text1
stringlengths
7
2.5k
labels
stringlengths
9
100
REvil can use the Windows command line to delete volume shadow copies and disable recovery.
['T1059.003']
RGDoor uses cmd.exe to execute commands on the victim’s machine.
['T1059.003']
RTM uses the command line and rundll32.exe to execute.
['T1059.003']
Ragnar Locker has used cmd.exe and batch scripts to execute commands.
['T1059.003']
RainyDay can use the Windows Command Shell for execution.
['T1059.003']
Rancor has used cmd.exe to execute commmands.
['T1059.003']
RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell.
['T1059.003']
Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine.
['T1059.003']
RobbinHood uses cmd.exe on the victim's computer.
['T1059.003']
RunningRAT uses a batch file to kill a security program task and then attempts to remove itself.
['T1059.003']
Ryuk has used "cmd.exe" to create a Registry entry to establish persistence.
['T1059.003']
S-Type has provided the ability to execute shell commands on a compromised host.
['T1059.003']
SDBbot has the ability to use the command shell to execute commands on a compromised host.
['T1059.003']
SEASHARPEE can execute commands on victims.
['T1059.003']
SNUGRIDE is capable of executing commands and spawning a reverse shell.
['T1059.003']
STARWHALE has the ability to execute commands via `cmd.exe`.
['T1059.003']
SYSCON has the ability to execute commands through cmd on a compromised host.
['T1059.003']
Saint Bot has used `cmd.exe` and `.bat` scripts for execution.
['T1059.003']
Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell.
['T1059.003']
SamSam uses custom batch scripts to execute some of its components.
['T1059.003']
Sandworm Team has run the "xp_cmdshell" command in MS-SQL.
['T1059.003']
SeaDuke is capable of executing commands.
['T1059.003']
Seasalt uses cmd.exe to create a reverse shell on the infected endpoint.
['T1059.003']
Seth-Locker can execute commands via the command line shell.
['T1059.003']
Several tools used by Suckfly have been command-line driven.
['T1059.003']
Shark has the ability to use `CMD` to execute commands.
['T1059.003']
SharpStage can execute arbitrary commands with the command line.
['T1059.003']
ShimRat can be issued a command shell function from the C2.
['T1059.003']
SideTwist can execute shell commands on a compromised host.
['T1059.003']
Small Sieve can use `cmd.exe` to execute commands on a victim's system.
['T1059.003']
StreamEx has the ability to remotely execute commands.
['T1059.003']
TA505 has executed commands using "cmd.exe".
['T1059.003']
TA551 has used "cmd.exe" to execute commands.
['T1059.003']
TAINTEDSCRIBE can enable Windows CLI access and execute files.
['T1059.003']
TDTESS provides a reverse shell on the victim.
['T1059.003']
TEXTMATE executes cmd.exe to provide a reverse shell to adversaries.
['T1059.003']
TYPEFRAME can uninstall malware components using a batch script. TYPEFRAME can execute commands using a shell.
['T1059.003']
Taidoor can copy cmd.exe into the system temp folder.
['T1059.003']
Tarrask may abuse the Windows schtasks command-line tool to create "hidden" scheduled tasks.
['T1059.003']
TeamTNT has used batch scripts to download tools and executing cryptocurrency miners.
['T1059.003']
The C# implementation of the CharmPower command execution module can use "cmd".
['T1059.003']
The Maze encryption process has used batch scripts with various commands.
['T1059.003']
Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands.
['T1059.003']
Threat Group-3390 has used command-line interfaces for execution.
['T1059.003']
TinyTurla has been installed using a .bat file.
['T1059.003']
TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine.
['T1059.003']
Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process.
['T1059.003']
Tropic Trooper has used Windows command scripts.
['T1059.003']
Turian can create a remote shell and execute commands using cmd.
['T1059.003']
UBoatRAT can start a command shell.
['T1059.003']
UNC2452 used "cmd.exe" to execute commands on remote machines.
