2017) |
| SharpStage |
SharpStage has the ability to download and execute additional payloads via a DropBox API.(Citation: Cybereason Molerats Dec 2020)(Citation: BleepingComputer Molerats Dec 2020) |
| Sardonic |
Sardonic has the ability to upload additional malicious files to a compromised machine.(Citation: Bitdefender Sardonic Aug 2021) |
| Smoke Loader |
Smoke Loader downloads a new version of itself once it has installed. It also downloads additional plugins.(Citation: Malwarebytes SmokeLoader 2016) |
| Misdat |
Misdat is capable of downloading files from the C2.(Citation: Cylance Dust Storm) |
| reGeorg |
reGeorg has the ability to download files to targeted systems.(Citation: GitHub Neo-reGeorg 2019) |
| Emissary |
Emissary has the capability to download files from the C2 server.(Citation: Lotus Blossom Dec 2015) |
| Exaramel for Linux |
Exaramel for Linux has a command to download a file from and to a remote C2 server.(Citation: ESET TeleBots Oct 2018)(Citation: ANSSI Sandworm January 2021) |
| ShimRatReporter |
ShimRatReporter had the ability to download additional payloads.(Citation: FOX-IT May 2016 Mofang) |
| KEYMARBLE |
KEYMARBLE can upload files to the victim’s machine and can download additional payloads.(Citation: US-CERT KEYMARBLE Aug 2018) |
| Sliver |
Sliver can download additional content and files from the Sliver server to the client residing on the victim machine using the |
| SILENTTRINITY |
SILENTTRINITY can load additional files and tools, including Mimikatz.(Citation: GitHub SILENTTRINITY Modules July 2019) |
| TAMECAT |
TAMECAT has used `wget` and `curl` to download additional content.(Citation: Mandiant APT42-untangling) |
| PS1 |
CostaBricks can download additional payloads onto a compromised host.(Citation: BlackBerry CostaRicto November 2020) |
| Ursnif |
Ursnif has dropped payload and configuration files to disk. Ursnif has also been used to download and execute additional payloads.(Citation: TrendMicro PE_URSNIF.A2)(Citation: TrendMicro BKDR_URSNIF.SM) |
| ThreatNeedle |
ThreatNeedle can download additional tools to enable lateral movement.(Citation: Kaspersky ThreatNeedle Feb 2021) |
| ZLib |
ZLib has the ability to download files.(Citation: Cylance Dust Storm) |
| RedLeaves |
RedLeaves is capable of downloading a file from a specified URL.(Citation: PWC Cloud Hopper Technical Annex April 2017) |
| POWERSOURCE |
POWERSOURCE has been observed being used to download TEXTMATE and the Cobalt Strike Beacon payload onto victims.(Citation: FireEye FIN7 March 2017) |
| Felismus |
Felismus can download files from remote servers.(Citation: Forcepoint Felismus Mar 2017) |
| Zeus Panda |
Zeus Panda can download additional malware plug-in modules and execute them on the victim’s machine.(Citation: GDATA Zeus Panda June 2017) |
| CARROTBAT |
CARROTBAT has the ability to download and execute a remote file via certutil.(Citation: Unit 42 CARROTBAT November 2018) |
| WEBC2 |
WEBC2 can download and execute a file.(Citation: Mandiant APT1) |
| Bankshot |
Bankshot uploads files and secondary payloads to the victim's machine.(Citation: US-CERT Bankshot Dec 2017) |
| SharpDisco |
SharpDisco has been used to download a Python interpreter to `C:\Users\Public\WinTN\WinTN.exe` as well as other plugins from external sources.(Citation: MoustachedBouncer ESET August 2023) |
| StrongPity |
StrongPity can download files to specified targets.(Citation: Bitdefender StrongPity June 2020) |
| HAPPYWORK |
can download and execute a second-stage payload.(Citation: FireEye APT37 Feb 2018) |
| xCaon |
xCaon has a command to download files to the victim's machine.(Citation: Checkpoint IndigoZebra July 2021) |
| PLAINTEE |
PLAINTEE has downloaded and executed additional plugins.(Citation: Rancor Unit42 June 2018) |
| Pony |
Pony can download additional files onto the infected system.(Citation: Malwarebytes Pony April 2016) |
| Nebulae |
Nebulae can download files from C2.(Citation: Bitdefender Naikon April 2021) |
| AuditCred |
AuditCred can download files and additional malware.(Citation: TrendMicro Lazarus Nov 2018) |
| Kasidet |
Kasidet has the ability to download and execute additional files.(Citation: Zscaler Kasidet) |
| Hannotog |
Hannotog can download additional files to the victim machine.(Citation: Symantec Bilbug 2022) |
| RainyDay |
RainyDay can download files to a compromised host.(Citation: Bitdefender Naikon April 2021) |
| Ecipekac |
Ecipekac can download additional payloads to a compromised host.(Citation: Securelist APT10 March 2021) |
| BUSHWALK |
BUSHWALK can write malicious payloads sent through a web request’s command parameter.(Citation: Mandiant Cutting Edge Part 2 January 2024)(Citation: Mandiant Cutting Edge Part 3 February 2024) |
| macOS.OSAMiner |
macOS.OSAMiner has used `curl` to download a Stripped Payloads from a public facing adversary-controlled webpage. |
| LOWBALL |
LOWBALL uses the Dropbox API to request two files, one of which is the same file as the one dropped by the malicious email attachment. This is most likely meant to be a mechanism to update the compromised host with a new version of the LOWBALL malware.(Citation: FireEye admin@338) |
| NETWIRE |
NETWIRE can downloaded payloads from C2 to the compromised host.(Citation: FireEye NETWIRE March 2019)(Citation: Proofpoint NETWIRE December 2020) |
| TinyTurla |
TinyTurla has the ability to act as a second-stage dropper used to infect the system with additional malware.(Citation: Talos TinyTurla September 2021) |
| PowerExchange |
PowerExchange can decode Base64-encoded files and call `WriteAllBytes` to write the files to compromised hosts.(Citation: Symantec Crambus OCT 2023) |
| IMAPLoader |
IMAPLoader is a loader used to retrieve follow-on payload encoded in email messages for execution on victim systems.(Citation: PWC Yellow Liderc 2023) |
| GreyEnergy |
GreyEnergy can download additional modules and payloads.(Citation: ESET GreyEnergy Oct 2018) |
| Aria-body |
Aria-body has the ability to download additional payloads from C2.(Citation: CheckPoint Naikon May 2020) |
| Emotet |
Emotet can download follow-on payloads and items via malicious `url` parameters in obfuscated PowerShell code.(Citation: Pincus Emotet 2020) |
| Crimson |
Crimson contains a command to retrieve files from its C2 server.(Citation: Proofpoint Operation Transparent Tribe March 2016)(Citation: Kaspersky Transparent Tribe August 2020)(Citation: Cisco Talos Transparent Tribe Education Campaign July 2022) |
| Tomiris |
Tomiris can download files and execute them on a victim's system.(Citation: Kaspersky Tomiris Sep 2021) |
| DUSTTRAP |
DUSTTRAP can retrieve and load additional payloads.(Citation: Google Cloud APT41 2024) |
| Empire |
Empire can upload and download to and from a victim machine.(Citation: Github PowerShell Empire) |
| Turian |
Turian can download additional files and tools from its C2.(Citation: ESET BackdoorDiplomacy Jun 2021) |
| BADHATCH |
BADHATCH has the ability to load a second stage malicious DLL file onto a compromised machine.(Citation: Gigamon BADHATCH Jul 2019) |
| Machete |
Machete can download additional files for execution on the victim’s machine.(Citation: ESET Machete July 2019) |
| PowerLess |
PowerLess can download additional payloads to a compromised host.(Citation: Cybereason PowerLess February 2022) |
| Action RAT |
Action RAT has the ability to download additional payloads onto an infected machine.(Citation: MalwareBytes SideCopy Dec 2021) |
| Avenger |
Avenger has the ability to download files from C2 to a compromised host.(Citation: Trend Micro Tick November 2019) |
| Gootloader |
Gootloader can fetch second stage code from hardcoded web domains.(Citation: Sophos Gootloader)(Citation: SentinelOne Gootloader June 2021) |
| WellMess |
WellMess can write files to a compromised host.(Citation: PWC WellMess July 2020)(Citation: CISA WellMess July 2020) |
| Dacls |
Dacls can download its payload from a C2 server.(Citation: SentinelOne Lazarus macOS July 2020)(Citation: TrendMicro macOS Dacls May 2020) |
| DropBook |
DropBook can download and execute additional files.(Citation: Cybereason Molerats Dec 2020)(Citation: BleepingComputer Molerats Dec 2020) |
| Woody RAT |
Woody RAT can download files from its C2 server, including the .NET DLLs, `WoodySharpExecutor` and `WoodyPowerSession`.(Citation: MalwareBytes WoodyRAT Aug 2022) |
| Mafalda |
Mafalda can download additional files onto the compromised host.(Citation: SentinelLabs Metador Technical Appendix Sept 2022) |
| KARAE |
KARAE can upload and download files, including second-stage malware.(Citation: FireEye APT37 Feb 2018) |
| Squirrelwaffle |
Squirrelwaffle has downloaded and executed additional encoded payloads.(Citation: ZScaler Squirrelwaffle Sep 2021)(Citation: Netskope Squirrelwaffle Oct 2021) |
| PolyglotDuke |
PolyglotDuke can retrieve payloads from the C2 server.(Citation: ESET Dukes October 2019) |
| Hildegard |
Hildegard has downloaded additional scripts that build and run Monero cryptocurrency miners.(Citation: Unit 42 Hildegard Malware) |
| Agent.btz |
Agent.btz attempts to download an encrypted binary from a specified domain.(Citation: ThreatExpert Agent.btz) |
| SLOWDRIFT |
SLOWDRIFT downloads additional payloads.(Citation: FireEye APT37 Feb 2018) |
| SHUTTERSPEED |
SHUTTERSPEED can download and execute an arbitary executable.(Citation: FireEye APT37 Feb 2018) |
| SombRAT |
SombRAT has the ability to download and execute additional payloads.(Citation: BlackBerry CostaRicto November 2020)(Citation: FireEye FiveHands April 2021)(Citation: CISA AR21-126A FIVEHANDS May 2021) |
| ODAgent |
ODAgent has the ability to download and execute files on compromised systems.(Citation: ESET OilRig Downloaders DEC 2023) |
| FlawedAmmyy |
FlawedAmmyy can transfer files from C2.(Citation: Korean FSI TA505 2020) |
| Snip3 |
Snip3 can download additional payloads to compromised systems.(Citation: Morphisec Snip3 May 2021)(Citation: Telefonica Snip3 December 2021) |
| FYAnti |
FYAnti can download additional payloads to a compromised host.(Citation: Securelist APT10 March 2021) |
| HOPLIGHT |
HOPLIGHT has the ability to connect to a remote host in order to upload and download files.(Citation: US-CERT HOPLIGHT Apr 2019) |
| GuLoader |
GuLoader can download further malware for execution on the victim's machine.(Citation: Medium Eli Salem GuLoader April 2021) |
