prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:Visual Basic
|
It has used VBS scripts as well as embedded macros for execution.
|
Command and Scripting Interpreter:Visual Basic
|
Remexi uses AutoIt and VBS scripts throughout its execution process.
|
Command and Scripting Interpreter:Visual Basic
|
REvil has used obfuscated VBA macros for execution.
|
Command and Scripting Interpreter:Visual Basic
|
ROKRAT has used Visual Basic for execution.
|
Command and Scripting Interpreter:Visual Basic
|
Saint Bot has used .vbs scripts for execution.
|
Command and Scripting Interpreter:Visual Basic
|
It has created VBScripts to run an SSH server.
|
Command and Scripting Interpreter:Visual Basic
|
Sibot executes commands using VBScript.
|
Command and Scripting Interpreter:Visual Basic
|
It has sent Microsoft Office Publisher documents to victims that have embedded malicious macros that execute an hta file via calling mshta.exe.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript to drop and execute malware loaders.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBS scripts.
|
Command and Scripting Interpreter:Visual Basic
|
Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload.
|
Command and Scripting Interpreter:Visual Basic
|
Snip3 can use visual basic scripts for first-stage execution.
|
Command and Scripting Interpreter:Visual Basic
|
For the SolarWinds Compromise, It wrote malware such as Sibot in Visual Basic.
|
Command and Scripting Interpreter:Visual Basic
|
Squirrelwaffle has used malicious VBA macros in Microsoft Word documents and Excel spreadsheets that execute an AutoOpen subroutine.
|
Command and Scripting Interpreter:Visual Basic
|
STARWHALE can use the VBScript function GetRef as part of its persistence mechanism.
|
Command and Scripting Interpreter:Visual Basic
|
StoneDrill has several VBS scripts used throughout the malware's lifecycle.
|
Command and Scripting Interpreter:Visual Basic
|
SUNBURST used VBScripts to initiate the execution of payloads.
|
Command and Scripting Interpreter:Visual Basic
|
SVCReady has used VBA macros to execute shellcode.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBS files to execute or establish persistence for additional payloads, often using file names consistent with email themes or mimicking system functionality.
|
Command and Scripting Interpreter:Visual Basic
|
It has a VBScript for execution.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBS for code execution.
|
Command and Scripting Interpreter:Visual Basic
|
It has crafted VBS-based malicious documents.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBS scripts throughout its operations.
|
Command and Scripting Interpreter:Visual Basic
|
TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.
|
Command and Scripting Interpreter:Visual Basic
|
Ursnif droppers have used VBA macros to download and execute the malware's full executable payload.
|
Command and Scripting Interpreter:Visual Basic
|
VBShower has the ability to execute VBScript files.
|
Command and Scripting Interpreter:Visual Basic
|
WhisperGate can use a Visual Basic script to exclude the C:\ drive from Windows Defender.
|
Command and Scripting Interpreter:Visual Basic
|
It has used Visual Basic 6 (VB6) payloads.
|
Command and Scripting Interpreter:Visual Basic
|
It has used VBScript in its operations.
|
Command and Scripting Interpreter:Visual Basic
|
Xbash can execute malicious VBScript payloads on the victim’s machine.
|
Command and Scripting Interpreter:Python
|
It has developed malware variants written in Python.
|
Command and Scripting Interpreter:Python
|
It has used Python scripts to execute payloads.
|
Command and Scripting Interpreter:Python
|
It has used a command line utility and a network scanner written in python.
|
Command and Scripting Interpreter:Python
|
Bandook can support commands to execute Python-based payloads.
|
Command and Scripting Interpreter:Python
|
It has made use of Python-based remote access tools.
|
Command and Scripting Interpreter:Python
|
Bundlore has used Python scripts to execute payloads.
|
Command and Scripting Interpreter:Python
|
Chaes has used Python scripts for execution and the installation of additional files.
|
Command and Scripting Interpreter:Python
|
Cobalt Strike can use Python to perform execution.
|
Command and Scripting Interpreter:Python
|
CoinTicker executes a Python script to download its second stage.
|
Command and Scripting Interpreter:Python
|
CookieMiner has used python scripts on the user’s system, as well as the Python variant of the Empire agent, EmPyre.
|
Command and Scripting Interpreter:Python
|
Donut can generate shellcode outputs that execute via Python.
|
Command and Scripting Interpreter:Python
|
It has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim.
|
Command and Scripting Interpreter:Python
|
DropBook is a Python-based backdoor compiled with PyInstaller.
|
Command and Scripting Interpreter:Python
|
It used Python scripts for port scanning or building reverse shells.
|
Command and Scripting Interpreter:Python
|
Ebury has used Python to implement its DGA.
|
Command and Scripting Interpreter:Python
|
IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector.
|
Command and Scripting Interpreter:Python
|
KeyBoy uses Python scripts for installing files and performing execution.
|
Command and Scripting Interpreter:Python
|
Keydnap uses Python for scripting to execute additional commands.
|
Command and Scripting Interpreter:Python
|
It has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data.
|
Command and Scripting Interpreter:Python
|
It is written in Python and is used in conjunction with additional Python scripts.
|
Command and Scripting Interpreter:Python
|
It used multiple compiled Python scripts on the victim’s system. It's main backdoor It is also written in Python.
