text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Bisonal's dropper creates VBS scripts on the victim’s machine. | ['T1059.005'] |
Bumblebee can create a Visual Basic script to enable persistence. | ['T1059.005'] |
Chaes has used VBscript to execute malicious code. | ['T1059.005'] |
Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution. | ['T1059.005'] |
Cobalt Strike can use VBA to perform execution. | ['T1059.005'] |
Confucius has used VBScript to execute malicious code. | ['T1059.005'] |
DanBot can use a VBA macro embedded in an Excel file to drop the payload. | ['T1059.005'] |
Donut can generate shellcode outputs that execute via VBScript. | ['T1059.005'] |
During C0015, the threat actors used a malicious HTA file that contained a mix of HTML and JavaScript/VBScript code. | ['T1059.005'] |
During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script. | ['T1059.005'] |
During Operation CuckooBees, the threat actors executed an encoded VBScript file using `wscript` and wrote the decoded output to a text file. | ['T1059.005'] |
During Operation Dust Storm, the threat actors used Visual Basic scripts. | ['T1059.005'] |
During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun. | ['T1059.005'] |
Earth Lusca used VBA scripts. | ['T1059.005'] |
Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads. | ['T1059.005'] |
FIN4 has used VBA macros to display a dialog box and collect victim credentials. | ['T1059.005'] |
Ferocious has the ability to use Visual Basic scripts for execution. | ['T1059.005'] |
Flagpro can execute malicious VBA macros embedded in .xlsm files. | ['T1059.005'] |
For Operation Honeybee, the threat actors used a Visual Basic script embedded within a Word document to download an implant. | ['T1059.005'] |
Gamaredon Group has embedded malicious macros in document templates, which executed VBScript. Gamaredon Group has also delivered Microsoft Outlook VBA projects with embedded macros. | ['T1059.005'] |
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2. | ['T1059.005', 'T1071.003'] |
Grandoreiro can use VBScript to execute malicious code. | ['T1059.005'] |
Honeybee embeds a Visual Basic script within a malicious Word document as part of initial access; the script is executed when the Word document is opened. | ['T1059.005'] |
IcedID has used obfuscated VBA string expressions. | ['T1059.005'] |
Inception has used VBScript to execute malicious commands and payloads. | ['T1059.005'] |
JCry has used VBS scripts. | ['T1059.005'] |
JSS Loader can download and execute VBScript files. | ['T1059.005'] |
Javali has used embedded VBScript to download malicious payloads from C2. | ['T1059.005'] |
KOCTOPUS has used VBScript to call wscript to execute a PowerShell command. | ['T1059.005'] |
Kimsuky has used Visual Basic to download malicious payloads. Kimsuky has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure. | ['T1059.005'] |
Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode . | ['T1059.005'] |
Lazarus Group has used VBA and embedded macros in Word documents to execute malicious code. | ['T1059.005'] |
Lazarus Group has used VBScript to gather information about a victim machine. | ['T1059.005'] |
Lokibot has used VBS scripts and XLS macros for execution. | ['T1059.005'] |
LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host. | ['T1059.005'] |
Machete has embedded malicious macros within spearphishing attachments to download additional files. | ['T1059.005'] |
Magic Hound malware has used VBS scripts for execution. | ['T1059.005'] |
Melcoz can use VBS scripts to execute malicious DLLs. | ['T1059.005'] |
Metamorfo has used VBS code on victims’ systems. | ['T1059.005'] |
MuddyWater has used VBScript files to execute its POWERSTATS payload, as well as macros. | ['T1059.005'] |
NETWIRE has been executed through use of VBScripts. | ['T1059.005'] |
NanHaiShu executes additional VBScript code on the victim's machine. | ['T1059.005'] |
NanoCore uses VBS files. | ['T1059.005'] |
OSX_OCEANLOTUS.D uses Word macros for execution. | ['T1059.005'] |
OilRig has used VBSscipt macros for execution on compromised hosts. | ['T1059.005'] |
One version of Helminth consists of VBScript scripts. | ['T1059.005'] |
OopsIE creates and uses a VBScript as part of its persistent execution. | ['T1059.005'] |
