text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Nomadic Octopus has used PowerShell for execution. | ['T1059.001'] |
OilRig has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents. | ['T1059.001'] |
One version of Helminth uses a PowerShell script. | ['T1059.001'] |
POSHSPY uses PowerShell to execute various commands, one to execute its payload. | ['T1059.001'] |
POWERSOURCE is a PowerShell backdoor. | ['T1059.001'] |
POWERSTATS uses PowerShell for obfuscation and execution. | ['T1059.001'] |
POWERTON is written in PowerShell. | ['T1059.001'] |
POWRUNER is written in PowerShell. | ['T1059.001'] |
PUNCHBUGGY has used PowerShell scripts. | ['T1059.001'] |
PowGoop has the ability to use PowerShell scripts to execute commands. | ['T1059.001'] |
PowerLess is written in and executed via PowerShell without using powershell.exe. | ['T1059.001'] |
PowerShower is a backdoor written in PowerShell. | ['T1059.001'] |
PowerSploit modules are written in and executed via PowerShell. | ['T1059.001'] |
PyDCrypt has attempted to execute with PowerShell. | ['T1059.001'] |
Pysa has used Powershell scripts to deploy its ransomware. | ['T1059.001'] |
QakBot can use PowerShell to download and execute payloads. | ['T1059.001'] |
REvil has used PowerShell to delete volume shadow copies and download files. | ['T1059.001'] |
RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence, RogueRobin creates "%APPDATA%\OneDrive.bat" and saves the following string to it:"powershell.exe -WindowStyle Hidden -exec bypass -File “%APPDATA%\OneDrive.ps1”". | ['T1059.001'] |
SHARPSTATS has the ability to employ a custom PowerShell script. | ['T1059.001'] |
SMOKEDHAM can execute Powershell commands sent from its C2 server. | ['T1059.001'] |
SQLRat has used PowerShell to create a Meterpreter session. | ['T1059.001'] |
SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket. | ['T1059.001'] |
ServHelper has the ability to execute a PowerShell script to get information from the infected host. | ['T1059.001'] |
SharpStage can execute arbitrary commands with PowerShell. | ['T1059.001'] |
Sidewinder has used PowerShell to drop and execute malware loaders. | ['T1059.001'] |
Socksbot can write and execute PowerShell scripts. | ['T1059.001'] |
Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server. | ['T1059.001'] |
StrongPity can use PowerShell to add files to the Windows Defender exclusions list. | ['T1059.001'] |
TA459 has used PowerShell for execution of a payload. | ['T1059.001'] |
TEMP.Veles has used a publicly-available PowerShell-based tool, WMImplant. The group has also used PowerShell to perform Timestomping. | ['T1059.001'] |
The Clambling dropper can use PowerShell to download the malware. | ['T1059.001'] |
The NETWIRE binary has been executed via PowerShell script. | ['T1059.001'] |
The Poseidon Group's Information Gathering Tool (IGT) includes PowerShell components. | ['T1059.001'] |
There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form. | ['T1059.001'] |
Threat Group-3390 has used PowerShell for execution. | ['T1059.001'] |
Thrip leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance. | ['T1059.001'] |
Tonto Team has used PowerShell to download additional payloads. | ['T1059.001'] |
TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers. | ['T1059.001'] |
UNC2452 used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and to execute other commands. | ['T1059.001'] |
WIRTE has used PowerShell for script execution. | ['T1059.001'] |
WarzoneRAT can use PowerShell to download files and execute commands. | ['T1059.001'] |
WellMess can execute PowerShell scripts received from C2. | ['T1059.001'] |
WhisperGate can use PowerShell to support multiple actions including execution and defense evasion. | ['T1059.001'] |
Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network. | ['T1059.001'] |
Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution. | ['T1059.001'] |
Zeus Panda uses PowerShell to download and execute the payload. | ['T1059.001'] |
Bundlore can use AppleScript to inject malicious JavaScript into a browser. | ['T1059.002'] |
ThiefQuest uses AppleScript's "osascript -e" command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon. | ['T1059.002'] |
macOS.OSAMiner has used `osascript` to call itself via the `do shell script` command in the Launch Agent `.plist` file. | ['T1059.002'] |
4H RAT has the capability to create a remote shell. | ['T1059.003'] |
ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. | ['T1059.003'] |
ADVSTORESHELL can create a remote shell and run a given command. | ['T1059.003'] |
APT18 uses cmd.exe to execute commands on the victim’s machine. | ['T1059.003'] |
APT29 used "cmd.exe" to execute commands on remote machines. | ['T1059.003'] |
APT32 has used cmd.exe for execution. | ['T1059.003'] |
APT37 has used the command-line interface. | ['T1059.003'] |
APT38 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine. | ['T1059.003'] |
APT41 used "cmd.exe /c" to execute commands on remote machines.
APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader. | ['T1059.003'] |
Action RAT can use `cmd.exe` to execute commands on an infected host. | ['T1059.003'] |
An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. | ['T1059.003'] |
Anchor has used cmd.exe to run its self deletion routine. | ['T1059.003'] |
Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to "cmd /C". | ['T1059.003'] |
AuTo Stealer can use `cmd.exe` to execute a created batch file. | ['T1059.003'] |
BADNEWS is capable of executing commands via cmd.exe. | ['T1059.003'] |
BISCUIT has a command to launch a command shell on the system. | ['T1059.003'] |
BLACKCOFFEE has the capability to create a reverse shell. | ['T1059.003'] |
BLINDINGCAN has executed commands via cmd.exe. | ['T1059.003'] |
BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe. | ['T1059.003'] |
BRONZE BUTLER has used batch scripts and the command-line interface for execution. | ['T1059.003'] |
Babuk has the ability to use the command line to control execution on compromised hosts. | ['T1059.003'] |
BabyShark has used cmd.exe to execute commands. | ['T1059.003'] |
BackConfig can download and run batch files to execute commands on a compromised host. | ['T1059.003'] |
Bandook is capable of spawning a Windows command shell. | ['T1059.003'] |
Bankshot uses the command-line interface to execute arbitrary commands. | ['T1059.003'] |
Bazar can launch cmd.exe to perform reconnaissance commands. | ['T1059.003'] |
BlackMould can run cmd.exe with parameters. | ['T1059.003'] |
BoxCaon can execute arbitrary commands and utilize the "ComSpec" environment variable. | ['T1059.003'] |
Bumblebee can use `cmd.exe` to drop and run files. | ['T1059.003'] |
CALENDAR has a command to run cmd.exe to execute commands. | ['T1059.003'] |
CARROTBAT has the ability to execute command line arguments on a compromised host. | ['T1059.003'] |
Carbanak has a command to create a reverse shell. | ['T1059.003'] |
Cardinal RAT can execute commands. | ['T1059.003'] |
China Chopper's server component is capable of opening a command terminal. | ['T1059.003'] |
Clambling can use cmd.exe for command execution. | ['T1059.003'] |
Clop can use cmd.exe to help execute commands on the system. | ['T1059.003'] |
Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files. | ['T1059.003'] |
Cobalt Strike uses a command-line interface to interact with systems. | ['T1059.003'] |
ComRAT has used "cmd.exe" to execute commands. | ['T1059.003'] |
Conti can utilize command line options to allow an attacker control over how it scans and encrypts files. | ['T1059.003'] |
Cuba has used "cmd.exe /c" and batch files for execution. | ['T1059.003'] |
DanBot has the ability to execute arbitrary commands via `cmd.exe`. | ['T1059.003'] |
Dark Caracal has used macros in Word documents that would download a second stage if executed. | ['T1059.003'] |
DarkWatchman can use `cmd.exe` to execute commands. | ['T1059.003'] |
Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. | ['T1059.003', 'T1547.009'] |
DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim’s machine. | ['T1059.003'] |
Dipsind can spawn remote shells. | ['T1059.003'] |
DnsSystem can use `cmd.exe` for execution. | ['T1059.003'] |
DownPaper uses the command line. | ['T1059.003'] |
Dragonfly 2.0 used various types of scripting to perform operations, including batch scripts. | ['T1059.003'] |
Dragonfly has used various types of scripting to perform operations, including batch scripts. | ['T1059.003'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.