prompt
stringclasses
508 values
procedure
stringlengths
20
478
Command and Scripting Interpreter:Windows Command Shell
InvisiMole can launch a remote shell to execute commands.
Command and Scripting Interpreter:Windows Command Shell
Ixeshe is capable of executing commands via cmd.
Command and Scripting Interpreter:Windows Command Shell
JCry has used cmd.exe to launch PowerShell.
Command and Scripting Interpreter:Windows Command Shell
JHUHUGIT uses a .bat file to execute a .dll.
Command and Scripting Interpreter:Windows Command Shell
JPIN can use the command-line utility cacls.exe to change file permissions.
Command and Scripting Interpreter:Windows Command Shell
jRAT has command line access.
Command and Scripting Interpreter:Windows Command Shell
Kasidet can execute commands using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
Kazuar uses cmd.exe to execute commands on the victim’s machine.
Command and Scripting Interpreter:Windows Command Shell
It has used batch scripts in its malware to install persistence mechanisms.
Command and Scripting Interpreter:Windows Command Shell
Kevin can use a renamed image of cmd.exe for execution.
Command and Scripting Interpreter:Windows Command Shell
KeyBoy can launch interactive shells for communicating with the victim machine.
Command and Scripting Interpreter:Windows Command Shell
KEYMARBLE can execute shell commands using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
KGH_SPY has the ability to set a Registry key to run a cmd.exe command.
Command and Scripting Interpreter:Windows Command Shell
It has executed Windows commands by using cmd and running batch scripts.
Command and Scripting Interpreter:Windows Command Shell
Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host (Jscript) and to run arbitrary shellcode.
Command and Scripting Interpreter:Windows Command Shell
KOCTOPUS has used cmd.exe and batch files for execution.
Command and Scripting Interpreter:Windows Command Shell
KOMPROGO is capable of creating a reverse shell.
Command and Scripting Interpreter:Windows Command Shell
KONNI has used cmd.exe to execute arbitrary commands on the infected host across different stages of the infection chain.
Command and Scripting Interpreter:Windows Command Shell
It malware uses cmd.exe to execute commands on a compromised host. A Destover-like variant used by It uses a batch file mechanism to delete its binaries from the system.
Command and Scripting Interpreter:Windows Command Shell
It has used batch files to deploy open-source and multi-stage RATs.
Command and Scripting Interpreter:Windows Command Shell
LightNeuron is capable of executing commands via cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
Linfo creates a backdoor through which remote attackers can start a remote shell.
Command and Scripting Interpreter:Windows Command Shell
Lizar has a command to open the command-line on the infected system.
Command and Scripting Interpreter:Windows Command Shell
Lokibot has used cmd /c commands embedded within batch scripts.
Command and Scripting Interpreter:Windows Command Shell
LookBack executes the cmd.exe command.
Command and Scripting Interpreter:Windows Command Shell
LoudMiner used a batch script to run the Linux virtual machine as a service.
Command and Scripting Interpreter:Windows Command Shell
Lucifer can issue shell commands to download and execute additional payloads.
Command and Scripting Interpreter:Windows Command Shell
It has used batch files to initiate additional downloads of malicious files.
Command and Scripting Interpreter:Windows Command Shell
Mafalda can execute shell commands using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
It has used the command-line interface for code execution.
Command and Scripting Interpreter:Windows Command Shell
MarkiRAT can utilize cmd.exe to execute commands in a victim's environment.
Command and Scripting Interpreter:Windows Command Shell
The Maze encryption process has used batch scripts with various commands.
Command and Scripting Interpreter:Windows Command Shell
MCMD can launch a console process (cmd.exe) with redirected standard input and output.
Command and Scripting Interpreter:Windows Command Shell
MechaFlounder has the ability to run commands on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
MegaCortex has used .cmd scripts on the victim's system.
Command and Scripting Interpreter:Windows Command Shell
It executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. It has used malicious macros embedded inside Office documents to execute files.
Command and Scripting Interpreter:Windows Command Shell
It has used the Windows command line to execute commands.
Command and Scripting Interpreter:Windows Command Shell
Metamorfo has used cmd.exe /c to execute files.
Command and Scripting Interpreter:Windows Command Shell
Meteor can run set.bat, update.bat, cache.bat, bcd.bat, msrun.bat, and similar scripts.
Command and Scripting Interpreter:Windows Command Shell
Micropsia creates a command-line shell using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
Milan can use cmd.exe for discovery actions on a targeted system.
Command and Scripting Interpreter:Windows Command Shell
MirageFox has the capability to execute commands using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
Mis-Type has used cmd.exe to run commands on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
Misdat is capable of providing shell functionality to the attacker to execute commands.
Command and Scripting Interpreter:Windows Command Shell
Mivast has the capability to open a remote shell and run basic commands.
Command and Scripting Interpreter:Windows Command Shell
MoleNet can execute commands via the command line utility.
Command and Scripting Interpreter:Windows Command Shell
MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes, including to restart and uninstall itself.
Command and Scripting Interpreter:Windows Command Shell
More_eggs has used cmd.exe for execution.
Command and Scripting Interpreter:Windows Command Shell
Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.
Command and Scripting Interpreter:Windows Command Shell
It has used a custom tool for creating reverse shells.
