prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Command and Scripting Interpreter:Visual Basic | It has used VBS scripts as well as embedded macros for execution. |
Command and Scripting Interpreter:Visual Basic | Remexi uses AutoIt and VBS scripts throughout its execution process. |
Command and Scripting Interpreter:Visual Basic | REvil has used obfuscated VBA macros for execution. |
Command and Scripting Interpreter:Visual Basic | ROKRAT has used Visual Basic for execution. |
Command and Scripting Interpreter:Visual Basic | Saint Bot has used .vbs scripts for execution. |
Command and Scripting Interpreter:Visual Basic | It has created VBScripts to run an SSH server. |
Command and Scripting Interpreter:Visual Basic | Sibot executes commands using VBScript. |
Command and Scripting Interpreter:Visual Basic | It has sent Microsoft Office Publisher documents to victims that have embedded malicious macros that execute an hta file via calling mshta.exe. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript to drop and execute malware loaders. |
Command and Scripting Interpreter:Visual Basic | It has used VBS scripts. |
Command and Scripting Interpreter:Visual Basic | Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload. |
Command and Scripting Interpreter:Visual Basic | Snip3 can use visual basic scripts for first-stage execution. |
Command and Scripting Interpreter:Visual Basic | For the SolarWinds Compromise, It wrote malware such as Sibot in Visual Basic. |
Command and Scripting Interpreter:Visual Basic | Squirrelwaffle has used malicious VBA macros in Microsoft Word documents and Excel spreadsheets that execute an AutoOpen subroutine. |
Command and Scripting Interpreter:Visual Basic | STARWHALE can use the VBScript function GetRef as part of its persistence mechanism. |
Command and Scripting Interpreter:Visual Basic | StoneDrill has several VBS scripts used throughout the malware's lifecycle. |
Command and Scripting Interpreter:Visual Basic | SUNBURST used VBScripts to initiate the execution of payloads. |
Command and Scripting Interpreter:Visual Basic | SVCReady has used VBA macros to execute shellcode. |
Command and Scripting Interpreter:Visual Basic | It has used VBS files to execute or establish persistence for additional payloads, often using file names consistent with email themes or mimicking system functionality. |
Command and Scripting Interpreter:Visual Basic | It has a VBScript for execution. |
Command and Scripting Interpreter:Visual Basic | It has used VBS for code execution. |
Command and Scripting Interpreter:Visual Basic | It has crafted VBS-based malicious documents. |
Command and Scripting Interpreter:Visual Basic | It has used VBS scripts throughout its operations. |
Command and Scripting Interpreter:Visual Basic | TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution. |
Command and Scripting Interpreter:Visual Basic | Ursnif droppers have used VBA macros to download and execute the malware's full executable payload. |
Command and Scripting Interpreter:Visual Basic | VBShower has the ability to execute VBScript files. |
Command and Scripting Interpreter:Visual Basic | WhisperGate can use a Visual Basic script to exclude the C:\ drive from Windows Defender. |
Command and Scripting Interpreter:Visual Basic | It has used Visual Basic 6 (VB6) payloads. |
Command and Scripting Interpreter:Visual Basic | It has used VBScript in its operations. |
Command and Scripting Interpreter:Visual Basic | Xbash can execute malicious VBScript payloads on the victim’s machine. |
Command and Scripting Interpreter:Python | It has developed malware variants written in Python. |
Command and Scripting Interpreter:Python | It has used Python scripts to execute payloads. |
Command and Scripting Interpreter:Python | It has used a command line utility and a network scanner written in python. |
Command and Scripting Interpreter:Python | Bandook can support commands to execute Python-based payloads. |
Command and Scripting Interpreter:Python | It has made use of Python-based remote access tools. |
Command and Scripting Interpreter:Python | Bundlore has used Python scripts to execute payloads. |
Command and Scripting Interpreter:Python | Chaes has used Python scripts for execution and the installation of additional files. |
Command and Scripting Interpreter:Python | Cobalt Strike can use Python to perform execution. |
Command and Scripting Interpreter:Python | CoinTicker executes a Python script to download its second stage. |
Command and Scripting Interpreter:Python | CookieMiner has used python scripts on the user’s system, as well as the Python variant of the Empire agent, EmPyre. |
Command and Scripting Interpreter:Python | Donut can generate shellcode outputs that execute via Python. |
Command and Scripting Interpreter:Python | It has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim. |
Command and Scripting Interpreter:Python | DropBook is a Python-based backdoor compiled with PyInstaller. |
Command and Scripting Interpreter:Python | It used Python scripts for port scanning or building reverse shells. |
Command and Scripting Interpreter:Python | Ebury has used Python to implement its DGA. |
Command and Scripting Interpreter:Python | IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector. |
Command and Scripting Interpreter:Python | KeyBoy uses Python scripts for installing files and performing execution. |
Command and Scripting Interpreter:Python | Keydnap uses Python for scripting to execute additional commands. |
Command and Scripting Interpreter:Python | It has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data. |
Command and Scripting Interpreter:Python | It is written in Python and is used in conjunction with additional Python scripts. |
