prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:PowerShell
|
AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader.
|
Command and Scripting Interpreter:PowerShell
|
BADHATCH can utilize powershell.exe to execute commands on a compromised host.
|
Command and Scripting Interpreter:PowerShell
|
Bandook has used PowerShell loaders as part of execution.
|
Command and Scripting Interpreter:PowerShell
|
Bazar can execute a PowerShell script received from C2.
|
Command and Scripting Interpreter:PowerShell
|
Black Basta has used PowerShell scripts for discovery and to execute files over the network.
|
Command and Scripting Interpreter:PowerShell
|
BloodHound can use PowerShell to pull Active Directory information from the target environment.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell reverse TCP shells to issue interactive commands over a network connection.
|
Command and Scripting Interpreter:PowerShell
|
BONDUPDATER is written in PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell for execution.
|
Command and Scripting Interpreter:PowerShell
|
Bumblebee can use PowerShell for execution.
|
Command and Scripting Interpreter:PowerShell
|
During C0018, the threat actors used encoded PowerShell scripts for execution.
|
Command and Scripting Interpreter:PowerShell
|
During C0021, the threat actors used obfuscated PowerShell to extract an encoded payload from within an .LNK file.
|
Command and Scripting Interpreter:PowerShell
|
CharmPower can use PowerShell for payload execution and C2 communication.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features.
|
Command and Scripting Interpreter:PowerShell
|
The Clambling dropper can use PowerShell to download the malware.
|
Command and Scripting Interpreter:PowerShell
|
It has used powershell.exe to download and execute scripts.
|
Command and Scripting Interpreter:PowerShell
|
Cobalt Strike can execute a payload on a remote host with PowerShell. This technique does not write any data to disk. Cobalt Strike can also use PowerSploit and other scripting frameworks to perform execution.
|
Command and Scripting Interpreter:PowerShell
|
ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to execute malicious files and payloads.
|
Command and Scripting Interpreter:PowerShell
|
ConnectWise can be used to execute PowerShell commands on target machines.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell Empire.
|
Command and Scripting Interpreter:PowerShell
|
CrackMapExec can execute PowerShell commands via WMI.
|
Command and Scripting Interpreter:PowerShell
|
CreepyDrive can use Powershell for execution, including the cmdlets Invoke-WebRequest and Invoke-Expression.
|
Command and Scripting Interpreter:PowerShell
|
CreepySnail can use PowerShell for execution, including the cmdlets Invoke-WebRequst and Invoke-Expression.
|
Command and Scripting Interpreter:PowerShell
|
Cuba has been dropped onto systems and used for lateral movement via obfuscated PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
It leveraged PowerShell to download and execute additional scripts for execution.
|
Command and Scripting Interpreter:PowerShell
|
It used PowerShell to create shellcode loaders.
|
Command and Scripting Interpreter:PowerShell
|
DarkWatchman can execute PowerShell commands and has used PowerShell to execute a keylogger.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell scripts to download and execute programs in memory, without writing to disk.
|
Command and Scripting Interpreter:PowerShell
|
Denis has a version written in PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
Donut can generate shellcode outputs that execute via PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
DownPaper uses PowerShell for execution.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell scripts for execution.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to execute commands.
|
Command and Scripting Interpreter:PowerShell
|
Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to download and execute malicious code.
|
Command and Scripting Interpreter:PowerShell
|
Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz.
|
Command and Scripting Interpreter:PowerShell
|
Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the Invoke-PSRemoting module.
|
Command and Scripting Interpreter:PowerShell
|
FatDuke has the ability to execute PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
Ferocious can use PowerShell scripts for execution.
|
Command and Scripting Interpreter:PowerShell
|
It uses PowerShell for execution as well as PowerShell Empire to establish persistence.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell commands to obtain DNS data from a compromised network.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener.
|
Command and Scripting Interpreter:PowerShell
|
It used a PowerShell script to launch shellcode that retrieved an additional payload.
|
Command and Scripting Interpreter:PowerShell
|
It's malicious spearphishing payloads are executed as PowerShell. It has also used PowerShell for lateral movement and credential access.
|
Command and Scripting Interpreter:PowerShell
|
FlawedAmmyy has used PowerShell to execute commands.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell scripts to access credential data.
|
Command and Scripting Interpreter:PowerShell
|
During Frankenstein, the threat actors used PowerShell to run a series of Base64-encoded commands that acted as a stager and enumerated hosts.
|
Command and Scripting Interpreter:PowerShell
|
It used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines.
