prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:Windows Command Shell | InvisiMole can launch a remote shell to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | Ixeshe is capable of executing commands via cmd. |
Command and Scripting Interpreter:Windows Command Shell | JCry has used cmd.exe to launch PowerShell. |
Command and Scripting Interpreter:Windows Command Shell | JHUHUGIT uses a .bat file to execute a .dll. |
Command and Scripting Interpreter:Windows Command Shell | JPIN can use the command-line utility cacls.exe to change file permissions. |
Command and Scripting Interpreter:Windows Command Shell | jRAT has command line access. |
Command and Scripting Interpreter:Windows Command Shell | Kasidet can execute commands using cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | Kazuar uses cmd.exe to execute commands on the victim’s machine. |
Command and Scripting Interpreter:Windows Command Shell | It has used batch scripts in its malware to install persistence mechanisms. |
Command and Scripting Interpreter:Windows Command Shell | Kevin can use a renamed image of cmd.exe for execution. |
Command and Scripting Interpreter:Windows Command Shell | KeyBoy can launch interactive shells for communicating with the victim machine. |
Command and Scripting Interpreter:Windows Command Shell | KEYMARBLE can execute shell commands using cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | KGH_SPY has the ability to set a Registry key to run a cmd.exe command. |
Command and Scripting Interpreter:Windows Command Shell | It has executed Windows commands by using cmd and running batch scripts. |
Command and Scripting Interpreter:Windows Command Shell | Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host (Jscript) and to run arbitrary shellcode. |
Command and Scripting Interpreter:Windows Command Shell | KOCTOPUS has used cmd.exe and batch files for execution. |
Command and Scripting Interpreter:Windows Command Shell | KOMPROGO is capable of creating a reverse shell. |
Command and Scripting Interpreter:Windows Command Shell | KONNI has used cmd.exe to execute arbitrary commands on the infected host across different stages of the infection chain. |
Command and Scripting Interpreter:Windows Command Shell | It malware uses cmd.exe to execute commands on a compromised host. A Destover-like variant used by It uses a batch file mechanism to delete its binaries from the system. |
Command and Scripting Interpreter:Windows Command Shell | It has used batch files to deploy open-source and multi-stage RATs. |
Command and Scripting Interpreter:Windows Command Shell | LightNeuron is capable of executing commands via cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | Linfo creates a backdoor through which remote attackers can start a remote shell. |
Command and Scripting Interpreter:Windows Command Shell | Lizar has a command to open the command-line on the infected system. |
Command and Scripting Interpreter:Windows Command Shell | Lokibot has used cmd /c commands embedded within batch scripts. |
Command and Scripting Interpreter:Windows Command Shell | LookBack executes the cmd.exe command. |
Command and Scripting Interpreter:Windows Command Shell | LoudMiner used a batch script to run the Linux virtual machine as a service. |
Command and Scripting Interpreter:Windows Command Shell | Lucifer can issue shell commands to download and execute additional payloads. |
Command and Scripting Interpreter:Windows Command Shell | It has used batch files to initiate additional downloads of malicious files. |
Command and Scripting Interpreter:Windows Command Shell | Mafalda can execute shell commands using cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | It has used the command-line interface for code execution. |
Command and Scripting Interpreter:Windows Command Shell | MarkiRAT can utilize cmd.exe to execute commands in a victim's environment. |
Command and Scripting Interpreter:Windows Command Shell | The Maze encryption process has used batch scripts with various commands. |
Command and Scripting Interpreter:Windows Command Shell | MCMD can launch a console process (cmd.exe) with redirected standard input and output. |
Command and Scripting Interpreter:Windows Command Shell | MechaFlounder has the ability to run commands on a compromised host. |
Command and Scripting Interpreter:Windows Command Shell | MegaCortex has used .cmd scripts on the victim's system. |
Command and Scripting Interpreter:Windows Command Shell | It executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. It has used malicious macros embedded inside Office documents to execute files. |
Command and Scripting Interpreter:Windows Command Shell | It has used the Windows command line to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | Metamorfo has used cmd.exe /c to execute files. |
Command and Scripting Interpreter:Windows Command Shell | Meteor can run set.bat, update.bat, cache.bat, bcd.bat, msrun.bat, and similar scripts. |
Command and Scripting Interpreter:Windows Command Shell | Micropsia creates a command-line shell using cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | Milan can use cmd.exe for discovery actions on a targeted system. |
Command and Scripting Interpreter:Windows Command Shell | MirageFox has the capability to execute commands using cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | Mis-Type has used cmd.exe to run commands on a compromised host. |
Command and Scripting Interpreter:Windows Command Shell | Misdat is capable of providing shell functionality to the attacker to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | Mivast has the capability to open a remote shell and run basic commands. |
Command and Scripting Interpreter:Windows Command Shell | MoleNet can execute commands via the command line utility. |
Command and Scripting Interpreter:Windows Command Shell | MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes, including to restart and uninstall itself. |
Command and Scripting Interpreter:Windows Command Shell | More_eggs has used cmd.exe for execution. |
Command and Scripting Interpreter:Windows Command Shell | Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server. |
Command and Scripting Interpreter:Windows Command Shell | It has used a custom tool for creating reverse shells. |