| MobileOrder |
MobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card.(Citation: Scarlet Mimic Jan 2016) |
| RegDuke |
RegDuke can download files from C2.(Citation: ESET Dukes October 2019) |
| InvisiMole |
InvisiMole can upload files to the victim's machine for operations.(Citation: ESET InvisiMole June 2018)(Citation: ESET InvisiMole June 2020) |
| P.A.S. Webshell |
P.A.S. Webshell can upload and download files to and from compromised hosts.(Citation: ANSSI Sandworm January 2021) |
| Volgmer |
Volgmer can download remote files and additional payloads to the victim's machine.(Citation: US-CERT Volgmer Nov 2017)(Citation: US-CERT Volgmer 2 Nov 2017)(Citation: Symantec Volgmer Aug 2014) |
| WhisperGate |
WhisperGate can download additional stages of malware from a Discord CDN channel.(Citation: Microsoft WhisperGate January 2022)(Citation: Unit 42 WhisperGate January 2022)(Citation: Cisco Ukraine Wipers January 2022)(Citation: Medium S2W WhisperGate January 2022) |
| ZeroT |
ZeroT can download additional payloads onto the victim.(Citation: Proofpoint ZeroT Feb 2017) |
| RDAT |
RDAT can download files via DNS.(Citation: Unit42 RDAT July 2020) |
| Skidmap |
Skidmap has the ability to download files on an infected host.(Citation: Trend Micro Skidmap) |
| Okrum |
Okrum has built-in commands for uploading, downloading, and executing files to the system.(Citation: ESET Okrum July 2019) |
| Bonadan |
Bonadan can download additional modules from the C2 server.(Citation: ESET ForSSHe December 2018) |
| Neoichor |
Neoichor can download additional files onto a compromised host.(Citation: Microsoft NICKEL December 2021) |
| Raspberry Robin |
Raspberry Robin retrieves its second stage payload in a variety of ways such as through msiexec.exe abuse, or running the curl command to download the payload to the victim's |
| RemoteCMD |
RemoteCMD copies a file over to the remote system before execution.(Citation: Symantec Buckeye) |
| Diavol |
Diavol can receive configuration updates and additional payloads including wscpy.exe from C2.(Citation: Fortinet Diavol July 2021) |
| Doki |
Doki has downloaded scripts from C2.(Citation: Intezer Doki July 20) |
| IcedID |
IcedID has the ability to download additional modules and a configuration file from C2.(Citation: IBM IcedID November 2017)(Citation: Juniper IcedID June 2020)(Citation: DFIR_Quantum_Ransomware)(Citation: Latrodectus APR 2024) |
| VERMIN |
VERMIN can download and upload files to the victim's machine.(Citation: Unit 42 VERMIN Jan 2018) |
| UBoatRAT |
UBoatRAT can upload and download files to the victim’s machine.(Citation: PaloAlto UBoatRAT Nov 2017) |
| CSPY Downloader |
CSPY Downloader can download additional tools to a compromised host.(Citation: Cybereason Kimsuky November 2020) |
| MarkiRAT |
MarkiRAT can download additional files and tools from its C2 server, including through the use of BITSAdmin.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
| Kazuar |
Kazuar downloads additional plug-ins to load on the victim’s machine, including the ability to upgrade and replace its own binary.(Citation: Unit 42 Kazuar May 2017) |
| NavRAT |
NavRAT can download files remotely.(Citation: Talos NavRAT May 2018) |
| DarkComet |
DarkComet can load any files onto the infected machine to execute.(Citation: TrendMicro DarkComet Sept 2014)(Citation: Malwarebytes DarkComet March 2018) |
| CHIMNEYSWEEP |
CHIMNEYSWEEP can download additional files from C2.(Citation: Mandiant ROADSWEEP August 2022) |
| Lucifer |
Lucifer can download and execute a replica of itself using certutil.(Citation: Unit 42 Lucifer June 2020) |
| DRATzarus |
DRATzarus can deploy additional tools onto an infected machine.(Citation: ClearSky Lazarus Aug 2020) |
| ShimRat |
ShimRat can download additional files.(Citation: FOX-IT May 2016 Mofang) |
| Chrommme |
Chrommme can download its code from C2.(Citation: ESET Gelsemium June 2021) |
| BADFLICK |
BADFLICK has download files from its C2 server.(Citation: Accenture MUDCARP March 2019) |
| Conficker |
Conficker downloads an HTTP server to the infected machine.(Citation: SANS Conficker) |
| SocGholish |
SocGholish can download additional malware to infected hosts.(Citation: Red Canary SocGholish March 2024)(Citation: Secureworks Gold Prelude Profile) |
| Flagpro |
Flagpro can download additional malware from the C2 server.(Citation: NTT Security Flagpro new December 2021) |
| Hi-Zor |
Hi-Zor has the ability to upload and download files from its C2 server.(Citation: Fidelis INOCNATION) |
| SpicyOmelette |
SpicyOmelette can download malicious files from threat actor controlled AWS URL's.(Citation: Secureworks GOLD KINGSWOOD September 2018) |
| China Chopper |
China Chopper's server component can download remote files.(Citation: FireEye Periscope March 2018)(Citation: Lee 2013)(Citation: NCSC Joint Report Public Tools)(Citation: Rapid7 HAFNIUM Mar 2021)(Citation: Kaspersky ToddyCat June 2022) |
| LightSpy |
On macOS, LightSpy downloads a `.json` file from the C2 server. The `.json` file contains metadata about the plugins to be downloaded, including their URL, name, version, and MD5 hash. LightSpy retrieves the plugins specified in the `.json` file, which are compiled `.dylib` files. These `.dylib` files provide task and platform specific functionality. LightSpy also imports open-source libraries to manage socket connections.(Citation: Huntress LightSpy macOS 2024) |
| PUNCHBUGGY |
PUNCHBUGGY can download additional files and payloads to compromised hosts.(Citation: FireEye Know Your Enemy FIN8 Aug 2016)(Citation: Morphisec ShellTea June 2019) |
| GoldMax |
GoldMax can download and execute additional files.(Citation: MSTIC NOBELIUM Mar 2021)(Citation: FireEye SUNSHUTTLE Mar 2021) |
| CostaBricks |
CostaBricks has been used to load SombRAT onto a compromised host.(Citation: BlackBerry CostaRicto November 2020) |
| KeyBoy |
KeyBoy has a download and upload functionality.(Citation: PWC KeyBoys Feb 2017)(Citation: Rapid7 KeyBoy Jun 2013) |
| POSHSPY |
POSHSPY downloads and executes additional PowerShell code and Windows binaries.(Citation: FireEye POSHSPY April 2017) |
| OilCheck |
OilCheck can download staged payloads from an actor-controlled infrastructure.(Citation: ESET OilRig Downloaders DEC 2023) |
| MiniDuke |
MiniDuke can download additional encrypted backdoors onto the victim via GIF files.(Citation: Securelist MiniDuke Feb 2013)(Citation: ESET Dukes October 2019) |
| HyperBro |
HyperBro has the ability to download additional files.(Citation: Unit42 Emissary Panda May 2019) |
| Anchor |
Anchor can download additional payloads.(Citation: Cyberreason Anchor December 2019)(Citation: Medium Anchor DNS July 2020) |
| Pteranodon |
Pteranodon can download and execute additional files.(Citation: Palo Alto Gamaredon Feb 2017)(Citation: Symantec Shuckworm January 2022)(Citation: Unit 42 Gamaredon February 2022) |
| DarkTortilla |
DarkTortilla can download additional packages for keylogging, cryptocurrency mining, and other capabilities; it can also retrieve malicious payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit.(Citation: Secureworks DarkTortilla Aug 2022) |
| CARROTBALL |
CARROTBALL has the ability to download and install a remote payload.(Citation: Unit 42 CARROTBAT January 2020) |
| ROKRAT |
ROKRAT can retrieve additional malicious payloads from its C2 server.(Citation: Talos ROKRAT)(Citation: NCCGroup RokRat Nov 2018)(Citation: Volexity InkySquid RokRAT August 2021)(Citation: Malwarebytes RokRAT VBA January 2021) |
| CORESHELL |
CORESHELL downloads another dropper from its C2 server.(Citation: FireEye APT28) |
| Dyre |
Dyre has a command to download and executes additional files.(Citation: Symantec Dyre June 2015) |
| BlackMould |
BlackMould has the ability to download files to the victim's machine.(Citation: Microsoft GALLIUM December 2019) |
| Javali |
Javali can download payloads from remote C2 servers.(Citation: Securelist Brazilian Banking Malware July 2020) |
| BITSAdmin |
BITSAdmin can be used to create BITS Jobs to upload and/or download files.(Citation: Microsoft BITSAdmin) |
| PlugX |
PlugX has a module to download and execute files on the compromised machine.(Citation: CIRCL PlugX March 2013)(Citation: Proofpoint TA416 Europe March 2022) |
| Bisonal |
Bisonal has the capability to download files to execute on the victim’s machine.(Citation: Unit 42 Bisonal July 2018)(Citation: Kaspersky CactusPete Aug 2020)(Citation: Talos Bisonal Mar 2020) |
| S-Type |
S-Type can download additional files onto a compromised host.(Citation: Cylance Dust Storm) |
| SeaDuke |
SeaDuke is capable of uploading and downloading files.(Citation: Unit 42 SeaDuke 2015) |
| Remsec |
Remsec contains a network loader to receive executable modules from remote attackers and run them on the local victim. It can also upload and download files over HTTP and HTTPS.(Citation: Symantec Remsec IOCs)(Citation: Kaspersky ProjectSauron Technical Analysis) |
| Explosive |
Explosive has a function to download a file to the infected system.(Citation: CheckPoint Volatile Cedar March 2015) |
| AsyncRAT |
AsyncRAT has the ability to download files over SFTP.(Citation: AsyncRAT GitHub) |
| Xbash |
Xbash can download additional malicious files from its C2 server.(Citation: Unit42 Xbash Sept 2018) |
| LightNeuron |
LightNeuron has the ability to download and execute additional files.(Citation: ESET LightNeuron May 2019) |
| Peppy |
Peppy can download and execute remote files.(Citation: Proofpoint Operation Transparent Tribe March 2016) |
| Cuba |
Cuba can download files from its C2 server.(Citation: McAfee Cuba April 2021) |
| DEATHRANSOM |
DEATHRANSOM can download files to a compromised host.(Citation: FireEye FiveHands April 2021) |
| Agent Tesla |
Agent Tesla can download additional files for execution on the victim’s machine.(Citation: Talos Agent Tesla Oct 2018)(Citation: DigiTrust Agent Tesla Jan 2017) |
| DarkGate |
DarkGate retrieves cryptocurrency mining payloads and commands in encrypted traffic from its command and control server.(Citation: Ensilo Darkgate 2018) DarkGate uses Windows Batch scripts executing the |
| Mongall |
Mongall can download files to targeted systems.(Citation: SentinelOne Aoqin Dragon June 2022) |
| NanHaiShu |
NanHaiShu can download additional files from URLs.(Citation: Proofpoint Leviathan Oct 2017) |
