Skip to content

Command and Control

Ivan Kirillov edited this page Feb 21, 2014 · 12 revisions
Aliases
Description The 'command and control' (C2) Capability indicates that the malware instance is able to receive and execute remotely submitted commands.
Relationships
Properties
  • Protocol Used: (The name of the network protocol used in the C2 capability)
  • Encryption Algorithm: (The name of the encryption algorithm used to encrypt the network traffic of the C2 capability)
References
Examples
Clone this wiki locally