text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Dtrack has used "cmd.exe" to add a persistent service. | ['T1059.003'] |
During C0015, the threat actors used `cmd.exe` to execute commands and run malicious binaries. | ['T1059.003'] |
During FunnyDream, the threat actors used `cmd.exe` to execute the wmiexec.vbs script. | ['T1059.003'] |
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells. | ['T1059.003'] |
During Operation Honeybee, various implants used batch scripting and `cmd.exe` for execution. | ['T1059.003'] |
During Operation Wocao, threat actors spawned a new `cmd.exe` process to execute commands. | ['T1059.003'] |
Ember Bear had used `cmd.exe` and Windows Script Host (wscript) to execute malicious code. | ['T1059.003'] |
Emissary has the capability to create a remote shell and execute specified commands. | ['T1059.003'] |
Empire has modules for executing scripts. | ['T1059.003'] |
EvilBunny has an integrated scripting engine to download and execute Lua scripts. | ['T1059.003'] |
FIN10 has executed malicious .bat files containing PowerShell commands. | ['T1059.003'] |
FIN6 has used "kill.bat" script to disable security tools. | ['T1059.003'] |
FIN7 used the command prompt to launch commands on the victim’s machine. | ['T1059.003'] |
FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities. FIN8 has also executed commands remotely via cmd. | ['T1059.003'] |
Felismus uses command line for execution. | ['T1059.003'] |
FlawedAmmyy has used `cmd` to execute commands on a compromised host. | ['T1059.003'] |
Following exploitation with LOWBALL malware, admin@338 actors created a file containing a list of commands to be executed on the compromised computer. | ['T1059.003'] |
Fox Kitten has used cmd.exe likely as a password changing mechanism. | ['T1059.003'] |
Frankenstein has run a command script to set up persistence as a scheduled task named "WinUpdate", as well as other encoded commands from the command-line. | ['T1059.003'] |
FunnyDream can use `cmd.exe` for execution on remote hosts. | ['T1059.003'] |
GALLIUM used the Windows command shell to execute commands. | ['T1059.003'] |
Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file. | ['T1059.003'] |
Gold Dragon uses cmd.exe to execute commands for discovery. | ['T1059.003'] |
GoldMax can spawn a command shell, and execute native commands. | ['T1059.003'] |
GoldenSpy can execute remote commands via the command-line interface. | ['T1059.003'] |
Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel. | ['T1059.003'] |
Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system. | ['T1059.003'] |
GravityRAT executes commands remotely on the infected host. | ['T1059.003'] |
H1N1 kills and disables services by using cmd.exe. | ['T1059.003'] |
HAWKBALL has created a cmd.exe reverse shell, executed commands, and uploaded output via the command line. | ['T1059.003'] |
HOMEFRY uses a command-line interface. | ['T1059.003'] |
HTTPBrowser is capable of spawning a reverse shell on a victim. | ['T1059.003'] |
Helminth can provide a remote shell. One version of Helminth uses batch scripting. | ['T1059.003'] |
HermeticWizard can use `cmd.exe` for execution on compromised hosts. | ['T1059.003'] |
Hi-Zor has the ability to create a reverse shell. | ['T1059.003'] |
HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution. | ['T1059.003'] |
Higaisa used "cmd.exe" for execution. | ['T1059.003'] |
Hikit has the ability to create a remote shell and run given commands. | ['T1059.003'] |
Indrik Spider has used batch scripts on victim's machines. | ['T1059.003'] |
Ixeshe is capable of executing commands via cmd. | ['T1059.003'] |
JHUHUGIT uses a .bat file to execute a .dll. | ['T1059.003'] |
JPIN can use the command-line utility cacls.exe to change file permissions. | ['T1059.003', 'T1222.001'] |
KEYMARBLE can execute shell commands using cmd.exe. | ['T1059.003'] |
KGH_SPY has the ability to set a Registry key to run a cmd.exe command. | ['T1059.003'] |
KOCTOPUS has used `cmd.exe` and batch files for execution. | ['T1059.003'] |
KOMPROGO is capable of creating a reverse shell. | ['T1059.003'] |
Kasidet can execute commands using cmd.exe. | ['T1059.003'] |
Ke3chang has used batch scripts in its malware to install persistence mechanisms. | ['T1059.003'] |
Kimsuky has executed Windows commands by using `cmd` and running batch scripts. | ['T1059.003'] |