| SVCReady |
SVCReady has the ability to download additional tools such as the RedLine Stealer to an infected host.(Citation: HP SVCReady Jun 2022) |
| ThiefQuest |
ThiefQuest can download and execute payloads in-memory or from disk.(Citation: wardle evilquest partii) |
| FoggyWeb |
FoggyWeb can receive additional malicious components from an actor controlled C2 server and execute them on a compromised AD FS server.(Citation: MSTIC FoggyWeb September 2021) |
| Hydraq |
Hydraq creates a backdoor through which remote attackers can download files and additional malware components.(Citation: Symantec Trojan.Hydraq Jan 2010)(Citation: Symantec Hydraq Jan 2010) |
| SHARPSTATS |
SHARPSTATS has the ability to upload and download files.(Citation: TrendMicro POWERSTATS V3 June 2019) |
| CreepyDrive |
CreepyDrive can download files to the compromised host.(Citation: Microsoft POLONIUM June 2022) |
| Caterpillar WebShell |
Caterpillar WebShell has a module to download and upload files to the system.(Citation: ClearSky Lebanese Cedar Jan 2021) |
| Netwalker |
Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload.(Citation: Sophos Netwalker May 2020) |
| Elise |
Elise can download additional files from the C2 server for execution.(Citation: Accenture Dragonfish Jan 2018) |
| Brute Ratel C4 |
Brute Ratel C4 can download files to compromised hosts.(Citation: Palo Alto Brute Ratel July 2022)(Citation: Rapid7 Fake W2 July 2024) |
| Gazer |
Gazer can execute a task to download a file.(Citation: ESET Gazer Aug 2017)(Citation: Securelist WhiteBear Aug 2017) |
| TSCookie |
TSCookie has the ability to upload and download files to and from the infected host.(Citation: JPCert TSCookie March 2018) |
| Latrodectus |
Latrodectus can download and execute PEs, DLLs, and shellcode from C2.(Citation: Latrodectus APR 2024)(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024) |
| Saint Bot |
Saint Bot can download additional files onto a compromised host.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) |
| Chaes |
Chaes can download additional files onto an infected machine.(Citation: Cybereason Chaes Nov 2020) |
| Briba |
Briba downloads files onto infected hosts.(Citation: Symantec Briba May 2012) |
| CharmPower |
CharmPower has the ability to download additional modules to a compromised host.(Citation: Check Point APT35 CharmPower January 2022) |
| TYPEFRAME |
TYPEFRAME can upload and download files to the victim’s machine.(Citation: US-CERT TYPEFRAME June 2018) |
| Bundlore |
Bundlore can download and execute new versions of itself.(Citation: MacKeeper Bundlore Apr 2019) |
| P8RAT |
P8RAT can download additional payloads to a target system.(Citation: Securelist APT10 March 2021) |
| Remcos |
Remcos can upload and download files to and from the victim’s machine.(Citation: Riskiq Remcos Jan 2018) |
| EVILNUM |
EVILNUM can download and upload files to the victim's computer.(Citation: ESET EvilNum July 2020)(Citation: Prevailion EvilNum May 2020) |
| SMOKEDHAM |
SMOKEDHAM has used Powershell to download UltraVNC and ngrok from third-party file sharing sites.(Citation: FireEye SMOKEDHAM June 2021) |
| TAINTEDSCRIBE |
TAINTEDSCRIBE can download additional modules from its C2 server.(Citation: CISA MAR-10288834-2.v1 TAINTEDSCRIBE MAY 2020) |
| BendyBear |
BendyBear is designed to download an implant from a C2 server.(Citation: Unit42 BendyBear Feb 2021) |
| Uroburos |
Uroburos can use a `Put` command to write files to an infected machine.(Citation: Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023) |
| Metamorfo |
Metamorfo has used MSI files to download additional files to execute.(Citation: Medium Metamorfo Apr 2020)(Citation: FireEye Metamorfo Apr 2018)(Citation: Fortinet Metamorfo Feb 2020)(Citation: ESET Casbaneiro Oct 2019) |
| Spica |
Spica can upload and download files to and from compromised hosts.(Citation: Google TAG COLDRIVER January 2024) |
| Trojan.Karagany |
Trojan.Karagany can upload, download, and execute files on the victim.(Citation: Symantec Dragonfly)(Citation: Secureworks Karagany July 2019) |
| Bandook |
Bandook can download files to the system.(Citation: CheckPoint Bandook Nov 2020) |
| PipeMon |
PipeMon can install additional modules via C2 commands.(Citation: ESET PipeMon May 2020) |
| MagicRAT |
MagicRAT can import and execute additional payloads.(Citation: Cisco MagicRAT 2022) |
| KONNI |
KONNI can download files and execute them on the victim’s machine.(Citation: Talos Konni May 2017)(Citation: Malwarebytes Konni Aug 2021) |
| Winnti for Linux |
Winnti for Linux has the ability to deploy modules directly from command and control (C2) servers, possibly for remote command execution, file exfiltration, and socks5 proxying on the infected host. (Citation: Chronicle Winnti for Linux May 2019) |
| gh0st RAT |
gh0st RAT can download files to the victim’s machine.(Citation: Nccgroup Gh0st April 2018)(Citation: Gh0stRAT ATT March 2019) |
| Shamoon |
Shamoon can download an executable to run on the victim.(Citation: Palo Alto Shamoon Nov 2016) |
| DnsSystem |
DnsSystem can download files to compromised systems after receiving a command with the string `downloaddd`.(Citation: Zscaler Lyceum DnsSystem June 2022) |
| MoleNet |
MoleNet can download additional payloads from the C2.(Citation: Cybereason Molerats Dec 2020) |
| JHUHUGIT |
JHUHUGIT can retrieve an additional payload from its C2 server.(Citation: ESET Sednit Part 1)(Citation: Unit 42 Sofacy Feb 2018) JHUHUGIT has a command to download files to the victim’s machine.(Citation: Talos Seduploader Oct 2017) |
| BLUELIGHT |
BLUELIGHT can download additional files onto the host.(Citation: Volexity InkySquid BLUELIGHT August 2021) |
| KGH_SPY |
KGH_SPY has the ability to download and execute code from remote servers.(Citation: Cybereason Kimsuky November 2020) |
| down_new |
down_new has the ability to download files to the compromised host.(Citation: Trend Micro Tick November 2019) |
| Ixeshe |
Ixeshe can download and execute additional files.(Citation: Trend Micro IXESHE 2012) |
| Micropsia |
Micropsia can download and execute an executable from the C2 server.(Citation: Talos Micropsia June 2017)(Citation: Radware Micropsia July 2018) |
| Kerrdown |
Kerrdown can download specific payloads to a compromised host based on OS architecture.(Citation: Unit 42 KerrDown February 2019) |
| RARSTONE |
RARSTONE downloads its backdoor component from a C2 server and loads it directly into memory.(Citation: Aquino RARSTONE) |
| VBShower |
VBShower has the ability to download VBS files to the target computer.(Citation: Kaspersky Cloud Atlas August 2019) |
| StoneDrill |
StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine.(Citation: Kaspersky StoneDrill 2017) |
| OopsIE |
OopsIE can download files from its C2 server to the victim's machine.(Citation: Unit 42 OopsIE! Feb 2018)(Citation: Unit 42 OilRig Sept 2018) |
| RogueRobin |
RogueRobin can save a new file to the system from the C2 server.(Citation: Unit 42 DarkHydrus July 2018)(Citation: Unit42 DarkHydrus Jan 2019) |
| Attor |
Attor can download additional plugins, updates and other files. (Citation: ESET Attor Oct 2019) |
| SQLRat |
SQLRat can make a direct SQL connection to a Microsoft database controlled by the attackers, retrieve an item from the bindata table, then write and execute the file on disk.(Citation: Flashpoint FIN 7 March 2019) |
| LitePower |
LitePower has the ability to download payloads containing system commands to a compromised host.(Citation: Kaspersky WIRTE November 2021) |
| BoxCaon |
BoxCaon can download files.(Citation: Checkpoint IndigoZebra July 2021) |
| NightClub |
NightClub can load multiple additional plugins on an infected host.(Citation: MoustachedBouncer ESET August 2023) |
| SDBbot |
SDBbot has the ability to download a DLL from C2 to a compromised host.(Citation: Proofpoint TA505 October 2019) |
| Mosquito |
Mosquito can upload and download files to the victim.(Citation: ESET Turla Mosquito Jan 2018) |
| RTM |
RTM can download additional files.(Citation: ESET RTM Feb 2017)(Citation: Unit42 Redaman January 2019) |
| SodaMaster |
SodaMaster has the ability to download additional payloads from C2 to the targeted system.(Citation: Securelist APT10 March 2021) |
| Hikit |
Hikit has the ability to download files to a compromised host.(Citation: Novetta-Axiom) |
| StrelaStealer |
StrelaStealer installers have used obfuscated PowerShell scripts to retrieve follow-on payloads from WebDAV servers.(Citation: IBM StrelaStealer 2024) |
| Grandoreiro |
Grandoreiro can download its second stage from a hardcoded URL within the loader's code.(Citation: IBM Grandoreiro April 2020)(Citation: ESET Grandoreiro April 2020) |
| WellMail |
WellMail can receive data and executable scripts from C2.(Citation: CISA WellMail July 2020) |
| LiteDuke |
LiteDuke has the ability to download files.(Citation: ESET Dukes October 2019) |
| Sakula |
Sakula has the capability to download files.(Citation: Dell Sakula) |
| VaporRage |
VaporRage has the ability to download malicious shellcode to compromised systems.(Citation: MSTIC Nobelium Toolset May 2021) |
| MCMD |
MCMD can upload additional files to a compromised host.(Citation: Secureworks MCMD July 2019) |
| Sibot |
Sibot can download and execute a payload onto a compromised system.(Citation: MSTIC NOBELIUM Mar 2021) |
| ZxxZ |
ZxxZ can download and execute additional files.(Citation: Cisco Talos Bitter Bangladesh May 2022) |
| Drovorub |
Drovorub can download files to a compromised host.(Citation: NSA/FBI Drovorub August 2020) |
| Shark |
Shark can download additional files from its C2 via HTTP or DNS.(Citation: ClearSky Siamesekitten August 2021)(Citation: Accenture Lyceum Targets November 2021) |
| Bazar |
Bazar can download and deploy additional payloads, including ransomware and post-exploitation frameworks such as Cobalt Strike.(Citation: Cybereason Bazar July 2020)(Citation: Zscaler Bazar September 2020)(Citation: NCC Group Team9 June 2020)(Citation: CrowdStrike Wizard Spider October 2020) |
| BadPatch |
BadPatch can download and execute or update malware.(Citation: Unit 42 BadPatch Oct 2017) |
| RATANKBA |
RATANKBA uploads and downloads information.(Citation: Lazarus RATANKBA)(Citation: RATANKBA) |
| Nidiran |
Nidiran can download and execute files.(Citation: Symantec Backdoor.Nidiran) |
