text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Nomadic Octopus has used PowerShell for execution.
['T1059.001']
OilRig has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.
['T1059.001']
One version of Helminth uses a PowerShell script.
['T1059.001']
POSHSPY uses PowerShell to execute various commands, one to execute its payload.
['T1059.001']
POWERSOURCE is a PowerShell backdoor.
['T1059.001']
POWERSTATS uses PowerShell for obfuscation and execution.
['T1059.001']
POWERTON is written in PowerShell.
['T1059.001']
POWRUNER is written in PowerShell.
['T1059.001']
PUNCHBUGGY has used PowerShell scripts.
['T1059.001']
PowGoop has the ability to use PowerShell scripts to execute commands.
['T1059.001']
PowerLess is written in and executed via PowerShell without using powershell.exe.
['T1059.001']
PowerShower is a backdoor written in PowerShell.
['T1059.001']
PowerSploit modules are written in and executed via PowerShell.
['T1059.001']
PyDCrypt has attempted to execute with PowerShell.
['T1059.001']
Pysa has used Powershell scripts to deploy its ransomware.
['T1059.001']
QakBot can use PowerShell to download and execute payloads.
['T1059.001']
REvil has used PowerShell to delete volume shadow copies and download files.
['T1059.001']
RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence, RogueRobin creates "%APPDATA%\OneDrive.bat" and saves the following string to it:"powershell.exe -WindowStyle Hidden -exec bypass -File “%APPDATA%\OneDrive.ps1”".
['T1059.001']
SHARPSTATS has the ability to employ a custom PowerShell script.
['T1059.001']
SMOKEDHAM can execute Powershell commands sent from its C2 server.
['T1059.001']
SQLRat has used PowerShell to create a Meterpreter session.
['T1059.001']
SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket.
['T1059.001']
ServHelper has the ability to execute a PowerShell script to get information from the infected host.
['T1059.001']
SharpStage can execute arbitrary commands with PowerShell.
['T1059.001']
Sidewinder has used PowerShell to drop and execute malware loaders.
['T1059.001']
Socksbot can write and execute PowerShell scripts.
['T1059.001']
Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.
['T1059.001']
StrongPity can use PowerShell to add files to the Windows Defender exclusions list.
['T1059.001']
TA459 has used PowerShell for execution of a payload.
['T1059.001']
TEMP.Veles has used a publicly-available PowerShell-based tool, WMImplant. The group has also used PowerShell to perform Timestomping.
['T1059.001']
The Clambling dropper can use PowerShell to download the malware.
['T1059.001']
The NETWIRE binary has been executed via PowerShell script.
['T1059.001']
The Poseidon Group's Information Gathering Tool (IGT) includes PowerShell components.
['T1059.001']
There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form.
['T1059.001']
Threat Group-3390 has used PowerShell for execution.
['T1059.001']
Thrip leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.
['T1059.001']
Tonto Team has used PowerShell to download additional payloads.
['T1059.001']
TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers.
['T1059.001']
UNC2452 used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and to execute other commands.
['T1059.001']
WIRTE has used PowerShell for script execution.
['T1059.001']
WarzoneRAT can use PowerShell to download files and execute commands.
['T1059.001']
WellMess can execute PowerShell scripts received from C2.
['T1059.001']
WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.
['T1059.001']
Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network.
['T1059.001']
Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution.
['T1059.001']
Zeus Panda uses PowerShell to download and execute the payload.
['T1059.001']
Bundlore can use AppleScript to inject malicious JavaScript into a browser.
['T1059.002']
ThiefQuest uses AppleScript's "osascript -e" command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.
['T1059.002']
macOS.OSAMiner has used `osascript` to call itself via the `do shell script` command in the Launch Agent `.plist` file.
['T1059.002']
4H RAT has the capability to create a remote shell.
['T1059.003']
ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.
['T1059.003']
ADVSTORESHELL can create a remote shell and run a given command.
['T1059.003']
APT18 uses cmd.exe to execute commands on the victim’s machine.
['T1059.003']
APT29 used "cmd.exe" to execute commands on remote machines.
['T1059.003']
APT32 has used cmd.exe for execution.
['T1059.003']
APT37 has used the command-line interface.
['T1059.003']
APT38 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.
['T1059.003']
APT41 used "cmd.exe /c" to execute commands on remote machines. APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.
['T1059.003']
Action RAT can use `cmd.exe` to execute commands on an infected host.
['T1059.003']
An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads.
['T1059.003']
Anchor has used cmd.exe to run its self deletion routine.
['T1059.003']
Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to "cmd /C".
['T1059.003']
AuTo Stealer can use `cmd.exe` to execute a created batch file.
['T1059.003']
BADNEWS is capable of executing commands via cmd.exe.
['T1059.003']
BISCUIT has a command to launch a command shell on the system.
['T1059.003']
BLACKCOFFEE has the capability to create a reverse shell.
['T1059.003']
BLINDINGCAN has executed commands via cmd.exe.
['T1059.003']
BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe.
['T1059.003']
BRONZE BUTLER has used batch scripts and the command-line interface for execution.
['T1059.003']
Babuk has the ability to use the command line to control execution on compromised hosts.
['T1059.003']
BabyShark has used cmd.exe to execute commands.
['T1059.003']
BackConfig can download and run batch files to execute commands on a compromised host.
['T1059.003']
Bandook is capable of spawning a Windows command shell.
['T1059.003']
Bankshot uses the command-line interface to execute arbitrary commands.
['T1059.003']
Bazar can launch cmd.exe to perform reconnaissance commands.
['T1059.003']
BlackMould can run cmd.exe with parameters.
['T1059.003']
BoxCaon can execute arbitrary commands and utilize the "ComSpec" environment variable.
['T1059.003']
Bumblebee can use `cmd.exe` to drop and run files.
['T1059.003']
CALENDAR has a command to run cmd.exe to execute commands.
['T1059.003']
CARROTBAT has the ability to execute command line arguments on a compromised host.
['T1059.003']
Carbanak has a command to create a reverse shell.
['T1059.003']
Cardinal RAT can execute commands.
['T1059.003']
China Chopper's server component is capable of opening a command terminal.
['T1059.003']
Clambling can use cmd.exe for command execution.
['T1059.003']
Clop can use cmd.exe to help execute commands on the system.
['T1059.003']
Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files.
['T1059.003']
Cobalt Strike uses a command-line interface to interact with systems.
['T1059.003']
ComRAT has used "cmd.exe" to execute commands.
['T1059.003']
Conti can utilize command line options to allow an attacker control over how it scans and encrypts files.
['T1059.003']
Cuba has used "cmd.exe /c" and batch files for execution.
['T1059.003']
DanBot has the ability to execute arbitrary commands via `cmd.exe`.
['T1059.003']
Dark Caracal has used macros in Word documents that would download a second stage if executed.
['T1059.003']
DarkWatchman can use `cmd.exe` to execute commands.
['T1059.003']
Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file.
['T1059.003', 'T1547.009']
DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim’s machine.
['T1059.003']
Dipsind can spawn remote shells.
['T1059.003']
DnsSystem can use `cmd.exe` for execution.
['T1059.003']
DownPaper uses the command line.
['T1059.003']
Dragonfly 2.0 used various types of scripting to perform operations, including batch scripts.
['T1059.003']
Dragonfly has used various types of scripting to perform operations, including batch scripts.
['T1059.003']