prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:PowerShell | PowerShower is a backdoor written in PowerShell. |
Command and Scripting Interpreter:PowerShell | POWERSOURCE is a PowerShell backdoor. |
Command and Scripting Interpreter:PowerShell | PowerSploit modules are written in and executed via PowerShell. |
Command and Scripting Interpreter:PowerShell | PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server. |
Command and Scripting Interpreter:PowerShell | POWERSTATS uses PowerShell for obfuscation and execution. |
Command and Scripting Interpreter:PowerShell | POWERTON is written in PowerShell. |
Command and Scripting Interpreter:PowerShell | PowGoop has the ability to use PowerShell scripts to execute commands. |
Command and Scripting Interpreter:PowerShell | POWRUNER is written in PowerShell. |
Command and Scripting Interpreter:PowerShell | Prestige can use PowerShell for payload execution on targeted systems. |
Command and Scripting Interpreter:PowerShell | PS1 can utilize a PowerShell loader. |
Command and Scripting Interpreter:PowerShell | PUNCHBUGGY has used PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | Pupy has a module for loading and executing PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | PyDCrypt has attempted to execute with PowerShell. |
Command and Scripting Interpreter:PowerShell | Pysa has used Powershell scripts to deploy its ransomware. |
Command and Scripting Interpreter:PowerShell | QakBot can use PowerShell to download and execute payloads. |
Command and Scripting Interpreter:PowerShell | QUADAGENT uses PowerShell scripts for execution. |
Command and Scripting Interpreter:PowerShell | There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form. |
Command and Scripting Interpreter:PowerShell | RegDuke can extract and execute PowerShell scripts from C2 communications. |
Command and Scripting Interpreter:PowerShell | Revenge RAT uses the PowerShell command Reflection.Assembly to load itself into memory to aid in execution. |
Command and Scripting Interpreter:PowerShell | REvil has used PowerShell to delete volume shadow copies and download files. |
Command and Scripting Interpreter:PowerShell | RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence, RogueRobin creates %APPDATA%\OneDrive.bat and saves the following string to it:powershell.exe -WindowStyle Hidden -exec bypass -File "%APPDATA%\OneDrive.ps1". |
Command and Scripting Interpreter:PowerShell | Saint Bot has used PowerShell for execution. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell scripts to run a credential harvesting tool in memory to evade defenses. |
Command and Scripting Interpreter:PowerShell | Sardonic has the ability to execute PowerShell commands on a compromised machine. |
Command and Scripting Interpreter:PowerShell | SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket. |
Command and Scripting Interpreter:PowerShell | ServHelper has the ability to execute a PowerShell script to get information from the infected host. |
Command and Scripting Interpreter:PowerShell | SharpStage can execute arbitrary commands with PowerShell. |
Command and Scripting Interpreter:PowerShell | SHARPSTATS has the ability to employ a custom PowerShell script. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to drop and execute malware loaders. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to download and execute payloads. |
Command and Scripting Interpreter:PowerShell | SILENTTRINITY can use PowerShell to execute commands. |
Command and Scripting Interpreter:PowerShell | SMOKEDHAM can execute Powershell commands sent from its C2 server. |
Command and Scripting Interpreter:PowerShell | Snip3 can use a PowerShell script for second-stage execution. |
Command and Scripting Interpreter:PowerShell | Socksbot can write and execute PowerShell scripts. |
Command and Scripting Interpreter:PowerShell | During the SolarWinds Compromise, It used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and execute other commands. |
Command and Scripting Interpreter:PowerShell | SQLRat has used PowerShell to create a Meterpreter session. |
Command and Scripting Interpreter:PowerShell | Squirrelwaffle has used PowerShell to execute its payload. |
Command and Scripting Interpreter:PowerShell | It malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server. |
Command and Scripting Interpreter:PowerShell | StrongPity can use PowerShell to add files to the Windows Defender exclusions list. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to download files and to inject into various Windows processes. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell for execution of a payload. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to download and execute malware and reconnaissance scripts. |
Command and Scripting Interpreter:PowerShell | It has executed PowerShell commands in batch scripts. |
Command and Scripting Interpreter:PowerShell | It has used a publicly-available PowerShell-based tool, WMImplant. The group has also used PowerShell to perform Timestomping. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell for execution. |
Command and Scripting Interpreter:PowerShell | It leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to download additional payloads. |
Command and Scripting Interpreter:PowerShell | TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell to execute commands/scripts, in some cases via a custom executable or code from Empire's PSInject. It has also used PowerShell scripts to load and execute malware in memory. |
Command and Scripting Interpreter:PowerShell | Ursnif droppers have used PowerShell in download cradles to download and execute the malware's full executable payload. |
Command and Scripting Interpreter:PowerShell | Valak has used PowerShell to download additional modules. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell including for remote system discovery. |