| Cryptoistic |
Cryptoistic has the ability to send and receive files.(Citation: SentinelOne Lazarus macOS July 2020) |
| ABK |
ABK has the ability to download files from C2.(Citation: Trend Micro Tick November 2019) |
| Zebrocy |
Zebrocy obtains additional code to execute on the victim's machine, including the downloading of a secondary payload.(Citation: Palo Alto Sofacy 06-2018)(Citation: Unit42 Cannon Nov 2018)(Citation: ESET Zebrocy May 2019)(Citation: Accenture SNAKEMACKEREL Nov 2018) |
| Pandora |
Pandora can load additional drivers and files onto a victim machine.(Citation: Trend Micro Iron Tiger April 2021) |
| SpeakUp |
SpeakUp downloads and executes additional files from a remote server. (Citation: CheckPoint SpeakUp Feb 2019) |
| Cobalt Strike |
Cobalt Strike can deliver additional payloads to victim machines.(Citation: Talos Cobalt Strike September 2020)(Citation: Cobalt Strike Manual 4.3 November 2020) |
| Donut |
Donut can download and execute previously staged shellcode payloads.(Citation: Donut Github) |
| SampleCheck5000 |
SampleCheck5000 can download additional payloads to compromised hosts.(Citation: ESET OilRig Campaigns Sep 2023)(Citation: ESET OilRig Downloaders DEC 2023) |
| SUNBURST |
SUNBURST delivered different payloads, including TEARDROP in at least one instance.(Citation: FireEye SUNBURST Backdoor December 2020) |
| EvilBunny |
EvilBunny has downloaded additional Lua scripts from the C2.(Citation: Cyphort EvilBunny Dec 2014) |
| HotCroissant |
HotCroissant has the ability to upload a file from the command and control (C2) server to the victim machine.(Citation: Carbon Black HotCroissant April 2020) |
| ServHelper |
ServHelper may download additional files to execute.(Citation: Proofpoint TA505 Jan 2019)(Citation: Deep Instinct TA505 Apr 2019) |
| Unknown Logger |
Unknown Logger is capable of downloading remote files.(Citation: Forcepoint Monsoon) |
| REvil |
REvil can download a copy of itself from an attacker controlled IP address to the victim machine.(Citation: Talos Sodinokibi April 2019)(Citation: McAfee Sodinokibi October 2019)(Citation: Picus Sodinokibi January 2020) |
| Valak |
Valak has downloaded a variety of modules and payloads to the compromised host, including IcedID and NetSupport Manager RAT-based malware.(Citation: Unit 42 Valak July 2020)(Citation: Cybereason Valak May 2020) |
| Samurai |
Samurai has been used to deploy other malware including Ninja.(Citation: Kaspersky ToddyCat June 2022) |
| Milan |
Milan has received files from C2 and stored them in log folders beginning with the character sequence `a9850d2f`.(Citation: ClearSky Siamesekitten August 2021) |
| OSX_OCEANLOTUS.D |
OSX_OCEANLOTUS.D has a command to download and execute a file on the victim’s machine.(Citation: TrendMicro MacOS April 2018)(Citation: Trend Micro MacOS Backdoor November 2020) |
| OilBooster |
OilBooster can download and execute files from an actor-controlled OneDrive account.(Citation: ESET OilRig Downloaders DEC 2023) |
| Taidoor |
Taidoor has downloaded additional files onto a compromised host.(Citation: TrendMicro Taidoor) |
| Kivars |
Kivars has the ability to download and execute files.(Citation: TrendMicro BlackTech June 2017) |
| Cyclops Blink |
Cyclops Blink has the ability to download files to target systems.(Citation: NCSC Cyclops Blink February 2022)(Citation: Trend Micro Cyclops Blink March 2022) |
| PoisonIvy |
PoisonIvy creates a backdoor through which remote attackers can upload files.(Citation: Symantec Darkmoon Aug 2005) |
| Seasalt |
Seasalt has a command to download additional files.(Citation: Mandiant APT1 Appendix)(Citation: Mandiant APT1 Appendix) |
| NanoCore |
NanoCore has the capability to download and activate additional modules for execution.(Citation: DigiTrust NanoCore Jan 2017)(Citation: PaloAlto NanoCore Feb 2016) |
| Pasam |
Pasam creates a backdoor through which remote attackers can upload files.(Citation: Symantec Pasam May 2012) |
| PLEAD |
PLEAD has the ability to upload and download files to and from an infected host.(Citation: JPCert PLEAD Downloader June 2018) |
| Raccoon Stealer |
Raccoon Stealer downloads various library files enabling interaction with various data stores and structures to facilitate follow-on information theft.(Citation: S2W Racoon 2022)(Citation: Sekoia Raccoon2 2022) |
| Daserf |
Daserf can download remote files.(Citation: Trend Micro Daserf Nov 2017)(Citation: Secureworks BRONZE BUTLER Oct 2017) |
| Cardinal RAT |
Cardinal RAT can download and execute additional payloads.(Citation: PaloAlto CardinalRat Apr 2017) |
| DanBot |
DanBot can download additional files to a targeted system.(Citation: SecureWorks August 2019) |
| BISCUIT |
BISCUIT has a command to download a file from the C2 server.(Citation: Mandiant APT1 Appendix) |
| Calisto |
Calisto has the capability to upload and download files to the victim's machine.(Citation: Symantec Calisto July 2018) |
| Solar |
Solar has the ability to download and execute files.(Citation: ESET OilRig Campaigns Sep 2023) |
| Pisloader |
Pisloader has a command to upload a file to the victim machine.(Citation: Palo Alto DNS Requests) |
| GoldenSpy |
GoldenSpy constantly attempts to download and execute files from the remote C2, including GoldenSpy itself if not found on the system.(Citation: Trustwave GoldenSpy June 2020) |
| Gold Dragon |
Gold Dragon can download additional components from the C2 server.(Citation: McAfee Gold Dragon) |
| RGDoor |
RGDoor uploads and downloads files to and from the victim’s machine.(Citation: Unit 42 RGDoor Jan 2018) |
| Neo-reGeorg |
Neo-reGeorg has the ability to download files to targeted systems.(Citation: GitHub Neo-reGeorg 2019) |
| cmd |
cmd can be used to copy files to/from a remotely connected external system.(Citation: TechNet Copy) |
| Carberp |
Carberp can download and execute new plugins from the C2 server. (Citation: Prevx Carberp March 2011)(Citation: Trusteer Carberp October 2010) |
| Revenge RAT |
Revenge RAT has the ability to upload and download files.(Citation: Cylance Shaheen Nov 2018) |
| MacMa |
MacMa has downloaded additional files, including an exploit for used privilege escalation.(Citation: ESET DazzleSpy Jan 2022)(Citation: Objective-See MacMa Nov 2021) |
| FunnyDream |
FunnyDream can download additional files onto a compromised host.(Citation: Bitdefender FunnyDream Campaign November 2020) |
| More_eggs |
More_eggs can download and launch additional payloads.(Citation: Talos Cobalt Group July 2018)(Citation: Security Intelligence More Eggs Aug 2019) |
| SysUpdate |
SysUpdate has the ability to download files to a compromised host.(Citation: Trend Micro Iron Tiger April 2021)(Citation: Lunghi Iron Tiger Linux) |
| OutSteel |
OutSteel can download files from its C2 server.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) |
| BackConfig |
BackConfig can download and execute additional payloads on a compromised host.(Citation: Unit 42 BackConfig May 2020) |
| Kwampirs |
Kwampirs downloads additional files from C2 servers.(Citation: Symantec Security Center Trojan.Kwampirs) |
| Nerex |
Nerex creates a backdoor through which remote attackers can download files onto a compromised host.(Citation: Symantec Ristol May 2012) |
| esentutl |
esentutl can be used to copy files from a given URL.(Citation: LOLBAS Esentutl) |
| BoomBox |
BoomBox has the ability to download next stage malware components to a compromised system.(Citation: MSTIC Nobelium Toolset May 2021) |
| Koadic |
Koadic can download additional files and tools.(Citation: Github Koadic)(Citation: MalwareBytes LazyScripter Feb 2021) |
| WIREFIRE |
WIREFIRE has the ability to download files to compromised devices.(Citation: Mandiant Cutting Edge January 2024) |
| Kessel |
Kessel can download additional modules from the C2 server.(Citation: ESET ForSSHe December 2018) |
| GrimAgent |
GrimAgent has the ability to download and execute additional payloads.(Citation: Group IB GrimAgent July 2021) |
| STEADYPULSE |
STEADYPULSE can add lines to a Perl script on a targeted server to import additional Perl modules.(Citation: Mandiant Pulse Secure Zero-Day April 2021) |
| YAHOYAH |
YAHOYAH uses HTTP GET requests to download other files that are executed in memory.(Citation: TrendMicro TropicTrooper 2015) |
| Pupy |
Pupy can upload and download to/from a victim machine.(Citation: GitHub Pupy) |
| Lokibot |
Lokibot downloaded several staged items onto the victim's machine.(Citation: Talos Lokibot Jan 2021) |
| CallMe |
CallMe has the capability to download a file to the victim from the C2 server.(Citation: Scarlet Mimic Jan 2016) |
| CloudDuke |
CloudDuke downloads and executes additional malware from either a Web address or a Microsoft OneDrive account.(Citation: F-Secure The Dukes) |
| Egregor |
Egregor has the ability to download files from its C2 server.(Citation: Cybereason Egregor Nov 2020)(Citation: Intrinsec Egregor Nov 2020) |
| PoetRAT |
PoetRAT has the ability to copy files and download/upload files into C2 channels using FTP and HTTPS.(Citation: Talos PoetRAT April 2020)(Citation: Talos PoetRAT October 2020) |
| CHOPSTICK |
CHOPSTICK is capable of performing remote file transmission.(Citation: Crowdstrike DNC June 2016) |
| ftp |
ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment.(Citation: Microsoft FTP)(Citation: Linux FTP) |
| FELIXROOT |
FELIXROOT downloads and uploads files to and from the victim’s machine.(Citation: FireEye FELIXROOT July 2018)(Citation: ESET GreyEnergy Oct 2018) |
| ZxShell |
ZxShell has a command to transfer files from a remote host.(Citation: Talos ZxShell Oct 2014) |
| SLIGHTPULSE |
RAPIDPULSE can transfer files to and from compromised hosts.(Citation: Mandiant Pulse Secure Update May 2021) |
| NDiskMonitor |
NDiskMonitor can download and execute a file from given URL.(Citation: TrendMicro Patchwork Dec 2017) |
| CoinTicker |
CoinTicker executes a Python script to download its second stage.(Citation: CoinTicker 2019) |
| DDKONG |
DDKONG downloads and uploads files on the victim’s machine.(Citation: Rancor Unit42 June 2018) |
| Penquin |
Penquin can execute the command code |
| BabyShark |
BabyShark has downloaded additional files from the C2.(Citation: Unit42 BabyShark Apr 2019)(Citation: CISA AA20-301A Kimsuky) |
| Cannon |
