text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Bisonal's dropper creates VBS scripts on the victim’s machine.
['T1059.005']
Bumblebee can create a Visual Basic script to enable persistence.
['T1059.005']
Chaes has used VBscript to execute malicious code.
['T1059.005']
Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution.
['T1059.005']
Cobalt Strike can use VBA to perform execution.
['T1059.005']
Confucius has used VBScript to execute malicious code.
['T1059.005']
DanBot can use a VBA macro embedded in an Excel file to drop the payload.
['T1059.005']
Donut can generate shellcode outputs that execute via VBScript.
['T1059.005']
During C0015, the threat actors used a malicious HTA file that contained a mix of HTML and JavaScript/VBScript code.
['T1059.005']
During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script.
['T1059.005']
During Operation CuckooBees, the threat actors executed an encoded VBScript file using `wscript` and wrote the decoded output to a text file.
['T1059.005']
During Operation Dust Storm, the threat actors used Visual Basic scripts.
['T1059.005']
During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun.
['T1059.005']
Earth Lusca used VBA scripts.
['T1059.005']
Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.
['T1059.005']
FIN4 has used VBA macros to display a dialog box and collect victim credentials.
['T1059.005']
Ferocious has the ability to use Visual Basic scripts for execution.
['T1059.005']
Flagpro can execute malicious VBA macros embedded in .xlsm files.
['T1059.005']
For Operation Honeybee, the threat actors used a Visual Basic script embedded within a Word document to download an implant.
['T1059.005']
Gamaredon Group has embedded malicious macros in document templates, which executed VBScript. Gamaredon Group has also delivered Microsoft Outlook VBA projects with embedded macros.
['T1059.005']
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.
['T1059.005', 'T1071.003']
Grandoreiro can use VBScript to execute malicious code.
['T1059.005']
Honeybee embeds a Visual Basic script within a malicious Word document as part of initial access; the script is executed when the Word document is opened.
['T1059.005']
IcedID has used obfuscated VBA string expressions.
['T1059.005']
Inception has used VBScript to execute malicious commands and payloads.
['T1059.005']
JCry has used VBS scripts.
['T1059.005']
JSS Loader can download and execute VBScript files.
['T1059.005']
Javali has used embedded VBScript to download malicious payloads from C2.
['T1059.005']
KOCTOPUS has used VBScript to call wscript to execute a PowerShell command.
['T1059.005']
Kimsuky has used Visual Basic to download malicious payloads. Kimsuky has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure.
['T1059.005']
Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode .
['T1059.005']
Lazarus Group has used VBA and embedded macros in Word documents to execute malicious code.
['T1059.005']
Lazarus Group has used VBScript to gather information about a victim machine.
['T1059.005']
Lokibot has used VBS scripts and XLS macros for execution.
['T1059.005']
LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host.
['T1059.005']
Machete has embedded malicious macros within spearphishing attachments to download additional files.
['T1059.005']
Magic Hound malware has used VBS scripts for execution.
['T1059.005']
Melcoz can use VBS scripts to execute malicious DLLs.
['T1059.005']
Metamorfo has used VBS code on victims’ systems.
['T1059.005']
MuddyWater has used VBScript files to execute its POWERSTATS payload, as well as macros.
['T1059.005']
NETWIRE has been executed through use of VBScripts.
['T1059.005']
NanHaiShu executes additional VBScript code on the victim's machine.
['T1059.005']
NanoCore uses VBS files.
['T1059.005']
OSX_OCEANLOTUS.D uses Word macros for execution.
['T1059.005']
OilRig has used VBSscipt macros for execution on compromised hosts.
['T1059.005']
One version of Helminth consists of VBScript scripts.
['T1059.005']
OopsIE creates and uses a VBScript as part of its persistent execution.
['T1059.005']
Operation Wocao has used a VBScript to conduct reconnaissance on targeted systems.
['T1059.005']
POWERSTATS can use VBScript (VBE) code for execution.
['T1059.005']
Patchwork used Visual Basic Scripts (VBS) on victim machines.
['T1059.005']
Pteranodon can use a malicious VBS file for execution.
['T1059.005']
QUADAGENT uses VBScripts.
['T1059.005']
REvil has used obfuscated VBA macros for execution.
['T1059.005']
Ramsay has included embedded Visual Basic scripts in malicious documents.
['T1059.005']
Rancor has used VBS scripts as well as embedded macros for execution.
['T1059.005']
Remexi uses AutoIt and VBS scripts throughout its execution process.
['T1059.005']
SUNBURST used VBScripts to initiate the execution of payloads.
['T1059.005']
Saint Bot has used `.vbs` scripts for execution.
['T1059.005']
Sibot executes commands using VBScript.
['T1059.005']
Sidewinder has used VBScript to drop and execute malware loaders.
['T1059.005']
Silence has used VBS scripts.
['T1059.005']
Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload.
['T1059.005']
StoneDrill has several VBS scripts used throughout the malware's lifecycle.
['T1059.005']
TA459 has a VBScript for execution.
['T1059.005']
TA505 has used VBS for code execution.
['T1059.005']
TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.
['T1059.005']
Transparent Tribe has crafted VBS-based malicious documents.
['T1059.005']
Turla has used VBS scripts throughout its operations.
['T1059.005']
Ursnif droppers have used VBA macros to download and execute the malware's full executable payload.
['T1059.005']
WIRTE has used VBScript in its operations.
['T1059.005']
WhisperGate can use a Visual Basic script to exclude the `C:\` drive from Windows Defender.
['T1059.005']
Windshift has used Visual Basic 6 (VB6) payloads.
['T1059.005']
jRAT has been distributed as HTA files with VBScript.
['T1059.005']
APT29 has developed malware variants written in Python.
['T1059.006']
APT37 has used Python scripts to execute payloads.
['T1059.006']
APT39 has used a command line utility and a network scanner written in python.
['T1059.006']
BRONZE BUTLER has made use of Python-based remote access tools.
['T1059.006']
Bundlore has used Python scripts to execute payloads.
['T1059.006']
Cobalt Strike can use Python to perform execution.
['T1059.006']
CoinTicker executes a Python script to download its second stage.
['T1059.006', 'T1105']
CookieMiner has used python scripts on the user’s system, as well as the Python variant of the Empire agent, EmPyre.
['T1059.006']
Dragonfly 2.0 used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim.
['T1059.006']
Dragonfly has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim.
['T1059.006']
DropBook is a Python-based backdoor compiled with PyInstaller.
['T1059.006']
During Operation Wocao, threat actors' backdoors were written in Python and compiled with py2exe.
['T1059.006']
IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector.
['T1059.006']
KeyBoy uses Python scripts for installing files and performing execution.
['T1059.006']
Keydnap uses Python for scripting to execute additional commands.
['T1059.006']
Machete used multiple compiled Python scripts on the victim’s system. Machete's main backdoor Machete is also written in Python.
['T1059.006']
MechaFlounder uses a python-based payload.
['T1059.006']
MuddyWater has used developed tools in Python including Out1.
['T1059.006']
Operation Wocao's backdoors have been written in Python and compiled with py2exe.
['T1059.006']
PUNCHBUGGY has used python scripts.
['T1059.006']
Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts (“scriptlets”) to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc.
['T1059.006']
PyDCrypt, along with its functions, is written in Python.
['T1059.006']
Pysa has used Python scripts to deploy ransomware.
['T1059.006']
Remcos uses Python scripts.
['T1059.006']
Rocke has used Python-based malware to install and spread their coinminer.
['T1059.006']
Small Sieve can use Python scripts to execute commands.
['T1059.006']
SpeakUp uses Python scripts.
['T1059.006']