text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Dtrack has used "cmd.exe" to add a persistent service.
['T1059.003']
During C0015, the threat actors used `cmd.exe` to execute commands and run malicious binaries.
['T1059.003']
During FunnyDream, the threat actors used `cmd.exe` to execute the wmiexec.vbs script.
['T1059.003']
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells.
['T1059.003']
During Operation Honeybee, various implants used batch scripting and `cmd.exe` for execution.
['T1059.003']
During Operation Wocao, threat actors spawned a new `cmd.exe` process to execute commands.
['T1059.003']
Ember Bear had used `cmd.exe` and Windows Script Host (wscript) to execute malicious code.
['T1059.003']
Emissary has the capability to create a remote shell and execute specified commands.
['T1059.003']
Empire has modules for executing scripts.
['T1059.003']
EvilBunny has an integrated scripting engine to download and execute Lua scripts.
['T1059.003']
FIN10 has executed malicious .bat files containing PowerShell commands.
['T1059.003']
FIN6 has used "kill.bat" script to disable security tools.
['T1059.003']
FIN7 used the command prompt to launch commands on the victim’s machine.
['T1059.003']
FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities. FIN8 has also executed commands remotely via cmd.
['T1059.003']
Felismus uses command line for execution.
['T1059.003']
FlawedAmmyy has used `cmd` to execute commands on a compromised host.
['T1059.003']
Following exploitation with LOWBALL malware, admin@338 actors created a file containing a list of commands to be executed on the compromised computer.
['T1059.003']
Fox Kitten has used cmd.exe likely as a password changing mechanism.
['T1059.003']
Frankenstein has run a command script to set up persistence as a scheduled task named "WinUpdate", as well as other encoded commands from the command-line.
['T1059.003']
FunnyDream can use `cmd.exe` for execution on remote hosts.
['T1059.003']
GALLIUM used the Windows command shell to execute commands.
['T1059.003']
Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file.
['T1059.003']
Gold Dragon uses cmd.exe to execute commands for discovery.
['T1059.003']
GoldMax can spawn a command shell, and execute native commands.
['T1059.003']
GoldenSpy can execute remote commands via the command-line interface.
['T1059.003']
Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel.
['T1059.003']
Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system.
['T1059.003']
GravityRAT executes commands remotely on the infected host.
['T1059.003']
H1N1 kills and disables services by using cmd.exe.
['T1059.003']
HAWKBALL has created a cmd.exe reverse shell, executed commands, and uploaded output via the command line.
['T1059.003']
HOMEFRY uses a command-line interface.
['T1059.003']
HTTPBrowser is capable of spawning a reverse shell on a victim.
['T1059.003']
Helminth can provide a remote shell. One version of Helminth uses batch scripting.
['T1059.003']
HermeticWizard can use `cmd.exe` for execution on compromised hosts.
['T1059.003']
Hi-Zor has the ability to create a reverse shell.
['T1059.003']
HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution.
['T1059.003']
Higaisa used "cmd.exe" for execution.
['T1059.003']
Hikit has the ability to create a remote shell and run given commands.
['T1059.003']
Indrik Spider has used batch scripts on victim's machines.
['T1059.003']
Ixeshe is capable of executing commands via cmd.
['T1059.003']
JHUHUGIT uses a .bat file to execute a .dll.
['T1059.003']
JPIN can use the command-line utility cacls.exe to change file permissions.
['T1059.003', 'T1222.001']
KEYMARBLE can execute shell commands using cmd.exe.
['T1059.003']
KGH_SPY has the ability to set a Registry key to run a cmd.exe command.
['T1059.003']
KOCTOPUS has used `cmd.exe` and batch files for execution.
['T1059.003']
KOMPROGO is capable of creating a reverse shell.
['T1059.003']
Kasidet can execute commands using cmd.exe.
['T1059.003']
Ke3chang has used batch scripts in its malware to install persistence mechanisms.
['T1059.003']
Kimsuky has executed Windows commands by using `cmd` and running batch scripts.
