text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Donut can generate shellcode outputs that execute via Ruby. | ['T1059'] |
Dragonfly has used the command line for execution. | ['T1059'] |
Emotet has used cmd.exe to run a PowerShell script. | ['T1059', 'T1059.003'] |
Empire uses a command-line interface to interact with systems. | ['T1059'] |
Exaramel for Windows has a command to launch a remote shell and executes commands on the victim’s machine. | ['T1059', 'T1059.003'] |
FIN6 has used scripting to iterate through a list of compromised PoS systems, copy data to a log file, and remove the original data files. | ['T1059'] |
FIN7 used SQL scripts to help perform tasks on the victim's machine. | ['T1059'] |
FIVEHANDS can receive a command line argument to limit file encryption to specified directories. | ['T1059'] |
Fox Kitten has used a Perl reverse shell to communicate with C2. | ['T1059'] |
Get2 has the ability to run executables with command-line arguments. | ['T1059'] |
Imminent Monitor has a CommandPromptPacket and ScriptPacket module(s) for creating a remote shell and executing scripts. | ['T1059'] |
Kessel can create a reverse shell between the infected host and a specified system. | ['T1059'] |
Lazarus Group malware uses cmd.exe to execute commands on victims. | ['T1059'] |
Malware used by Ke3chang can run commands on the command-line interface. | ['T1059'] |
Matryoshka is capable of providing Meterpreter shell access. | ['T1059'] |
Molerats used various implants, including those built on .NET, on target machines. | ['T1059'] |
MoonWind can execute commands via an interactive command shell. | ['T1059'] |
OSX_OCEANLOTUS.D can run commands through a terminal on the victim’s machine. | ['T1059'] |
OilRig has used the command-line interface for execution. | ['T1059'] |
OilRig has used various types of scripting for execution. | ['T1059'] |
P.A.S. Webshell has the ability to create reverse shells with Perl scripts. | ['T1059'] |
PoetRAT has executed a Lua script through a Lua interpreter for Windows. | ['T1059'] |
Several commands are supported by the Honeybee's implant via the command-line interface and there’s also a utility to execute any custom command on an infected endpoint. | ['T1059'] |
SpeakUp uses Perl scripts. | ['T1059'] |
Stealth Falcon malware uses WMI to script data collection and command execution on the victim. | ['T1059'] |
TYPEFRAME can execute commands using a shell. | ['T1059'] |
WINERACK can create a reverse shell that utilizes statically-linked Wine cmd.exe code to emulate Windows command prompt commands. | ['T1059'] |
Whitefly has used a simple remote shell tool that will call back to the C2 server and wait for commands. | ['T1059'] |
creates a backdoor through which remote attackers can open a command-line interface. | ['T1059', 'T1059'] |
gh0st RAT is able to open a remote shell to execute commands. | ['T1059'] |
AADInternals is written and executed via PowerShell. | ['T1059.001'] |
APT19 used PowerShell commands to execute payloads. | ['T1059.001'] |
APT28 downloads and executes PowerShell scripts and performs PowerShell commands. | ['T1059.001'] |
APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke. APT29 also used PowerShell to create new tasks on remote machines, identify configuration settings, evade defenses, exfiltrate data, and to execute other commands. | ['T1059.001'] |
APT32 has used PowerShell-based tools, PowerShell one-liners, and shellcode loaders for execution. | ['T1059.001'] |
APT33 has utilized PowerShell to download files from the C2 server and run various scripts. | ['T1059.001'] |
APT38 has used PowerShell to execute commands and other operational tasks. | ['T1059.001'] |
AppleSeed has the ability to execute its payload via PowerShell. | ['T1059.001'] |
Aquatic Panda has downloaded additional scripts and executed Base64 encoded commands in PowerShell. | ['T1059.001'] |
AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader. | ['T1059.001'] |
BRONZE BUTLER has used PowerShell for execution. | ['T1059.001'] |
Bandook has used PowerShell loaders as part of execution. | ['T1059.001'] |
Bazar can execute a PowerShell script received from C2. | ['T1059.001'] |
BloodHound can use PowerShell to pull Active Directory information from the target environment. | ['T1059.001'] |
Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection. | ['T1059.001'] |
Bumblebee can use PowerShell for execution. | ['T1059.001'] |
CharmPower can use PowerShell for payload execution and C2 communication. | ['T1059.001'] |
Chimera has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features. | ['T1059.001'] |