Operation Wocao has used a VBScript to conduct reconnaissance on targeted systems. | ['T1059.005'] |
POWERSTATS can use VBScript (VBE) code for execution. | ['T1059.005'] |
Patchwork used Visual Basic Scripts (VBS) on victim machines. | ['T1059.005'] |
Pteranodon can use a malicious VBS file for execution. | ['T1059.005'] |
QUADAGENT uses VBScripts. | ['T1059.005'] |
REvil has used obfuscated VBA macros for execution. | ['T1059.005'] |
Ramsay has included embedded Visual Basic scripts in malicious documents. | ['T1059.005'] |
Rancor has used VBS scripts as well as embedded macros for execution. | ['T1059.005'] |
Remexi uses AutoIt and VBS scripts throughout its execution process. | ['T1059.005'] |
SUNBURST used VBScripts to initiate the execution of payloads. | ['T1059.005'] |
Saint Bot has used `.vbs` scripts for execution. | ['T1059.005'] |
Sibot executes commands using VBScript. | ['T1059.005'] |
Sidewinder has used VBScript to drop and execute malware loaders. | ['T1059.005'] |
Silence has used VBS scripts. | ['T1059.005'] |
Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload. | ['T1059.005'] |
StoneDrill has several VBS scripts used throughout the malware's lifecycle. | ['T1059.005'] |
TA459 has a VBScript for execution. | ['T1059.005'] |
TA505 has used VBS for code execution. | ['T1059.005'] |
TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution. | ['T1059.005'] |
Transparent Tribe has crafted VBS-based malicious documents. | ['T1059.005'] |
Turla has used VBS scripts throughout its operations. | ['T1059.005'] |
Ursnif droppers have used VBA macros to download and execute the malware's full executable payload. | ['T1059.005'] |
WIRTE has used VBScript in its operations. | ['T1059.005'] |
WhisperGate can use a Visual Basic script to exclude the `C:\` drive from Windows Defender. | ['T1059.005'] |
Windshift has used Visual Basic 6 (VB6) payloads. | ['T1059.005'] |
jRAT has been distributed as HTA files with VBScript. | ['T1059.005'] |
APT29 has developed malware variants written in Python. | ['T1059.006'] |
APT37 has used Python scripts to execute payloads. | ['T1059.006'] |
APT39 has used a command line utility and a network scanner written in python. | ['T1059.006'] |
BRONZE BUTLER has made use of Python-based remote access tools. | ['T1059.006'] |
Bundlore has used Python scripts to execute payloads. | ['T1059.006'] |
Cobalt Strike can use Python to perform execution. | ['T1059.006'] |
CoinTicker executes a Python script to download its second stage. | ['T1059.006', 'T1105'] |
CookieMiner has used python scripts on the user’s system, as well as the Python variant of the Empire agent, EmPyre. | ['T1059.006'] |
Dragonfly 2.0 used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim. | ['T1059.006'] |
Dragonfly has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim. | ['T1059.006'] |
DropBook is a Python-based backdoor compiled with PyInstaller. | ['T1059.006'] |
During Operation Wocao, threat actors' backdoors were written in Python and compiled with py2exe. | ['T1059.006'] |
IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector. | ['T1059.006'] |
KeyBoy uses Python scripts for installing files and performing execution. | ['T1059.006'] |
Keydnap uses Python for scripting to execute additional commands. | ['T1059.006'] |
Machete used multiple compiled Python scripts on the victim’s system. Machete's main backdoor Machete is also written in Python. | ['T1059.006'] |
MechaFlounder uses a python-based payload. | ['T1059.006'] |
MuddyWater has used developed tools in Python including Out1. | ['T1059.006'] |
Operation Wocao's backdoors have been written in Python and compiled with py2exe. | ['T1059.006'] |
PUNCHBUGGY has used python scripts. | ['T1059.006'] |
Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts (“scriptlets”) to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc. | ['T1059.006'] |
PyDCrypt, along with its functions, is written in Python. | ['T1059.006'] |
Pysa has used Python scripts to deploy ransomware. | ['T1059.006'] |
Remcos uses Python scripts. | ['T1059.006'] |
Rocke has used Python-based malware to install and spread their coinminer. | ['T1059.006'] |
Small Sieve can use Python scripts to execute commands. | ['T1059.006'] |
SpeakUp uses Python scripts. | ['T1059.006'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.