Skip to content

T1132.001 Standard Encoding

Adversaries may encode data with a standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a standard data encoding system that adheres to existing protocol specifications. Common data encoding schemes include ASCII, Unicode, hexadecimal, Base64, and MIME.23 Some data encoding systems may also result in data compression, such as gzip.

Item Value
ID T1132.001
Sub-techniques T1132.001, T1132.002
Tactics TA0011
Platforms Linux, Windows, macOS
Version 1.0
Created 14 March 2020
Last Modified 03 March 2023

Procedure Examples

ID Name Description
S0045 ADVSTORESHELL C2 traffic from ADVSTORESHELL is encrypted, then encoded with Base64 encoding.14
G0073 APT19 An APT19 HTTP malware variant used Base64 to encode communications to the C2 server.97
G0064 APT33 APT33 has used base64 to encode command and control traffic.94
S0373 Astaroth Astaroth encodes data using Base64 before sending it to the C2 server. 27
S0129 AutoIt backdoor AutoIt backdoor has sent a C2 response that was base64-encoded.32
S0414 BabyShark BabyShark has encoded data using certutil before exfiltration.59
S0093 Backdoor.Oldrea Some Backdoor.Oldrea samples use standard Base64 + bzip2, and some use standard Base64 + reverse XOR + RSA-2048 to decrypt data received from C2 servers.86
S0128 BADNEWS BADNEWS encodes C2 traffic with base64.325556
S0268 Bisonal Bisonal has encoded binary data with Base64 and ASCII.1918
S0520 BLINDINGCAN BLINDINGCAN has encoded its C2 traffic with Base64.15
G0060 BRONZE BUTLER Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server.5
S0014 BS2005 BS2005 uses Base64 encoding for communication in the message body of an HTTP request.48
S1039 Bumblebee Bumblebee has the ability to base64 encode C2 server responses.36
S0030 Carbanak Carbanak encodes the message body of HTTP traffic with Base64.67
S0631 Chaes Chaes has used Base64 to encode C2 communications.40
S0674 CharmPower CharmPower can send additional modules over C2 encoded with base64.10
S0144 ChChes ChChes can encode C2 data with a custom technique that utilizes Base64.1112
S0154 Cobalt Strike Cobalt Strike can use Base64, URL-safe Base64, or NetBIOS encoding in its C2 traffic.79
S0338 Cobian RAT Cobian RAT obfuscates communications with the C2 server using Base64 encoding.45
S0137 CORESHELL CORESHELL C2 messages are Base64-encoded.31
S1024 CreepySnail CreepySnail can use Base64 to encode its C2 traffic.74
S0673 DarkWatchman DarkWatchman encodes data using hexadecimal representation before sending it to the C2 server.71
S0187 Daserf Daserf uses custom base64 encoding to obfuscate HTTP traffic.5
S0354 Denis Denis encodes the data sent to the server in Base64.51
S0200 Dipsind Dipsind encodes C2 traffic with base64.8
S1021 DnsSystem DnsSystem can Base64 encode data sent to C2.23
S0472 down_new down_new has the ability to base64 encode C2 communications.38
S0377 Ebury Ebury has encoded C2 traffic in hexadecimal format.89
S0081 Elise Elise exfiltrates data using cookie values that are Base64-encoded.44
S0171 Felismus Some Felismus samples use a custom method for C2 traffic that utilizes Base64.35
S0696 Flagpro Flagpro has encoded bidirectional data communications between a target system and C2 server using Base64.64
S0410 Fysbis Fysbis can use Base64 to encode its C2 traffic.72
S0032 gh0st RAT gh0st RAT has used Zlib to compress C2 communications data before encrypting it.82
S0632 GrimAgent GrimAgent can base64 encode C2 replies.83
G0125 HAFNIUM HAFNIUM has used ASCII encoding for C2 traffic.96
S0170 Helminth For C2 over HTTP, Helminth encodes data with base64 and sends it via the “Cookie” field of HTTP requests. For C2 over DNS, Helminth converts ASCII characters into their hexadecimal values and sends the data in cleartext.57
S0376 HOPLIGHT HOPLIGHT has utilized Zlib compression to obfuscate the communications payload. 49
S0015 Ixeshe Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests.5253
S0044 JHUHUGIT A JHUHUGIT variant encodes C2 POST data base64.43