Cobalt Group has used powershell.exe to download and execute scripts. | ['T1059.001'] |
ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system. | ['T1059.001'] |
ConnectWise can be used to execute PowerShell commands on target machines. | ['T1059.001'] |
CrackMapExec can execute PowerShell commands via WMI. | ['T1059.001'] |
CreepySnail can use PowerShell for execution, including the cmdlets `Invoke-WebRequst` and `Invoke-Expression`. | ['T1059.001'] |
Cuba has been dropped onto systems and used for lateral movement via obfuscated PowerShell scripts. | ['T1059.001'] |
DarkVishnya used PowerShell to create shellcode loaders. | ['T1059.001'] |
DarkWatchman can execute PowerShell commands and has used PowerShell to execute a keylogger. | ['T1059.001'] |
Denis has a version written in PowerShell. | ['T1059.001'] |
DownPaper uses PowerShell for execution. | ['T1059.001'] |
Dragonfly 2.0 used PowerShell scripts for execution. | ['T1059.001'] |
Dragonfly has used PowerShell scripts for execution. | ['T1059.001'] |
During Frankenstein, the threat actors used PowerShell to run a series of Base64-encoded commands that acted as a stager and enumerated hosts. | ['T1059.001'] |
During Operation Wocao, threat actors used PowerShell on compromised systems. | ['T1059.001'] |
Earth Lusca has used PowerShell to execute commands. | ['T1059.001'] |
Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement. | ['T1059.001'] |
Ember Bear has used PowerShell to download and execute malicious code. | ['T1059.001'] |
Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz. | ['T1059.001'] |
Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the "Invoke-PSRemoting" module. | ['T1059.001'] |
FIN10 uses PowerShell for execution as well as PowerShell Empire to establish persistence. | ['T1059.001'] |
FIN6 has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener. | ['T1059.001'] |
FIN7 used a PowerShell script to launch shellcode that retrieved an additional payload. | ['T1059.001'] |
FIN8's malicious spearphishing payloads are executed as PowerShell. FIN8 has also used PowerShell for lateral movement and credential access. | ['T1059.001'] |
Ferocious can use PowerShell scripts for execution. | ['T1059.001'] |
Fox Kitten has used PowerShell scripts to access credential data. | ['T1059.001'] |
Frankenstein has used PowerShell to run a series of base64-encoded commands, that acted as a stager and enumerated hosts. | ['T1059.001'] |
GALLIUM used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines. | ['T1059.001'] |
GOLD SOUTHFIELD has staged and executed PowerShell scripts on compromised hosts. | ['T1059.001'] |
Gamaredon Group has used obfuscated PowerShell scripts for staging. | ['T1059.001'] |
HAFNIUM has used the Exchange Power Shell module "Set-OabVirtualDirectoryPowerShell" to export mailbox data. | ['T1059.001'] |
HAMMERTOSS is known to use PowerShell. | ['T1059.001'] |
HEXANE has used PowerShell-based tools and scripts for discovery and collection on compromised hosts. | ['T1059.001'] |
Inception has used PowerShell to execute malicious commands and payloads. | ['T1059.001'] |
Indrik Spider has used PowerShell Empire for execution of malware. | ['T1059.001'] |
JCry has used PowerShell to execute payloads. | ['T1059.001'] |
JSS Loader has the ability to download and execute PowerShell scripts. | ['T1059.001'] |
KOCTOPUS has used PowerShell commands to download additional files. | ['T1059.001'] |
KONNI used PowerShell to download and execute a specific 64-bit version of the malware. | ['T1059.001'] |
KeyBoy uses PowerShell commands to download and execute payloads. | ['T1059.001'] |
Kimsuky has executed a variety of PowerShell scripts. | ['T1059.001'] |
Koadic has used PowerShell to establish persistence. | ['T1059.001'] |
LazyScripter has used PowerShell scripts to execute malicious code. | ['T1059.001'] |
Leviathan has used PowerShell for execution. | ['T1059.001'] |
LitePower can use a PowerShell script to execute commands. | ['T1059.001'] |
Lizar has used PowerShell scripts. | ['T1059.001'] |
Lokibot has used PowerShell commands embedded inside batch scripts. | ['T1059.001'] |
Magic Hound has used PowerShell for execution and privilege escalation. | ['T1059.001'] |
Meteor can use PowerShell commands to disable the network adapters on a victim machines. | ['T1059.001'] |
Mosquito can launch PowerShell Scripts. | ['T1059.001'] |
MuddyWater has used PowerShell for execution. | ['T1059.001'] |
Mustang Panda has used malicious PowerShell scripts to enable execution. | ['T1059.001'] |
Netwalker has been written in PowerShell and executed directly in memory, avoiding detection. | ['T1059.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.