Cannon can download a payload for execution.(Citation: Unit42 Cannon Nov 2018) |
| build_downer |
build_downer has the ability to download files from C2 to the infected host.(Citation: Trend Micro Tick November 2019) |
| Melcoz |
Melcoz has the ability to download additional files to a compromised host.(Citation: Securelist Brazilian Banking Malware July 2020) |
| Winnti for Windows |
The Winnti for Windows dropper can place malicious payloads on targeted systems.(Citation: Novetta Winnti April 2015) |
| PowerPunch |
PowerPunch can download payloads from adversary infrastructure.(Citation: Microsoft Actinium February 2022) |
| BONDUPDATER |
BONDUPDATER can download or upload files from its C2 server.(Citation: Palo Alto OilRig Sep 2018) |
| Kinsing |
Kinsing has downloaded additional lateral movement scripts from C2.(Citation: Aqua Kinsing April 2020) |
| Meteor |
Meteor has the ability to download additional files for execution on the victim's machine.(Citation: Check Point Meteor Aug 2021) |
| njRAT |
njRAT can download files to the victim’s machine.(Citation: Fidelis njRAT June 2013)(Citation: Trend Micro njRAT 2018) |
| ZIPLINE |
ZIPLINE can download files to be saved on the compromised system.(Citation: Mandiant Cutting Edge January 2024)(Citation: Mandiant Cutting Edge Part 2 January 2024) |
| QuasarRAT |
QuasarRAT can download files to the victim’s machine and execute them.(Citation: GitHub QuasarRAT)(Citation: Volexity Patchwork June 2018) |
| TURNEDUP |
TURNEDUP is capable of downloading additional files.(Citation: FireEye APT33 Sept 2017) |
| ChChes |
ChChes is capable of downloading files, including additional modules.(Citation: Palo Alto menuPass Feb 2017)(Citation: JPCERT ChChes Feb 2017)(Citation: FireEye APT10 April 2017) |
| POWERSTATS |
POWERSTATS can retrieve and execute additional PowerShell payloads from the C2 server.(Citation: FireEye MuddyWater Mar 2018) |
| ANDROMEDA |
ANDROMEDA can download additional payloads from C2.(Citation: Mandiant Suspected Turla Campaign February 2023) |
| JPIN |
JPIN can download files and upgrade itself.(Citation: Microsoft PLATINUM April 2016) |
| metaMain |
metaMain can download files onto compromised systems.(Citation: SentinelLabs Metador Sept 2022)(Citation: SentinelLabs Metador Technical Appendix Sept 2022) |
| SideTwist |
SideTwist has the ability to download additional files.(Citation: Check Point APT34 April 2021) |
| KOCTOPUS |
KOCTOPUS has executed a PowerShell command to download a file to the system.(Citation: MalwareBytes LazyScripter Feb 2021) |
| MechaFlounder |
MechaFlounder has the ability to upload and download files to and from a compromised host.(Citation: Unit 42 MechaFlounder March 2019) |
| Psylo |
Psylo has a command to download a file to the system from its C2 server.(Citation: Scarlet Mimic Jan 2016) |
| HTTPBrowser |
HTTPBrowser is capable of writing a file to the compromised system from the C2 server.(Citation: Dell TG-3390) |
| Mis-Type |
Mis-Type has downloaded additional malware and files onto a compromised host.(Citation: Cylance Dust Storm) |
| XCSSET |
XCSSET downloads browser specific AppleScript modules using a constructed URL with the |
| Disco |
Disco can download files to targeted systems via SMB.(Citation: MoustachedBouncer ESET August 2023) |
| Dipsind |
Dipsind can download remote files.(Citation: Microsoft PLATINUM April 2016) |
| Octopus |
Octopus can download additional files and tools onto the victim’s machine.(Citation: Securelist Octopus Oct 2018)(Citation: Security Affairs DustSquad Oct 2018)(Citation: ESET Nomadic Octopus 2018) |
| SoreFang |
SoreFang can download additional payloads from C2.(Citation: CISA SoreFang July 2016)(Citation: NCSC APT29 July 2020) |
| Industroyer |
Industroyer downloads a shellcode payload from a remote C2 server and loads it into memory.(Citation: ESET Industroyer) |
| Kevin |
Kevin can download files to the compromised host.(Citation: Kaspersky Lyceum October 2021) |
| BADNEWS |
BADNEWS is capable of downloading additional files through C2 channels, including a new version of itself.(Citation: Forcepoint Monsoon)(Citation: PaloAlto Patchwork Mar 2018)(Citation: TrendMicro Patchwork Dec 2017) |
| Linfo |
Linfo creates a backdoor through which remote attackers can download files onto compromised hosts.(Citation: Symantec Linfo May 2012) |
| ShadowPad |
ShadowPad has downloaded code from a C2 server.(Citation: Securelist ShadowPad Aug 2017) |
| Astaroth |
Astaroth uses certutil and BITSAdmin to download additional malware. (Citation: Cofense Astaroth Sept 2018)(Citation: Cybereason Astaroth Feb 2019)(Citation: Securelist Brazilian Banking Malware July 2020) |
| QakBot |
QakBot has the ability to download additional components and malware.(Citation: Trend Micro Qakbot May 2020)(Citation: Crowdstrike Qakbot October 2020)(Citation: Trend Micro Qakbot December 2020)(Citation: Cyberint Qakbot May 2021)(Citation: Kaspersky QakBot September 2021)(Citation: Group IB Ransomware September 2020) |
| CookieMiner |
CookieMiner can download additional scripts from a web server.(Citation: Unit42 CookieMiner Jan 2019) |
| Hancitor |
Hancitor has the ability to download additional files from C2.(Citation: Threatpost Hancitor) |
| Gelsemium |
Gelsemium can download additional plug-ins to a compromised host.(Citation: ESET Gelsemium June 2021) |
| jRAT |
jRAT can download and execute files.(Citation: jRAT Symantec Aug 2018)(Citation: Kaspersky Adwind Feb 2016)(Citation: Symantec Frutas Feb 2013) |
| Helminth |
Helminth can download additional files.(Citation: Palo Alto OilRig May 2016) |
| BBK |
BBK has the ability to download files from C2 to the infected host.(Citation: Trend Micro Tick November 2019) |
| OSX/Shlayer |
OSX/Shlayer can download payloads, and extract bytes from files. OSX/Shlayer uses the |
| Denis |
Denis deploys additional backdoors and hacking tools to the system.(Citation: Cybereason Cobalt Kitty 2017) |
| Waterbear |
Waterbear can receive and load executables from remote C2 servers.(Citation: Trend Micro Waterbear December 2019) |
| Vasport |
Vasport can download files.(Citation: Symantec Vasport May 2012) |
| JSS Loader |
JSS Loader has the ability to download malicious executables to a compromised host.(Citation: CrowdStrike Carbon Spider August 2021) |
| Lizar |
Lizar can download additional plugins, files, and tools.(Citation: BiZone Lizar May 2021) |
| Dtrack |
Dtrack’s can download and upload a file to the victim’s computer.(Citation: Securelist Dtrack)(Citation: CyberBit Dtrack) |
| H1N1 |
H1N1 contains a command to download and execute a file from a remotely hosted URL using WinINet HTTP requests.(Citation: Cisco H1N1 Part 2) |
| Seth-Locker |
Seth-Locker has the ability to download and execute files on a compromised host.(Citation: Trend Micro Ransomware February 2021) |
| LoudMiner |
LoudMiner used SCP to update the miner from the C2.(Citation: ESET LoudMiner June 2019) |
| Azorult |
Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes.(Citation: Unit42 Azorult Nov 2018)(Citation: Proofpoint Azorult July 2018) |
| Zox |
Zox can download files to a compromised machine.(Citation: Novetta-Axiom) |
| UPPERCUT |
UPPERCUT can download and upload files to and from the victim’s machine.(Citation: FireEye APT10 Sept 2018) |
| StrifeWater |
StrifeWater can download updates and auxiliary modules.(Citation: Cybereason StrifeWater Feb 2022) |
| Mivast |
Mivast has the capability to download and execute .exe files.(Citation: Symantec Backdoor.Mivast) |
| HiddenWasp |
HiddenWasp downloads a tar compressed archive from a download server to the system.(Citation: Intezer HiddenWasp Map 2019) |
| WarzoneRAT |
WarzoneRAT can download and execute additional files.(Citation: Check Point Warzone Feb 2020) |
| SLOTHFULMEDIA |
SLOTHFULMEDIA has downloaded files onto a victim machine.(Citation: CISA MAR SLOTHFULMEDIA October 2020) |
| Small Sieve |
Small Sieve has the ability to download files.(Citation: NCSC GCHQ Small Sieve Jan 2022) |
| Frankenstein |
Frankenstein has uploaded and downloaded files to utilize additional plugins.(Citation: Talos Frankenstein June 2019) |
| APT28 |
APT28 has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.(Citation: Bitdefender APT28 Dec 2015)(Citation: Unit 42 Playbook Dec 2017)(Citation: Accenture SNAKEMACKEREL Nov 2018)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) |
| Turla |
Turla has used shellcode to download Meterpreter after compromising a victim.(Citation: ESET Turla Mosquito May 2018) |
| Tropic Trooper |
Tropic Trooper has used a delivered trojan to download additional files.(Citation: TrendMicro Tropic Trooper May 2020) |
| Evilnum |
Evilnum can deploy additional components or tools as needed.(Citation: ESET EvilNum July 2020) |
| APT33 |
APT33 has downloaded additional files and programs from its C2 server.(Citation: Symantec Elfin Mar 2019)(Citation: Microsoft Holmium June 2020) |
| Operation Wocao |
Operation Wocao can download additional files to the infected system.(Citation: FoxIT Wocao December 2019) |
| Fox Kitten |
Fox Kitten has downloaded additional tools including PsExec directly to endpoints.(Citation: CISA AA20-259A Iran-Based Actor September 2020) |
| Lazarus Group |
Lazarus Group has downloaded files, malware, and tools from its C2 onto a compromised host.(Citation: Novetta Blockbuster)(Citation: Novetta Blockbuster Destructive Malware)(Citation: Novetta Blockbuster Loaders)(Citation: SentinelOne Lazarus macOS July 2020)(Citation: TrendMicro macOS Dacls May 2020)(Citation: Kaspersky ThreatNeedle Feb 2021)(Citation: Google TAG Lazarus Jan 2021)(Citation: Lazarus APT January 2022)(Citation: Qualys LolZarus)(Citation: ESET Twitter Ida Pro Nov 2021) |
| Gamaredon Group |
Gamaredon Group has downloaded additional malware and tools onto a compromised host.(Citation: Palo Alto Gamaredon Feb 2017)(Citation: TrendMicro Gamaredon April 2020)(Citation: ESET Gamaredon June 2020)(Citation: Microsoft Actinium February 2022) For example, Gamaredon Group uses a backdoor script to retrieve and decode additional payloads once in victim environments.(Citation: unit42_gamaredon_dec2022) |
| APT29 |
APT29 has downloaded additional tools and malware onto compromised networks.(Citation: Mandiant No Easy Breach)(Citation: PWC WellMess July 2020)(Citation: F-Secure The Dukes)(Citation: Mandiant APT29 Eye Spy Email Nov 22) |
