text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
REvil can use the Windows command line to delete volume shadow copies and disable recovery. | ['T1059.003'] |
RGDoor uses cmd.exe to execute commands on the victim’s machine. | ['T1059.003'] |
RTM uses the command line and rundll32.exe to execute. | ['T1059.003'] |
Ragnar Locker has used cmd.exe and batch scripts to execute commands. | ['T1059.003'] |
RainyDay can use the Windows Command Shell for execution. | ['T1059.003'] |
Rancor has used cmd.exe to execute commmands. | ['T1059.003'] |
RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell. | ['T1059.003'] |
Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine. | ['T1059.003'] |
RobbinHood uses cmd.exe on the victim's computer. | ['T1059.003'] |
RunningRAT uses a batch file to kill a security program task and then attempts to remove itself. | ['T1059.003'] |
Ryuk has used "cmd.exe" to create a Registry entry to establish persistence. | ['T1059.003'] |
S-Type has provided the ability to execute shell commands on a compromised host. | ['T1059.003'] |
SDBbot has the ability to use the command shell to execute commands on a compromised host. | ['T1059.003'] |
SEASHARPEE can execute commands on victims. | ['T1059.003'] |
SNUGRIDE is capable of executing commands and spawning a reverse shell. | ['T1059.003'] |
STARWHALE has the ability to execute commands via `cmd.exe`. | ['T1059.003'] |
SYSCON has the ability to execute commands through cmd on a compromised host. | ['T1059.003'] |
Saint Bot has used `cmd.exe` and `.bat` scripts for execution. | ['T1059.003'] |
Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell. | ['T1059.003'] |
SamSam uses custom batch scripts to execute some of its components. | ['T1059.003'] |
Sandworm Team has run the "xp_cmdshell" command in MS-SQL. | ['T1059.003'] |
SeaDuke is capable of executing commands. | ['T1059.003'] |
Seasalt uses cmd.exe to create a reverse shell on the infected endpoint. | ['T1059.003'] |
Seth-Locker can execute commands via the command line shell. | ['T1059.003'] |
Several tools used by Suckfly have been command-line driven. | ['T1059.003'] |
Shark has the ability to use `CMD` to execute commands. | ['T1059.003'] |
SharpStage can execute arbitrary commands with the command line. | ['T1059.003'] |
ShimRat can be issued a command shell function from the C2. | ['T1059.003'] |
SideTwist can execute shell commands on a compromised host. | ['T1059.003'] |
Small Sieve can use `cmd.exe` to execute commands on a victim's system. | ['T1059.003'] |
StreamEx has the ability to remotely execute commands. | ['T1059.003'] |
TA505 has executed commands using "cmd.exe". | ['T1059.003'] |
TA551 has used "cmd.exe" to execute commands. | ['T1059.003'] |
TAINTEDSCRIBE can enable Windows CLI access and execute files. | ['T1059.003'] |
TDTESS provides a reverse shell on the victim. | ['T1059.003'] |
TEXTMATE executes cmd.exe to provide a reverse shell to adversaries. | ['T1059.003'] |
TYPEFRAME can uninstall malware components using a batch script. TYPEFRAME can execute commands using a shell. | ['T1059.003'] |
Taidoor can copy cmd.exe into the system temp folder. | ['T1059.003'] |
Tarrask may abuse the Windows schtasks command-line tool to create "hidden" scheduled tasks. | ['T1059.003'] |
TeamTNT has used batch scripts to download tools and executing cryptocurrency miners. | ['T1059.003'] |
The C# implementation of the CharmPower command execution module can use "cmd". | ['T1059.003'] |
The Maze encryption process has used batch scripts with various commands. | ['T1059.003'] |
Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands. | ['T1059.003'] |
Threat Group-3390 has used command-line interfaces for execution. | ['T1059.003'] |
TinyTurla has been installed using a .bat file. | ['T1059.003'] |
TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine. | ['T1059.003'] |
Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process. | ['T1059.003'] |
Tropic Trooper has used Windows command scripts. | ['T1059.003'] |
Turian can create a remote shell and execute commands using cmd. | ['T1059.003'] |
UBoatRAT can start a command shell. | ['T1059.003'] |
UNC2452 used "cmd.exe" to execute commands on remote machines. | ['T1059.003'] |
UPPERCUT uses cmd.exe to execute commands on the victim’s machine. | ['T1059.003'] |