S0265 Kazuar Kazuar encodes communications to the C2 server in Base64.81
S0487 Kessel Kessel has exfiltrated data via hexadecimal-encoded subdomain fields of DNS queries.37
S1020 Kevin Kevin can Base32 encode chunks of output files during exfiltration.84
S0356 KONNI KONNI has used a custom base64 key to encode stolen data before exfiltration.25
G0032 Lazarus Group A Lazarus Group malware sample encodes data with base64.90
S0409 Machete Machete has used base64 encoding.77
S1060 Mafalda Mafalda can encode data using Base64 prior to exfiltration.58
S0459 MechaFlounder MechaFlounder has the ability to use base16 encoded strings in C2.68
S0084 Mis-Type Mis-Type uses Base64 encoding for C2 traffic.61
S0083 Misdat Misdat network traffic is Base64-encoded plaintext.61
S1026 Mongall Mongall can use Base64 to encode information sent to its C2.33
S0284 More_eggs More_eggs has used basE91 encoding, along with encryption, for C2 communication.62
S1047 Mori Mori can use Base64 encoded JSON libraries used in C2.42
G0069 MuddyWater MuddyWater has used tools to encode C2 communications including Base64 encoding.9293
S0385 njRAT njRAT uses Base64 encoding for C2 traffic.87
S0340 Octopus Octopus has encoded C2 communications in Base64.16
S0439 Okrum Okrum has used base64 to encode C2 communication.20
S0264 OopsIE OopsIE encodes data in hexadecimal format over the C2 channel.39
G0040 Patchwork Patchwork used Base64 to encode C2 traffic.95
S1031 PingPull PingPull can encode C2 traffic with Base64.46
S0124 Pisloader Responses from the Pisloader C2 server are base32-encoded.24
S0441 PowerShower PowerShower has the ability to encode C2 communications with base64 encoding.2930
S0223 POWERSTATS POWERSTATS encoded C2 traffic with base64.70
S0184 POWRUNER POWRUNER can use base64 encoded C2 communications.22
S0113 Prikormka Prikormka encodes C2 traffic with Base64.65
S0650 QakBot QakBot can Base64 encode system information sent to C2.7576
S0269 QUADAGENT QUADAGENT encodes C2 communications with base64.63
S0458 Ramsay Ramsay has used base64 to encode its C2 traffic.80
S0495 RDAT RDAT can communicate with the C2 via base32-encoded subdomains.13
S0379 Revenge RAT Revenge RAT uses Base64 to encode information sent to the C2 server.41
S0270 RogueRobin RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel.50
S0085 S-Type S-Type uses Base64 encoding for C2 traffic.61
S1018 Saint Bot Saint Bot has used Base64 to encode its C2 communications.69
G0034 Sandworm Team Sandworm Team‘s BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server.91
S0053 SeaDuke SeaDuke C2 traffic is base64-encoded.21
S0610 SideTwist SideTwist has used Base64 for encoded C2 traffic.85
S0633 Sliver Sliver can use standard encoding techniques like gzip and hex to ASCII to encode the C2 communication payload.4
S0649 SMOKEDHAM SMOKEDHAM has encoded its C2 traffic with Base64.67
S0543 Spark Spark has encoded communications with the C2 server with base64.88
S0374 SpeakUp SpeakUp encodes C&C communication using Base64. 34
S1030 Squirrelwaffle Squirrelwaffle has encoded its communications to C2 servers using Base64.73
S1037 STARWHALE STARWHALE has the ability to hex-encode collected data from an infected host.42
S0603 Stuxnet Stuxnet transforms encrypted binary data into an ASCII string in order to use it as a URL parameter value.66
S0559 SUNBURST SUNBURST used Base64 encoding in its C2 traffic.26
S0663 SysUpdate SysUpdate has used Base64 to encode its C2 traffic.28
G0127 TA551 TA551 has used encoded ASCII text for initial C2 communications.60
S0678 Torisma Torisma has encoded C2 communications with Base64.47
S0266 TrickBot TrickBot can Base64-encode C2 commands.54
G0081 Tropic Trooper Tropic Trooper has used base64 encoding to hide command strings delivered from the C2.98
S0476 Valak Valak has returned C2 data as encoded ASCII.60
S0514 WellMess WellMess has used Base64 encoding to uniquely identify communication to and from the C2.9
S0653 xCaon xCaon has used Base64 to encode its C2 traffic.78
S0251 Zebrocy Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.17