Command and Scripting Interpreter:Python | It used multiple compiled Python scripts on the victim’s system. It's main backdoor It is also written in Python. |
Command and Scripting Interpreter:Python | MechaFlounder uses a python-based payload. |
Command and Scripting Interpreter:Python | It has used developed tools in Python including Out1. |
Command and Scripting Interpreter:Python | During Operation Wocao, threat actors' backdoors were written in Python and compiled with py2exe. |
Command and Scripting Interpreter:Python | PoetRAT was executed with a Python script and worked in conjunction with additional Python-based post-exploitation tools. |
Command and Scripting Interpreter:Python | PUNCHBUGGY has used python scripts. |
Command and Scripting Interpreter:Python | Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts ("scriptlets") to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc. |
Command and Scripting Interpreter:Python | PyDCrypt, along with its functions, is written in Python. |
Command and Scripting Interpreter:Python | Pysa has used Python scripts to deploy ransomware. |
Command and Scripting Interpreter:Python | Remcos uses Python scripts. |
Command and Scripting Interpreter:Python | It has used Python-based malware to install and spread their coinminer. |
Command and Scripting Interpreter:Python | SILENTTRINITY is written in Python and can use multiple Python scripts for execution on targeted systems. |
Command and Scripting Interpreter:Python | Small Sieve can use Python scripts to execute commands. |
Command and Scripting Interpreter:Python | SpeakUp uses Python scripts. |
Command and Scripting Interpreter:Python | It has used Python-based tools for execution. |
Command and Scripting Interpreter:Python | Turian has the ability to use Python to spawn a Unix shell. |
Command and Scripting Interpreter:Python | It has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads. |
Command and Scripting Interpreter:Python | ItM has used Python-based implants to interact with compromised hosts. |
Command and Scripting Interpreter:JavaScript | AppleSeed has the ability to use JavaScript to execute PowerShell. |
Command and Scripting Interpreter:JavaScript | It has used JavaScript for drive-by downloads and C2 communications. |
Command and Scripting Interpreter:JavaScript | Astaroth uses JavaScript to perform its core functionalities. |
Command and Scripting Interpreter:JavaScript | Avaddon has been executed through a malicious JScript downloader. |
Command and Scripting Interpreter:JavaScript | Bundlore can execute JavaScript by injecting it into the victim's browser. |
Command and Scripting Interpreter:JavaScript | During C0015, the threat actors used a malicious HTA file that contained a mix of encoded HTML and JavaScript/VBScript code. |
Command and Scripting Interpreter:JavaScript | During C0017, It deployed JScript web shells on compromised systems. |
Command and Scripting Interpreter:JavaScript | Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process. |
Command and Scripting Interpreter:JavaScript | It has executed JavaScript scriptlets on the victim's machine. |
Command and Scripting Interpreter:JavaScript | The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions. |
Command and Scripting Interpreter:JavaScript | DarkWatchman uses JavaScript to perform its core functionalities. |
Command and Scripting Interpreter:JavaScript | Donut can generate shellcode outputs that execute via JavaScript or JScript. |
Command and Scripting Interpreter:JavaScript | It has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations. |
Command and Scripting Interpreter:JavaScript | It has used JavaScript to execute malicious code on a victim's machine. |
Command and Scripting Interpreter:JavaScript | EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver. |
Command and Scripting Interpreter:JavaScript | It has used malicious JavaScript files on the victim's machine. |
Command and Scripting Interpreter:JavaScript | It has used malicious JavaScript to steal payment card data from e-commerce sites. |
Command and Scripting Interpreter:JavaScript | It used JavaScript scripts to help perform tasks on the victim's machine. |
Command and Scripting Interpreter:JavaScript | GRIFFON is written in and executed as JavaScript. |
Command and Scripting Interpreter:JavaScript | It used JavaScript to execute additional files. |
Command and Scripting Interpreter:JavaScript | It has used malicious JavaScript files for several components of their attack. |
Command and Scripting Interpreter:JavaScript | InvisiMole can use a JavaScript file as part of its execution chain. |
Command and Scripting Interpreter:JavaScript | jRAT has been distributed as HTA files with JScript. |
Command and Scripting Interpreter:JavaScript | JSS Loader can download and execute JavaScript files. |
Command and Scripting Interpreter:JavaScript | It has used JScript for logging and downloading additional tools. |
Command and Scripting Interpreter:JavaScript | KONNI has executed malicious JavaScript code. |
Command and Scripting Interpreter:JavaScript | KOPILUWAK had used Javascript to perform its core functions. |
Command and Scripting Interpreter:JavaScript | It has used JavaScript in its attacks. |
Command and Scripting Interpreter:JavaScript | It infected victims using JavaScript code. |
Command and Scripting Interpreter:JavaScript | Metamorfo includes payloads written in JavaScript. |
Command and Scripting Interpreter:JavaScript | It used various implants, including those built with JS, on target machines. |
Command and Scripting Interpreter:JavaScript | It has used JavaScript to deliver malware hosted on HTML pages. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.