prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:PowerShell | AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader. |
Command and Scripting Interpreter:PowerShell | BADHATCH can utilize powershell.exe to execute commands on a compromised host. |
Command and Scripting Interpreter:PowerShell | Bandook has used PowerShell loaders as part of execution. |
Command and Scripting Interpreter:PowerShell | Bazar can execute a PowerShell script received from C2. |
Command and Scripting Interpreter:PowerShell | Black Basta has used PowerShell scripts for discovery and to execute files over the network. |
Command and Scripting Interpreter:PowerShell | BloodHound can use PowerShell to pull Active Directory information from the target environment. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell reverse TCP shells to issue interactive commands over a network connection. |
Command and Scripting Interpreter:PowerShell | BONDUPDATER is written in PowerShell. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell for execution. |
Command and Scripting Interpreter:PowerShell | Bumblebee can use PowerShell for execution. |
Command and Scripting Interpreter:PowerShell | During C0018, the threat actors used encoded PowerShell scripts for execution. |
Command and Scripting Interpreter:PowerShell | During C0021, the threat actors used obfuscated PowerShell to extract an encoded payload from within an .LNK file. |
Command and Scripting Interpreter:PowerShell | CharmPower can use PowerShell for payload execution and C2 communication. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features. |
Command and Scripting Interpreter:PowerShell | The Clambling dropper can use PowerShell to download the malware. |
Command and Scripting Interpreter:PowerShell | It has used powershell.exe to download and execute scripts. |
Command and Scripting Interpreter:PowerShell | Cobalt Strike can execute a payload on a remote host with PowerShell. This technique does not write any data to disk. Cobalt Strike can also use PowerSploit and other scripting frameworks to perform execution. |
Command and Scripting Interpreter:PowerShell | ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to execute malicious files and payloads. |
Command and Scripting Interpreter:PowerShell | ConnectWise can be used to execute PowerShell commands on target machines. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell Empire. |
Command and Scripting Interpreter:PowerShell | CrackMapExec can execute PowerShell commands via WMI. |
Command and Scripting Interpreter:PowerShell | CreepyDrive can use Powershell for execution, including the cmdlets Invoke-WebRequest and Invoke-Expression. |
Command and Scripting Interpreter:PowerShell | CreepySnail can use PowerShell for execution, including the cmdlets Invoke-WebRequst and Invoke-Expression. |
Command and Scripting Interpreter:PowerShell | Cuba has been dropped onto systems and used for lateral movement via obfuscated PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | It leveraged PowerShell to download and execute additional scripts for execution. |
Command and Scripting Interpreter:PowerShell | It used PowerShell to create shellcode loaders. |
Command and Scripting Interpreter:PowerShell | DarkWatchman can execute PowerShell commands and has used PowerShell to execute a keylogger. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell scripts to download and execute programs in memory, without writing to disk. |
Command and Scripting Interpreter:PowerShell | Denis has a version written in PowerShell. |
Command and Scripting Interpreter:PowerShell | Donut can generate shellcode outputs that execute via PowerShell. |
Command and Scripting Interpreter:PowerShell | DownPaper uses PowerShell for execution. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell scripts for execution. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to execute commands. |
Command and Scripting Interpreter:PowerShell | Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to download and execute malicious code. |
Command and Scripting Interpreter:PowerShell | Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz. |
Command and Scripting Interpreter:PowerShell | Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the Invoke-PSRemoting module. |
Command and Scripting Interpreter:PowerShell | FatDuke has the ability to execute PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | Ferocious can use PowerShell scripts for execution. |
Command and Scripting Interpreter:PowerShell | It uses PowerShell for execution as well as PowerShell Empire to establish persistence. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell commands to obtain DNS data from a compromised network. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener. |
Command and Scripting Interpreter:PowerShell | It used a PowerShell script to launch shellcode that retrieved an additional payload. |
Command and Scripting Interpreter:PowerShell | It's malicious spearphishing payloads are executed as PowerShell. It has also used PowerShell for lateral movement and credential access. |
Command and Scripting Interpreter:PowerShell | FlawedAmmyy has used PowerShell to execute commands. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell scripts to access credential data. |
Command and Scripting Interpreter:PowerShell | During Frankenstein, the threat actors used PowerShell to run a series of Base64-encoded commands that acted as a stager and enumerated hosts. |
