prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:Unix Shell | Hildegard has used shell scripts for execution. |
Command and Scripting Interpreter:Unix Shell | Kazuar uses /bin/bash to execute commands on the victim’s machine. |
Command and Scripting Interpreter:Unix Shell | Kinsing has used Unix shell scripts to execute commands in the victim environment. |
Command and Scripting Interpreter:Unix Shell | Kobalos can spawn a new pseudo-terminal and execute arbitrary commands at the command prompt. |
Command and Scripting Interpreter:Unix Shell | LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization. |
Command and Scripting Interpreter:Unix Shell | MacMa can execute supplied shell commands and uses bash scripts to perform additional actions. |
Command and Scripting Interpreter:Unix Shell | NETWIRE has the ability to use /bin/bash and /bin/sh to execute commands. |
Command and Scripting Interpreter:Unix Shell | OSX/Shlayer can use bash scripts to check the macOS version, download payloads, and extract bytes from files. OSX/Shlayer uses the command sh -c tail -c +1381... to extract bytes at an offset from a specified file. OSX/Shlayer uses the curl -fsL "$url" >$tmp_path command to download malicious payloads into a temporary directory. |
Command and Scripting Interpreter:Unix Shell | OSX_OCEANLOTUS.D uses a shell script as the main executable inside an app bundle and drops an embedded base64-encoded payload to the /tmp folder. |
Command and Scripting Interpreter:Unix Shell | Penquin can execute remote commands using bash scripts. |
Command and Scripting Interpreter:Unix Shell | Proton uses macOS' .command file type to script actions. |
Command and Scripting Interpreter:Unix Shell | It used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware. |
Command and Scripting Interpreter:Unix Shell | Skidmap has used pm.sh to download and install its main payload. |
Command and Scripting Interpreter:Unix Shell | It has used shell scripts for execution. |
Command and Scripting Interpreter:Unix Shell | Turian has the ability to use /bin/sh to execute commands. |
Command and Scripting Interpreter:Unix Shell | WindTail can use the open command to execute an application. |
Command and Scripting Interpreter:Unix Shell | XCSSET uses a shell script to execute Mach-o files and osacompile commands such as, osacompile -x -o xcode.app main.applescript. |
Command and Scripting Interpreter:Visual Basic | During the 2015 Ukraine Electric Power Attack, It installed a VBA script called vba_macro.exe. This macro dropped FONTCACHE.DAT, the primary BlackEnergy implant; rundll32.exe, for executing the malware; NTUSER.log, an empty file; and desktop.ini, the default file used to determine folder displays on Windows machines. |
Command and Scripting Interpreter:Visual Basic | During the 2016 Ukraine Electric Power Attack, It created VBScripts to run on an SSH server. |
Command and Scripting Interpreter:Visual Basic | It has embedded a VBScript within a malicious Word document which is executed upon the document opening. |
Command and Scripting Interpreter:Visual Basic | It has used macros, COM scriptlets, and VBS scripts. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript to initiate the delivery of payloads. |
Command and Scripting Interpreter:Visual Basic | It executes shellcode and a VBA script to decode Base64 strings. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript to execute commands and other operational tasks. |
Command and Scripting Interpreter:Visual Basic | It has utilized malicious VBS scripts in malware. |
Command and Scripting Interpreter:Visual Basic | Astaroth has used malicious VBS e-mail attachments for execution. |
Command and Scripting Interpreter:Visual Basic | BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code. |
Command and Scripting Interpreter:Visual Basic | Bandook has used malicious VBA code against the target system. |
Command and Scripting Interpreter:Visual Basic | Bisonal's dropper creates VBS scripts on the victim’s machine. |
Command and Scripting Interpreter:Visual Basic | It has used VBS and VBE scripts for execution. |
Command and Scripting Interpreter:Visual Basic | Bumblebee can create a Visual Basic script to enable persistence. |
Command and Scripting Interpreter:Visual Basic | For C0011, It used malicious VBA macros within a lure document as part of the Crimson malware installation process onto a compromised host. |
Command and Scripting Interpreter:Visual Basic | During C0015, the threat actors used a malicious HTA file that contained a mix of HTML and JavaScript/VBScript code. |
Command and Scripting Interpreter:Visual Basic | Chaes has used VBscript to execute malicious code. |
Command and Scripting Interpreter:Visual Basic | It has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution. |
Command and Scripting Interpreter:Visual Basic | Cobalt Strike can use VBA to perform execution. |
Command and Scripting Interpreter:Visual Basic | Comnie executes VBS scripts. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript to execute malicious code. |
Command and Scripting Interpreter:Visual Basic | DanBot can use a VBA macro embedded in an Excel file to drop the payload. |
Command and Scripting Interpreter:Visual Basic | Donut can generate shellcode outputs that execute via VBScript. |
Command and Scripting Interpreter:Visual Basic | It used VBA scripts. |
Command and Scripting Interpreter:Visual Basic | Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads. |
Command and Scripting Interpreter:Visual Basic | Exaramel for Windows has a command to execute VBS scripts on the victim’s machine. |
Command and Scripting Interpreter:Visual Basic | Ferocious has the ability to use Visual Basic scripts for execution. |
Command and Scripting Interpreter:Visual Basic | It has used VBS scripts for code execution on comrpomised machines. |
Command and Scripting Interpreter:Visual Basic | It has used VBA macros to display a dialog box and collect victim credentials. |
Command and Scripting Interpreter:Visual Basic | It used VBS scripts to help perform tasks on the victim's machine. |
Command and Scripting Interpreter:Visual Basic | Flagpro can execute malicious VBA macros embedded in .xlsm files. |