['T1059.003']
UPPERCUT uses cmd.exe to execute commands on the victim’s machine.
['T1059.003']
USBferry can execute various Windows commands.
['T1059.003']
Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet
['T1059.003']
Volgmer can execute commands on the victim's machine.
['T1059.003']
WEBC2 can open an interactive command shell.
['T1059.003']
WarzoneRAT can use `cmd.exe` to execute malicious code.
['T1059.003']
WellMess can execute command line scripts received from C2.
['T1059.003']
Wiarp creates a backdoor through which remote attackers can open a command line interface.
['T1059.003']
XTunnel has been used to execute remote commands.
['T1059.003']
Zebrocy uses cmd.exe to execute commands on the system.
['T1059.003']
ZxShell can launch a reverse command shell.
['T1059.003']
adbupd can run a copy of cmd.exe.
['T1059.003']
ccf32 has used `cmd.exe` for archiving data and deleting files.
['T1059.003']
cmd is used to execute programs and other actions at the command-line interface.
['T1059.003']
hcdLoader provides command-line access to the compromised system.
['T1059.003']
httpclient opens cmd.exe on the victim.
['T1059.003']
jRAT has command line access.
['T1059.003']
menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files.
['T1059.003']
njRAT can launch a command shell interface for executing commands.
['T1059.003']
xCaon has a command to start an interactive shell.
['T1059.003']
zwShell can launch command-line shells.
['T1059.003']
Anchor can execute payloads via shell scripting.
['T1059.004']
Bundlore has leveraged /bin/sh and /bin/bash to execute commands on the victim machine.
['T1059.004']
CallMe has the capability to create a reverse shell on victims.
['T1059.004']
Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.
['T1059.004', 'T1573.001']
CookieMiner has used a Unix shell script to run a series of commands targeting macOS.
['T1059.004']
Drovorub can execute arbitrary commands as root on a compromised system.
['T1059.004']
Exaramel for Linux has a command to execute a shell command on the system.
['T1059.004']
Fysbis has the ability to create and execute commands in a remote shell for CLI.
['T1059.004']
Kinsing has used Unix shell scripts to execute commands in the victim environment.
['T1059.004']
Kobalos can spawn a new pseudo-terminal and execute arbitrary commands at the command prompt.
['T1059.004']
LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization.
['T1059.004']
MacMa can execute supplied shell commands and uses bash scripts to perform additional actions.
['T1059.004']
NETWIRE has the ability to use "/bin/bash" and "/bin/sh" to execute commands.
['T1059.004']
OSX/Shlayer can use bash scripts to check the macOS version, download payloads, and extract bytes from files. OSX/Shlayer uses the command "sh -c tail -c +1381..." to extract bytes at an offset from a specified file. OSX/Shlayer uses the "curl -fsL "$url" >$tmp_path" command to download malicious payloads into a temporary directory.
['T1059.004']
Penquin can execute remote commands using bash scripts.
['T1059.004']
Proton uses macOS' .command file type to script actions.
['T1059.004']
Rocke used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware.
['T1059.004']
Skidmap has used "pm.sh" to download and install its main payload.
['T1059.004']
TeamTNT has used shell scripts for execution.
['T1059.004']
XCSSET uses a shell script to execute Mach-o files and "osacompile" commands such as, "osacompile -x -o xcode.app main.applescript".
['T1059.004']
APT29 has written malware variants in Visual Basic.
['T1059.005']
APT33 has used VBScript to initiate the delivery of payloads.
['T1059.005']
APT37 executes shellcode and a VBA script to decode Base64 strings.
['T1059.005']
APT38 has used VBScript to execute commands and other operational tasks.
['T1059.005']
APT39 has utilized malicious VBS scripts in malware.
['T1059.005']
Astaroth has used malicious VBS e-mail attachments for execution.
['T1059.005']
BRONZE BUTLER has used VBS and VBE scripts for execution.
['T1059.005']
BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code.
['T1059.005']