diff --git a/content/labs/lab-1-visualization-in-transformerlab.md b/content/labs/lab-1-visualization-in-transformerlab.md index 1f31cbd..4665ff8 100644 --- a/content/labs/lab-1-visualization-in-transformerlab.md +++ b/content/labs/lab-1-visualization-in-transformerlab.md @@ -86,14 +86,13 @@ Use the launch panel below to open the local Netron service on port `8338`.
-### Execute: Download the Two GGUF Files +### Execute: Download the GGUF File -You will work with two small GGUF models in this objective: +You will work with a small GGUF model in this objective. Download the provided file: -- [Qwen 3 0.6B](/api/lab1/models/qwen3-0.6b-q8_0.gguf) -- [Llama 3.2 1B](/api/lab1/models/llama-3.2-1b-q4_k_m.gguf) +- [Llama-3.2-1B.Q4_K_M.gguf](/api/lab1/models/llama-3.2-1b-q4_k_m.gguf) for Llama 3.2 1B -These files are intentionally small enough to make architecture exploration practical in a classroom lab. Download both files to a convenient location such as your `Downloads` folder. Once you've downloaded your files, you can open them using the "Open Model" Button on the Netron Homepage. +This file is intentionally small enough to make architecture exploration practical in a classroom lab. Save it to a convenient location such as your `Downloads` folder. Once you've downloaded the file, you can open it using the "Open Model" button on the Netron home page.
-
-
+
+and" - }, - { - "role": "assistant", - "content": "T1071 - Application Layer Protocol', 'T1573 - Encrypted Channel', 'T1102 - Web Service', 'T1041 - Exfiltration Over C2 Channel', 'T1008 - Fallback Channels" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The Nefilim ransomware uses a batch file to stop services and kill processes in the local host. This batch file abuses taskill.exe using CMD to kill predefined services and processes in the target host. Nefilim distributes this batch file to multiple hosts using two batch files. One of the batch files uses the ‘copy’ command, and the other one uses WMI with hard-coded admin credentials." - }, - { - "role": "assistant", - "content": "T1562.001 - Impair Defenses: Disable or Modify Tools" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Sliver can collect network connection information." - }, - { - "role": "assistant", - "content": "T1049 - System Network Connections Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The variable $HL39fjh contains the base64-encoded PowerShell command shown in Figure 2. It reads the Windows Registry key where the encrypted payload is stored, and contains the password and the salt needed to decrypt the payload" - }, - { - "role": "assistant", - "content": "T1027 - Obfuscated Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "All the text files are now packed into the archive temp.zip (%temp%\\temp.zip) - zip is Base64 encoded (with a custom key, same as that used in the malicious document) and then copied to post.txt - txt is uploaded to the control server" - }, - { - "role": "assistant", - "content": "T1560 - Archive Collected Data', 'T1074.001 - Data Staged: Local Data Staging" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network." - }, - { - "role": "assistant", - "content": "T1570 - Lateral Tool Transfer" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The attack starts with a phishing email that contains a malicious link to a file hosted on Google Docs named “Annual Bonus Report.doc”. When the user clicks on the link, the TrickBot dropper downloads onto the target machine. This differs from previous TrickBot attacks we have seen, where TrickBot is usually dropped through a Microsoft Office document or by another malware like Emotet" - }, - { - "role": "assistant", - "content": "T1204.002 - User Execution: Malicious File', 'T1566.002 - Phishing: Spearphishing Link" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "includes a component based on the code of VNC that can stream a live feed of the desktop of an infected host." - }, - { - "role": "assistant", - "content": "T1113 - Screen Capture" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "BoomBox can enumerate the username on a compromised host." - }, - { - "role": "assistant", - "content": "T1033 - System Owner/User Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "RCSession can launch itself from a hollowed svchost.exe process." - }, - { - "role": "assistant", - "content": "T1055.012 - Process Injection: Process Hollowing" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated." - }, - { - "role": "assistant", - "content": "T1070.004 - Indicator Removal on Host: File Deletion" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "RTM can attempt to run the program as admin, then show a fake error message and a legitimate UAC bypass prompt to the user in an attempt to socially engineer the user into escalating privileges." - }, - { - "role": "assistant", - "content": "T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The email contained an attachment named Seminar-Invitation.doc, which is a malicious Microsoft Word document we track as ThreeDollars" - }, - { - "role": "assistant", - "content": "T1598.002 - Spearphishing Attachment" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine." - }, - { - "role": "assistant", - "content": "T1005 - Data from Local System" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "collects