prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:PowerShell
|
PowerShower is a backdoor written in PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
POWERSOURCE is a PowerShell backdoor.
|
Command and Scripting Interpreter:PowerShell
|
PowerSploit modules are written in and executed via PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.
|
Command and Scripting Interpreter:PowerShell
|
POWERSTATS uses PowerShell for obfuscation and execution.
|
Command and Scripting Interpreter:PowerShell
|
POWERTON is written in PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
PowGoop has the ability to use PowerShell scripts to execute commands.
|
Command and Scripting Interpreter:PowerShell
|
POWRUNER is written in PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
Prestige can use PowerShell for payload execution on targeted systems.
|
Command and Scripting Interpreter:PowerShell
|
PS1 can utilize a PowerShell loader.
|
Command and Scripting Interpreter:PowerShell
|
PUNCHBUGGY has used PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
Pupy has a module for loading and executing PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
PyDCrypt has attempted to execute with PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
Pysa has used Powershell scripts to deploy its ransomware.
|
Command and Scripting Interpreter:PowerShell
|
QakBot can use PowerShell to download and execute payloads.
|
Command and Scripting Interpreter:PowerShell
|
QUADAGENT uses PowerShell scripts for execution.
|
Command and Scripting Interpreter:PowerShell
|
There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form.
|
Command and Scripting Interpreter:PowerShell
|
RegDuke can extract and execute PowerShell scripts from C2 communications.
|
Command and Scripting Interpreter:PowerShell
|
Revenge RAT uses the PowerShell command Reflection.Assembly to load itself into memory to aid in execution.
|
Command and Scripting Interpreter:PowerShell
|
REvil has used PowerShell to delete volume shadow copies and download files.
|
Command and Scripting Interpreter:PowerShell
|
RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence, RogueRobin creates %APPDATA%\OneDrive.bat and saves the following string to it:powershell.exe -WindowStyle Hidden -exec bypass -File "%APPDATA%\OneDrive.ps1".
|
Command and Scripting Interpreter:PowerShell
|
Saint Bot has used PowerShell for execution.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell scripts to run a credential harvesting tool in memory to evade defenses.
|
Command and Scripting Interpreter:PowerShell
|
Sardonic has the ability to execute PowerShell commands on a compromised machine.
|
Command and Scripting Interpreter:PowerShell
|
SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket.
|
Command and Scripting Interpreter:PowerShell
|
ServHelper has the ability to execute a PowerShell script to get information from the infected host.
|
Command and Scripting Interpreter:PowerShell
|
SharpStage can execute arbitrary commands with PowerShell.
|
Command and Scripting Interpreter:PowerShell
|
SHARPSTATS has the ability to employ a custom PowerShell script.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to drop and execute malware loaders.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to download and execute payloads.
|
Command and Scripting Interpreter:PowerShell
|
SILENTTRINITY can use PowerShell to execute commands.
|
Command and Scripting Interpreter:PowerShell
|
SMOKEDHAM can execute Powershell commands sent from its C2 server.
|
Command and Scripting Interpreter:PowerShell
|
Snip3 can use a PowerShell script for second-stage execution.
|
Command and Scripting Interpreter:PowerShell
|
Socksbot can write and execute PowerShell scripts.
|
Command and Scripting Interpreter:PowerShell
|
During the SolarWinds Compromise, It used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and execute other commands.
|
Command and Scripting Interpreter:PowerShell
|
SQLRat has used PowerShell to create a Meterpreter session.
|
Command and Scripting Interpreter:PowerShell
|
Squirrelwaffle has used PowerShell to execute its payload.
|
Command and Scripting Interpreter:PowerShell
|
It malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.
|
Command and Scripting Interpreter:PowerShell
|
StrongPity can use PowerShell to add files to the Windows Defender exclusions list.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to download files and to inject into various Windows processes.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell for execution of a payload.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to download and execute malware and reconnaissance scripts.
|
Command and Scripting Interpreter:PowerShell
|
It has executed PowerShell commands in batch scripts.
|
Command and Scripting Interpreter:PowerShell
|
It has used a publicly-available PowerShell-based tool, WMImplant. The group has also used PowerShell to perform Timestomping.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell for execution.
|
Command and Scripting Interpreter:PowerShell
|
It leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to download additional payloads.
|
Command and Scripting Interpreter:PowerShell
|
TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell to execute commands/scripts, in some cases via a custom executable or code from Empire's PSInject. It has also used PowerShell scripts to load and execute malware in memory.
