Skip to content

Latest commit

 

History

History
18 lines (15 loc) · 1.09 KB

LOLBAS.md

File metadata and controls

18 lines (15 loc) · 1.09 KB

Living-off-the-Land Binaries and Scripts

Tip

  • Windows environments are equipped with a wide array of command-line utilities.
  • These tools collectively provide robust support for efficient system management, troubleshooting, and optimization, helping administrators maintain secure, stable, and high-performing Windows environments.

Important

  • Cybercriminals often exploit legitimate Windows administrative tools to execute malicious actions while evading detection.
  • These tools, used for tasks such as remote execution, file transfers, and system management, allow attackers to move laterally across networks, download and execute malware, manipulate logs, and gather sensitive information.
  • By leveraging these built-in utilities, attackers can conduct their activities stealthily, blending their actions with normal administrative operations.
Tool Name Threat Group Usage
BITSAdmin BERSERK BEAR
MiniDump FANCY BEAR
PsExec COZY BEAR, EMBER BEAR, BERSERK BEAR, Gamaredon, Turla
Windows Event Utility (wevtutil) FANCY BEAR
WMIC COZY BEAR