prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:Windows Command Shell
|
InvisiMole can launch a remote shell to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
Ixeshe is capable of executing commands via cmd.
|
Command and Scripting Interpreter:Windows Command Shell
|
JCry has used cmd.exe to launch PowerShell.
|
Command and Scripting Interpreter:Windows Command Shell
|
JHUHUGIT uses a .bat file to execute a .dll.
|
Command and Scripting Interpreter:Windows Command Shell
|
JPIN can use the command-line utility cacls.exe to change file permissions.
|
Command and Scripting Interpreter:Windows Command Shell
|
jRAT has command line access.
|
Command and Scripting Interpreter:Windows Command Shell
|
Kasidet can execute commands using cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
Kazuar uses cmd.exe to execute commands on the victim’s machine.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used batch scripts in its malware to install persistence mechanisms.
|
Command and Scripting Interpreter:Windows Command Shell
|
Kevin can use a renamed image of cmd.exe for execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
KeyBoy can launch interactive shells for communicating with the victim machine.
|
Command and Scripting Interpreter:Windows Command Shell
|
KEYMARBLE can execute shell commands using cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
KGH_SPY has the ability to set a Registry key to run a cmd.exe command.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has executed Windows commands by using cmd and running batch scripts.
|
Command and Scripting Interpreter:Windows Command Shell
|
Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host (Jscript) and to run arbitrary shellcode.
|
Command and Scripting Interpreter:Windows Command Shell
|
KOCTOPUS has used cmd.exe and batch files for execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
KOMPROGO is capable of creating a reverse shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
KONNI has used cmd.exe to execute arbitrary commands on the infected host across different stages of the infection chain.
|
Command and Scripting Interpreter:Windows Command Shell
|
It malware uses cmd.exe to execute commands on a compromised host. A Destover-like variant used by It uses a batch file mechanism to delete its binaries from the system.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used batch files to deploy open-source and multi-stage RATs.
|
Command and Scripting Interpreter:Windows Command Shell
|
LightNeuron is capable of executing commands via cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
Linfo creates a backdoor through which remote attackers can start a remote shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
Lizar has a command to open the command-line on the infected system.
|
Command and Scripting Interpreter:Windows Command Shell
|
Lokibot has used cmd /c commands embedded within batch scripts.
|
Command and Scripting Interpreter:Windows Command Shell
|
LookBack executes the cmd.exe command.
|
Command and Scripting Interpreter:Windows Command Shell
|
LoudMiner used a batch script to run the Linux virtual machine as a service.
|
Command and Scripting Interpreter:Windows Command Shell
|
Lucifer can issue shell commands to download and execute additional payloads.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used batch files to initiate additional downloads of malicious files.
|
Command and Scripting Interpreter:Windows Command Shell
|
Mafalda can execute shell commands using cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used the command-line interface for code execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
MarkiRAT can utilize cmd.exe to execute commands in a victim's environment.
|
Command and Scripting Interpreter:Windows Command Shell
|
The Maze encryption process has used batch scripts with various commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
MCMD can launch a console process (cmd.exe) with redirected standard input and output.
|
Command and Scripting Interpreter:Windows Command Shell
|
MechaFlounder has the ability to run commands on a compromised host.
|
Command and Scripting Interpreter:Windows Command Shell
|
MegaCortex has used .cmd scripts on the victim's system.
|
Command and Scripting Interpreter:Windows Command Shell
|
It executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. It has used malicious macros embedded inside Office documents to execute files.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used the Windows command line to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
Metamorfo has used cmd.exe /c to execute files.
|
Command and Scripting Interpreter:Windows Command Shell
|
Meteor can run set.bat, update.bat, cache.bat, bcd.bat, msrun.bat, and similar scripts.
|
Command and Scripting Interpreter:Windows Command Shell
|
Micropsia creates a command-line shell using cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
Milan can use cmd.exe for discovery actions on a targeted system.
|
Command and Scripting Interpreter:Windows Command Shell
|
MirageFox has the capability to execute commands using cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
Mis-Type has used cmd.exe to run commands on a compromised host.
|
Command and Scripting Interpreter:Windows Command Shell
|
Misdat is capable of providing shell functionality to the attacker to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
Mivast has the capability to open a remote shell and run basic commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
MoleNet can execute commands via the command line utility.
|
Command and Scripting Interpreter:Windows Command Shell
|
MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes, including to restart and uninstall itself.
|
Command and Scripting Interpreter:Windows Command Shell
|
More_eggs has used cmd.exe for execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used a custom tool for creating reverse shells.
|
Command and Scripting Interpreter:Windows Command Shell
|
MURKYTOP uses the command-line interface.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has executed HTA files via cmd.exe, and used batch scripts for collection.
