prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:Unix Shell
|
Hildegard has used shell scripts for execution.
|
Command and Scripting Interpreter:Unix Shell
|
Kazuar uses /bin/bash to execute commands on the victim’s machine.
|
Command and Scripting Interpreter:Unix Shell
|
Kinsing has used Unix shell scripts to execute commands in the victim environment.
|
Command and Scripting Interpreter:Unix Shell
|
Kobalos can spawn a new pseudo-terminal and execute arbitrary commands at the command prompt.
|
Command and Scripting Interpreter:Unix Shell
|
LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization.
|
Command and Scripting Interpreter:Unix Shell
|
MacMa can execute supplied shell commands and uses bash scripts to perform additional actions.
|
Command and Scripting Interpreter:Unix Shell
|
NETWIRE has the ability to use /bin/bash and /bin/sh to execute commands.
|
Command and Scripting Interpreter:Unix Shell
|
OSX/Shlayer can use bash scripts to check the macOS version, download payloads, and extract bytes from files. OSX/Shlayer uses the command sh -c tail -c +1381... to extract bytes at an offset from a specified file. OSX/Shlayer uses the curl -fsL "$url" >$tmp_path command to download malicious payloads into a temporary directory.
|
Command and Scripting Interpreter:Unix Shell
|
OSX_OCEANLOTUS.D uses a shell script as the main executable inside an app bundle and drops an embedded base64-encoded payload to the /tmp folder.
|
Command and Scripting Interpreter:Unix Shell
|
Penquin can execute remote commands using bash scripts.
|
Command and Scripting Interpreter:Unix Shell
|
Proton uses macOS' .command file type to script actions.
|
Command and Scripting Interpreter:Unix Shell
|
It used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware.
|
Command and Scripting Interpreter:Unix Shell
|
Skidmap has used pm.sh to download and install its main payload.
|
Command and Scripting Interpreter:Unix Shell
|
It has used shell scripts for execution.
|
Command and Scripting Interpreter:Unix Shell
|
Turian has the ability to use /bin/sh to execute commands.
|
Command and Scripting Interpreter:Unix Shell
|
WindTail can use the open command to execute an application.
|
Command and Scripting Interpreter:Unix Shell
|
XCSSET uses a shell script to execute Mach-o files and osacompile commands such as, osacompile -x -o xcode.app main.applescript.
|
Command and Scripting Interpreter:Visual Basic
|
During the 2015 Ukraine Electric Power Attack, It installed a VBA script called vba_macro.exe. This macro dropped FONTCACHE.DAT, the primary BlackEnergy implant; rundll32.exe, for executing the malware; NTUSER.log, an empty file; and desktop.ini, the default file used to determine folder displays on Windows machines.
|
Command and Scripting Interpreter:Visual Basic
|
During the 2016 Ukraine Electric Power Attack, It created VBScripts to run on an SSH server.
|
Command and Scripting Interpreter:Visual Basic
|
It has embedded a VBScript within a malicious Word document which is executed upon the document opening.
|
Command and Scripting Interpreter:Visual Basic
|
It has used macros, COM scriptlets, and VBS scripts.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript to initiate the delivery of payloads.
|
Command and Scripting Interpreter:Visual Basic
|
It executes shellcode and a VBA script to decode Base64 strings.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript to execute commands and other operational tasks.
|
Command and Scripting Interpreter:Visual Basic
|
It has utilized malicious VBS scripts in malware.
|
Command and Scripting Interpreter:Visual Basic
|
Astaroth has used malicious VBS e-mail attachments for execution.
|
Command and Scripting Interpreter:Visual Basic
|
BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code.
|
Command and Scripting Interpreter:Visual Basic
|
Bandook has used malicious VBA code against the target system.
|
Command and Scripting Interpreter:Visual Basic
|
Bisonal's dropper creates VBS scripts on the victim’s machine.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBS and VBE scripts for execution.
|
Command and Scripting Interpreter:Visual Basic
|
Bumblebee can create a Visual Basic script to enable persistence.
|
Command and Scripting Interpreter:Visual Basic
|
For C0011, It used malicious VBA macros within a lure document as part of the Crimson malware installation process onto a compromised host.
|
Command and Scripting Interpreter:Visual Basic
|
During C0015, the threat actors used a malicious HTA file that contained a mix of HTML and JavaScript/VBScript code.
|
Command and Scripting Interpreter:Visual Basic
|
Chaes has used VBscript to execute malicious code.
|
Command and Scripting Interpreter:Visual Basic
|
It has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution.
|
Command and Scripting Interpreter:Visual Basic
|
Cobalt Strike can use VBA to perform execution.
|
Command and Scripting Interpreter:Visual Basic
|
Comnie executes VBS scripts.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript to execute malicious code.
|
Command and Scripting Interpreter:Visual Basic
|
DanBot can use a VBA macro embedded in an Excel file to drop the payload.
|
Command and Scripting Interpreter:Visual Basic
|
Donut can generate shellcode outputs that execute via VBScript.
|
Command and Scripting Interpreter:Visual Basic
|
It used VBA scripts.
|
Command and Scripting Interpreter:Visual Basic
|
Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.
|
Command and Scripting Interpreter:Visual Basic
|
Exaramel for Windows has a command to execute VBS scripts on the victim’s machine.
|
Command and Scripting Interpreter:Visual Basic
|
Ferocious has the ability to use Visual Basic scripts for execution.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBS scripts for code execution on comrpomised machines.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBA macros to display a dialog box and collect victim credentials.
|
Command and Scripting Interpreter:Visual Basic
|
It used VBS scripts to help perform tasks on the victim's machine.
|
Command and Scripting Interpreter:Visual Basic
|
Flagpro can execute malicious VBA macros embedded in .xlsm files.
