Skip to main content

Payload

IDDescriptionSignificance / Prevalence
BH12331Executes code directly from the Internet.
BH12381Injects a DLL to a DNS server.
BH12382Injects CSS into a page.
BH12383Injects JavaScript code into a page.
BH12386Installs or removes Windows Store apps.
BH12407Loads additional snap-ins or modules to the current session.
BH12408Loads additional snippets in Integrated Scripting Environment (ISE).
BH13294Contains SigLoader tool functionality, which is used for decrypting and loading shellcode.
BH15217Contains Base64-encoded data.
BH20113Uses a Nishang command to create a Compiled HTML Help file (.CHM) that could be used to run PowerShell commands and scripts.
BH20114Uses a Nishang command to create a JavaScript file, that could be used to run PowerShell commands and scripts.
BH20115Uses a Nishang command to create a shortcut capable of launching PowerShell commands and scripts.
BH20116Uses a Nishang command to create a Web Query (.iqy) file that can be used for phishing attacks.
BH20117Uses a Nishang command to create malicious SCT files that could be used to run PowerShell commands and scripts.
BH20118Uses a Nishang command to create SCF files that could be used to capture NTLM hashes.
BH20141Uses a Nishang command to generate a malicious HTML Application.
BH20142Uses a Nishang command to generate and modify existing Excel files with an auto-executable macro or DDE.
BH20143Uses a Nishang command to generate and modify existing Word files with an auto-executable macro or DDE.
BH20144Uses a Nishang command to generate DNS TXT records that could be used with other scripts.
BH20145Uses a Nishang command to generate JAR files to be used for Java Applet attacks.
BH20146Uses a Nishang command to generate rundll32.exe one-line commands that run PowerShell commands.
BH20231Uses PowerSploit/Empire command to install a security support provider (SSP) DLL.
BH20235Uses PowerSploit/Empire command to load Mimikatz tool in memory.
BH20245Uses PowerSploit/Empire command to patch in the path to a specified .bat (containing the specified command) into a pre-compiled hijackable C++ DLL and write the DLL out to the specified ServicePath location.
BH20255Uses PowerSploit/Empire command to replace the service binary for the specified service with one that executes a specified command as SYSTEM.
BH20319Uses PowerSploit/Empire command to write out a precompiled MSI installer that prompts for a user/group addition.