| TA2541 |
TA2541 has used malicious scripts and macros with the ability to download additional payloads.(Citation: Cisco Operation Layover September 2021) |
| WIRTE |
WIRTE has downloaded PowerShell code from the C2 server to be executed.(Citation: Lab52 WIRTE Apr 2019) |
| Indrik Spider |
Indrik Spider has downloaded additional scripts, malware, and tools onto a compromised host.(Citation: Crowdstrike Indrik November 2018)(Citation: Symantec WastedLocker June 2020)(Citation: Mandiant_UNC2165) |
| Whitefly |
Whitefly has the ability to download additional tools from the C2.(Citation: Symantec Whitefly March 2019) |
| Darkhotel |
Darkhotel has used first-stage payloads that download additional malware from C2 servers.(Citation: Microsoft DUBNIUM June 2016) |
| APT39 |
APT39 has downloaded tools to compromised hosts.(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 September 2020) |
| APT38 |
APT38 used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine.(Citation: FireEye APT38 Oct 2018) Additionally, APT38 has downloaded other payloads onto a victim’s machine.(Citation: 1 - appv) |
| MuddyWater |
MuddyWater has used malware that can upload additional files to the victim’s machine.(Citation: Securelist MuddyWater Oct 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: Reaqta MuddyWater November 2017)(Citation: Trend Micro Muddy Water March 2021) |
| Leviathan |
Leviathan has downloaded additional scripts and files from adversary-controlled servers.(Citation: Proofpoint Leviathan Oct 2017)(Citation: FireEye Periscope March 2018) |
| Dragonfly 2.0 |
Dragonfly 2.0 copied and installed tools for operations once in the victim environment.(Citation: US-CERT TA18-074A)(Citation: US-CERT APT Energy Oct 2017) |
| Volatile Cedar |
Volatile Cedar can deploy additional tools.(Citation: ClearSky Lebanese Cedar Jan 2021) |
| Rocke |
Rocke used malware to download additional malicious files to the target system.(Citation: Talos Rocke August 2018) |
| Aquatic Panda |
Aquatic Panda has downloaded additional malware onto compromised hosts.(Citation: CrowdStrike AQUATIC PANDA December 2021) |
| BRONZE BUTLER |
BRONZE BUTLER has used various tools to download files, including DGet (a similar tool to wget).(Citation: Secureworks BRONZE BUTLER Oct 2017) |
| ZIRCONIUM |
ZIRCONIUM has used tools to download malicious files to compromised hosts.(Citation: Zscaler APT31 Covid-19 October 2020) |
| Molerats |
Molerats used executables to download malicious files from different sources.(Citation: Kaspersky MoleRATs April 2019)(Citation: Unit42 Molerat Mar 2020) |
| BlackByte |
BlackByte has transferred tools such as Cobalt Strike to victim environments from file sharing and hosting websites.(Citation: Microsoft BlackByte 2023) |
| SideCopy |
SideCopy has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads.(Citation: MalwareBytes SideCopy Dec 2021) |
| Silence |
Silence has downloaded additional modules and malware to victim’s machines.(Citation: Group IB Silence Sept 2018) |
| Nomadic Octopus |
Nomadic Octopus has used malicious macros to download additional files to the victim's machine.(Citation: ESET Nomadic Octopus 2018) |
| Wizard Spider |
Wizard Spider can transfer malicious payloads such as ransomware to compromised machines.(Citation: Mandiant FIN12 Oct 2021) |
| Confucius |
Confucius has downloaded additional files and payloads onto a compromised host following initial access.(Citation: Uptycs Confucius APT Jan 2021)(Citation: TrendMicro Confucius APT Aug 2021) |
| Threat Group-3390 |
Threat Group-3390 has downloaded additional malware and tools, including through the use of `certutil`, onto a compromised host .(Citation: Dell TG-3390)(Citation: Trend Micro DRBControl February 2020) |
| APT32 |
APT32 has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors.(Citation: Volexity OceanLotus Nov 2017) |
| Metador |
Metador has downloaded tools and malware onto a compromised system.(Citation: SentinelLabs Metador Sept 2022) |
| Moses Staff |
Moses Staff has downloaded and installed web shells to following path |
| Dragonfly |
Dragonfly has copied and installed tools for operations once in the victim environment.(Citation: US-CERT TA18-074A) |
| INC Ransom |
INC Ransom has downloaded tools to compromised servers including Advanced IP Scanner. (Citation: Huntress INC Ransom Group August 2023)(Citation: Huntress INC Ransomware May 2024) |
| Sidewinder |
Sidewinder has used LNK files to download remote files to the victim's network.(Citation: ATT Sidewinder January 2021)(Citation: Cyble Sidewinder September 2020) |
| OilRig |
OilRig had downloaded remote files onto victim infrastructure.(Citation: FireEye APT34 Dec 2017)(Citation: Trend Micro Earth Simnavaz October 2024) |
| LuminousMoth |
LuminousMoth has downloaded additional malware and tools onto a compromised host.(Citation: Kaspersky LuminousMoth July 2021)(Citation: Bitdefender LuminousMoth July 2021) |
| APT37 |
APT37 has downloaded second stage malware from compromised websites.(Citation: FireEye APT37 Feb 2018)(Citation: Securelist ScarCruft May 2019)(Citation: Volexity InkySquid BLUELIGHT August 2021)(Citation: Volexity InkySquid RokRAT August 2021) |
| Chimera |
Chimera has remotely copied tools and malware onto targeted systems.(Citation: Cycraft Chimera April 2020) |
| Andariel |
Andariel has downloaded additional tools and malware onto compromised hosts.(Citation: AhnLab Andariel Subgroup of Lazarus June 2018) |
| HEXANE |
HEXANE has downloaded additional payloads and malicious scripts onto a compromised host.(Citation: Kaspersky Lyceum October 2021) |
| FIN7 |
FIN7 has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload.(Citation: FireEye FIN7 April 2017)(Citation: DOJ FIN7 Aug 2018)(Citation: Mandiant FIN7 Apr 2022) |
| BackdoorDiplomacy |
BackdoorDiplomacy has downloaded additional files and tools onto a compromised host.(Citation: ESET BackdoorDiplomacy Jun 2021) |
| APT-C-36 |
APT-C-36 has downloaded binary data from a specified domain after the malicious document is opened.(Citation: QiAnXin APT-C-36 Feb2019) |
| Volt Typhoon |
Volt Typhoon has downloaded an outdated version of comsvcs.dll to a compromised domain controller in a non-standard folder.(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024) |
| FIN13 |
FIN13 has downloaded additional tools and malware to compromised systems.(Citation: Mandiant FIN13 Aug 2022)(Citation: Sygnia Elephant Beetle Jan 2022) |
| Kimsuky |
Kimsuky has downloaded additional scripts, tools, and malware onto victim systems.(Citation: Crowdstrike GTR2020 Mar 2020)(Citation: Talos Kimsuky Nov 2021) |
| BITTER |
BITTER has downloaded additional malware and tools onto a compromised host.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016) |
| Cinnamon Tempest |
Cinnamon Tempest has downloaded files, including Cobalt Strike, to compromised hosts.(Citation: Sygnia Emperor Dragonfly October 2022) |
| IndigoZebra |
IndigoZebra has downloaded additional files and tools from its C2 server.(Citation: Checkpoint IndigoZebra July 2021) |
| Sandworm Team |
Sandworm Team has pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.(Citation: ESET Telebots Dec 2016)(Citation: US District Court Indictment GRU Unit 74455 October 2020) |
| Sharpshooter |
Sharpshooter downloaded additional payloads after a target was infected with a first-stage downloader.(Citation: McAfee Sharpshooter December 2018) |
| APT18 |
APT18 can upload a file to the victim’s machine.(Citation: PaloAlto DNS Requests May 2016) |
| Magic Hound |
Magic Hound has downloaded additional code and files from servers onto victims.(Citation: Unit 42 Magic Hound Feb 2017)(Citation: DFIR Report APT35 ProxyShell March 2022)(Citation: DFIR Phosphorus November 2021)(Citation: Microsoft Iranian Threat Actor Trends November 2021) |
| Winnti Group |
Winnti Group has downloaded an auxiliary program named ff.exe to infected machines.(Citation: Kaspersky Winnti April 2013) |
| menuPass |
menuPass has installed updates and new malware on victims.(Citation: PWC Cloud Hopper April 2017)(Citation: District Court of NY APT10 Indictment December 2018) |
| Tonto Team |
Tonto Team has downloaded malicious DLLs which served as a ShadowPad loader.(Citation: ESET Exchange Mar 2021) |
| TeamTNT |
TeamTNT has the |
| Ke3chang |
Ke3chang has used tools to download files to compromised machines.(Citation: Microsoft NICKEL December 2021) |
| Windshift |
Windshift has used tools to deploy additional payloads to compromised hosts.(Citation: BlackBerry Bahamut) |
| Storm-1811 |
Storm-1811 has used scripted `cURL` commands, BITSAdmin, and other mechanisms to retrieve follow-on batch scripts and tools for execution on victim devices.(Citation: Microsoft Storm-1811 2024)(Citation: rapid7-email-bombing)(Citation: RedCanary June Insights 2024) |
| Patchwork |
Patchwork payloads download additional files from the C2 server.(Citation: Securelist Dropping Elephant)(Citation: TrendMicro Patchwork Dec 2017) |
| Moonstone Sleet |
Moonstone Sleet retrieved a final stage payload from command and control infrastructure during initial installation on victim systems.(Citation: Microsoft Moonstone Sleet 2024) |
| Mustang Panda |
Mustang Panda has downloaded additional executables following the initial infection stage.(Citation: Recorded Future REDDELTA July 2020) |
| Ember Bear |
Ember Bear has used tools to download malicious code.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) |
| Mustard Tempest |
Mustard Tempest has deployed secondary payloads and third stage implants to compromised hosts.(Citation: Microsoft Ransomware as a Service) |
| Play |
Play has used Cobalt Strike to download files to compromised machines.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
| Gorgon Group |
Gorgon Group malware can download additional files from C2 servers.(Citation: Unit 42 Gorgon Group Aug 2018) |
| Ajax Security Team |
Ajax Security Team has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system.(Citation: Check Point Rocket Kitten) |
| APT3 |
APT3 has a tool that can copy files to remote machines.(Citation: FireEye Clandestine Fox) |
| Winter Vivern |
Winter Vivern executed PowerShell scripts to create scheduled tasks to retrieve remotely-hosted payloads.(Citation: DomainTools WinterVivern 2021) |
| TA551 |