|
Command and Scripting Interpreter:Windows Command Shell
|
NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files.
|
Command and Scripting Interpreter:Windows Command Shell
|
NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory.
|
Command and Scripting Interpreter:Windows Command Shell
|
Nebulae can use CMD to execute a process.
|
Command and Scripting Interpreter:Windows Command Shell
|
NETEAGLE allows adversaries to execute shell commands on the infected host.
|
Command and Scripting Interpreter:Windows Command Shell
|
Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload.
|
Command and Scripting Interpreter:Windows Command Shell
|
NETWIRE can issue commands using cmd.exe.
|
Command and Scripting Interpreter:Windows Command Shell
|
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells.
|
Command and Scripting Interpreter:Windows Command Shell
|
njRAT can launch a command shell interface for executing commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
It used cmd.exe /c within a malicious macro.
|
Command and Scripting Interpreter:Windows Command Shell
|
OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used macros to deliver malware such as QUADAGENT and OopsIE. It has used batch scripts.
|
Command and Scripting Interpreter:Windows Command Shell
|
Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version.
|
Command and Scripting Interpreter:Windows Command Shell
|
OopsIE uses the command prompt to execute commands on the victim's machine.
|
Command and Scripting Interpreter:Windows Command Shell
|
During Operation CuckooBees, the threat actors used batch scripts to perform reconnaissance.
|
Command and Scripting Interpreter:Windows Command Shell
|
During Operation Dream Job, It launched malicious DLL files, created new folders, and renamed folders with the use of the Windows command shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
During Operation Honeybee, various implants used batch scripting and cmd.exe for execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
During Operation Wocao, threat actors spawned a new cmd.exe process to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
Orz can execute shell commands. Orz can execute commands with JavaScript.
|
Command and Scripting Interpreter:Windows Command Shell
|
Out1 can use native command line for execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
OutSteel has used cmd.exe to scan a compromised host for specific file extensions.
|
Command and Scripting Interpreter:Windows Command Shell
|
It ran a reverse shell with Meterpreter. It used JavaScript code and .SCT files on victim machines.
|
Command and Scripting Interpreter:Windows Command Shell
|
PcShare can execute cmd commands on a compromised host.
|
Command and Scripting Interpreter:Windows Command Shell
|
Peppy has the ability to execute shell commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
PHOREAL is capable of creating reverse shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
PingPull can use cmd.exe to run various commands as a reverse shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
PLAINTEE uses cmd.exe to execute commands on the victim’s machine.
|
Command and Scripting Interpreter:Windows Command Shell
|
PLEAD has the ability to execute shell commands on the compromised host.
|
Command and Scripting Interpreter:Windows Command Shell
|
PlugX allows actors to spawn a reverse shell on a victim.
|
Command and Scripting Interpreter:Windows Command Shell
|
PoetRAT has called cmd through a Word document macro.
|
Command and Scripting Interpreter:Windows Command Shell
|
PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.
|
Command and Scripting Interpreter:Windows Command Shell
|
Pony has used batch scripts to delete itself after execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
PowerDuke runs cmd.exe /c and sends the output to its C2.
|
Command and Scripting Interpreter:Windows Command Shell
|
POWRUNER can execute commands from its C2 server.
|
Command and Scripting Interpreter:Windows Command Shell
|
Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c " > %temp%\PM* .tmp 2>&1".
|
Command and Scripting Interpreter:Windows Command Shell
|
Pteranodon can use cmd.exe for execution on victim systems.
|
Command and Scripting Interpreter:Windows Command Shell
|
PyDCrypt has used cmd.exe for execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
QakBot can use cmd.exe to launch itself and to execute multiple C2 commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine.
|
Command and Scripting Interpreter:Windows Command Shell
|
QuasarRAT can launch a remote shell to execute commands on the victim’s machine.
|
Command and Scripting Interpreter:Windows Command Shell
|
Ragnar Locker has used cmd.exe and batch scripts to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
RainyDay can use the Windows Command Shell for execution.
|
Command and Scripting Interpreter:Windows Command Shell
|
It has used cmd.exe to execute commmands.
|
Command and Scripting Interpreter:Windows Command Shell
|
RATANKBA uses cmd.exe to execute commands.
|
Command and Scripting Interpreter:Windows Command Shell
|
RCSession can use cmd.exe for execution on compromised hosts.
|
Command and Scripting Interpreter:Windows Command Shell
|
RDAT has executed commands using cmd.exe /c.
|
Command and Scripting Interpreter:Windows Command Shell
|
RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell.
|
Command and Scripting Interpreter:Windows Command Shell
|
Remcos can launch a remote command line to execute commands on the victim’s machine.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.