Mitigations

ID Mitigation Description
M1031 Network Intrusion Prevention Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific obfuscation technique used by a particular adversary or tool, and will likely be different across various malware families and versions. Adversaries will likely change tool C2 signatures over time or construct protocols in such a way as to avoid detection by common defensive tools.

Detection

ID Data Source Data Component
DS0029 Network Traffic Network Traffic Content

References


  1. Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016. 

  2. Wikipedia. (2016, December 26). Binary-to-text encoding. Retrieved March 1, 2017. 

  3. Wikipedia. (2017, February 19). Character Encoding. Retrieved March 1, 2017. 

  4. BishopFox. (n.d.). Sliver HTTP(S) C2. Retrieved September 16, 2021. 

  5. Counter Threat Unit Research Team. (2017, October 12). BRONZE BUTLER Targets Japanese Enterprises. Retrieved January 4, 2018. 

  6. Kaspersky Lab’s Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018. 

  7. Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018. 

  8. Windows Defender Advanced Threat Hunting Team. (2016, April 29). PLATINUM: Targeted attacks in South and Southeast Asia. Retrieved February 15, 2018. 

  9. CISA. (2020, July 16). MAR-10296782-2.v1 – WELLMESS. Retrieved September 24, 2020. 

  10. Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022. 

  11. Nakamura, Y.. (2017, February 17). ChChes - Malware that Communicates with C&C Servers Using Cookie Headers. Retrieved March 1, 2017. 

  12. Falcone, R. (2020, July 22). OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory. Retrieved July 28, 2020. 

  13. Kaspersky Lab’s Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015. 

  14. US-CERT. (2020, August 19). MAR-10295134-1.v1 – North Korean Remote Access Trojan: BLINDINGCAN. Retrieved August 19, 2020. 

  15. Kaspersky Lab’s Global Research & Analysis Team. (2018, October 15). Octopus-infested seas of Central Asia. Retrieved November 14, 2018. 

  16. Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019. 

  17. Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022. 

  18. Zykov, K. (2020, August 13). CactusPete APT group’s updated Bisonal backdoor. Retrieved May 5, 2021. 

  19. Hromcova, Z. (2019, July). OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY. Retrieved May 6, 2020. 

  20. Grunzweig, J.. (2015, July 14). Unit 42 Technical Analysis: Seaduke. Retrieved August 3, 2016. 

  21. Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017. 

  22. Shivtarkar, N. and Kumar, A. (2022, June 9). Lyceum .NET DNS Backdoor. Retrieved June 23, 2022. 

  23. Grunzweig, J., et al. (2016, May 24). New Wekby Attacks Use DNS Requests As Command and Control Mechanism. Retrieved August 17, 2016. 

  24. Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020. 

  25. FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021. 

  26. Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved April 17, 2019. 

  27. Daniel Lunghi. (2023, March 1). Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting. Retrieved March 20, 2023. 

  28. Lancaster, T. (2018, November 5). Inception Attackers Target Europe with Year-old Office Vulnerability. Retrieved May 8, 2020. 

  29. GReAT. (2019, August 12). Recent Cloud Atlas activity. Retrieved May 8, 2020. 

  30. FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015. 

  31. Settle, A., et al. (2016, August 8). MONSOON - Analysis Of An APT Campaign. Retrieved September 22, 2016. 

  32. Chen, Joey. (2022, June 9). Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years. Retrieved July 14, 2022. 

  33. Check Point Research. (2019, February 4). SpeakUp: A New Undetected Backdoor Linux Trojan. Retrieved April 17, 2019. 

  34. Somerville, L. and Toro, A. (2017, March 30). Playing Cat & Mouse: Introducing the Felismus Malware. Retrieved November 16, 2017. 

  35. Merriman, K. and Trouerbach, P. (2022, April 28). This isn’t Optimus Prime’s Bumblebee but it’s Still Transforming. Retrieved August 22, 2022. 

  36. Dumont, R., M.Léveillé, M., Porcher, H. (2018, December 1). THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors. Retrieved July 16, 2020. 

  37. Chen, J. et al. (2019, November). Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data. Retrieved June 9, 2020. 

  38. Lee, B., Falcone, R. (2018, February 23). OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan. Retrieved July 16, 2018. 

  39. Salem, E. (2020, November 17). CHAES: Novel Malware Targeting Latin American E-Commerce. Retrieved June 30, 2021. 

  40. Livelli, K, et al. (2018, November 12). Operation Shaheen. Retrieved May 1, 2019. 

  41. FBI, CISA, CNMF, NCSC-UK. (2022, February 24). Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks. Retrieved September 27, 2022. 

  42. Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017. 

  43. Falcone, R., et al.. (2015, June 16). Operation Lotus Blossom. Retrieved February 15, 2016. 

  44. Yadav, A., et al. (2017, August 31). Cobian RAT – A backdoored RAT. Retrieved November 13, 2018. 

  45. Unit 42. (2022, June 13). GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool. Retrieved August 7, 2022. 

  46. Beek, C. (2020, November 5). Operation North Star: Behind The Scenes. Retrieved December 20, 2021. 

  47. Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014. 

  48. US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019. 

  49. Falcone, R., et al. (2018, July 27). New Threat Actor Group DarkHydrus Targets Middle East Government. Retrieved August 2, 2018. 

  50. Dahan, A. (2017). Operation Cobalt Kitty. Retrieved December 27, 2018. 

  51. Moran, N., & Villeneuve, N. (2013, August 12). Survival of the Fittest: New York Times Attackers Evolve Quickly [Blog]. Retrieved November 12, 2014. 