the account name of the logged-in user and sends it to the C2." - }, - { - "role": "assistant", - "content": "T1033 - System Owner/User Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Sandworm Team has used `move` to transfer files to a network share." - }, - { - "role": "assistant", - "content": "T1570 - Lateral Tool Transfer" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "APT29 temporarily replaced legitimate utilities with their own, executed their payload, and then restored the original file." - }, - { - "role": "assistant", - "content": "T1070 - Indicator Removal on Host" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Zebrocy's Delphi variant was packed with UPX." - }, - { - "role": "assistant", - "content": "T1027.002 - Obfuscated Files or Information: Software Packing" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "WINERACK can gather information on the victim username." - }, - { - "role": "assistant", - "content": "T1033 - System Owner/User Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "LightNeuron has used AES and XOR to decrypt configuration files and commands." - }, - { - "role": "assistant", - "content": "T1140 - Deobfuscate/Decode Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet" - }, - { - "role": "assistant", - "content": "T1059.003 - Command and Scripting Interpreter: Windows Command Shell" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Denis ran multiple system checks, looking for processor and register characteristics, to evade emulation and analysis." - }, - { - "role": "assistant", - "content": "T1497.001 - Virtualization/Sandbox Evasion: System Checks" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "DanBot can download additional files to a targeted system." - }, - { - "role": "assistant", - "content": "T1105 - Ingress Tool Transfer" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The \"net view \\\\remotesystem\" and \"net share\" commands in Net can be used to find shared drives and directories on remote and local systems respectively." - }, - { - "role": "assistant", - "content": "T1135 - Network Share Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Reaver encrypts some of its files with XOR." - }, - { - "role": "assistant", - "content": "T1027 - Obfuscated Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "WannaCry uses Tor for command and control traffic." - }, - { - "role": "assistant", - "content": "T1090.003 - Proxy: Multi-hop Proxy" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of “YHCRA” and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic." - }, - { - "role": "assistant", - "content": "T1573.001 - Symmetric Cryptography" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Saint Bot can identify the OS version, CPU, and other details from a victim's machine." - }, - { - "role": "assistant", - "content": "T1082 - System Information Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The ‘tasklist’ command will use a WMI query or the “ps” command, which allows Kazuar to obtain running processes from both Windows and Unix systems. Also, Kazuar’s ‘cmd’ command will run commands using “cmd.exe” for Windows systems and “/bin/bash” for Unix systems. These two commands provide evidence that the authors of Kazuar intended to use this malware as a cross-platform tool to target both Windows and Unix systems" - }, - { - "role": "assistant", - "content": "T1047 - Windows Management Instrumentation', 'T1057 - Process Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Then it checks to see if it was launched by RUNDLL32.exe along with parameter #1" - }, - { - "role": "assistant", - "content": "T1218.011 - Signed Binary Proxy Execution: Rundll32" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "APT38 has used web shells for persistence or to ensure redundant access." - }, - { - "role": "assistant", - "content": "T1505.003 - Server Software Component: Web Shell" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Hildegard has queried the Cloud Instance Metadata API for cloud credentials." - }, - { - "role": "assistant", - "content": "T1552.005 - Unsecured Credentials: Cloud Instance Metadata API" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Andariel has limited its watering hole attacks to specific IP address ranges." - }, - { - "role": "assistant", - "content": "T1590.005 - IP Addresses" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "SpeakUp checks for availability of specific ports on servers." - }, - { - "role": "assistant", - "content": "T1046 - Network Service Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "NotPetya can use valid credentials with PsExec or \"wmic\" to spread itself to remote systems." - }, - { - "role": "assistant", - "content": "T1078.003 - Valid Accounts: Local Accounts" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "BRONZE BUTLER has incorporated code into several tools that attempts to terminate anti-virus processes." - }, - { - "role": "assistant", - "content": "T1562.001 - Impair Defenses: Disable or Modify Tools" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "avoids analysis by encrypting all strings, internal files, configuration data." - }, - { - "role": "assistant", - "content": "T1027 - Obfuscated Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Volgmer