Command and Scripting Interpreter:PowerShell | WarzoneRAT can use PowerShell to download files and execute commands. |
Command and Scripting Interpreter:PowerShell | WellMess can execute PowerShell scripts received from C2. |
Command and Scripting Interpreter:PowerShell | WhisperGate can use PowerShell to support multiple actions including execution and defense evasion. |
Command and Scripting Interpreter:PowerShell | It has used PowerShell for script execution. |
Command and Scripting Interpreter:PowerShell | It has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network. |
Command and Scripting Interpreter:PowerShell | Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, WoodyPowerSession. |
Command and Scripting Interpreter:PowerShell | Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution. |
Command and Scripting Interpreter:PowerShell | Zeus Panda uses PowerShell to download and execute the payload. |
Command and Scripting Interpreter:AppleScript | Bundlore can use AppleScript to inject malicious JavaScript into a browser. |
Command and Scripting Interpreter:AppleScript | Dok uses AppleScript to create a login item for persistence. |
Command and Scripting Interpreter:AppleScript | macOS.OSAMiner has used osascript to call itself via the do shell script command in the Launch Agent .plist file. |
Command and Scripting Interpreter:AppleScript | ThiefQuest uses AppleScript's osascript -e command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon. |
Command and Scripting Interpreter:Windows Command Shell | During the 2016 Ukraine Electric Power Attack, It used the xp_cmdshell command in MS-SQL. |
Command and Scripting Interpreter:Windows Command Shell | 4H RAT has the capability to create a remote shell. |
Command and Scripting Interpreter:Windows Command Shell | ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. |
Command and Scripting Interpreter:Windows Command Shell | Action RAT can use cmd.exe to execute commands on an infected host. |
Command and Scripting Interpreter:Windows Command Shell | adbupd can run a copy of cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | Following exploitation with LOWBALL malware, It actors created a file containing a list of commands to be executed on the compromised computer. |
Command and Scripting Interpreter:Windows Command Shell | ADVSTORESHELL can create a remote shell and run a given command. |
Command and Scripting Interpreter:Windows Command Shell | Anchor has used cmd.exe to run its self deletion routine. |
Command and Scripting Interpreter:Windows Command Shell | It has used the Windows command shell to execute commands, and batch scripting to automate execution. |
Command and Scripting Interpreter:Windows Command Shell | It uses cmd.exe to execute commands on the victim’s machine. |
Command and Scripting Interpreter:Windows Command Shell | An It loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. |
Command and Scripting Interpreter:Windows Command Shell | An It downloader uses the Windows command "cmd.exe" /C whoami. The group also uses a tool to execute commands on remote computers. |
Command and Scripting Interpreter:Windows Command Shell | It has used cmd.exe for execution. |
Command and Scripting Interpreter:Windows Command Shell | It has used the command-line interface. |
Command and Scripting Interpreter:Windows Command Shell | It has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine. |
Command and Scripting Interpreter:Windows Command Shell | It used cmd.exe /c to execute commands on remote machines.It used a batch file to install persistence for the Cobalt Strike BEACON loader. |
Command and Scripting Interpreter:Windows Command Shell | It has attempted and failed to run Bash commands on a Windows host by passing them to cmd /C. |
Command and Scripting Interpreter:Windows Command Shell | Astaroth spawns a CMD process to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | AuditCred can open a reverse shell on the system to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | AuTo Stealer can use cmd.exe to execute a created batch file. |
Command and Scripting Interpreter:Windows Command Shell | Babuk has the ability to use the command line to control execution on compromised hosts. |
Command and Scripting Interpreter:Windows Command Shell | BabyShark has used cmd.exe to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | BackConfig can download and run batch files to execute commands on a compromised host. |
Command and Scripting Interpreter:Windows Command Shell | Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell. |
Command and Scripting Interpreter:Windows Command Shell | BADHATCH can use cmd.exe to execute commands on a compromised host. |
Command and Scripting Interpreter:Windows Command Shell | BADNEWS is capable of executing commands via cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | Bandook is capable of spawning a Windows command shell. |
Command and Scripting Interpreter:Windows Command Shell | Bankshot uses the command-line interface to execute arbitrary commands. |
Command and Scripting Interpreter:Windows Command Shell | Bazar can launch cmd.exe to perform reconnaissance commands. |
Command and Scripting Interpreter:Windows Command Shell | BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. |
Command and Scripting Interpreter:Windows Command Shell | BISCUIT has a command to launch a command shell on the system. |
Command and Scripting Interpreter:Windows Command Shell | Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system. |
Command and Scripting Interpreter:Windows Command Shell | Black Basta can use cmd.exe to enable shadow copy deletion. |
Command and Scripting Interpreter:Windows Command Shell | BlackCat can execute commands on a compromised network with the use of cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | BLACKCOFFEE has the capability to create a reverse shell. |
Command and Scripting Interpreter:Windows Command Shell | BlackMould can run cmd.exe with parameters. |