Encrypted Channel
Adversaries may employ an encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if secret keys are encoded and/or generated within malware samples/configuration files.
BY SOURCE
PROCEDURES (22)
Auto-extracted: 4 detections for attachment
Auto-extracted: 3 detections for cloud
Auto-extracted: 2 detections for encrypt
Auto-extracted: 2 detections for bypass
Auto-extracted: 2 detections for base64
Auto-extracted: 2 detections for command and control
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for phish
Auto-extracted: 1 detections for impersonat
Auto-extracted: 1 detections for network connection monitoring
Auto-extracted: 1 detections for office
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for download
Auto-extracted: 1 detections for download
Auto-extracted: 1 detections for obfuscat
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for office