prompt
stringclasses
508 values
procedure
stringlengths
20
478
Command and Scripting Interpreter:PowerShell
PowerShower is a backdoor written in PowerShell.
Command and Scripting Interpreter:PowerShell
POWERSOURCE is a PowerShell backdoor.
Command and Scripting Interpreter:PowerShell
PowerSploit modules are written in and executed via PowerShell.
Command and Scripting Interpreter:PowerShell
PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.
Command and Scripting Interpreter:PowerShell
POWERSTATS uses PowerShell for obfuscation and execution.
Command and Scripting Interpreter:PowerShell
POWERTON is written in PowerShell.
Command and Scripting Interpreter:PowerShell
PowGoop has the ability to use PowerShell scripts to execute commands.
Command and Scripting Interpreter:PowerShell
POWRUNER is written in PowerShell.
Command and Scripting Interpreter:PowerShell
Prestige can use PowerShell for payload execution on targeted systems.
Command and Scripting Interpreter:PowerShell
PS1 can utilize a PowerShell loader.
Command and Scripting Interpreter:PowerShell
PUNCHBUGGY has used PowerShell scripts.
Command and Scripting Interpreter:PowerShell
Pupy has a module for loading and executing PowerShell scripts.
Command and Scripting Interpreter:PowerShell
PyDCrypt has attempted to execute with PowerShell.
Command and Scripting Interpreter:PowerShell
Pysa has used Powershell scripts to deploy its ransomware.
Command and Scripting Interpreter:PowerShell
QakBot can use PowerShell to download and execute payloads.
Command and Scripting Interpreter:PowerShell
QUADAGENT uses PowerShell scripts for execution.
Command and Scripting Interpreter:PowerShell
There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form.
Command and Scripting Interpreter:PowerShell
RegDuke can extract and execute PowerShell scripts from C2 communications.
Command and Scripting Interpreter:PowerShell
Revenge RAT uses the PowerShell command Reflection.Assembly to load itself into memory to aid in execution.
Command and Scripting Interpreter:PowerShell
REvil has used PowerShell to delete volume shadow copies and download files.
Command and Scripting Interpreter:PowerShell
RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence, RogueRobin creates %APPDATA%\OneDrive.bat and saves the following string to it:powershell.exe -WindowStyle Hidden -exec bypass -File "%APPDATA%\OneDrive.ps1".
Command and Scripting Interpreter:PowerShell
Saint Bot has used PowerShell for execution.
Command and Scripting Interpreter:PowerShell
It has used PowerShell scripts to run a credential harvesting tool in memory to evade defenses.
Command and Scripting Interpreter:PowerShell
Sardonic has the ability to execute PowerShell commands on a compromised machine.
Command and Scripting Interpreter:PowerShell
SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket.
Command and Scripting Interpreter:PowerShell
ServHelper has the ability to execute a PowerShell script to get information from the infected host.
Command and Scripting Interpreter:PowerShell
SharpStage can execute arbitrary commands with PowerShell.
Command and Scripting Interpreter:PowerShell
SHARPSTATS has the ability to employ a custom PowerShell script.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to drop and execute malware loaders.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to download and execute payloads.
Command and Scripting Interpreter:PowerShell
SILENTTRINITY can use PowerShell to execute commands.
Command and Scripting Interpreter:PowerShell
SMOKEDHAM can execute Powershell commands sent from its C2 server.
Command and Scripting Interpreter:PowerShell
Snip3 can use a PowerShell script for second-stage execution.
Command and Scripting Interpreter:PowerShell
Socksbot can write and execute PowerShell scripts.
Command and Scripting Interpreter:PowerShell
During the SolarWinds Compromise, It used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and execute other commands.
Command and Scripting Interpreter:PowerShell
SQLRat has used PowerShell to create a Meterpreter session.
Command and Scripting Interpreter:PowerShell
Squirrelwaffle has used PowerShell to execute its payload.
Command and Scripting Interpreter:PowerShell
It malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.
Command and Scripting Interpreter:PowerShell
StrongPity can use PowerShell to add files to the Windows Defender exclusions list.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to download files and to inject into various Windows processes.
Command and Scripting Interpreter:PowerShell
It has used PowerShell for execution of a payload.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to download and execute malware and reconnaissance scripts.
Command and Scripting Interpreter:PowerShell
It has executed PowerShell commands in batch scripts.
Command and Scripting Interpreter:PowerShell
It has used a publicly-available PowerShell-based tool, WMImplant. The group has also used PowerShell to perform Timestomping.
Command and Scripting Interpreter:PowerShell
It has used PowerShell for execution.
Command and Scripting Interpreter:PowerShell
It leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to download additional payloads.
Command and Scripting Interpreter:PowerShell
TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers.
Command and Scripting Interpreter:PowerShell
It has used PowerShell to execute commands/scripts, in some cases via a custom executable or code from Empire's PSInject. It has also used PowerShell scripts to load and execute malware in memory.
Command and Scripting Interpreter:PowerShell
Ursnif droppers have used PowerShell in download cradles to download and execute the malware's full executable payload.
