prompt
stringclasses
508 values
procedure
stringlengths
20
478
Command and Scripting Interpreter:Visual Basic
It has used VBS scripts as well as embedded macros for execution.
Command and Scripting Interpreter:Visual Basic
Remexi uses AutoIt and VBS scripts throughout its execution process.
Command and Scripting Interpreter:Visual Basic
REvil has used obfuscated VBA macros for execution.
Command and Scripting Interpreter:Visual Basic
ROKRAT has used Visual Basic for execution.
Command and Scripting Interpreter:Visual Basic
Saint Bot has used .vbs scripts for execution.
Command and Scripting Interpreter:Visual Basic
It has created VBScripts to run an SSH server.
Command and Scripting Interpreter:Visual Basic
Sibot executes commands using VBScript.
Command and Scripting Interpreter:Visual Basic
It has sent Microsoft Office Publisher documents to victims that have embedded malicious macros that execute an hta file via calling mshta.exe.
Command and Scripting Interpreter:Visual Basic
It has used VBScript to drop and execute malware loaders.
Command and Scripting Interpreter:Visual Basic
It has used VBS scripts.
Command and Scripting Interpreter:Visual Basic
Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload.
Command and Scripting Interpreter:Visual Basic
Snip3 can use visual basic scripts for first-stage execution.
Command and Scripting Interpreter:Visual Basic
For the SolarWinds Compromise, It wrote malware such as Sibot in Visual Basic.
Command and Scripting Interpreter:Visual Basic
Squirrelwaffle has used malicious VBA macros in Microsoft Word documents and Excel spreadsheets that execute an AutoOpen subroutine.
Command and Scripting Interpreter:Visual Basic
STARWHALE can use the VBScript function GetRef as part of its persistence mechanism.
Command and Scripting Interpreter:Visual Basic
StoneDrill has several VBS scripts used throughout the malware's lifecycle.
Command and Scripting Interpreter:Visual Basic
SUNBURST used VBScripts to initiate the execution of payloads.
Command and Scripting Interpreter:Visual Basic
SVCReady has used VBA macros to execute shellcode.
Command and Scripting Interpreter:Visual Basic
It has used VBS files to execute or establish persistence for additional payloads, often using file names consistent with email themes or mimicking system functionality.
Command and Scripting Interpreter:Visual Basic
It has a VBScript for execution.
Command and Scripting Interpreter:Visual Basic
It has used VBS for code execution.
Command and Scripting Interpreter:Visual Basic
It has crafted VBS-based malicious documents.
Command and Scripting Interpreter:Visual Basic
It has used VBS scripts throughout its operations.
Command and Scripting Interpreter:Visual Basic
TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.
Command and Scripting Interpreter:Visual Basic
Ursnif droppers have used VBA macros to download and execute the malware's full executable payload.
Command and Scripting Interpreter:Visual Basic
VBShower has the ability to execute VBScript files.
Command and Scripting Interpreter:Visual Basic
WhisperGate can use a Visual Basic script to exclude the C:\ drive from Windows Defender.
Command and Scripting Interpreter:Visual Basic
It has used Visual Basic 6 (VB6) payloads.
Command and Scripting Interpreter:Visual Basic
It has used VBScript in its operations.
Command and Scripting Interpreter:Visual Basic
Xbash can execute malicious VBScript payloads on the victim’s machine.
Command and Scripting Interpreter:Python
It has developed malware variants written in Python.
Command and Scripting Interpreter:Python
It has used Python scripts to execute payloads.
Command and Scripting Interpreter:Python
It has used a command line utility and a network scanner written in python.
Command and Scripting Interpreter:Python
Bandook can support commands to execute Python-based payloads.
Command and Scripting Interpreter:Python
It has made use of Python-based remote access tools.
Command and Scripting Interpreter:Python
Bundlore has used Python scripts to execute payloads.
Command and Scripting Interpreter:Python
Chaes has used Python scripts for execution and the installation of additional files.
Command and Scripting Interpreter:Python
Cobalt Strike can use Python to perform execution.
Command and Scripting Interpreter:Python
CoinTicker executes a Python script to download its second stage.
Command and Scripting Interpreter:Python
CookieMiner has used python scripts on the user’s system, as well as the Python variant of the Empire agent, EmPyre.
Command and Scripting Interpreter:Python
Donut can generate shellcode outputs that execute via Python.
Command and Scripting Interpreter:Python
It has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim.
Command and Scripting Interpreter:Python
DropBook is a Python-based backdoor compiled with PyInstaller.
Command and Scripting Interpreter:Python
It used Python scripts for port scanning or building reverse shells.
Command and Scripting Interpreter:Python
Ebury has used Python to implement its DGA.
Command and Scripting Interpreter:Python
IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector.
Command and Scripting Interpreter:Python
KeyBoy uses Python scripts for installing files and performing execution.
Command and Scripting Interpreter:Python
Keydnap uses Python for scripting to execute additional commands.
Command and Scripting Interpreter:Python
It has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data.
