prompt
stringclasses
508 values
procedure
stringlengths
20
478
Command and Scripting Interpreter:Windows Command Shell
Remexi silently executes received commands with cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine.
Command and Scripting Interpreter:Windows Command Shell
REvil can use the Windows command line to delete volume shadow copies and disable recovery.
Command and Scripting Interpreter:Windows Command Shell
RGDoor uses cmd.exe to execute commands on the victim’s machine.
Command and Scripting Interpreter:Windows Command Shell
Rising Sun has executed commands using cmd.exe /c "<command> > <%temp%>\AM<random>. tmp" 2>&1.
Command and Scripting Interpreter:Windows Command Shell
RobbinHood uses cmd.exe on the victim's computer.
Command and Scripting Interpreter:Windows Command Shell
RogueRobin uses Windows Script Components.
Command and Scripting Interpreter:Windows Command Shell
It uses the command line and rundll32.exe to execute.
Command and Scripting Interpreter:Windows Command Shell
RunningRAT uses a batch file to kill a security program task and then attempts to remove itself.
Command and Scripting Interpreter:Windows Command Shell
Ryuk has used cmd.exe to create a Registry entry to establish persistence.
Command and Scripting Interpreter:Windows Command Shell
S-Type has provided the ability to execute shell commands on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
Saint Bot has used cmd.exe and .bat scripts for execution.
Command and Scripting Interpreter:Windows Command Shell
Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell.
Command and Scripting Interpreter:Windows Command Shell
SamSam uses custom batch scripts to execute some of its components.
Command and Scripting Interpreter:Windows Command Shell
Sardonic has the ability to run cmd.exe or other interactive processes on a compromised computer.
Command and Scripting Interpreter:Windows Command Shell
SDBbot has the ability to use the command shell to execute commands on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
SeaDuke is capable of executing commands.
Command and Scripting Interpreter:Windows Command Shell
Seasalt uses cmd.exe to create a reverse shell on the infected endpoint.
Command and Scripting Interpreter:Windows Command Shell
SEASHARPEE can execute commands on victims.
Command and Scripting Interpreter:Windows Command Shell
ServHelper can execute shell commands against cmd.
Command and Scripting Interpreter:Windows Command Shell
Seth-Locker can execute commands via the command line shell.
Command and Scripting Interpreter:Windows Command Shell
Shark has the ability to use CMD to execute commands.
Command and Scripting Interpreter:Windows Command Shell
SharpDisco can use cmd.exe to execute plugins and to send command output to specified SMB shares.
Command and Scripting Interpreter:Windows Command Shell
SharpStage can execute arbitrary commands with the command line.
Command and Scripting Interpreter:Windows Command Shell
ShimRat can be issued a command shell function from the C2.
Command and Scripting Interpreter:Windows Command Shell
SideTwist can execute shell commands on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
It has used Windows command-line to run commands.
Command and Scripting Interpreter:Windows Command Shell
SILENTTRINITY can use cmd.exe to enable lateral movement using DCOM.
Command and Scripting Interpreter:Windows Command Shell
Siloscape can run cmd through an IRC channel.
Command and Scripting Interpreter:Windows Command Shell
SLOTHFULMEDIA can open a command line to execute commands.
Command and Scripting Interpreter:Windows Command Shell
Small Sieve can use cmd.exe to execute commands on a victim's system.
Command and Scripting Interpreter:Windows Command Shell
SNUGRIDE is capable of executing commands and spawning a reverse shell.
Command and Scripting Interpreter:Windows Command Shell
During the SolarWinds Compromise, It used cmd.exe to execute commands on remote machines.
Command and Scripting Interpreter:Windows Command Shell
It has used command line during its intrusions.
Command and Scripting Interpreter:Windows Command Shell
Spark can use cmd.exe to run commands.
Command and Scripting Interpreter:Windows Command Shell
SQLRat has used SQL to execute JavaScript and VB scripts on the host system.
Command and Scripting Interpreter:Windows Command Shell
Squirrelwaffle has used cmd.exe for execution.
Command and Scripting Interpreter:Windows Command Shell
STARWHALE has the ability to execute commands via cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
StreamEx has the ability to remotely execute commands.
Command and Scripting Interpreter:Windows Command Shell
StrifeWater can execute shell commands using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
Several tools used by It have been command-line driven.
Command and Scripting Interpreter:Windows Command Shell
SUGARUSH has used cmd for execution on an infected host.
Command and Scripting Interpreter:Windows Command Shell
SYSCON has the ability to execute commands through cmd on a compromised host.
Command and Scripting Interpreter:Windows Command Shell
It has executed commands using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
It has used cmd.exe to execute commands.
Command and Scripting Interpreter:Windows Command Shell
Taidoor can copy cmd.exe into the system temp folder.
Command and Scripting Interpreter:Windows Command Shell
TAINTEDSCRIBE can enable Windows CLI access and execute files.
Command and Scripting Interpreter:Windows Command Shell
Tarrask may abuse the Windows schtasks command-line tool to create "hidden" scheduled tasks.
Command and Scripting Interpreter:Windows Command Shell
TDTESS provides a reverse shell on the victim.
Command and Scripting Interpreter:Windows Command Shell
It has used batch scripts to download tools and executing cryptocurrency miners.
Command and Scripting Interpreter:Windows Command Shell
TEXTMATE executes cmd.exe to provide a reverse shell to adversaries.
