prompt
stringclasses
508 values
procedure
stringlengths
20
478
Command and Scripting Interpreter:PowerShell
AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader.
Command and Scripting Interpreter:PowerShell
BADHATCH can utilize powershell.exe to execute commands on a compromised host.
Command and Scripting Interpreter:PowerShell
Bandook has used PowerShell loaders as part of execution.
Command and Scripting Interpreter:PowerShell
Bazar can execute a PowerShell script received from C2.
Command and Scripting Interpreter:PowerShell
Black Basta has used PowerShell scripts for discovery and to execute files over the network.
Command and Scripting Interpreter:PowerShell
BloodHound can use PowerShell to pull Active Directory information from the target environment.
Command and Scripting Interpreter:PowerShell
It has used PowerShell reverse TCP shells to issue interactive commands over a network connection.
Command and Scripting Interpreter:PowerShell
BONDUPDATER is written in PowerShell.
Command and Scripting Interpreter:PowerShell
It has used PowerShell for execution.
Command and Scripting Interpreter:PowerShell
Bumblebee can use PowerShell for execution.
Command and Scripting Interpreter:PowerShell
During C0018, the threat actors used encoded PowerShell scripts for execution.
Command and Scripting Interpreter:PowerShell
During C0021, the threat actors used obfuscated PowerShell to extract an encoded payload from within an .LNK file.
Command and Scripting Interpreter:PowerShell
CharmPower can use PowerShell for payload execution and C2 communication.
Command and Scripting Interpreter:PowerShell
It has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features.
Command and Scripting Interpreter:PowerShell
The Clambling dropper can use PowerShell to download the malware.
Command and Scripting Interpreter:PowerShell
It has used powershell.exe to download and execute scripts.
Command and Scripting Interpreter:PowerShell
Cobalt Strike can execute a payload on a remote host with PowerShell. This technique does not write any data to disk. Cobalt Strike can also use PowerSploit and other scripting frameworks to perform execution.
Command and Scripting Interpreter:PowerShell
ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to execute malicious files and payloads.
Command and Scripting Interpreter:PowerShell
ConnectWise can be used to execute PowerShell commands on target machines.
Command and Scripting Interpreter:PowerShell
It has used PowerShell Empire.
Command and Scripting Interpreter:PowerShell
CrackMapExec can execute PowerShell commands via WMI.
Command and Scripting Interpreter:PowerShell
CreepyDrive can use Powershell for execution, including the cmdlets Invoke-WebRequest and Invoke-Expression.
Command and Scripting Interpreter:PowerShell
CreepySnail can use PowerShell for execution, including the cmdlets Invoke-WebRequst and Invoke-Expression.
Command and Scripting Interpreter:PowerShell
Cuba has been dropped onto systems and used for lateral movement via obfuscated PowerShell scripts.
Command and Scripting Interpreter:PowerShell
It leveraged PowerShell to download and execute additional scripts for execution.
Command and Scripting Interpreter:PowerShell
It used PowerShell to create shellcode loaders.
Command and Scripting Interpreter:PowerShell
DarkWatchman can execute PowerShell commands and has used PowerShell to execute a keylogger.
Command and Scripting Interpreter:PowerShell
It has used PowerShell scripts to download and execute programs in memory, without writing to disk.
Command and Scripting Interpreter:PowerShell
Denis has a version written in PowerShell.
Command and Scripting Interpreter:PowerShell
Donut can generate shellcode outputs that execute via PowerShell.
Command and Scripting Interpreter:PowerShell
DownPaper uses PowerShell for execution.
Command and Scripting Interpreter:PowerShell
It has used PowerShell scripts for execution.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to execute commands.
Command and Scripting Interpreter:PowerShell
Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to download and execute malicious code.
Command and Scripting Interpreter:PowerShell
Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz.
Command and Scripting Interpreter:PowerShell
Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the Invoke-PSRemoting module.
Command and Scripting Interpreter:PowerShell
FatDuke has the ability to execute PowerShell scripts.
Command and Scripting Interpreter:PowerShell
Ferocious can use PowerShell scripts for execution.
Command and Scripting Interpreter:PowerShell
It uses PowerShell for execution as well as PowerShell Empire to establish persistence.
Command and Scripting Interpreter:PowerShell
It has used PowerShell commands to obtain DNS data from a compromised network.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener.
Command and Scripting Interpreter:PowerShell
It used a PowerShell script to launch shellcode that retrieved an additional payload.
Command and Scripting Interpreter:PowerShell
It's malicious spearphishing payloads are executed as PowerShell. It has also used PowerShell for lateral movement and credential access.
Command and Scripting Interpreter:PowerShell
FlawedAmmyy has used PowerShell to execute commands.
Command and Scripting Interpreter:PowerShell
It has used PowerShell scripts to access credential data.
Command and Scripting Interpreter:PowerShell
During Frankenstein, the threat actors used PowerShell to run a series of Base64-encoded commands that acted as a stager and enumerated hosts.
Command and Scripting Interpreter:PowerShell
It used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines.
Command and Scripting Interpreter:PowerShell
It used PowerShell to download additional payloads and for execution.