|
Command and Scripting Interpreter:PowerShell
|
Ursnif droppers have used PowerShell in download cradles to download and execute the malware's full executable payload.
|
Command and Scripting Interpreter:PowerShell
|
Valak has used PowerShell to download additional modules.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell including for remote system discovery.
|
Command and Scripting Interpreter:PowerShell
|
WarzoneRAT can use PowerShell to download files and execute commands.
|
Command and Scripting Interpreter:PowerShell
|
WellMess can execute PowerShell scripts received from C2.
|
Command and Scripting Interpreter:PowerShell
|
WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.
|
Command and Scripting Interpreter:PowerShell
|
It has used PowerShell for script execution.
|
Command and Scripting Interpreter:PowerShell
|
It has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network.
|
Command and Scripting Interpreter:PowerShell
|
Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, WoodyPowerSession.
|
Command and Scripting Interpreter:PowerShell
|
Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution.
|
Command and Scripting Interpreter:PowerShell
|
Zeus Panda uses PowerShell to download and execute the payload.
|
Command and Scripting Interpreter:AppleScript
|
Bundlore can use AppleScript to inject malicious JavaScript into a browser.
|
Command and Scripting Interpreter:AppleScript
|
Dok uses AppleScript to create a login item for persistence.
|
Command and Scripting Interpreter:AppleScript
|
macOS.OSAMiner has used osascript to call itself via the do shell script command in the Launch Agent .plist file.
|
Command and Scripting Interpreter:AppleScript
|
ThiefQuest uses AppleScript's osascript -e command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.
|
Command and Scripting Interpreter:Windows Command Shell
|
During the 2016 Ukraine Electric Power Attack, It used the xp_cmdshell command in MS-SQL.
|
Command and Scripting Interpreter:Windows Command Shell
|
4H RAT has the capability to create a remote shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.
|
Command and Scripting Interpreter:Windows Command Shell
|
Action RAT can use cmd.exe to execute commands on an infected host.
|
Command and Scripting Interpreter:Windows Command Shell
|
adbupd can run a copy of cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
Following exploitation with LOWBALL malware, It actors created a file containing a list of commands to be executed on the compromised computer.
|
Command and Scripting Interpreter:Windows Command Shell
|
ADVSTORESHELL can create a remote shell and run a given command.
|
Command and Scripting Interpreter:Windows Command Shell
|
Anchor has used cmd.exe to run its self deletion routine.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used the Windows command shell to execute commands, and batch scripting to automate execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
It uses cmd.exe to execute commands on the victim’s machine.
|
Command and Scripting Interpreter:Windows Command Shell
|
An It loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads.
|
Command and Scripting Interpreter:Windows Command Shell
|
An It downloader uses the Windows command "cmd.exe" /C whoami. The group also uses a tool to execute commands on remote computers.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used cmd.exe for execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used the command-line interface.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.
|
Command and Scripting Interpreter:Windows Command Shell
|
It used cmd.exe /c to execute commands on remote machines.It used a batch file to install persistence for the Cobalt Strike BEACON loader.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has attempted and failed to run Bash commands on a Windows host by passing them to cmd /C.
|
Command and Scripting Interpreter:Windows Command Shell
|
Astaroth spawns a CMD process to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
AuditCred can open a reverse shell on the system to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
AuTo Stealer can use cmd.exe to execute a created batch file.
|
Command and Scripting Interpreter:Windows Command Shell
|
Babuk has the ability to use the command line to control execution on compromised hosts.
|
Command and Scripting Interpreter:Windows Command Shell
|
BabyShark has used cmd.exe to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
BackConfig can download and run batch files to execute commands on a compromised host.
|
Command and Scripting Interpreter:Windows Command Shell
|
Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
BADHATCH can use cmd.exe to execute commands on a compromised host.
|
Command and Scripting Interpreter:Windows Command Shell
|
BADNEWS is capable of executing commands via cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
Bandook is capable of spawning a Windows command shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
Bankshot uses the command-line interface to execute arbitrary commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
Bazar can launch cmd.exe to perform reconnaissance commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.
|
Command and Scripting Interpreter:Windows Command Shell
|
BISCUIT has a command to launch a command shell on the system.
|
Command and Scripting Interpreter:Windows Command Shell
|
Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system.
|
Command and Scripting Interpreter:Windows Command Shell
|
Black Basta can use cmd.exe to enable shadow copy deletion.
|
Command and Scripting Interpreter:Windows Command Shell
|
BlackCat can execute commands on a compromised network with the use of cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
BLACKCOFFEE has the capability to create a reverse shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
BlackMould can run cmd.exe with parameters.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.