Command and Scripting Interpreter:Windows Command Shell
MURKYTOP uses the command-line interface.
Command and Scripting Interpreter:Windows Command Shell
It has executed HTA files via cmd.exe, and used batch scripts for collection.
Command and Scripting Interpreter:Windows Command Shell
NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files.
Command and Scripting Interpreter:Windows Command Shell
NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory.
Command and Scripting Interpreter:Windows Command Shell
Nebulae can use CMD to execute a process.
Command and Scripting Interpreter:Windows Command Shell
NETEAGLE allows adversaries to execute shell commands on the infected host.
Command and Scripting Interpreter:Windows Command Shell
Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload.
Command and Scripting Interpreter:Windows Command Shell
NETWIRE can issue commands using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells.
Command and Scripting Interpreter:Windows Command Shell
njRAT can launch a command shell interface for executing commands.
Command and Scripting Interpreter:Windows Command Shell
It used cmd.exe /c within a malicious macro.
Command and Scripting Interpreter:Windows Command Shell
OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros.
Command and Scripting Interpreter:Windows Command Shell
It has used macros to deliver malware such as QUADAGENT and OopsIE. It has used batch scripts.
Command and Scripting Interpreter:Windows Command Shell
Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version.
Command and Scripting Interpreter:Windows Command Shell
OopsIE uses the command prompt to execute commands on the victim's machine.
Command and Scripting Interpreter:Windows Command Shell
During Operation CuckooBees, the threat actors used batch scripts to perform reconnaissance.
Command and Scripting Interpreter:Windows Command Shell
During Operation Dream Job, It launched malicious DLL files, created new folders, and renamed folders with the use of the Windows command shell.
Command and Scripting Interpreter:Windows Command Shell
During Operation Honeybee, various implants used batch scripting and cmd.exe for execution.
Command and Scripting Interpreter:Windows Command Shell
During Operation Wocao, threat actors spawned a new cmd.exe process to execute commands.
Command and Scripting Interpreter:Windows Command Shell
Orz can execute shell commands. Orz can execute commands with JavaScript.
Command and Scripting Interpreter:Windows Command Shell
Out1 can use native command line for execution.
Command and Scripting Interpreter:Windows Command Shell
OutSteel has used cmd.exe to scan a compromised host for specific file extensions.
Command and Scripting Interpreter:Windows Command Shell
It ran a reverse shell with Meterpreter. It used JavaScript code and .SCT files on victim machines.
Command and Scripting Interpreter:Windows Command Shell
PcShare can execute cmd commands on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
Peppy has the ability to execute shell commands.
Command and Scripting Interpreter:Windows Command Shell
PHOREAL is capable of creating reverse shell.
Command and Scripting Interpreter:Windows Command Shell
PingPull can use cmd.exe to run various commands as a reverse shell.
Command and Scripting Interpreter:Windows Command Shell
Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.
Command and Scripting Interpreter:Windows Command Shell
PLAINTEE uses cmd.exe to execute commands on the victim’s machine.
Command and Scripting Interpreter:Windows Command Shell
PLEAD has the ability to execute shell commands on the compromised host.
Command and Scripting Interpreter:Windows Command Shell
PlugX allows actors to spawn a reverse shell on a victim.
Command and Scripting Interpreter:Windows Command Shell
PoetRAT has called cmd through a Word document macro.
Command and Scripting Interpreter:Windows Command Shell
PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.
Command and Scripting Interpreter:Windows Command Shell
Pony has used batch scripts to delete itself after execution.
Command and Scripting Interpreter:Windows Command Shell
PowerDuke runs cmd.exe /c and sends the output to its C2.
Command and Scripting Interpreter:Windows Command Shell
POWRUNER can execute commands from its C2 server.
Command and Scripting Interpreter:Windows Command Shell
Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c " > %temp%\PM* .tmp 2>&1".
Command and Scripting Interpreter:Windows Command Shell
Pteranodon can use cmd.exe for execution on victim systems.
Command and Scripting Interpreter:Windows Command Shell
PyDCrypt has used cmd.exe for execution.
Command and Scripting Interpreter:Windows Command Shell
QakBot can use cmd.exe to launch itself and to execute multiple C2 commands.
Command and Scripting Interpreter:Windows Command Shell
QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine.
Command and Scripting Interpreter:Windows Command Shell
QuasarRAT can launch a remote shell to execute commands on the victim’s machine.
Command and Scripting Interpreter:Windows Command Shell
Ragnar Locker has used cmd.exe and batch scripts to execute commands.
Command and Scripting Interpreter:Windows Command Shell
RainyDay can use the Windows Command Shell for execution.
Command and Scripting Interpreter:Windows Command Shell
It has used cmd.exe to execute commmands.
Command and Scripting Interpreter:Windows Command Shell
RATANKBA uses cmd.exe to execute commands.
Command and Scripting Interpreter:Windows Command Shell
RCSession can use cmd.exe for execution on compromised hosts.
Command and Scripting Interpreter:Windows Command Shell
RDAT has executed commands using cmd.exe /c.
Command and Scripting Interpreter:Windows Command Shell
RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell.
Command and Scripting Interpreter:Windows Command Shell
Remcos can launch a remote command line to execute commands on the victim’s machine.