|
Command and Scripting Interpreter:Python
|
MechaFlounder uses a python-based payload.
|
Command and Scripting Interpreter:Python
|
It has used developed tools in Python including Out1.
|
Command and Scripting Interpreter:Python
|
During Operation Wocao, threat actors' backdoors were written in Python and compiled with py2exe.
|
Command and Scripting Interpreter:Python
|
PoetRAT was executed with a Python script and worked in conjunction with additional Python-based post-exploitation tools.
|
Command and Scripting Interpreter:Python
|
PUNCHBUGGY has used python scripts.
|
Command and Scripting Interpreter:Python
|
Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts ("scriptlets") to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc.
|
Command and Scripting Interpreter:Python
|
PyDCrypt, along with its functions, is written in Python.
|
Command and Scripting Interpreter:Python
|
Pysa has used Python scripts to deploy ransomware.
|
Command and Scripting Interpreter:Python
|
Remcos uses Python scripts.
|
Command and Scripting Interpreter:Python
|
It has used Python-based malware to install and spread their coinminer.
|
Command and Scripting Interpreter:Python
|
SILENTTRINITY is written in Python and can use multiple Python scripts for execution on targeted systems.
|
Command and Scripting Interpreter:Python
|
Small Sieve can use Python scripts to execute commands.
|
Command and Scripting Interpreter:Python
|
SpeakUp uses Python scripts.
|
Command and Scripting Interpreter:Python
|
It has used Python-based tools for execution.
|
Command and Scripting Interpreter:Python
|
Turian has the ability to use Python to spawn a Unix shell.
|
Command and Scripting Interpreter:Python
|
It has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads.
|
Command and Scripting Interpreter:Python
|
ItM has used Python-based implants to interact with compromised hosts.
|
Command and Scripting Interpreter:JavaScript
|
AppleSeed has the ability to use JavaScript to execute PowerShell.
|
Command and Scripting Interpreter:JavaScript
|
It has used JavaScript for drive-by downloads and C2 communications.
|
Command and Scripting Interpreter:JavaScript
|
Astaroth uses JavaScript to perform its core functionalities.
|
Command and Scripting Interpreter:JavaScript
|
Avaddon has been executed through a malicious JScript downloader.
|
Command and Scripting Interpreter:JavaScript
|
Bundlore can execute JavaScript by injecting it into the victim's browser.
|
Command and Scripting Interpreter:JavaScript
|
During C0015, the threat actors used a malicious HTA file that contained a mix of encoded HTML and JavaScript/VBScript code.
|
Command and Scripting Interpreter:JavaScript
|
During C0017, It deployed JScript web shells on compromised systems.
|
Command and Scripting Interpreter:JavaScript
|
Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process.
|
Command and Scripting Interpreter:JavaScript
|
It has executed JavaScript scriptlets on the victim's machine.
|
Command and Scripting Interpreter:JavaScript
|
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions.
|
Command and Scripting Interpreter:JavaScript
|
DarkWatchman uses JavaScript to perform its core functionalities.
|
Command and Scripting Interpreter:JavaScript
|
Donut can generate shellcode outputs that execute via JavaScript or JScript.
|
Command and Scripting Interpreter:JavaScript
|
It has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations.
|
Command and Scripting Interpreter:JavaScript
|
It has used JavaScript to execute malicious code on a victim's machine.
|
Command and Scripting Interpreter:JavaScript
|
EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver.
|
Command and Scripting Interpreter:JavaScript
|
It has used malicious JavaScript files on the victim's machine.
|
Command and Scripting Interpreter:JavaScript
|
It has used malicious JavaScript to steal payment card data from e-commerce sites.
|
Command and Scripting Interpreter:JavaScript
|
It used JavaScript scripts to help perform tasks on the victim's machine.
|
Command and Scripting Interpreter:JavaScript
|
GRIFFON is written in and executed as JavaScript.
|
Command and Scripting Interpreter:JavaScript
|
It used JavaScript to execute additional files.
|
Command and Scripting Interpreter:JavaScript
|
It has used malicious JavaScript files for several components of their attack.
|
Command and Scripting Interpreter:JavaScript
|
InvisiMole can use a JavaScript file as part of its execution chain.
|
Command and Scripting Interpreter:JavaScript
|
jRAT has been distributed as HTA files with JScript.
|
Command and Scripting Interpreter:JavaScript
|
JSS Loader can download and execute JavaScript files.
|
Command and Scripting Interpreter:JavaScript
|
It has used JScript for logging and downloading additional tools.
|
Command and Scripting Interpreter:JavaScript
|
KONNI has executed malicious JavaScript code.
|
Command and Scripting Interpreter:JavaScript
|
KOPILUWAK had used Javascript to perform its core functions.
|
Command and Scripting Interpreter:JavaScript
|
It has used JavaScript in its attacks.
|
Command and Scripting Interpreter:JavaScript
|
It infected victims using JavaScript code.
|
Command and Scripting Interpreter:JavaScript
|
Metamorfo includes payloads written in JavaScript.
|
Command and Scripting Interpreter:JavaScript
|
It used various implants, including those built with JS, on target machines.
|
Command and Scripting Interpreter:JavaScript
|
It has used JavaScript to deliver malware hosted on HTML pages.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.