Command and Scripting Interpreter:PowerShell
It has used obfuscated PowerShell scripts for staging.
Command and Scripting Interpreter:PowerShell
It has staged and executed PowerShell scripts on compromised hosts.
Command and Scripting Interpreter:PowerShell
It malware can use PowerShell commands to download and execute a payload and open a decoy document on the victim’s machine.
Command and Scripting Interpreter:PowerShell
GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet.
Command and Scripting Interpreter:PowerShell
It has used the Exchange Power Shell module Set-OabVirtualDirectoryPowerShell to export mailbox data.
Command and Scripting Interpreter:PowerShell
HALFBAKED can execute PowerShell scripts.
Command and Scripting Interpreter:PowerShell
HAMMERTOSS is known to use PowerShell.
Command and Scripting Interpreter:PowerShell
Hancitor has used PowerShell to execute commands.
Command and Scripting Interpreter:PowerShell
One version of Helminth uses a PowerShell script.
Command and Scripting Interpreter:PowerShell
It has used PowerShell-based tools and scripts for discovery and collection on compromised hosts.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to execute malicious commands and payloads.
Command and Scripting Interpreter:PowerShell
It has used PowerShell Empire for execution of malware.
Command and Scripting Interpreter:PowerShell
JCry has used PowerShell to execute payloads.
Command and Scripting Interpreter:PowerShell
JSS Loader has the ability to download and execute PowerShell scripts.
Command and Scripting Interpreter:PowerShell
KeyBoy uses PowerShell commands to download and execute payloads.
Command and Scripting Interpreter:PowerShell
KGH_SPY can execute PowerShell commands on the victim's machine.
Command and Scripting Interpreter:PowerShell
It has executed a variety of PowerShell scripts.
Command and Scripting Interpreter:PowerShell
Koadic has used PowerShell to establish persistence.
Command and Scripting Interpreter:PowerShell
KOCTOPUS has used PowerShell commands to download additional files.
Command and Scripting Interpreter:PowerShell
KONNI used PowerShell to download and execute a specific 64-bit version of the malware.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to execute commands and malicious code.
Command and Scripting Interpreter:PowerShell
It has used PowerShell scripts to execute malicious code.
Command and Scripting Interpreter:PowerShell
It has used PowerShell for execution.
Command and Scripting Interpreter:PowerShell
LitePower can use a PowerShell script to execute commands.
Command and Scripting Interpreter:PowerShell
Lizar has used PowerShell scripts.
Command and Scripting Interpreter:PowerShell
Lokibot has used PowerShell commands embedded inside batch scripts.
Command and Scripting Interpreter:PowerShell
Mafalda can execute PowerShell commands on a compromised machine.
Command and Scripting Interpreter:PowerShell
It has used PowerShell for execution and privilege escalation.
Command and Scripting Interpreter:PowerShell
It uses PowerSploit to inject shellcode into PowerShell.
Command and Scripting Interpreter:PowerShell
Meteor can use PowerShell commands to disable the network adapters on a victim machines.
Command and Scripting Interpreter:PowerShell
MoleNet can use PowerShell to set persistence.
Command and Scripting Interpreter:PowerShell
It used PowerShell implants on target machines.
Command and Scripting Interpreter:PowerShell
Mosquito can launch PowerShell Scripts.
Command and Scripting Interpreter:PowerShell
It has used plugins to execute PowerShell scripts.
Command and Scripting Interpreter:PowerShell
It has used PowerShell for execution.
Command and Scripting Interpreter:PowerShell
It has used malicious PowerShell scripts to enable execution.
Command and Scripting Interpreter:PowerShell
Netwalker has been written in PowerShell and executed directly in memory, avoiding detection.
Command and Scripting Interpreter:PowerShell
The NETWIRE binary has been executed via PowerShell script.
Command and Scripting Interpreter:PowerShell
njRAT has executed PowerShell commands via auto-run registry key persistence.
Command and Scripting Interpreter:PowerShell
It has used PowerShell for execution.
Command and Scripting Interpreter:PowerShell
It has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.
Command and Scripting Interpreter:PowerShell
During Operation Dream Job, It used PowerShell commands to explore the environment of compromised victims.
Command and Scripting Interpreter:PowerShell
During Operation Wocao, threat actors used PowerShell on compromised systems.
Command and Scripting Interpreter:PowerShell
OSX_OCEANLOTUS.D uses PowerShell scripts.
Command and Scripting Interpreter:PowerShell
It used PowerSploit to download payloads, run a reverse shell, and execute malware on the victim's machine.
Command and Scripting Interpreter:PowerShell
Pillowmint has used a PowerShell script to install a shim database.
Command and Scripting Interpreter:PowerShell
The It's Information Gathering Tool (IGT) includes PowerShell components.
Command and Scripting Interpreter:PowerShell
POSHSPY uses PowerShell to execute various commands, one to execute its payload.
Command and Scripting Interpreter:PowerShell
PowerLess is written in and executed via PowerShell without using powershell.exe.
Command and Scripting Interpreter:PowerShell
PowerPunch has the ability to execute through PowerShell.