  52. Sancho, D., et al. (2012, May 22). IXESHE An APT Campaign. Retrieved June 7, 2019. 

  53. Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020. 

  54. Levene, B. et al.. (2018, March 7). Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent. Retrieved March 31, 2018. 

  55. Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018. 

  56. Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017. 

  57. SentinelLabs. (2022, September 22). Metador Technical Appendix. Retrieved April 4, 2023. 

  58. Unit 42. (2019, February 22). New BabyShark Malware Targets U.S. National Security Think Tanks. Retrieved October 7, 2019. 

  59. Duncan, B. (2020, July 24). Evolution of Valak, from Its Beginnings to Mass Distribution. Retrieved August 31, 2020. 

  60. Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021. 

  61. Villadsen, O.. (2019, August 29). More_eggs, Anyone? Threat Actor ITG08 Strikes Again. Retrieved September 16, 2019. 

  62. Lee, B., Falcone, R. (2018, July 25). OilRig Targets Technology Service Provider and Government Agency with QUADAGENT. Retrieved August 9, 2018. 

  63. Hada, H. (2021, December 28). Flagpro The new malware used by BlackTech. Retrieved March 25, 2022. 

  64. Cherepanov, A.. (2016, May 17). Operation Groundbait: Analysis of a surveillance toolkit. Retrieved May 18, 2016. 

  65. Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved. 2017/09/22  

  66. FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021. 

  67. Falcone, R. (2019, March 4). New Python-Based Payload MechaFlounder Used by Chafer. Retrieved May 27, 2020. 

  68. Hasherezade. (2021, April 6). A deep dive into Saint Bot, a new downloader. Retrieved June 9, 2022. 

  69. Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018. 

  70. Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022. 

  71. Doctor Web. (2014, November 21). Linux.BackDoor.Fysbis.1. Retrieved December 7, 2017. 

  72. Kumar, A., Stone-Gross, Brett. (2021, September 28). Squirrelwaffle: New Loader Delivering Cobalt Strike. Retrieved August 9, 2022. 

  73. Microsoft. (2022, June 2). Exposing POLONIUM activity and infrastructure targeting Israeli organizations. Retrieved July 1, 2022. 

  74. CS. (2020, October 7). Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2. Retrieved September 27, 2021. 

  75. Kuzmenko, A. et al. (2021, September 2). QakBot technical analysis. Retrieved September 27, 2021. 

  76. Kaspersky Global Research and Analysis Team. (2014, August 20). El Machete. Retrieved September 13, 2019. 

  77. CheckPoint Research. (2021, July 1). IndigoZebra APT continues to attack Central Asia with evolving tools. Retrieved September 24, 2021. 

  78. Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021. 

  79. Antiy CERT. (2020, April 20). Analysis of Ramsay components of Darkhotel’s infiltration and isolation network. Retrieved March 24, 2021. 

  80. Levene, B, et al. (2017, May 03). Kazuar: Multiplatform Espionage Backdoor with API Access. Retrieved July 17, 2018. 

  81. Quinn, J. (2019, March 25). The odd case of a Gh0stRAT variant. Retrieved July 15, 2020. 

  82. Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved July 16, 2021. 

  83. Kayal, A. et al. (2021, October). LYCEUM REBORN: COUNTERINTELLIGENCE IN THE MIDDLE EAST. Retrieved June 14, 2022. 

  84. Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021. 

  85. Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016. 

  86. Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: “njRAT” Uncovered. Retrieved June 4, 2019. 

  87. Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020. 

  88. M.Léveillé, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019. 

  89. Sherstobitoff, R. (2018, February 12). Lazarus Resurfaces, Targets Global Banks and Bitcoin Users. Retrieved February 19, 2018. 

  90. Cherepanov, A.. (2016, December 13). The rise of TeleBots: Analyzing disruptive KillDisk attacks. Retrieved June 10, 2020. 

  91. ClearSky. (2019, June). Iranian APT group ‘MuddyWater’ Adds Exploits to Their Arsenal. Retrieved May 14, 2020. 

  92. Peretz, A. and Theck, E. (2021, March 5). Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021. 

  93. Ackerman, G., et al. (2018, December 21). OVERRULED: Containing a Potentially Destructive Adversary. Retrieved January 17, 2019. 

  94. Cymmetria. (2016). Unveiling Patchwork - The Copy-Paste APT. Retrieved August 3, 2016. 

  95. MSTIC. (2021, March 2). HAFNIUM targeting Exchange Servers with 0-day exploits. Retrieved March 3, 2021. 

  96. Grunzweig, J., Lee, B. (2016, January 22). New Attacks Linked to C0d0so0 Group. Retrieved August 2, 2018. 

  97. Chen, J.. (2020, May 12). Tropic Trooper’s Back: USBferry Attack Targets Air gapped Environments. Retrieved May 20, 2020.