Command and Scripting Interpreter:Python
It is written in Python and is used in conjunction with additional Python scripts.
Command and Scripting Interpreter:Python
It used multiple compiled Python scripts on the victim’s system. It's main backdoor It is also written in Python.
Command and Scripting Interpreter:Python
MechaFlounder uses a python-based payload.
Command and Scripting Interpreter:Python
It has used developed tools in Python including Out1.
Command and Scripting Interpreter:Python
During Operation Wocao, threat actors' backdoors were written in Python and compiled with py2exe.
Command and Scripting Interpreter:Python
PoetRAT was executed with a Python script and worked in conjunction with additional Python-based post-exploitation tools.
Command and Scripting Interpreter:Python
PUNCHBUGGY has used python scripts.
Command and Scripting Interpreter:Python
Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts ("scriptlets") to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc.
Command and Scripting Interpreter:Python
PyDCrypt, along with its functions, is written in Python.
Command and Scripting Interpreter:Python
Pysa has used Python scripts to deploy ransomware.
Command and Scripting Interpreter:Python
Remcos uses Python scripts.
Command and Scripting Interpreter:Python
It has used Python-based malware to install and spread their coinminer.
Command and Scripting Interpreter:Python
SILENTTRINITY is written in Python and can use multiple Python scripts for execution on targeted systems.
Command and Scripting Interpreter:Python
Small Sieve can use Python scripts to execute commands.
Command and Scripting Interpreter:Python
SpeakUp uses Python scripts.
Command and Scripting Interpreter:Python
It has used Python-based tools for execution.
Command and Scripting Interpreter:Python
Turian has the ability to use Python to spawn a Unix shell.
Command and Scripting Interpreter:Python
It has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads.
Command and Scripting Interpreter:Python
ItM has used Python-based implants to interact with compromised hosts.
Command and Scripting Interpreter:JavaScript
AppleSeed has the ability to use JavaScript to execute PowerShell.
Command and Scripting Interpreter:JavaScript
It has used JavaScript for drive-by downloads and C2 communications.
Command and Scripting Interpreter:JavaScript
Astaroth uses JavaScript to perform its core functionalities.
Command and Scripting Interpreter:JavaScript
Avaddon has been executed through a malicious JScript downloader.
Command and Scripting Interpreter:JavaScript
Bundlore can execute JavaScript by injecting it into the victim's browser.
Command and Scripting Interpreter:JavaScript
During C0015, the threat actors used a malicious HTA file that contained a mix of encoded HTML and JavaScript/VBScript code.
Command and Scripting Interpreter:JavaScript
During C0017, It deployed JScript web shells on compromised systems.
Command and Scripting Interpreter:JavaScript
Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process.
Command and Scripting Interpreter:JavaScript
It has executed JavaScript scriptlets on the victim's machine.
Command and Scripting Interpreter:JavaScript
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions.
Command and Scripting Interpreter:JavaScript
DarkWatchman uses JavaScript to perform its core functionalities.
Command and Scripting Interpreter:JavaScript
Donut can generate shellcode outputs that execute via JavaScript or JScript.
Command and Scripting Interpreter:JavaScript
It has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations.
Command and Scripting Interpreter:JavaScript
It has used JavaScript to execute malicious code on a victim's machine.
Command and Scripting Interpreter:JavaScript
EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver.
Command and Scripting Interpreter:JavaScript
It has used malicious JavaScript files on the victim's machine.
Command and Scripting Interpreter:JavaScript
It has used malicious JavaScript to steal payment card data from e-commerce sites.
Command and Scripting Interpreter:JavaScript
It used JavaScript scripts to help perform tasks on the victim's machine.
Command and Scripting Interpreter:JavaScript
GRIFFON is written in and executed as JavaScript.
Command and Scripting Interpreter:JavaScript
It used JavaScript to execute additional files.
Command and Scripting Interpreter:JavaScript
It has used malicious JavaScript files for several components of their attack.
Command and Scripting Interpreter:JavaScript
InvisiMole can use a JavaScript file as part of its execution chain.
Command and Scripting Interpreter:JavaScript
jRAT has been distributed as HTA files with JScript.
Command and Scripting Interpreter:JavaScript
JSS Loader can download and execute JavaScript files.
Command and Scripting Interpreter:JavaScript
It has used JScript for logging and downloading additional tools.
Command and Scripting Interpreter:JavaScript
KONNI has executed malicious JavaScript code.
Command and Scripting Interpreter:JavaScript
KOPILUWAK had used Javascript to perform its core functions.
Command and Scripting Interpreter:JavaScript
It has used JavaScript in its attacks.
Command and Scripting Interpreter:JavaScript
It infected victims using JavaScript code.
Command and Scripting Interpreter:JavaScript
Metamorfo includes payloads written in JavaScript.
Command and Scripting Interpreter:JavaScript
It used various implants, including those built with JS, on target machines.
Command and Scripting Interpreter:JavaScript
It has used JavaScript to deliver malware hosted on HTML pages.