Command and Scripting Interpreter:PowerShell | It used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines. |
Command and Scripting Interpreter:PowerShell | It used PowerShell to download additional payloads and for execution. |
Command and Scripting Interpreter:PowerShell | It has used obfuscated PowerShell scripts for staging. |
Command and Scripting Interpreter:PowerShell | It has staged and executed PowerShell scripts on compromised hosts. |
Command and Scripting Interpreter:PowerShell | It malware can use PowerShell commands to download and execute a payload and open a decoy document on the victim’s machine. |
Command and Scripting Interpreter:PowerShell | GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet. |
Command and Scripting Interpreter:PowerShell | It has used the Exchange Power Shell module Set-OabVirtualDirectoryPowerShell to export mailbox data. |
Command and Scripting Interpreter:PowerShell | HALFBAKED can execute PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | HAMMERTOSS is known to use PowerShell. |
Command and Scripting Interpreter:PowerShell | Hancitor has used PowerShell to execute commands. |
Command and Scripting Interpreter:PowerShell | One version of Helminth uses a PowerShell script. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell-based tools and scripts for discovery and collection on compromised hosts. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to execute malicious commands and payloads. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell Empire for execution of malware. |
Command and Scripting Interpreter:PowerShell | JCry has used PowerShell to execute payloads. |
Command and Scripting Interpreter:PowerShell | JSS Loader has the ability to download and execute PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | KeyBoy uses PowerShell commands to download and execute payloads. |
Command and Scripting Interpreter:PowerShell | KGH_SPY can execute PowerShell commands on the victim's machine. |
Command and Scripting Interpreter:PowerShell | It has executed a variety of PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | Koadic has used PowerShell to establish persistence. |
Command and Scripting Interpreter:PowerShell | KOCTOPUS has used PowerShell commands to download additional files. |
Command and Scripting Interpreter:PowerShell | KONNI used PowerShell to download and execute a specific 64-bit version of the malware. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to execute commands and malicious code. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell scripts to execute malicious code. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell for execution. |
Command and Scripting Interpreter:PowerShell | LitePower can use a PowerShell script to execute commands. |
Command and Scripting Interpreter:PowerShell | Lizar has used PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | Lokibot has used PowerShell commands embedded inside batch scripts. |
Command and Scripting Interpreter:PowerShell | Mafalda can execute PowerShell commands on a compromised machine. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell for execution and privilege escalation. |
Command and Scripting Interpreter:PowerShell | It uses PowerSploit to inject shellcode into PowerShell. |
Command and Scripting Interpreter:PowerShell | Meteor can use PowerShell commands to disable the network adapters on a victim machines. |
Command and Scripting Interpreter:PowerShell | MoleNet can use PowerShell to set persistence. |
Command and Scripting Interpreter:PowerShell | It used PowerShell implants on target machines. |
Command and Scripting Interpreter:PowerShell | Mosquito can launch PowerShell Scripts. |
Command and Scripting Interpreter:PowerShell | It has used plugins to execute PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell for execution. |
Command and Scripting Interpreter:PowerShell | It has used malicious PowerShell scripts to enable execution. |
Command and Scripting Interpreter:PowerShell | Netwalker has been written in PowerShell and executed directly in memory, avoiding detection. |
Command and Scripting Interpreter:PowerShell | The NETWIRE binary has been executed via PowerShell script. |
Command and Scripting Interpreter:PowerShell | njRAT has executed PowerShell commands via auto-run registry key persistence. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell for execution. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents. |
Command and Scripting Interpreter:PowerShell | During Operation Dream Job, It used PowerShell commands to explore the environment of compromised victims. |
Command and Scripting Interpreter:PowerShell | During Operation Wocao, threat actors used PowerShell on compromised systems. |
Command and Scripting Interpreter:PowerShell | OSX_OCEANLOTUS.D uses PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | It used PowerSploit to download payloads, run a reverse shell, and execute malware on the victim's machine. |
Command and Scripting Interpreter:PowerShell | Pillowmint has used a PowerShell script to install a shim database. |
Command and Scripting Interpreter:PowerShell | The It's Information Gathering Tool (IGT) includes PowerShell components. |
Command and Scripting Interpreter:PowerShell | POSHSPY uses PowerShell to execute various commands, one to execute its payload. |
Command and Scripting Interpreter:PowerShell | PowerLess is written in and executed via PowerShell without using powershell.exe. |
Command and Scripting Interpreter:PowerShell | PowerPunch has the ability to execute through PowerShell. |