Command and Scripting Interpreter:Visual Basic | During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script. |
Command and Scripting Interpreter:Visual Basic | During FunnyDream, the threat actors used a Visual Basic script to run remote commands. |
Command and Scripting Interpreter:Visual Basic | It has embedded malicious macros in document templates, which executed VBScript. It has also delivered Microsoft Outlook VBA projects with embedded macros. |
Command and Scripting Interpreter:Visual Basic | Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2. |
Command and Scripting Interpreter:Visual Basic | It has used macros in Spearphishing Attachments as well as executed VBScripts on victim machines. |
Command and Scripting Interpreter:Visual Basic | Grandoreiro can use VBScript to execute malicious code. |
Command and Scripting Interpreter:Visual Basic | One version of Helminth consists of VBScript scripts. |
Command and Scripting Interpreter:Visual Basic | It has used a VisualBasic script named MicrosoftUpdator.vbs for execution of a PowerShell keylogger. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript code on the victim's machine. |
Command and Scripting Interpreter:Visual Basic | IcedID has used obfuscated VBA string expressions. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript to execute malicious commands and payloads. |
Command and Scripting Interpreter:Visual Basic | Javali has used embedded VBScript to download malicious payloads from C2. |
Command and Scripting Interpreter:Visual Basic | JCry has used VBS scripts. |
Command and Scripting Interpreter:Visual Basic | jRAT has been distributed as HTA files with VBScript. |
Command and Scripting Interpreter:Visual Basic | JSS Loader can download and execute VBScript files. |
Command and Scripting Interpreter:Visual Basic | Kerrdown can use a VBS base64 decoder function published by Motobit. |
Command and Scripting Interpreter:Visual Basic | KeyBoy uses VBS scripts for installing files and performing execution. |
Command and Scripting Interpreter:Visual Basic | It has used Visual Basic to download malicious payloads. It has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure. |
Command and Scripting Interpreter:Visual Basic | Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode . |
Command and Scripting Interpreter:Visual Basic | KOCTOPUS has used VBScript to call wscript to execute a PowerShell command. |
Command and Scripting Interpreter:Visual Basic | It has used VBA and embedded macros in Word documents to execute malicious code. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript to execute malicious code. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript. |
Command and Scripting Interpreter:Visual Basic | Lokibot has used VBS scripts and XLS macros for execution. |
Command and Scripting Interpreter:Visual Basic | LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host. |
Command and Scripting Interpreter:Visual Basic | It has embedded malicious macros within spearphishing attachments to download additional files. |
Command and Scripting Interpreter:Visual Basic | It malware has used VBS scripts for execution. |
Command and Scripting Interpreter:Visual Basic | Melcoz can use VBS scripts to execute malicious DLLs. |
Command and Scripting Interpreter:Visual Basic | Metamorfo has used VBS code on victims’ systems. |
Command and Scripting Interpreter:Visual Basic | It used various implants, including those built with VBScript, on target machines. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript files to execute its POWERSTATS payload, as well as macros. |
Command and Scripting Interpreter:Visual Basic | It has embedded VBScript components in LNK files to download additional files and automate collection. |
Command and Scripting Interpreter:Visual Basic | NanHaiShu executes additional VBScript code on the victim's machine. |
Command and Scripting Interpreter:Visual Basic | NanoCore uses VBS files. |
Command and Scripting Interpreter:Visual Basic | NETWIRE has been executed through use of VBScripts. |
Command and Scripting Interpreter:Visual Basic | It has used VBSscipt macros for execution on compromised hosts. |
Command and Scripting Interpreter:Visual Basic | OopsIE creates and uses a VBScript as part of its persistent execution. |
Command and Scripting Interpreter:Visual Basic | During Operation CuckooBees, the threat actors executed an encoded VBScript file using wscript and wrote the decoded output to a text file. |
Command and Scripting Interpreter:Visual Basic | During Operation Dream Job, It executed a VBA written malicious macro after victims download malicious DOTM files; It also used Visual Basic macro code to extract a double Base64 encoded DLL implant. |
Command and Scripting Interpreter:Visual Basic | During Operation Dust Storm, the threat actors used Visual Basic scripts. |
Command and Scripting Interpreter:Visual Basic | For Operation Honeybee, the threat actors used a Visual Basic script embedded within a Word document to download an implant. |
Command and Scripting Interpreter:Visual Basic | During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun. |
Command and Scripting Interpreter:Visual Basic | During Operation Wocao, threat actors used VBScript to conduct reconnaissance on targeted systems. |
Command and Scripting Interpreter:Visual Basic | OSX_OCEANLOTUS.D uses Word macros for execution. |
Command and Scripting Interpreter:Visual Basic | It used Visual Basic Scripts (VBS) on victim machines. |
Command and Scripting Interpreter:Visual Basic | PoetRAT has used Word documents with VBScripts to execute malicious activities. |
Command and Scripting Interpreter:Visual Basic | PowerShower has the ability to save and execute VBScript. |
Command and Scripting Interpreter:Visual Basic | POWERSTATS can use VBScript (VBE) code for execution. |
Command and Scripting Interpreter:Visual Basic | Pteranodon can use a malicious VBS file for execution. |
Command and Scripting Interpreter:Visual Basic | QakBot can use VBS to download and execute malicious files. |
Command and Scripting Interpreter:Visual Basic | QUADAGENT uses VBScripts. |
Command and Scripting Interpreter:Visual Basic | Ramsay has included embedded Visual Basic scripts in malicious documents. |
Subsets and Splits