prompt
stringclasses
508 values
procedure
stringlengths
20
478
Command and Scripting Interpreter:Unix Shell
Hildegard has used shell scripts for execution.
Command and Scripting Interpreter:Unix Shell
Kazuar uses /bin/bash to execute commands on the victim’s machine.
Command and Scripting Interpreter:Unix Shell
Kinsing has used Unix shell scripts to execute commands in the victim environment.
Command and Scripting Interpreter:Unix Shell
Kobalos can spawn a new pseudo-terminal and execute arbitrary commands at the command prompt.
Command and Scripting Interpreter:Unix Shell
LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization.
Command and Scripting Interpreter:Unix Shell
MacMa can execute supplied shell commands and uses bash scripts to perform additional actions.
Command and Scripting Interpreter:Unix Shell
NETWIRE has the ability to use /bin/bash and /bin/sh to execute commands.
Command and Scripting Interpreter:Unix Shell
OSX/Shlayer can use bash scripts to check the macOS version, download payloads, and extract bytes from files. OSX/Shlayer uses the command sh -c tail -c +1381... to extract bytes at an offset from a specified file. OSX/Shlayer uses the curl -fsL "$url" >$tmp_path command to download malicious payloads into a temporary directory.
Command and Scripting Interpreter:Unix Shell
OSX_OCEANLOTUS.D uses a shell script as the main executable inside an app bundle and drops an embedded base64-encoded payload to the /tmp folder.
Command and Scripting Interpreter:Unix Shell
Penquin can execute remote commands using bash scripts.
Command and Scripting Interpreter:Unix Shell
Proton uses macOS' .command file type to script actions.
Command and Scripting Interpreter:Unix Shell
It used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware.
Command and Scripting Interpreter:Unix Shell
Skidmap has used pm.sh to download and install its main payload.
Command and Scripting Interpreter:Unix Shell
It has used shell scripts for execution.
Command and Scripting Interpreter:Unix Shell
Turian has the ability to use /bin/sh to execute commands.
Command and Scripting Interpreter:Unix Shell
WindTail can use the open command to execute an application.
Command and Scripting Interpreter:Unix Shell
XCSSET uses a shell script to execute Mach-o files and osacompile commands such as, osacompile -x -o xcode.app main.applescript.
Command and Scripting Interpreter:Visual Basic
During the 2015 Ukraine Electric Power Attack, It installed a VBA script called vba_macro.exe. This macro dropped FONTCACHE.DAT, the primary BlackEnergy implant; rundll32.exe, for executing the malware; NTUSER.log, an empty file; and desktop.ini, the default file used to determine folder displays on Windows machines.
Command and Scripting Interpreter:Visual Basic
During the 2016 Ukraine Electric Power Attack, It created VBScripts to run on an SSH server.
Command and Scripting Interpreter:Visual Basic
It has embedded a VBScript within a malicious Word document which is executed upon the document opening.
Command and Scripting Interpreter:Visual Basic
It has used macros, COM scriptlets, and VBS scripts.
Command and Scripting Interpreter:Visual Basic
It has used VBScript to initiate the delivery of payloads.
Command and Scripting Interpreter:Visual Basic
It executes shellcode and a VBA script to decode Base64 strings.
Command and Scripting Interpreter:Visual Basic
It has used VBScript to execute commands and other operational tasks.
Command and Scripting Interpreter:Visual Basic
It has utilized malicious VBS scripts in malware.
Command and Scripting Interpreter:Visual Basic
Astaroth has used malicious VBS e-mail attachments for execution.
Command and Scripting Interpreter:Visual Basic
BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code.
Command and Scripting Interpreter:Visual Basic
Bandook has used malicious VBA code against the target system.
Command and Scripting Interpreter:Visual Basic
Bisonal's dropper creates VBS scripts on the victim’s machine.
Command and Scripting Interpreter:Visual Basic
It has used VBS and VBE scripts for execution.
Command and Scripting Interpreter:Visual Basic
Bumblebee can create a Visual Basic script to enable persistence.
Command and Scripting Interpreter:Visual Basic
For C0011, It used malicious VBA macros within a lure document as part of the Crimson malware installation process onto a compromised host.
Command and Scripting Interpreter:Visual Basic
During C0015, the threat actors used a malicious HTA file that contained a mix of HTML and JavaScript/VBScript code.
Command and Scripting Interpreter:Visual Basic
Chaes has used VBscript to execute malicious code.
Command and Scripting Interpreter:Visual Basic
It has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution.
Command and Scripting Interpreter:Visual Basic
Cobalt Strike can use VBA to perform execution.
Command and Scripting Interpreter:Visual Basic
Comnie executes VBS scripts.
Command and Scripting Interpreter:Visual Basic
It has used VBScript to execute malicious code.
Command and Scripting Interpreter:Visual Basic
DanBot can use a VBA macro embedded in an Excel file to drop the payload.
Command and Scripting Interpreter:Visual Basic
Donut can generate shellcode outputs that execute via VBScript.
Command and Scripting Interpreter:Visual Basic
It used VBA scripts.
Command and Scripting Interpreter:Visual Basic
Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.
Command and Scripting Interpreter:Visual Basic
Exaramel for Windows has a command to execute VBS scripts on the victim’s machine.
Command and Scripting Interpreter:Visual Basic
Ferocious has the ability to use Visual Basic scripts for execution.
Command and Scripting Interpreter:Visual Basic
It has used VBS scripts for code execution on comrpomised machines.
Command and Scripting Interpreter:Visual Basic
It has used VBA macros to display a dialog box and collect victim credentials.
Command and Scripting Interpreter:Visual Basic
It used VBS scripts to help perform tasks on the victim's machine.
Command and Scripting Interpreter:Visual Basic
Flagpro can execute malicious VBA macros embedded in .xlsm files.