|
Command and Scripting Interpreter:Visual Basic
|
During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script.
|
Command and Scripting Interpreter:Visual Basic
|
During FunnyDream, the threat actors used a Visual Basic script to run remote commands.
|
Command and Scripting Interpreter:Visual Basic
|
It has embedded malicious macros in document templates, which executed VBScript. It has also delivered Microsoft Outlook VBA projects with embedded macros.
|
Command and Scripting Interpreter:Visual Basic
|
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.
|
Command and Scripting Interpreter:Visual Basic
|
It has used macros in Spearphishing Attachments as well as executed VBScripts on victim machines.
|
Command and Scripting Interpreter:Visual Basic
|
Grandoreiro can use VBScript to execute malicious code.
|
Command and Scripting Interpreter:Visual Basic
|
One version of Helminth consists of VBScript scripts.
|
Command and Scripting Interpreter:Visual Basic
|
It has used a VisualBasic script named MicrosoftUpdator.vbs for execution of a PowerShell keylogger.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript code on the victim's machine.
|
Command and Scripting Interpreter:Visual Basic
|
IcedID has used obfuscated VBA string expressions.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript to execute malicious commands and payloads.
|
Command and Scripting Interpreter:Visual Basic
|
Javali has used embedded VBScript to download malicious payloads from C2.
|
Command and Scripting Interpreter:Visual Basic
|
JCry has used VBS scripts.
|
Command and Scripting Interpreter:Visual Basic
|
jRAT has been distributed as HTA files with VBScript.
|
Command and Scripting Interpreter:Visual Basic
|
JSS Loader can download and execute VBScript files.
|
Command and Scripting Interpreter:Visual Basic
|
Kerrdown can use a VBS base64 decoder function published by Motobit.
|
Command and Scripting Interpreter:Visual Basic
|
KeyBoy uses VBS scripts for installing files and performing execution.
|
Command and Scripting Interpreter:Visual Basic
|
It has used Visual Basic to download malicious payloads. It has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure.
|
Command and Scripting Interpreter:Visual Basic
|
Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode .
|
Command and Scripting Interpreter:Visual Basic
|
KOCTOPUS has used VBScript to call wscript to execute a PowerShell command.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBA and embedded macros in Word documents to execute malicious code.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript to execute malicious code.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript.
|
Command and Scripting Interpreter:Visual Basic
|
Lokibot has used VBS scripts and XLS macros for execution.
|
Command and Scripting Interpreter:Visual Basic
|
LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host.
|
Command and Scripting Interpreter:Visual Basic
|
It has embedded malicious macros within spearphishing attachments to download additional files.
|
Command and Scripting Interpreter:Visual Basic
|
It malware has used VBS scripts for execution.
|
Command and Scripting Interpreter:Visual Basic
|
Melcoz can use VBS scripts to execute malicious DLLs.
|
Command and Scripting Interpreter:Visual Basic
|
Metamorfo has used VBS code on victims’ systems.
|
Command and Scripting Interpreter:Visual Basic
|
It used various implants, including those built with VBScript, on target machines.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript files to execute its POWERSTATS payload, as well as macros.
|
Command and Scripting Interpreter:Visual Basic
|
It has embedded VBScript components in LNK files to download additional files and automate collection.
|
Command and Scripting Interpreter:Visual Basic
|
NanHaiShu executes additional VBScript code on the victim's machine.
|
Command and Scripting Interpreter:Visual Basic
|
NanoCore uses VBS files.
|
Command and Scripting Interpreter:Visual Basic
|
NETWIRE has been executed through use of VBScripts.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBSscipt macros for execution on compromised hosts.
|
Command and Scripting Interpreter:Visual Basic
|
OopsIE creates and uses a VBScript as part of its persistent execution.
|
Command and Scripting Interpreter:Visual Basic
|
During Operation CuckooBees, the threat actors executed an encoded VBScript file using wscript and wrote the decoded output to a text file.
|
Command and Scripting Interpreter:Visual Basic
|
During Operation Dream Job, It executed a VBA written malicious macro after victims download malicious DOTM files; It also used Visual Basic macro code to extract a double Base64 encoded DLL implant.
|
Command and Scripting Interpreter:Visual Basic
|
During Operation Dust Storm, the threat actors used Visual Basic scripts.
|
Command and Scripting Interpreter:Visual Basic
|
For Operation Honeybee, the threat actors used a Visual Basic script embedded within a Word document to download an implant.
|
Command and Scripting Interpreter:Visual Basic
|
During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun.
|
Command and Scripting Interpreter:Visual Basic
|
During Operation Wocao, threat actors used VBScript to conduct reconnaissance on targeted systems.
|
Command and Scripting Interpreter:Visual Basic
|
OSX_OCEANLOTUS.D uses Word macros for execution.
|
Command and Scripting Interpreter:Visual Basic
|
It used Visual Basic Scripts (VBS) on victim machines.
|
Command and Scripting Interpreter:Visual Basic
|
PoetRAT has used Word documents with VBScripts to execute malicious activities.
|
Command and Scripting Interpreter:Visual Basic
|
PowerShower has the ability to save and execute VBScript.
|
Command and Scripting Interpreter:Visual Basic
|
POWERSTATS can use VBScript (VBE) code for execution.
|
Command and Scripting Interpreter:Visual Basic
|
Pteranodon can use a malicious VBS file for execution.
|
Command and Scripting Interpreter:Visual Basic
|
QakBot can use VBS to download and execute malicious files.
|
Command and Scripting Interpreter:Visual Basic
|
QUADAGENT uses VBScripts.
|
Command and Scripting Interpreter:Visual Basic
|
Ramsay has included embedded Visual Basic scripts in malicious documents.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.