performing-lateral-movement-with-wmiexec
Audited by Socket on Apr 12, 2026
2 alerts found:
SecurityMalwareSUSPICIOUS/HIGH-RISK skill. The stated purpose is openly offensive and the actual footprint matches: remote execution, subnet-wide lateral movement, pass-the-hash, persistence, and credential harvesting. Tool references are partly legitimate and verifiable, so this is not confirmed malware, but it is a dangerous exploit-oriented AI skill with high operational and credential risk.
This artifact is an explicit malicious lateral-movement playbook detailing credential theft (Mimikatz/LaZagne/SAM dumps), account enumeration, and iterative pivoting using WMIExec with operational fallbacks. It describes high-risk post-exploitation techniques intended to achieve remote code execution and domain compromise. Without clear authorized red-team context and controls, treat as malicious guidance and investigate any implementation or distribution.