|
Command and Scripting Interpreter:PowerShell
|
It used PowerShell to download additional payloads and for execution.
|
Command and Scripting Interpreter:PowerShell
|
It has used obfuscated PowerShell scripts for staging.
|
Command and Scripting Interpreter:PowerShell
|
It has staged and executed PowerShell scripts on compromised hosts.
|
Command and Scripting Interpreter:PowerShell
|
It malware can use PowerShell commands to download and execute a payload and open a decoy document on the victim’s machine.
|
Command and Scripting Interpreter:PowerShell
|
GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet.
|
Command and Scripting Interpreter:PowerShell
|
It has used the Exchange Power Shell module Set-OabVirtualDirectoryPowerShell to export mailbox data.
|
Command and Scripting Interpreter:PowerShell
|
HALFBAKED can execute PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
HAMMERTOSS is known to use PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
Hancitor has used PowerShell to execute commands.
|
Command and Scripting Interpreter:PowerShell
|
One version of Helminth uses a PowerShell script.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell-based tools and scripts for discovery and collection on compromised hosts.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to execute malicious commands and payloads.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell Empire for execution of malware.
|
Command and Scripting Interpreter:PowerShell
|
JCry has used PowerShell to execute payloads.
|
Command and Scripting Interpreter:PowerShell
|
JSS Loader has the ability to download and execute PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
KeyBoy uses PowerShell commands to download and execute payloads.
|
Command and Scripting Interpreter:PowerShell
|
KGH_SPY can execute PowerShell commands on the victim's machine.
|
Command and Scripting Interpreter:PowerShell
|
It has executed a variety of PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
Koadic has used PowerShell to establish persistence.
|
Command and Scripting Interpreter:PowerShell
|
KOCTOPUS has used PowerShell commands to download additional files.
|
Command and Scripting Interpreter:PowerShell
|
KONNI used PowerShell to download and execute a specific 64-bit version of the malware.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to execute commands and malicious code.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell scripts to execute malicious code.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell for execution.
|
Command and Scripting Interpreter:PowerShell
|
LitePower can use a PowerShell script to execute commands.
|
Command and Scripting Interpreter:PowerShell
|
Lizar has used PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
Lokibot has used PowerShell commands embedded inside batch scripts.
|
Command and Scripting Interpreter:PowerShell
|
Mafalda can execute PowerShell commands on a compromised machine.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell for execution and privilege escalation.
|
Command and Scripting Interpreter:PowerShell
|
It uses PowerSploit to inject shellcode into PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
Meteor can use PowerShell commands to disable the network adapters on a victim machines.
|
Command and Scripting Interpreter:PowerShell
|
MoleNet can use PowerShell to set persistence.
|
Command and Scripting Interpreter:PowerShell
|
It used PowerShell implants on target machines.
|
Command and Scripting Interpreter:PowerShell
|
Mosquito can launch PowerShell Scripts.
|
Command and Scripting Interpreter:PowerShell
|
It has used plugins to execute PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell for execution.
|
Command and Scripting Interpreter:PowerShell
|
It has used malicious PowerShell scripts to enable execution.
|
Command and Scripting Interpreter:PowerShell
|
Netwalker has been written in PowerShell and executed directly in memory, avoiding detection.
|
Command and Scripting Interpreter:PowerShell
|
The NETWIRE binary has been executed via PowerShell script.
|
Command and Scripting Interpreter:PowerShell
|
njRAT has executed PowerShell commands via auto-run registry key persistence.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell for execution.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.
|
Command and Scripting Interpreter:PowerShell
|
During Operation Dream Job, It used PowerShell commands to explore the environment of compromised victims.
|
Command and Scripting Interpreter:PowerShell
|
During Operation Wocao, threat actors used PowerShell on compromised systems.
|
Command and Scripting Interpreter:PowerShell
|
OSX_OCEANLOTUS.D uses PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
It used PowerSploit to download payloads, run a reverse shell, and execute malware on the victim's machine.
|
Command and Scripting Interpreter:PowerShell
|
Pillowmint has used a PowerShell script to install a shim database.
|
Command and Scripting Interpreter:PowerShell
|
The It's Information Gathering Tool (IGT) includes PowerShell components.
|
Command and Scripting Interpreter:PowerShell
|
POSHSPY uses PowerShell to execute various commands, one to execute its payload.
|
Command and Scripting Interpreter:PowerShell
|
PowerLess is written in and executed via PowerShell without using powershell.exe.
|
Command and Scripting Interpreter:PowerShell
|
PowerPunch has the ability to execute through PowerShell.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.