TA551 has retrieved DLLs and installer binaries for malware execution from C2.(Citation: Unit 42 TA551 Jan 2021) |
| GALLIUM |
GALLIUM dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN.(Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019) |
| Daggerfly |
Daggerfly has used PowerShell and BITSAdmin to retrieve follow-on payloads from external locations for execution on victim machines.(Citation: Symantec Daggerfly 2023) |
| Cobalt Group |
Cobalt Group has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers.(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016) The group's JavaScript backdoor is also capable of downloading files.(Citation: Morphisec Cobalt Gang Oct 2018) |
| Elderwood |
The Ritsol backdoor trojan used by Elderwood can download files onto a compromised host from a remote location.(Citation: Symantec Ristol May 2012) |
| APT41 |
APT41 used certutil to download additional files.(Citation: FireEye APT41 March 2020)(Citation: Crowdstrike GTR2020 Mar 2020)(Citation: Group IB APT 41 June 2021) APT41 downloaded post-exploitation tools such as Cobalt Strike via command shell following initial access.(Citation: Rostovcev APT41 2021) APT41 has uploaded Procdump and NATBypass to a staging directory and has used these tools in follow-on activities.(Citation: apt41_dcsocytec_dec2022) |
| UNC2452 |
UNC2452 downloaded additional tools, such as TEARDROP malware and Cobalt Strike, to the compromised host following initial compromise.(Citation: FireEye SUNBURST Backdoor December 2020) |
| FIN8 |
FIN8 has used remote code execution to download subsequent payloads.(Citation: FireEye Fin8 May 2016)(Citation: Bitdefender FIN8 July 2021) |
| TA505 |
TA505 has downloaded additional malware to execute on victim systems.(Citation: Cybereason TA505 April 2019)(Citation: Deep Instinct TA505 Apr 2019)(Citation: ProofPoint SettingContent-ms July 2018) |
| HAFNIUM |
HAFNIUM has downloaded malware and tools--including Nishang and PowerCat--onto a compromised host.(Citation: Microsoft HAFNIUM March 2020)(Citation: Rapid7 HAFNIUM Mar 2021) |
| LazyScripter |
LazyScripter had downloaded additional tools to a compromised host.(Citation: MalwareBytes LazyScripter Feb 2021) |
| PLATINUM |
PLATINUM has transferred files using the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel.(Citation: Microsoft PLATINUM June 2017) |
| Rancor |
Rancor has downloaded additional malware, including by using certutil.(Citation: Rancor Unit42 June 2018) |
Контрмеры |
|
| Контрмера | Описание |
|---|---|
| Network Intrusion Prevention |
Use intrusion detection signatures to block traffic at network boundaries. |
| Remote File Copy Mitigation |
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware or unusual data transfer over known tools and protocols like FTP can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific obfuscation technique used by a particular adversary or tool, and will likely be different across various malware families and versions. Adversaries will likely change tool C2 signatures over time or construct protocols in such a way as to avoid detection by common defensive tools. (Citation: University of Birmingham C2) |
Обнаружение
Monitor for file creation and files transferred into the network. Unusual processes with external network connections creating files on-system may be suspicious. Use of utilities, such as ftp, that does not normally occur may also be suspicious.
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Specifically, for the finger utility on Windows and Linux systems, monitor command line or terminal execution for the finger command. Monitor network activity for TCP port 79, which is used by the finger utility, and Windows netsh interface portproxy modifications to well-known ports such as 80 and 443. Furthermore, monitor file system for the download/creation and execution of suspicious files, which may indicate adversary-downloaded payloads. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used.(Citation: University of Birmingham C2)
Ссылки
- Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021.
- Martin Zugec. (2021, July 27). Deep Dive Into a FIN8 Attack - A Forensic Investigation. Retrieved September 1, 2021.
- CISA. (2020, September 15). Iran-Based Threat Actor Exploits VPN Vulnerabilities. Retrieved December 21, 2020.
- USG. (2020, May 12). MAR-10288834-2.v1 – North Korean Trojan: TAINTEDSCRIBE. Retrieved March 5, 2021.
- Budaca, E., et al. (2021, August 25). FIN8 Threat Actor Goes Agile with New Sardonic Backdoor. Retrieved August 9, 2023.
- Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022.
- Check Point Research. (2019, February 4). SpeakUp: A New Undetected Backdoor Linux Trojan. Retrieved April 17, 2019.
- CheckPoint. (2020, May 7). Naikon APT: Cyber Espionage Reloaded. Retrieved May 26, 2020.
- Booz Allen Hamilton. (2016). When The Lights Went Out. Retrieved December 18, 2024.
- Carbon Black Threat Analysis Unit. (2019, February 12). New macOS Malware Variant of Shlayer (OSX) Discovered. Retrieved August 8, 2019.
- Check Point Software Technologies. (2015). ROCKET KITTEN: A CAMPAIGN WITH 9 LIVES. Retrieved March 16, 2018.
- Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.
- Check Point Research Team. (2021, August 14). Indra - Hackers Behind Recent Attacks on Iran. Retrieved February 17, 2022.
- Singer, G. (2020, April 3). Threat Alert: Kinsing Malware Attacks Targeting Container Environments. Retrieved April 1, 2021.
- Bitdefender. (2015, December). APT28 Under the Scope. Retrieved February 23, 2017.
- Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.
- Kasuya, M. (2020, January 8). Threat Spotlight: Amadey Bot Targets Non-Russian Users. Retrieved July 14, 2022.
- Asheer Malhotra, Vitor Ventura & Jungsoo An, Cisco Talos. (2022, September 7). MagicRAT: Lazarus’ latest gateway into victim networks. Retrieved December 30, 2024.
- Botezatu, B and etl. (2021, July 21). LuminousMoth - PlugX, File Exfiltration and Persistence Revisited. Retrieved October 20, 2022.
- Ilascu, I. (2020, December 14). Hacking group’s new malware abuses Google and Facebook services. Retrieved December 28, 2020.
- Radu Tudorica. (2021, July 12). A Fresh Look at Trickbot’s Ever-Improving VNC Module. Retrieved September 28, 2021.
- CISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021.
- Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.
- DHS/CISA, Cyber National Mission Force. (2020, October 1). Malware Analysis Report (MAR) MAR-10303705-1.v1 – Remote Access Trojan: SLOTHFULMEDIA. Retrieved October 2, 2020.
- Harakhavik, Y. (2020, February 3). Warzone: Behind the enemy lines. Retrieved December 17, 2021.
- ANSSI. (2021, January 27). SANDWORM INTRUSION SET CAMPAIGN TARGETING CENTREON SYSTEMS. Retrieved March 30, 2021.
- Nyan-x-Cat. (n.d.). NYAN-x-CAT / AsyncRAT-C-Sharp. Retrieved October 3, 2023.
- Tudorica, R. et al. (2020, June 30). StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure. Retrieved July 20, 2020.
- Symantec Security Response. (2010, January 18). The Trojan.Hydraq Incident. Retrieved February 20, 2018.
- SecureWorks 2019, August 27 LYCEUM Takes Center Stage in Middle East Campaign Retrieved. 2019/11/19
- Black Lotus Labs. (2023, December 13). Routers Roasting On An Open Firewall: The KV-Botnet Investigation. Retrieved June 10, 2024.
- Faou, M. and Boutin, J. (2017, February). Read The Manual: A Guide to the RTM Banking Trojan. Retrieved March 9, 2017.
- Cherepanov, A. (2018, October). GREYENERGY A successor to BlackEnergy. Retrieved November 15, 2018.
- Golo Mühr, Joe Fasulo & Charlotte Hammond, IBM X-Force. (2024, November 12). Strela Stealer: Today’s invoice is tomorrow’s phish. Retrieved December 31, 2024.
- Breitenbacher, D and Osis, K. (2020, June 17). OPERATION IN(TER)CEPTION: Targeted Attacks Against European Aerospace and Military Companies. Retrieved December 20, 2021.
- Financial Security Institute. (2020, February 28). Profiling of TA505 Threat Group That Continues to Attack the Financial Sector. Retrieved July 14, 2022.
- Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.
- Ebach, L. (2017, June 22). Analysis Results of Zeus.Variant.Panda. Retrieved November 5, 2018.
- Liebenberg, D.. (2018, August 30). Rocke: The Champion of Monero Miners. Retrieved May 26, 2020.
- Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.
- Lorber, N. (2021, May 7). Revealing the Snip3 Crypter, a Highly Evasive RAT Loader. Retrieved September 13, 2023.
- Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020.
- Stolyarov, V. (2022, March 17). Exposing initial access broker with ties to Conti. Retrieved August 18, 2022.
- QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020.
- Grunzweig, J. (2018, October 01). NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT. Retrieved November 5, 2018.
- Levene, B. et al.. (2018, March 7). Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent. Retrieved March 31, 2018.
- Pantazopoulos, N.. (2018, November 8). RokRat Analysis. Retrieved May 21, 2020.
- SentinelLabs. (2022, September 22). Metador Technical Appendix. Retrieved April 4, 2023.
- Symantec Security Response. (2015, June 23). Dyre: Emerging threat on financial fraud landscape. Retrieved August 23, 2018.
- Patrick Wardle. (2020, July 3). OSX.EvilQuest Uncovered part ii: insidious capabilities. Retrieved March 21, 2021.
- Singh, S. et al.. (2018, March 13). Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign. Retrieved April 11, 2018.
- Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021.
- Jazi, Hossein. (2021, January 6). Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat. Retrieved March 22, 2022.
- Chen, J. and Hsieh, M. (2017, November 7). REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography. Retrieved December 27, 2017.
- Kumar, A., Stone-Gross, Brett. (2021, September 28). Squirrelwaffle: New Loader Delivering Cobalt Strike. Retrieved August 9, 2022.
- Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.
- Palazolo, G. (2021, October 7). SquirrelWaffle: New Malware Loader Delivering Cobalt Strike and QakBot. Retrieved August 9, 2022.
- Hod Gavriel. (2019, November 21). Dtrack: In-depth analysis of APT on a nuclear power plant. Retrieved January 20, 2021.
- Microsoft. (2022, June 2). Exposing POLONIUM activity and infrastructure targeting Israeli organizations. Retrieved July 1, 2022.