Command and Scripting Interpreter:Visual Basic
During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script.
Command and Scripting Interpreter:Visual Basic
During FunnyDream, the threat actors used a Visual Basic script to run remote commands.
Command and Scripting Interpreter:Visual Basic
It has embedded malicious macros in document templates, which executed VBScript. It has also delivered Microsoft Outlook VBA projects with embedded macros.
Command and Scripting Interpreter:Visual Basic
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.
Command and Scripting Interpreter:Visual Basic
It has used macros in Spearphishing Attachments as well as executed VBScripts on victim machines.
Command and Scripting Interpreter:Visual Basic
Grandoreiro can use VBScript to execute malicious code.
Command and Scripting Interpreter:Visual Basic
One version of Helminth consists of VBScript scripts.
Command and Scripting Interpreter:Visual Basic
It has used a VisualBasic script named MicrosoftUpdator.vbs for execution of a PowerShell keylogger.
Command and Scripting Interpreter:Visual Basic
It has used VBScript code on the victim's machine.
Command and Scripting Interpreter:Visual Basic
IcedID has used obfuscated VBA string expressions.
Command and Scripting Interpreter:Visual Basic
It has used VBScript to execute malicious commands and payloads.
Command and Scripting Interpreter:Visual Basic
Javali has used embedded VBScript to download malicious payloads from C2.
Command and Scripting Interpreter:Visual Basic
JCry has used VBS scripts.
Command and Scripting Interpreter:Visual Basic
jRAT has been distributed as HTA files with VBScript.
Command and Scripting Interpreter:Visual Basic
JSS Loader can download and execute VBScript files.
Command and Scripting Interpreter:Visual Basic
Kerrdown can use a VBS base64 decoder function published by Motobit.
Command and Scripting Interpreter:Visual Basic
KeyBoy uses VBS scripts for installing files and performing execution.
Command and Scripting Interpreter:Visual Basic
It has used Visual Basic to download malicious payloads. It has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure.
Command and Scripting Interpreter:Visual Basic
Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode .
Command and Scripting Interpreter:Visual Basic
KOCTOPUS has used VBScript to call wscript to execute a PowerShell command.
Command and Scripting Interpreter:Visual Basic
It has used VBA and embedded macros in Word documents to execute malicious code.
Command and Scripting Interpreter:Visual Basic
It has used VBScript to execute malicious code.
Command and Scripting Interpreter:Visual Basic
It has used VBScript.
Command and Scripting Interpreter:Visual Basic
Lokibot has used VBS scripts and XLS macros for execution.
Command and Scripting Interpreter:Visual Basic
LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host.
Command and Scripting Interpreter:Visual Basic
It has embedded malicious macros within spearphishing attachments to download additional files.
Command and Scripting Interpreter:Visual Basic
It malware has used VBS scripts for execution.
Command and Scripting Interpreter:Visual Basic
Melcoz can use VBS scripts to execute malicious DLLs.
Command and Scripting Interpreter:Visual Basic
Metamorfo has used VBS code on victims’ systems.
Command and Scripting Interpreter:Visual Basic
It used various implants, including those built with VBScript, on target machines.
Command and Scripting Interpreter:Visual Basic
It has used VBScript files to execute its POWERSTATS payload, as well as macros.
Command and Scripting Interpreter:Visual Basic
It has embedded VBScript components in LNK files to download additional files and automate collection.
Command and Scripting Interpreter:Visual Basic
NanHaiShu executes additional VBScript code on the victim's machine.
Command and Scripting Interpreter:Visual Basic
NanoCore uses VBS files.
Command and Scripting Interpreter:Visual Basic
NETWIRE has been executed through use of VBScripts.
Command and Scripting Interpreter:Visual Basic
It has used VBSscipt macros for execution on compromised hosts.
Command and Scripting Interpreter:Visual Basic
OopsIE creates and uses a VBScript as part of its persistent execution.
Command and Scripting Interpreter:Visual Basic
During Operation CuckooBees, the threat actors executed an encoded VBScript file using wscript and wrote the decoded output to a text file.
Command and Scripting Interpreter:Visual Basic
During Operation Dream Job, It executed a VBA written malicious macro after victims download malicious DOTM files; It also used Visual Basic macro code to extract a double Base64 encoded DLL implant.
Command and Scripting Interpreter:Visual Basic
During Operation Dust Storm, the threat actors used Visual Basic scripts.
Command and Scripting Interpreter:Visual Basic
For Operation Honeybee, the threat actors used a Visual Basic script embedded within a Word document to download an implant.
Command and Scripting Interpreter:Visual Basic
During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun.
Command and Scripting Interpreter:Visual Basic
During Operation Wocao, threat actors used VBScript to conduct reconnaissance on targeted systems.
Command and Scripting Interpreter:Visual Basic
OSX_OCEANLOTUS.D uses Word macros for execution.
Command and Scripting Interpreter:Visual Basic
It used Visual Basic Scripts (VBS) on victim machines.
Command and Scripting Interpreter:Visual Basic
PoetRAT has used Word documents with VBScripts to execute malicious activities.
Command and Scripting Interpreter:Visual Basic
PowerShower has the ability to save and execute VBScript.
Command and Scripting Interpreter:Visual Basic
POWERSTATS can use VBScript (VBE) code for execution.
Command and Scripting Interpreter:Visual Basic
Pteranodon can use a malicious VBS file for execution.
Command and Scripting Interpreter:Visual Basic
QakBot can use VBS to download and execute malicious files.
Command and Scripting Interpreter:Visual Basic
QUADAGENT uses VBScripts.
Command and Scripting Interpreter:Visual Basic
Ramsay has included embedded Visual Basic scripts in malicious documents.