Command and Scripting Interpreter:PowerShell
Valak has used PowerShell to download additional modules.
Command and Scripting Interpreter:PowerShell
It has used PowerShell including for remote system discovery.
Command and Scripting Interpreter:PowerShell
WarzoneRAT can use PowerShell to download files and execute commands.
Command and Scripting Interpreter:PowerShell
WellMess can execute PowerShell scripts received from C2.
Command and Scripting Interpreter:PowerShell
WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.
Command and Scripting Interpreter:PowerShell
It has used PowerShell for script execution.
Command and Scripting Interpreter:PowerShell
It has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network.
Command and Scripting Interpreter:PowerShell
Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, WoodyPowerSession.
Command and Scripting Interpreter:PowerShell
Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution.
Command and Scripting Interpreter:PowerShell
Zeus Panda uses PowerShell to download and execute the payload.
Command and Scripting Interpreter:AppleScript
Bundlore can use AppleScript to inject malicious JavaScript into a browser.
Command and Scripting Interpreter:AppleScript
Dok uses AppleScript to create a login item for persistence.
Command and Scripting Interpreter:AppleScript
macOS.OSAMiner has used osascript to call itself via the do shell script command in the Launch Agent .plist file.
Command and Scripting Interpreter:AppleScript
ThiefQuest uses AppleScript's osascript -e command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.
Command and Scripting Interpreter:Windows Command Shell
During the 2016 Ukraine Electric Power Attack, It used the xp_cmdshell command in MS-SQL.
Command and Scripting Interpreter:Windows Command Shell
4H RAT has the capability to create a remote shell.
Command and Scripting Interpreter:Windows Command Shell
ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.
Command and Scripting Interpreter:Windows Command Shell
Action RAT can use cmd.exe to execute commands on an infected host.
Command and Scripting Interpreter:Windows Command Shell
adbupd can run a copy of cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
Following exploitation with LOWBALL malware, It actors created a file containing a list of commands to be executed on the compromised computer.
Command and Scripting Interpreter:Windows Command Shell
ADVSTORESHELL can create a remote shell and run a given command.
Command and Scripting Interpreter:Windows Command Shell
Anchor has used cmd.exe to run its self deletion routine.
Command and Scripting Interpreter:Windows Command Shell
It has used the Windows command shell to execute commands, and batch scripting to automate execution.
Command and Scripting Interpreter:Windows Command Shell
It uses cmd.exe to execute commands on the victim’s machine.
Command and Scripting Interpreter:Windows Command Shell
An It loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads.
Command and Scripting Interpreter:Windows Command Shell
An It downloader uses the Windows command "cmd.exe" /C whoami. The group also uses a tool to execute commands on remote computers.
Command and Scripting Interpreter:Windows Command Shell
It has used cmd.exe for execution.
Command and Scripting Interpreter:Windows Command Shell
It has used the command-line interface.
Command and Scripting Interpreter:Windows Command Shell
It has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.
Command and Scripting Interpreter:Windows Command Shell
It used cmd.exe /c to execute commands on remote machines.It used a batch file to install persistence for the Cobalt Strike BEACON loader.
Command and Scripting Interpreter:Windows Command Shell
It has attempted and failed to run Bash commands on a Windows host by passing them to cmd /C.
Command and Scripting Interpreter:Windows Command Shell
Astaroth spawns a CMD process to execute commands.
Command and Scripting Interpreter:Windows Command Shell
AuditCred can open a reverse shell on the system to execute commands.
Command and Scripting Interpreter:Windows Command Shell
AuTo Stealer can use cmd.exe to execute a created batch file.
Command and Scripting Interpreter:Windows Command Shell
Babuk has the ability to use the command line to control execution on compromised hosts.
Command and Scripting Interpreter:Windows Command Shell
BabyShark has used cmd.exe to execute commands.
Command and Scripting Interpreter:Windows Command Shell
BackConfig can download and run batch files to execute commands on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell.
Command and Scripting Interpreter:Windows Command Shell
BADHATCH can use cmd.exe to execute commands on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
BADNEWS is capable of executing commands via cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
Bandook is capable of spawning a Windows command shell.
Command and Scripting Interpreter:Windows Command Shell
Bankshot uses the command-line interface to execute arbitrary commands.
Command and Scripting Interpreter:Windows Command Shell
Bazar can launch cmd.exe to perform reconnaissance commands.
Command and Scripting Interpreter:Windows Command Shell
BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.
Command and Scripting Interpreter:Windows Command Shell
BISCUIT has a command to launch a command shell on the system.
Command and Scripting Interpreter:Windows Command Shell
Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system.
Command and Scripting Interpreter:Windows Command Shell
Black Basta can use cmd.exe to enable shadow copy deletion.
Command and Scripting Interpreter:Windows Command Shell
BlackCat can execute commands on a compromised network with the use of cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
BLACKCOFFEE has the capability to create a reverse shell.
Command and Scripting Interpreter:Windows Command Shell
BlackMould can run cmd.exe with parameters.