LazyScripter has used batch files to deploy open-source and multi-stage RATs. | ['T1059.003'] |
Leviathan uses a backdoor known as BADFLICK that is is capable of generating a reverse shell, and has used multiple types of scripting for execution, including JavaScript and JavaScript Scriptlets in XML.. | ['T1059.003'] |
LightNeuron is capable of executing commands via cmd.exe. | ['T1059.003'] |
Linfo creates a backdoor through which remote attackers can start a remote shell. | ['T1059.003'] |
Lizar has a command to open the command-line on the infected system. | ['T1059.003'] |
Lokibot has used "cmd /c" commands embedded within batch scripts. | ['T1059.003'] |
LookBack executes the "cmd.exe" command. | ['T1059.003'] |
LoudMiner used a batch script to run the Linux virtual machine as a service. | ['T1059.003'] |
Lucifer can issue shell commands to download and execute additional payloads. | ['T1059.003'] |
Machete has used batch files to initiate additional downloads of malicious files. | ['T1059.003'] |
Magic Hound has used the command-line interface. | ['T1059.003'] |
MechaFlounder has the ability to run commands on a compromised host. | ['T1059.003'] |
MegaCortex has used ".cmd" scripts on the victim's system. | ['T1059.003'] |
Meteor can run `set.bat`, `update.bat`, `cache.bat`, `bcd.bat`, `msrun.bat`, and similar scripts. | ['T1059.003'] |
Micropsia creates a command-line shell using cmd.exe. | ['T1059.003'] |
Milan can use `cmd.exe` for discovery actions on a targeted system. | ['T1059.003'] |
MirageFox has the capability to execute commands using cmd.exe. | ['T1059.003'] |
Mis-Type has used `cmd.exe` to run commands on a compromised host. | ['T1059.003'] |
Misdat is capable of providing shell functionality to the attacker to execute commands. | ['T1059.003'] |
Mivast has the capability to open a remote shell and run basic commands. | ['T1059.003'] |
MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes, including to restart and uninstall itself. | ['T1059.003'] |
More_eggs has used cmd.exe for execution. | ['T1059.003'] |
Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server. | ['T1059.003'] |
Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection. | ['T1059.003'] |
NETWIRE can issue commands using cmd.exe. | ['T1059.003'] |
NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files. | ['T1059.003'] |
Nebulae can use CMD to execute a process. | ['T1059.003'] |
Nomadic Octopus used "cmd.exe /c" within a malicious macro. | ['T1059.003'] |
OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros. | ['T1059.003'] |
OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts. | ['T1059.003'] |
Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version. | ['T1059.003'] |
OopsIE uses the command prompt to execute commands on the victim's machine. | ['T1059.003'] |
Operation Wocao has spawned a new "cmd.exe" process to execute commands. | ['T1059.003'] |
Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload. | ['T1059.003'] |
Orz can execute shell commands. Orz can execute commands with JavaScript. | ['T1059.003'] |
Out1 can use native command line for execution. | ['T1059.003'] |
OutSteel has used `cmd.exe` to scan a compromised host for specific file extensions. | ['T1059.003'] |
PHOREAL is capable of creating reverse shell. | ['T1059.003'] |
PLEAD has the ability to execute shell commands on the compromised host. | ['T1059.003'] |
POWRUNER can execute commands from its C2 server. | ['T1059.003'] |
Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines. | ['T1059.003'] |
PcShare can execute `cmd` commands on a compromised host. | ['T1059.003'] |
Peppy has the ability to execute shell commands. | ['T1059.003'] |
PlugX allows actors to spawn a reverse shell on a victim. | ['T1059.003'] |
Proxysvc executes a binary on the system and logs the results into a temp file by using: "cmd.exe /c "<file_path> > %temp%\PM* .tmp 2>&1"". | ['T1059.003'] |
Pteranodon can use `cmd.exe` for execution on victim systems. | ['T1059.003'] |
PyDCrypt has used `cmd.exe` for execution. | ['T1059.003'] |
QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine. | ['T1059.003'] |
QakBot can use cmd.exe to launch itself and to execute multiple C2 commands. | ['T1059.003'] |
RATANKBA uses cmd.exe to execute commands. | ['T1059.003'] |
RDAT has executed commands using "cmd.exe /c". | ['T1059.003'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.