['T1059.003']
LazyScripter has used batch files to deploy open-source and multi-stage RATs.
['T1059.003']
Leviathan uses a backdoor known as BADFLICK that is is capable of generating a reverse shell, and has used multiple types of scripting for execution, including JavaScript and JavaScript Scriptlets in XML..
['T1059.003']
LightNeuron is capable of executing commands via cmd.exe.
['T1059.003']
Linfo creates a backdoor through which remote attackers can start a remote shell.
['T1059.003']
Lizar has a command to open the command-line on the infected system.
['T1059.003']
Lokibot has used "cmd /c" commands embedded within batch scripts.
['T1059.003']
LookBack executes the "cmd.exe" command.
['T1059.003']
LoudMiner used a batch script to run the Linux virtual machine as a service.
['T1059.003']
Lucifer can issue shell commands to download and execute additional payloads.
['T1059.003']
Machete has used batch files to initiate additional downloads of malicious files.
['T1059.003']
Magic Hound has used the command-line interface.
['T1059.003']
MechaFlounder has the ability to run commands on a compromised host.
['T1059.003']
MegaCortex has used ".cmd" scripts on the victim's system.
['T1059.003']
Meteor can run `set.bat`, `update.bat`, `cache.bat`, `bcd.bat`, `msrun.bat`, and similar scripts.
['T1059.003']
Micropsia creates a command-line shell using cmd.exe.
['T1059.003']
Milan can use `cmd.exe` for discovery actions on a targeted system.
['T1059.003']
MirageFox has the capability to execute commands using cmd.exe.
['T1059.003']
Mis-Type has used `cmd.exe` to run commands on a compromised host.
['T1059.003']
Misdat is capable of providing shell functionality to the attacker to execute commands.
['T1059.003']
Mivast has the capability to open a remote shell and run basic commands.
['T1059.003']
MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes, including to restart and uninstall itself.
['T1059.003']
More_eggs has used cmd.exe for execution.
['T1059.003']
Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.
['T1059.003']
Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection.
['T1059.003']
NETWIRE can issue commands using cmd.exe.
['T1059.003']
NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files.
['T1059.003']
Nebulae can use CMD to execute a process.
['T1059.003']
Nomadic Octopus used "cmd.exe /c" within a malicious macro.
['T1059.003']
OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros.
['T1059.003']
OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts.
['T1059.003']
Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version.
['T1059.003']
OopsIE uses the command prompt to execute commands on the victim's machine.
['T1059.003']
Operation Wocao has spawned a new "cmd.exe" process to execute commands.
['T1059.003']
Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload.
['T1059.003']
Orz can execute shell commands. Orz can execute commands with JavaScript.
['T1059.003']
Out1 can use native command line for execution.
['T1059.003']
OutSteel has used `cmd.exe` to scan a compromised host for specific file extensions.
['T1059.003']
PHOREAL is capable of creating reverse shell.
['T1059.003']
PLEAD has the ability to execute shell commands on the compromised host.
['T1059.003']
POWRUNER can execute commands from its C2 server.
['T1059.003']
Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines.
['T1059.003']
PcShare can execute `cmd` commands on a compromised host.
['T1059.003']
Peppy has the ability to execute shell commands.
['T1059.003']
PlugX allows actors to spawn a reverse shell on a victim.
['T1059.003']
Proxysvc executes a binary on the system and logs the results into a temp file by using: "cmd.exe /c "<file_path> > %temp%\PM* .tmp 2>&1"".
['T1059.003']
Pteranodon can use `cmd.exe` for execution on victim systems.
['T1059.003']
PyDCrypt has used `cmd.exe` for execution.
['T1059.003']
QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine.
['T1059.003']
QakBot can use cmd.exe to launch itself and to execute multiple C2 commands.
['T1059.003']
RATANKBA uses cmd.exe to execute commands.
['T1059.003']
RDAT has executed commands using "cmd.exe /c".
['T1059.003']