Command and Scripting Interpreter:Windows Command Shell
It actors spawned shells on remote systems on a victim network to execute commands.
Command and Scripting Interpreter:Windows Command Shell
It has used command-line interfaces for execution.
Command and Scripting Interpreter:Windows Command Shell
TinyIt has been installed using a .bat file.
Command and Scripting Interpreter:Windows Command Shell
TinyZBot supports execution from the command-line.
Command and Scripting Interpreter:Windows Command Shell
TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine.
Command and Scripting Interpreter:Windows Command Shell
Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process.
Command and Scripting Interpreter:Windows Command Shell
It has used Windows command scripts.
Command and Scripting Interpreter:Windows Command Shell
TSCookie has the ability to execute shell commands on the infected host.
Command and Scripting Interpreter:Windows Command Shell
Turian can create a remote shell and execute commands using cmd.
Command and Scripting Interpreter:Windows Command Shell
It RPC backdoors have used cmd.exe to execute commands.
Command and Scripting Interpreter:Windows Command Shell
TURNEDUP is capable of creating a reverse shell.
Command and Scripting Interpreter:Windows Command Shell
TYPEFRAME can uninstall malware components using a batch script. TYPEFRAME can execute commands using a shell.
Command and Scripting Interpreter:Windows Command Shell
UBoatRAT can start a command shell.
Command and Scripting Interpreter:Windows Command Shell
Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet
Command and Scripting Interpreter:Windows Command Shell
UPPERCUT uses cmd.exe to execute commands on the victim’s machine.
Command and Scripting Interpreter:Windows Command Shell
Uroburos has the ability to use the command line for execution on the targeted system.
Command and Scripting Interpreter:Windows Command Shell
USBferry can execute various Windows commands.
Command and Scripting Interpreter:Windows Command Shell
Volgmer can execute commands on the victim's machine.
Command and Scripting Interpreter:Windows Command Shell
It has used the Windows command line to perform hands-on-keyboard activities in targeted environments including for discovery.
Command and Scripting Interpreter:Windows Command Shell
WarzoneRAT can use cmd.exe to execute malicious code.
Command and Scripting Interpreter:Windows Command Shell
WastedLocker has used cmd to execute commands on the system.
Command and Scripting Interpreter:Windows Command Shell
WEBC2 can open an interactive command shell.
Command and Scripting Interpreter:Windows Command Shell
WellMess can execute command line scripts received from C2.
Command and Scripting Interpreter:Windows Command Shell
WhisperGate can use cmd.exe to execute commands.
Command and Scripting Interpreter:Windows Command Shell
Wiarp creates a backdoor through which remote attackers can open a command line interface.
Command and Scripting Interpreter:Windows Command Shell
It has used cmd.exe to execute commands on a victim's machine.
Command and Scripting Interpreter:Windows Command Shell
Woody RAT can execute commands using cmd.exe.
Command and Scripting Interpreter:Windows Command Shell
xCaon has a command to start an interactive shell.
Command and Scripting Interpreter:Windows Command Shell
XTunnel has been used to execute remote commands.
Command and Scripting Interpreter:Windows Command Shell
Zebrocy uses cmd.exe to execute commands on the system.
Command and Scripting Interpreter:Windows Command Shell
Zeus Panda can launch an interface where it can execute several commands on the victim’s PC.
Command and Scripting Interpreter:Windows Command Shell
ItM has used a tool to open a Windows Command Shell on a remote host.
Command and Scripting Interpreter:Windows Command Shell
ZLib has the ability to execute shell commands.
Command and Scripting Interpreter:Windows Command Shell
zwShell can launch command-line shells.
Command and Scripting Interpreter:Windows Command Shell
ZxShell can launch a reverse command shell.
Command and Scripting Interpreter:Unix Shell
Anchor can execute payloads via shell scripting.
Command and Scripting Interpreter:Unix Shell
AppleJeus has used shell scripts to execute commands after installation and set persistence mechanisms.
Command and Scripting Interpreter:Unix Shell
It executed file /bin/pwd in activity exploiting CVE-2019-19781 against Citrix devices.
Command and Scripting Interpreter:Unix Shell
Bundlore has leveraged /bin/sh and /bin/bash to execute commands on the victim machine.
Command and Scripting Interpreter:Unix Shell
CallMe has the capability to create a reverse shell on victims.
Command and Scripting Interpreter:Unix Shell
Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.
Command and Scripting Interpreter:Unix Shell
CoinTicker executes a bash script to establish a reverse shell.
Command and Scripting Interpreter:Unix Shell
CookieMiner has used a Unix shell script to run a series of commands targeting macOS.
Command and Scripting Interpreter:Unix Shell
Derusbi is capable of creating a remote Bash shell and executing commands.
Command and Scripting Interpreter:Unix Shell
Doki has executed shell scripts with /bin/sh.
Command and Scripting Interpreter:Unix Shell
Drovorub can execute arbitrary commands as root on a compromised system.
Command and Scripting Interpreter:Unix Shell
Exaramel for Linux has a command to execute a shell command on the system.
Command and Scripting Interpreter:Unix Shell
Fysbis has the ability to create and execute commands in a remote shell for CLI.
Command and Scripting Interpreter:Unix Shell
Green Lambert can use shell scripts for execution, such as /bin/sh -c.