Adversaries may rename legitimate system utilities to try to evade security mechanisms concerning the usage of those utilities.

Tactics
TA0005

Sub-technique of
T1036


See: MITRE ATT&CK