installs a copy of itself in a randomly selected service, then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings." - }, - { - "role": "assistant", - "content": "T1543.003 - Create or Modify System Process: Windows Service" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "DarkWatchman has the ability to self-extract as a RAR archive." - }, - { - "role": "assistant", - "content": "T1140 - Deobfuscate/Decode Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The threat actors also collected the files “ntds.dit” and the “SYSTEM” registry hive. DHS observed the threat actors compress all of these files into archives named “SYSTEM.zip” and “comps.zip" - }, - { - "role": "assistant", - "content": "T1560 - Archive Collected Data" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "SombRAT can execute \"enum\" to enumerate files in storage on a compromised system." - }, - { - "role": "assistant", - "content": "T1083 - File and Directory Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "has used the open source tool Essential NetTools to map the network and build a list of targets." - }, - { - "role": "assistant", - "content": "T1018 - Remote System Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "(Source: Dell SecureWorks) The following tools appear to be exclusive to TG-3390: OwaAuth web shell — A web shell and credential stealer deployed to Microsoft Exchange servers" - }, - { - "role": "assistant", - "content": "T1059 - Command and Scripting Interpreter', 'T1505.003 - Server Software Component: Web Shell" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "1) The script uses the function fromCharCode() that returns a string created from a sequence of UTF-16 code units. By using this function, it avoids explicitly writing commands it wants to execute and it hides the actual code it is initiating. In particular, the script uses this function to hide information related to process names. To the best of our knowledge, this method was not used in early versions of the spam campaign. 2) The script uses the function radador(), which returns a randomized integer. In contrast to the first method of obfuscation, this has been used effectively since early versions of the Astaroth Trojan campaign" - }, - { - "role": "assistant", - "content": "T1140 - Deobfuscate/Decode Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "SideTwist has the ability to download additional files." - }, - { - "role": "assistant", - "content": "T1105 - Ingress Tool Transfer" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The actors dumped LSASS process memory by using 'rundll32.exe' to execute the MiniDump function exported by the native Windows® DLL 'comsvcs.dll'." - }, - { - "role": "assistant", - "content": "T1003.001 - OS Credential Dumping: LSASS Memory" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application whitelisting techniques." - }, - { - "role": "assistant", - "content": "T1127 - Trusted Developer Utilities Proxy Execution" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "UNC2452 used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and to execute other commands." - }, - { - "role": "assistant", - "content": "T1059.001 - Command and Scripting Interpreter: PowerShell" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "RemoteUtilities can enumerate files and directories on a target machine." - }, - { - "role": "assistant", - "content": "T1083 - File and Directory Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "APT28 has renamed the WinRAR utility to avoid detection." - }, - { - "role": "assistant", - "content": "T1036 - Masquerading" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "A Lazarus Group custom backdoor implant included a custom PE loader named \"Security Package\" that was added into the lsass.exe process via registry key." - }, - { - "role": "assistant", - "content": "T1036.004 - Masquerading: Masquerade Task or Service" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "TA505 has password-protected malicious Word documents and used base64 encoded PowerShell commands." - }, - { - "role": "assistant", - "content": "T1027 - Obfuscated Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "ccf32 can temporarily store files in a hidden directory on the local host." - }, - { - "role": "assistant", - "content": "T1074.001 - Data Staged: Local Data Staging" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "samples have been signed with legitimate, compromised code signing certificates owned by software company AI Squared." - }, - { - "role": "assistant", - "content": "T1553.002 - Code Signing" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Ragnar Locker has used rundll32.exe to execute components of VirtualBox." - }, - { - "role": "assistant", - "content": "T1218.011 - Signed Binary Proxy Execution: Rundll32" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "More_eggs uses HTTPS for C2." - }, - { - "role": "assistant", - "content": "T1071.001 - Application Layer Protocol: Web Protocols" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "It eventually downloads a PowerShell module from an Amazon S3 bucket URL hxxps://s3[.]amazonaws[.]com/doclibrarysales/test[.]txt and then executes it" - }, - { - "role": "assistant", - "content": "T1583.006 - Web Services', 'T1102 - Web Service" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Finally, REvil ransomware marks its binary code for deletion during the next reboot and terminates execution" - }, - { - "role": "assistant", - "content": "T1070.004 - Indicator Removal on Host: File Deletion" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "StoneDrill can take screenshots." - }, - { - "role": "assistant", - "content": "T1113 - Screen Capture" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The attacker’s choice of IP addresses was also optimized to evade detection. The attacker primarily used only IP addresses originating from the same country as the victim, leveraging Virtual Private Servers" - }, - { - "role": "assistant", - "content": "T1036 - Masquerading" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Earth Lusca has used the megacmd tool to upload stolen files from a victim network to MEGA." - }, - { - "role": "assistant", - "content": "T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "BitPaymer has copied itself to the \":bin\" alternate data stream of a newly created file." - }, - { - "role": "assistant", - "content": "T1564.004 - Hide Artifacts: NTFS File Attributes" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Maintain Presence APT40 primarily uses backdoors, including web shells, to maintain presence within a victim environment" - }, - { - "role": "assistant", - "content": "T1505.003 - Server Software Component: Web Shell" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The attackers typically distribute Netwalker ransomware with the use of a reflective PowerShell loader script that has been protected from casual analysis with several layers of obfuscation" - }, - { - "role": "assistant", - "content": "T1059.001 - Command and Scripting Interpreter: PowerShell', 'T1027 - Obfuscated Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "TeamTNT has encrypted its binaries via AES and encoded files using Base64." - }, - { - "role": "assistant", - "content": "T1027 - Obfuscated Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "has used the Microsoft administration tool csvde.exe to export Active Directory data." - }, - { - "role": "assistant", - "content": "T1087 - Account Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "After decrypting the C&C server address, the shellcode proceeds to send an HTTP GET request to fetch the resource: “msdn.cpp” on the server" - }, - { - "role": "assistant", - "content": "T1071.001 - Application Layer Protocol: Web Protocols" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "cmd can be used to copy files to/from a remotely connected internal system." - }, - { - "role": "assistant", - "content": "T1570 - Lateral Tool Transfer" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Upon exploitation, a GH0ST RAT variant is delivered to the victims’ system, which calls out to a previously known APT18 CnC address 223.25.233.248. GH0ST RAT is a backdoor derived from public source code" - }, - { - "role": "assistant", - "content": "T1070.001 - Indicator Removal on Host: Clear Windows Event Logs', 'T1059 - Command and Scripting Interpreter" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "After initialization, the code monitors browser activities, looking for online banking sessions. Once these are found, the malware enables the attacker to display an overlay window in front of the victim’s browser to manipulate the user’s session in the background. In this way, the fraudulent transaction is performed from the victim’s machine, making it harder to detect for anti-fraud solutions on the bank’s end. The criminal can also request specific information, asked during the bank transaction, such as a secondary password and token, bypassing two-factor authentication solutions adopted by the financial sector" - }, - { - "role": "assistant", - "content": "T1185 - Browser Session Hijacking', 'T1185 - Browser Session Hijacking" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Key takeaways: - TeamTNT is using new, open source tools to steal usernames and passwords from infected machines. The campaign has been active for approximately one month and is responsible for thousands of infections globally. Background . TeamTNT has been one of the most active threat groups since mid 2020. One of the most recent findings (June 4, 2021) came from Palo Alto researchers who discovered the TeamTNT Chimaera repository. TeamTNT C&C website showing infection statistics . Figure 2. The full list of supported programs can be found on the Lazagne page on Github. Windows module - persistence . Kubernetes root payload component . This component is mainly responsible for installing a cryptocurrency miner on infected devices, allowing the attacker to connect remotely to the system using SSH. Decoded shell script . TeamTNT IRC bot . As described previously this year by Lacework, TeamTNT includes ZiggyStartux in their IRC bot. IRC Bot available commands . TeamTNT AWS stealer . Similar to the other TeamTNT components, the AWS stealer (see figure 11) first installs missing dependencies. Conclusion . AT&T Alien Labs has discovered new malicious files distributed by the threat actor TeamTNT" - }, - { - "role": "assistant", - "content": "T1518.001 - Software Discovery: Security