Command and Scripting Interpreter:Windows Command Shell | MURKYTOP uses the command-line interface. |
Command and Scripting Interpreter:Windows Command Shell | It has executed HTA files via cmd.exe, and used batch scripts for collection. |
Command and Scripting Interpreter:Windows Command Shell | NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files. |
Command and Scripting Interpreter:Windows Command Shell | NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory. |
Command and Scripting Interpreter:Windows Command Shell | Nebulae can use CMD to execute a process. |
Command and Scripting Interpreter:Windows Command Shell | NETEAGLE allows adversaries to execute shell commands on the infected host. |
Command and Scripting Interpreter:Windows Command Shell | Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload. |
Command and Scripting Interpreter:Windows Command Shell | NETWIRE can issue commands using cmd.exe. |
Command and Scripting Interpreter:Windows Command Shell | During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells. |
Command and Scripting Interpreter:Windows Command Shell | njRAT can launch a command shell interface for executing commands. |
Command and Scripting Interpreter:Windows Command Shell | It used cmd.exe /c within a malicious macro. |
Command and Scripting Interpreter:Windows Command Shell | OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros. |
Command and Scripting Interpreter:Windows Command Shell | It has used macros to deliver malware such as QUADAGENT and OopsIE. It has used batch scripts. |
Command and Scripting Interpreter:Windows Command Shell | Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version. |
Command and Scripting Interpreter:Windows Command Shell | OopsIE uses the command prompt to execute commands on the victim's machine. |
Command and Scripting Interpreter:Windows Command Shell | During Operation CuckooBees, the threat actors used batch scripts to perform reconnaissance. |
Command and Scripting Interpreter:Windows Command Shell | During Operation Dream Job, It launched malicious DLL files, created new folders, and renamed folders with the use of the Windows command shell. |
Command and Scripting Interpreter:Windows Command Shell | During Operation Honeybee, various implants used batch scripting and cmd.exe for execution. |
Command and Scripting Interpreter:Windows Command Shell | During Operation Wocao, threat actors spawned a new cmd.exe process to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | Orz can execute shell commands. Orz can execute commands with JavaScript. |
Command and Scripting Interpreter:Windows Command Shell | Out1 can use native command line for execution. |
Command and Scripting Interpreter:Windows Command Shell | OutSteel has used cmd.exe to scan a compromised host for specific file extensions. |
Command and Scripting Interpreter:Windows Command Shell | It ran a reverse shell with Meterpreter. It used JavaScript code and .SCT files on victim machines. |
Command and Scripting Interpreter:Windows Command Shell | PcShare can execute cmd commands on a compromised host. |
Command and Scripting Interpreter:Windows Command Shell | Peppy has the ability to execute shell commands. |
Command and Scripting Interpreter:Windows Command Shell | PHOREAL is capable of creating reverse shell. |
Command and Scripting Interpreter:Windows Command Shell | PingPull can use cmd.exe to run various commands as a reverse shell. |
Command and Scripting Interpreter:Windows Command Shell | Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell. |
Command and Scripting Interpreter:Windows Command Shell | PLAINTEE uses cmd.exe to execute commands on the victim’s machine. |
Command and Scripting Interpreter:Windows Command Shell | PLEAD has the ability to execute shell commands on the compromised host. |
Command and Scripting Interpreter:Windows Command Shell | PlugX allows actors to spawn a reverse shell on a victim. |
Command and Scripting Interpreter:Windows Command Shell | PoetRAT has called cmd through a Word document macro. |
Command and Scripting Interpreter:Windows Command Shell | PoisonIvy creates a backdoor through which remote attackers can open a command-line interface. |
Command and Scripting Interpreter:Windows Command Shell | Pony has used batch scripts to delete itself after execution. |
Command and Scripting Interpreter:Windows Command Shell | PowerDuke runs cmd.exe /c and sends the output to its C2. |
Command and Scripting Interpreter:Windows Command Shell | POWRUNER can execute commands from its C2 server. |
Command and Scripting Interpreter:Windows Command Shell | Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c " > %temp%\PM* .tmp 2>&1". |
Command and Scripting Interpreter:Windows Command Shell | Pteranodon can use cmd.exe for execution on victim systems. |
Command and Scripting Interpreter:Windows Command Shell | PyDCrypt has used cmd.exe for execution. |
Command and Scripting Interpreter:Windows Command Shell | QakBot can use cmd.exe to launch itself and to execute multiple C2 commands. |
Command and Scripting Interpreter:Windows Command Shell | QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine. |
Command and Scripting Interpreter:Windows Command Shell | QuasarRAT can launch a remote shell to execute commands on the victim’s machine. |
Command and Scripting Interpreter:Windows Command Shell | Ragnar Locker has used cmd.exe and batch scripts to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | RainyDay can use the Windows Command Shell for execution. |
Command and Scripting Interpreter:Windows Command Shell | It has used cmd.exe to execute commmands. |
Command and Scripting Interpreter:Windows Command Shell | RATANKBA uses cmd.exe to execute commands. |
Command and Scripting Interpreter:Windows Command Shell | RCSession can use cmd.exe for execution on compromised hosts. |
Command and Scripting Interpreter:Windows Command Shell | RDAT has executed commands using cmd.exe /c. |
Command and Scripting Interpreter:Windows Command Shell | RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell. |
Command and Scripting Interpreter:Windows Command Shell | Remcos can launch a remote command line to execute commands on the victim’s machine. |