USBferry can execute various Windows commands. | ['T1059.003'] |
Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet | ['T1059.003'] |
Volgmer can execute commands on the victim's machine. | ['T1059.003'] |
WEBC2 can open an interactive command shell. | ['T1059.003'] |
WarzoneRAT can use `cmd.exe` to execute malicious code. | ['T1059.003'] |
WellMess can execute command line scripts received from C2. | ['T1059.003'] |
Wiarp creates a backdoor through which remote attackers can open a command line interface. | ['T1059.003'] |
XTunnel has been used to execute remote commands. | ['T1059.003'] |
Zebrocy uses cmd.exe to execute commands on the system. | ['T1059.003'] |
ZxShell can launch a reverse command shell. | ['T1059.003'] |
adbupd can run a copy of cmd.exe. | ['T1059.003'] |
ccf32 has used `cmd.exe` for archiving data and deleting files. | ['T1059.003'] |
cmd is used to execute programs and other actions at the command-line interface. | ['T1059.003'] |
hcdLoader provides command-line access to the compromised system. | ['T1059.003'] |
httpclient opens cmd.exe on the victim. | ['T1059.003'] |
jRAT has command line access. | ['T1059.003'] |
menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files. | ['T1059.003'] |
njRAT can launch a command shell interface for executing commands. | ['T1059.003'] |
xCaon has a command to start an interactive shell. | ['T1059.003'] |
zwShell can launch command-line shells. | ['T1059.003'] |
Anchor can execute payloads via shell scripting. | ['T1059.004'] |
Bundlore has leveraged /bin/sh and /bin/bash to execute commands on the victim machine. | ['T1059.004'] |
CallMe has the capability to create a reverse shell on victims. | ['T1059.004'] |
Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES. | ['T1059.004', 'T1573.001'] |
CookieMiner has used a Unix shell script to run a series of commands targeting macOS. | ['T1059.004'] |
Drovorub can execute arbitrary commands as root on a compromised system. | ['T1059.004'] |
Exaramel for Linux has a command to execute a shell command on the system. | ['T1059.004'] |
Fysbis has the ability to create and execute commands in a remote shell for CLI. | ['T1059.004'] |
Kinsing has used Unix shell scripts to execute commands in the victim environment. | ['T1059.004'] |
Kobalos can spawn a new pseudo-terminal and execute arbitrary commands at the command prompt. | ['T1059.004'] |
LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization. | ['T1059.004'] |
MacMa can execute supplied shell commands and uses bash scripts to perform additional actions. | ['T1059.004'] |
NETWIRE has the ability to use "/bin/bash" and "/bin/sh" to execute commands. | ['T1059.004'] |
OSX/Shlayer can use bash scripts to check the macOS version, download payloads, and extract bytes from files. OSX/Shlayer uses the command "sh -c tail -c +1381..." to extract bytes at an offset from a specified file. OSX/Shlayer uses the "curl -fsL "$url" >$tmp_path" command to download malicious payloads into a temporary directory. | ['T1059.004'] |
Penquin can execute remote commands using bash scripts. | ['T1059.004'] |
Proton uses macOS' .command file type to script actions. | ['T1059.004'] |
Rocke used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware. | ['T1059.004'] |
Skidmap has used "pm.sh" to download and install its main payload. | ['T1059.004'] |
TeamTNT has used shell scripts for execution. | ['T1059.004'] |
XCSSET uses a shell script to execute Mach-o files and "osacompile" commands such as, "osacompile -x -o xcode.app main.applescript". | ['T1059.004'] |
APT29 has written malware variants in Visual Basic. | ['T1059.005'] |
APT33 has used VBScript to initiate the delivery of payloads. | ['T1059.005'] |
APT37 executes shellcode and a VBA script to decode Base64 strings. | ['T1059.005'] |
APT38 has used VBScript to execute commands and other operational tasks. | ['T1059.005'] |
APT39 has utilized malicious VBS scripts in malware. | ['T1059.005'] |
Astaroth has used malicious VBS e-mail attachments for execution. | ['T1059.005'] |
BRONZE BUTLER has used VBS and VBE scripts for execution. | ['T1059.005'] |
BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code. | ['T1059.005'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.