- Muhammad, I., Unterbrink, H.. (2021, January 6). A Deep Dive into Lokibot Infection Chain. Retrieved August 31, 2021.
- National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.
- DFIR Report. (2022, March 21). APT35 Automates Initial Access Using ProxyShell. Retrieved May 25, 2022.
- PWC. (2020, July 16). How WellMess malware has been used to target COVID-19 vaccines. Retrieved September 24, 2020.
- Mercer, W., Rascagneres, P. (2017, April 03). Introducing ROKRAT. Retrieved May 21, 2018.
- US-CERT. (2018, June 14). MAR-10135536-12 – North Korean Trojan: TYPEFRAME. Retrieved July 13, 2018.
- Dunwoody, M.. (2017, April 3). Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY). Retrieved April 5, 2017.
- BishopFox. (n.d.). Sliver Upload. Retrieved September 16, 2021.
- Trend Micro. (2014, December 11). PE_URSNIF.A2. Retrieved June 5, 2019.
- ClearSky Cyber Security . (2021, August). New Iranian Espionage Campaign By “Siamesekitten” - Lyceum. Retrieved June 6, 2022.
- Burton, K. (n.d.). The Conficker Worm. Retrieved February 18, 2021.
- Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020.
- Windows Defender Advanced Threat Hunting Team. (2016, April 29). PLATINUM: Targeted attacks in South and Southeast Asia. Retrieved February 15, 2018.
- ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021.
- Su, V. et al. (2019, December 11). Waterbear Returns, Uses API Hooking to Evade Security. Retrieved February 22, 2021.
- Hada, H. (2021, December 28). Flagpro The new malware used by BlackTech. Retrieved March 25, 2022.
- Mabutas, G. (2020, May 11). New MacOS Dacls RAT Backdoor Shows Lazarus’ Multi-Platform Attack Capability. Retrieved August 10, 2020.
- Lassalle, D., et al. (2017, November 6). OceanLotus Blossoms: Mass Digital Surveillance and Attacks Targeting ASEAN, Asian Nations, the Media, Human Rights Groups, and Civil Society. Retrieved November 6, 2017.
- Tsarfaty, Y. (2018, July 25). Micropsia Malware. Retrieved November 13, 2018.
- Rascagneres, P., Mercer, W. (2017, June 19). Delphi Used To Score Against Palestine. Retrieved November 13, 2018.
- Bar, T., Conant, S. (2017, October 20). BadPatch. Retrieved November 13, 2018.
- Porolli, M. (2020, July 9). More evil: A deep look at Evilnum and its toolset. Retrieved January 22, 2021.
- Axel F, Pierre T. (2017, October 16). Leviathan: Espionage actor spearphishes maritime and defense targets. Retrieved February 15, 2018.
- Levene, B, et al. (2017, May 03). Kazuar: Multiplatform Espionage Backdoor with API Access. Retrieved July 17, 2018.
- Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023.
- Ray, V. and Hayashi, K. (2019, February 1). Tracking OceanLotus’ new Downloader, KerrDown. Retrieved October 1, 2021.
- Huss, D. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016.
- Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved September 25, 2024.
- Hawley, S. et al. (2023, February 2). Turla: A Galaxy of Opportunity. Retrieved May 15, 2023.
- Cherepanov, Anton. (2019, November 10). ESETresearch discovered a trojanized IDA Pro installer. Retrieved September 12, 2024.
- Stuart Ashenbrenner, Alden Schmidt. (2024, April 25). LightSpy Malware Variant Targeting macOS. Retrieved January 3, 2025.
- CS. (2020, October 7). Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2. Retrieved September 27, 2021.
- Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.
- ClearSky Research Team. (2020, August 13). Operation 'Dream Job' Widespread North Korean Espionage Campaign. Retrieved December 20, 2021.
- Huss, D., et al. (2017, February 2). Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX. Retrieved April 5, 2018.
- Threat Intelligence Team. (2021, December 2). SideCopy APT: Connecting lures victims, payloads to infrastructure. Retrieved June 13, 2022.
- McGraw, T. (2024, December 4). Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware. Retrieved December 9, 2024.
- Chen, Joey. (2022, June 9). Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years. Retrieved July 14, 2022.
- MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021.
- Adamitis, D. et al. (2019, June 4). It's alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign. Retrieved May 11, 2020.
- McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018.
- F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.
- Ramin Nafisi. (2021, September 27). FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor. Retrieved October 4, 2021.
- Salem, E. (2021, April 19). Dancing With Shellcodes: Cracking the latest version of Guloader. Retrieved July 7, 2021.
- Sierra, E., Iglesias, G.. (2018, April 24). Metamorfo Campaigns Targeting Brazilian Users. Retrieved July 30, 2020.
- Microsoft. (2016, June 9). Reverse-engineering DUBNIUM. Retrieved March 31, 2021.
- FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021.
- Dunwoody, M., et al. (2018, November 19). Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign. Retrieved November 27, 2018.
- Cherepanov, A., Lipovsky, R. (2018, October 11). New TeleBots backdoor: First evidence linking Industroyer to NotPetya. Retrieved November 27, 2018.
- S2 Grupo. (2019, April 2). WIRTE Group attacking the Middle East. Retrieved May 24, 2019.
- Falcone, R. (2020, July 22). OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory. Retrieved July 28, 2020.
- Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021.
- Mathanraj Thangaraju, Sijo Jacob. (2023, July 26). Beyond File Search: A Novel Method for Exploiting the "search-ms" URI Protocol Handler. Retrieved March 15, 2024.
- Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.
- NCSC GCHQ. (2022, January 27). Small Sieve Malware Analysis Report. Retrieved August 22, 2022.
- Falcone, R. et al.. (2022, January 20). Threat Brief: Ongoing Russia and Ukraine Cyber Conflict. Retrieved March 10, 2022.
- ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.
- Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020.
- GReAT. (2019, August 12). Recent Cloud Atlas activity. Retrieved May 8, 2020.
- Slowik, J. (2021, October). THE BAFFLING BERSERK BEAR: A DECADE’S ACTIVITY TARGETING CRITICAL INFRASTRUCTURE. Retrieved December 6, 2021.
- Smith, L., Leathery, J., Read, B. (2021, March 4). New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452. Retrieved March 12, 2021.
- Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.
- Sushko, O. (2019, April 17). macOS Bundlore: Mac Virus Bypassing macOS Security Features. Retrieved June 30, 2020.
- Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020.
- DCSO CyTec Blog. (2022, December 24). APT41 — The spy who failed to encrypt me. Retrieved June 13, 2024.
- Group-IB. (2018, September). Silence: Moving Into the Darkside. Retrieved May 5, 2020.
- Microsoft Threat Intelligence. (2024, May 28). Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks. Retrieved August 26, 2024.
- Sancho, D., et al. (2012, May 22). IXESHE An APT Campaign. Retrieved June 7, 2019.
- ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.
- Team Huntress. (2023, August 11). Investigating New INC Ransom Group Activity. Retrieved June 5, 2024.
- Lee, B, et al. (2018, February 28). Sofacy Attacks Multiple Government Entities. Retrieved March 15, 2018.
- Mac Threat Response, Mobile Research Team. (2020, August 13). The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits. Retrieved October 5, 2021.
- Hromcova, Z. (2019, July). OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY. Retrieved May 6, 2020.
- Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.
- Kaspersky Lab's Global Research & Analysis Team. (2018, October 10). MuddyWater expands operations. Retrieved November 2, 2018.
- Centero, R. et al. (2021, February 5). New in Ransomware: Seth-Locker, Babuk Locker, Maoloa, TeslaCrypt, and CobraLocker. Retrieved August 11, 2021.
- Sherstobitoff, R., Malhotra, A., et. al.. (2018, December 18). Operation Sharpshooter Campaign Targets Global Defense, Critical Infrastructure. Retrieved May 14, 2020.
- Yamout, M. (2021, November 29). WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019. Retrieved February 1, 2022.
- Erlich, C. (2020, April 3). The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable. Retrieved May 26, 2020.
- ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.
- Symantec. (2022, January 31). Shuckworm Continues Cyber-Espionage Attacks Against Ukraine. Retrieved February 17, 2022.
- Glyer, C, et al. (2020, March). This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits. Retrieved April 28, 2020.
- Lancaster, T., Cortes, J. (2018, January 29). VERMIN: Quasar RAT and Custom Malware Used In Ukraine. Retrieved July 5, 2018.
- Kessem, L., et al. (2017, November 13). New Banking Trojan IcedID Discovered by IBM X-Force Research. Retrieved July 14, 2020.
- Hromcová, Z. (2018, June 07). InvisiMole: Surprisingly equipped spyware, undercover since 2013. Retrieved July 10, 2018.
- McCabe, A. (2020, January 23). The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks. Retrieved June 2, 2020.
- Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018.
- Stepanic, D. and Bousseaden, S. (2024, May 15). Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID. Retrieved September 13, 2024.
- Kamble, V. (2022, June 28). Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem. Retrieved August 24, 2022.
- Kaspersky Lab's Global Research & Analysis Team. (2018, October 15). Octopus-infested seas of Central Asia. Retrieved November 14, 2018.
- Lunghi, D. and Horejsi, J.. (2019, June 10). MuddyWater Resurfaces, Uses Multi-Stage Backdoor POWERSTATS V3 and New Post-Exploitation Tools. Retrieved May 14, 2020.
- Kaspersky Lab's Global Research & Analysis Team. (2013, February 27). The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoor. Retrieved November 17, 2024.
- Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017.
- Jazi, H. (2021, February). LazyScripter: From Empire to double RAT. Retrieved November 17, 2024.
- Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.
- Cadieux, P, et al (2019, April 30). Sodinokibi ransomware exploits WebLogic Server vulnerability. Retrieved August 4, 2020.
- ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.
- Stama, D.. (2015, February 6). Backdoor.Mivast. Retrieved February 15, 2016.
- Somerville, L. and Toro, A. (2017, March 30). Playing Cat & Mouse: Introducing the Felismus Malware. Retrieved November 16, 2017.
- Wardle, P. (2021, November 11). OSX.CDDS (OSX.MacMa). Retrieved June 30, 2022.
- Lei, C., et al. (2018, January 24). Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More. Retrieved May 22, 2018.
- Dahan, A. (2017). Operation Cobalt Kitty. Retrieved December 27, 2018.
- ESET Research. (2018, May 22). Turla Mosquito: A shift towards more generic tools. Retrieved July 3, 2018.
- Pradhan, A. (2022, February 8). LolZarus: Lazarus Group Incorporating Lolbins into Campaigns. Retrieved March 22, 2022.
- ESET. (2016, October). En Route with Sednit - Part 1: Approaching the Target. Retrieved November 8, 2016.
- ClearSky Cyber Security. (2021, January). “Lebanese Cedar” APT Global Lebanese Espionage Campaign Leveraging Web Servers. Retrieved February 10, 2021.
- An