Software Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "PowerPunch can use Base64-encoded scripts." - }, - { - "role": "assistant", - "content": "T1027 - Obfuscated Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "A Volgmer variant is encoded using a simple XOR cipher." - }, - { - "role": "assistant", - "content": "T1027 - Obfuscated Files or Information" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Metamorfo has embedded a \"vmdetect.exe\" executable to identify virtual machines at the beginning of execution." - }, - { - "role": "assistant", - "content": "T1497 - Virtualization/Sandbox Evasion" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Both RATs provide a wide range of functionality on the target machine, ranging from collecting files, watching the screen, to capturing passwords and keystrokes. The RATs also enable the operator to remotely delete files, and spy on the computer user via the microphone or webcam" - }, - { - "role": "assistant", - "content": "T1070.004 - Indicator Removal on Host: File Deletion" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Cobalt Strike can download a hosted \"beacon\" payload using BITSAdmin." - }, - { - "role": "assistant", - "content": "T1197 - BITS Jobs" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "TajMahal has the ability to send collected files over its C2." - }, - { - "role": "assistant", - "content": "T1041 - Exfiltration Over C2 Channel" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "GrimAgent can set persistence with a Registry run key." - }, - { - "role": "assistant", - "content": "T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Chimera has used HTTPS for C2 communications." - }, - { - "role": "assistant", - "content": "T1071.001 - Application Layer Protocol: Web Protocols" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection." - }, - { - "role": "assistant", - "content": "T1059.003 - Command and Scripting Interpreter: Windows Command Shell" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "FIN7 developed evasive techniques at a rapid pace. Throughout 2017, FIN7 was observed creating novel obfuscation methods, and in some cases modifying the methods on a daily basis while launching attacks targeting multiple victims. Their development of a payload obfuscation style using the Windows command interpreter's (cmd.exe) native string substitution was so unique that FireEye dubbed it \"FINcoding. These methods inspired deep command line obfuscation research and the release of Daniel Bohannon's Invoke-DOSfuscation. Reference Table 2 and Table 3 for a selection of samples and their associated command line obfuscation techniques" - }, - { - "role": "assistant", - "content": "T1059.003 - Command and Scripting Interpreter: Windows Command Shell" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "ShadowPad has discovered system information including memory status, CPU frequency, OS versions, and volume serial numbers." - }, - { - "role": "assistant", - "content": "T1082 - System Information Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process." - }, - { - "role": "assistant", - "content": "T1055.011 - Process Injection: Extra Window Memory Injection" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "BabyShark has executed the \"tasklist\" command." - }, - { - "role": "assistant", - "content": "T1057 - Process Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Tools CTU researchers observed BRONZE UNION using the following tools in intrusions since the 2015 analysis, but clients should assume that the threat group still has access to the previously reported tools" - }, - { - "role": "assistant", - "content": "T1518.001 - Software Discovery: Security Software Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "has targeted victims using spearphishing emails with malicious Microsoft Word attachments." - }, - { - "role": "assistant", - "content": "T1598.002 - Spearphishing Attachment" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The legitimate application is a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations. When the Kaspersky application is run, it loads a file named msi.dll, which is located within the same directory. The XOR-decode process, which skips zeroes, uses the single-byte key 0x88" - }, - { - "role": "assistant", - "content": "T1574.002 - Hijack Execution Flow: DLL Side-Loading" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Molerats used various implants, including those built with JS, on target machines." - }, - { - "role": "assistant", - "content": "T1059.007 - Command and Scripting Interpreter: JavaScript" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "SYSCON has the ability to use Tasklist to list running processes." - }, - { - "role": "assistant", - "content": "T1057 - Process Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "This file is a USB file stealer which can be also guessed by its internal name \"USBgrabber.dll\". However, the implementation is sloppy which makes it a file stealer for any newly connected logical volume on a system. This is because the malware monitors the computer for messages WM_COMMAND and WM_DEVICECHANGE, but not verifying if a USB drive was connected" - }, - { - "role": "assistant", - "content": "T1025 - Data from Removable Media" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "On balance, the fall campaigns diverged from Bulgarian themed NetWire campaigns in the early summer in scope and scale. These campaigns distributed NetWire variants which used Bulgarian email lures, leveraged geofencing, and downloading EXEs through certutils. The NetWire malware has been around since at least 2002 and has been consistently in use by various actors across the threat landscape. This analysis shows groupings of similar campaigns distributing NetWire based on message attributes, email lures and language, Office document metadata, VBA Macro code, and malware configuration" - }, - { - "role": "assistant", - "content": "T1566.001 - Phishing: Spearphishing Attachment', 'T1059.005 - Command and Scripting Interpreter: Visual Basic" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The backdoor also creates a separate thread that installs a Windows hook procedure on message WH_KEYBOARD_LL, through which it can intercept keystrokes. We believe this is mainly used to intercept credentials from other browsers, specifically Google Chrome" - }, - { - "role": "assistant", - "content": "T1056.001 - Input Capture: Keylogging" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Additionally, each beacon is accompanied with a screenshot that is initially saved as ‘scr.jpg’ in the public directory and subsequently issued to the C2 using the same HTTP POST request as in the ‘uploadsf’ command" - }, - { - "role": "assistant", - "content": "T1113 - Screen Capture" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "WastedLocker can enumerate files and directories just prior to encryption." - }, - { - "role": "assistant", - "content": "T1083 - File and Directory Discovery" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Over 80 files were sent to 40 email accounts within the organization, within the span of about an hour. The email contains Microsoft Excel attachments with malicious macros. When the file is opened, it loads in Microsoft Excel and urges the user to enable macros" - }, - { - "role": "assistant", - "content": "T1204.002 - User Execution: Malicious File" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "CVE-2018-4878 was the second most commonly observed vulnerability and is the only Adobe Flash Player vulnerability on this year’s top 10. Like CVE-2018-8174, this vulnerability was included in multiple exploit kits, most notably the Fallout exploit kit, which was used to distribute GandCrab ransomware. Fallout took its name and URI patterns from the now defunct Nuclear exploit kit, which had been associated with CVE-2015-7645, one of 2016’s top 10 vulnerabilities. In 2018, Fallout was last selling for $300 a week and $1,100 a month, as seen below." - }, - { - "role": "assistant", - "content": "T1203 - Exploitation for Client Execution', 'T1588.005 - Exploits" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Nomadic Octopus executed PowerShell in a hidden window." - }, - { - "role": "assistant", - "content": "T1564.003 - Hide Artifacts: Hidden Window" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "Pony has attempted to lure targets into downloading an attached executable (ZIP, RAR, or CAB archives) or document (PDF or other MS Office format)." - }, - { - "role": "assistant", - "content": "T1204.002 - User Execution: Malicious File" - } - ] - }, - { - "messages": [ - { - "role": "system", - "content": "Given a description of an attack technique, tactic, or procedure, return only an accurate MITRE ATT&CK ID and Name in the format: \"ID# - Technique\". " - }, - { - "role": "user", - "content": "The prior example decrypts to the following: mailto:121.126.211[.]94:8080;80;80 The following Python script may be used to decode the C2 data used by the newest Comnie variant: 12345678910111213141516171819202122232425262728293031323334353637383940 import base64import sysimport refrom string import maketransfrom struct import *import requestsdef rc4_crypt(data, key): S = range(256) j = 0 out = [] for i in range(256): j = (j + S[i] + ord( key[i % len(key)] )) % 256 S[i] , S[j] = S[j] , S[i] i = j = 0 for char in data: i = ( i + 1 ) % 256 j = ( j + S[i] ) % 256 S[i] , S[j] = S[j] , S[i] out.append(chr(ord(char) ^ S[(S[j] + S[i]) % 256])) return ''.join(out)def decode(data): o = \"\" for d in data: od = ord(d) o += chr((4 * (16 * od | od & 0xC) | (((od >> 4 | od & 0x30) >> 2))) & 0xFF) return obase64fixTable = maketrans(\"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"[::-1], \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\");def trans(string): return str(string).translate(base64fixTable)def altdecode(string): return base64.b64decode(trans(string))req = requests.get(sys.argv[1])fd = req.textoriginal_data = re.search(\"magnet:/\\?([^\\?]+)\\?\", fd).group(1)parsed_data = altdecode(original_data)dataLength = unpack(\" (01-04 11-40-02).txt All the text files are now packed into the archive temp.zip (%temp%\\temp.zip) zip is Base64 encoded (with a custom key, same as that used in the malicious document) and then copied to post.txt txt is uploaded to the control server Additional Commands and Capabilities The service-based DLL implant traverses to the /htdocs/ directory on the FTP server and looks for any files with the keywords: TO EVERYONE: Commands issued to all infected endpoints TO